Page 62 - index
P. 62
Second, due to the ever-increasing size of networks and the number of threats, the capture and
analysis process needs to be scalable.
Scalability is pivotal so information can be utilized and the risk of ignoring a critical piece of
information eliminated. The analysis needs to happen in real-time in order to be useful and allow
your security team to respond quickly to current threats.
Finally, the analysis should result in actionable information (like you’ve never heard that term
before!) that correlates directly to your network. Not all threats are equally important, and the
analysis should connect hypothetical risks to specific vulnerabilities inherent in the company's
network architecture.
When presented to senior leadership, the analysis should present a clear picture of the critical
risks, enabling approval of the mitigation plan. When leadership and technical resources share a
common view of the strategy and priorities, an efficient and cost-effective process for reducing
the risks can be put in place.
About the Author
Mark Bevilacqua
As the VP of Customer Success at IKANOW, Mark is responsible for
Services engagements and makes sure that our customers get the
most out of their data. Mark is a veteran of the USAF and has led
teams at AOL, CSC, Kastle Systems and most recently, Digital
Reasoning where he helped to solve complex business data issues
with advanced technology. When not spending time with his wife
and two sons, he is coaching his boys in Little League and Rugby.
62 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide