Page 19 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 19

Resilience Focused Outcomes

            With a better collection of security outcomes, organizations become better at evaluating cyber risk overall.
            Cyber resilience delivers enhanced security outcomes, backed by high fidelity, low volume alerts and
            precision response. Along with an improved security posture, cyber resilience   helps security leaders
            deliver better narratives to stakeholders.

            Deepwatch recommends organizations measure cyber resilience based on three pillars:



            Better Evaluation of Risk

               •  Internal, External, System and Business Risks
               •  Go beyond prioritization based on scan results
               •  Dynamic Alerting and prioritization based on internal and external context



            Response Actions

               •  The right action at the right time. Automation is critical, but so is understanding the risk of taking
                   an action.
               •  Planning and executing the combination of active responses needed, along with policy changes,
                   that enable preventative defenses.
               •  A precise mix of policy-based, automated, and human-enabled responses.
               •  Active response capability beyond the detection point.




            Continuous Improvement

               •  Threats are constantly changing, our defenses and our responses to attacks evolve but also need
                   to be measured and improved
               •  Deepwatch  Security  Expert-led  security  partnership  based  on  common  goals  and  Key
                   Performance Indicators (KPIs)



            Supported by these three pillars, organizations can better chart their security journey to enable cyber
            resilience. Together we review the current state of the security program and help customers understand
            their risks and response capabilities. From there we work to improve response plans, security team
            processes, and communication to other stakeholders.











                                                                                                              19
   14   15   16   17   18   19   20   21   22   23   24