Page 63 - index
P. 63
recent breach, a DHS official indicated that the “good news” was that the OPM
discovered the breach using the new tools. This is a real world example
demonstrating the benefits of deploying new tools.
• Invest more in response and shift the mindset to continuous response. If
attacks are continuous and we are continuously monitoring, then the next logical
step is to adopt a continuous approach to response. I think the first step in this
journey is for organizations to invest more in response, period. People, process,
and technology are all important. The response mindset also needs to
change. Historically, response has been episodic or event-driven (“I’ve been
attacked – Do something!) This mindset needs to shift to continuous response
(“I’m getting attacked all the time – Do something!”). A key ingredient to
enable continuous incident response will be the increasing use of
automation. Why? Automation is required to keep up with attackers that are
leveraging automation to attack. It’s also required to address a key challenge that
large and small companies face – the significant cybersecurity skills shortage.
Attacks like the one on OPM aren’t going away. We need to learn what we can to reinforce our
defenses. The answer lies in finding ways to continuously detect, investigate and remove
advanced threats within the network before attackers can steal data, compromise intellectual
property or cause process disruption.
About the Author:
Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions
in March 2014. His responsibilities include analyst relations, competitive
and market intelligence, corporate visibility, M&A, and strategic
partnership development. Todd draws on his 17+ years of experience as
an equity research analyst where he covered the security industry for
much of that time. In his equity research career Todd provided research
coverage of over 60 companies across several technology sectors,
including security, infrastructure software, data center/cloud hosting, and
healthcare IT.
Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog
Twitter: @hexis_cyber
LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
63 Cyber Warnings E-Magazine – June 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide