Page 207 - Cyber Defense eMagazine June 2024
P. 207

Balancing SOAR in a Dynamic Cyber Landscape

            Implementing SOAR solutions presented inherent complexities, largely due to the need for continuous
            adjustment to meet the vast and evolving cyber challenges organizations face. From new partners and
            security solutions being added to the organization, not only does the threat landscape expand, but so
            does the way in which automation responds to these new adjustments. This begs the question then: How
            do you keep an up-to-date security posture if you don’t have full insight into the inner workings of your
            business environment?

            With this skepticism towards full automation, a nuanced market emerged, one that prioritizes security
            solutions  capable  of  identifying  gaps  beyond  mere  log  analysis.  Modern  expectations  extend  to
            automation driven by machine learning, offering not just step-by-step playbooks but also the flexibility for
            customers to engage directly with the remediation process. This approach must be intuitive enough for
            security analysts to navigate effectively, blending automated efficiency with human judgment.



            Rethinking Automation and Building (Human) Trust

            The distinction between "automated remediation" and "automatic remediation" has become central to
            understanding market dynamics. Customers are looking for solutions  that provide the scaffolding for
            automation but leave room for human intervention and decision-making. Furthermore, the demand for
            open systems, accessible via API for those with the technical prowess, underscores a desire for flexibility
            and control over automated processes. The key here is adding in some sort of human element because
            without that automation can’t be fully trusted.

            The narrative around full automation in cybersecurity has often been romanticized, painting a picture of
            a self-sufficient, self-correcting system capable of managing security threats without human intervention.
            However, this overlooks a fundamental aspect of technology adoption: trust. Trust in technology is not a
            given; it must be earned and maintained through transparency, reliability, and the ability to intervene
            when necessary. As we move forward, the challenge for vendors and cybersecurity professionals will be
            to  continue  refining  these  technologies,  ensuring  they  are  not  only  effective  and  efficient  but  also
            trustworthy and adaptable to meet the organization’s needs and the threats posed.



            About the Author

            Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings
            19 years of experience in cybersecurity, advanced threat analysis, and product
            management. Prior to founding Veriti, Oren was a Senior Product Manager at
            Check Point Software Technologies, where he led AI-based innovations and
            advanced  data  analytics  projects  redefining  threat  hunting  and  SIEM
            applications. Before Check Point,  Oren served for 14 years at the prestigious
            8200 unit and was responsible for different cybersecurity activities and research.
            Oren won the Israeli Security Award and 3 MOD awards for cutting-edge innovations in cyber security.
            Oren can be reached at our company website https://veriti.ai/




            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          207
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   202   203   204   205   206   207   208   209   210   211   212