Info
Sec is an uphill battle daily. The entity with limited resources of staffing,
time, and expenses has the duty and responsibility to secure and protect the
enterprise and its data. The entity has only a limited number of staff members
present, space to have them, and costs associated with having the staff members
employed. This limited number of staff members equates to lesser hours being
available during the week to work on it. The entity lastly does not have an
open checkbook to purchase off of the top shelf security applications,
hardware, and scanning tools. All of these can get very costly very quickly.
The attackers, on the other hand, on a collective measure have people coding
malware, scanning, and actively seeking vulnerabilities. This occurs across the
globe. The business, being potentially attacked form anywhere, at any time, by
a large number of people and their bots. The CISO of a targeted organization
has many sleepless nights.
One
tool that is exceptionally helpful with this is predictive analytics.
Previously the businesses would use anti-virus (AV) and log management to
analyze a mass amount of data hoping to note this. The predictive analytics has
been able to add to the set of tools to assist with the function to provide a
greater depth of security.
One way
this is applied is to analyze the probability of an attack occurring. The data
set for this involves several factors, including data on the malware being seen
for the industry and in general, other data breaches, methods used with these,
phishing, and other data. This data coupled with the additional facets of the
attackers provide a sign to be used to compare against for the files, traffic
appearing in the network, emails and other attack vectors that may be present,
helps to provide a better algorithm.
In
implementing this, the items and network areas to review are much smaller and
manageable.
Miel, LLC Infosec Managed Services & Consulting
810-701-5511
charlesparkerii@gmail.com
It is not about winning or losing, but reorienting yourself to the real problem-managing the risk across the enterprise.
No comments:
Post a Comment