So it was fitting to attend the keynote by RSA Chairman Art
Coviello and hear him say, “It’s past time for
us to disenthrall ourselves from the reactive and perimeter-based security
dogmas of the past and speed adoption of intelligence-driven
security.” He described a fact that’s inescapable
to all security professionals now, which is that alerting systems and point
solutions for threat response aren’t sufficient to respond to modern threats.
The time has come to change the way we perform incident response by using
rapidly accessible, actionable intelligence to make the stakes higher for hackers,
crackers, and thieves.
Big Data: Double-edged Sword?
He began his address by noting that we’re
in the era of “big data” hype. While big data is potentially a boon to security
approaches, it’s ironic that the very applications and data stores that industry
is beginning to use for marketing and product-development purposes will live in
the cloud and be accessible by mobile devices and therefore become the targets
of the cybercriminals, corporate spies, and nation-state agencies we security
professionals are defending against.
But emerging big-data analytical tools
may soon enable us to “extract meaning, sort through masses of data, and find
the hidden patterns and unexpected correlations” in the millions of attacks
currently being experienced by government and enterprise organization on a
weekly basis.
Which leads directly to the main point
Coviello made: In order to fight cybercriminals and spies effectively, and
knowing that they will breach our firewalls and plant long-term threats in our
data, we must have immediate access to actionable intelligence. This
intelligence will make it possible for us to make tactical counter-strikes
against the bad guys sooner in such a way that it costs them more each and every
time they attempt a breach—setting up a state of diminishing returns.
Triage and Vital Intelligence Will Drive Smarter, Faster
Countermeasures
The problem is, of course, that for too
long there’s been a missing link between alerting systems and point response
tools. That missing link is the ability to rapidly triage, then uncover the
genuine threats and discover their source, scope, and threat on the endpoints
on which they’ve been unleashed. This intelligence then becomes vital
intelligence that can be used in minutes – not days or weeks – to fight the
attackers early in the game.
This is why we’ve created an integration
between EnCase® Cybersecurity and FireEye MPS: because organizations need to
move quickly from alert to triage to intelligence to action. These are exciting
times, and it’s good to be in on the beginning of a collaborative phase in our
industry, where we band together, integrate, and fight faster and smarter
against cybercriminals.
No comments :
Post a Comment