Cybersecurity is Facing a Cataclysmic Problem
At a time when cybersecurity threats are at an all-time high, an alarming statistic is emerging: Professionals in this field are experiencing high levels of stress and burnout.
At a time when cybersecurity threats are at an all-time high, an alarming statistic is emerging: Professionals in this field are experiencing high levels of stress and burnout.
Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson and Coulehan have been partnering together for almost three years to transform the City’s cybersecurity initiatives and Security Operations Center (SOC).
Cybersecurity teams working in financial and banking settings face a constant struggle — protecting industry regulated data with limited resources. The situation can reach a breaking point when these teams become overwhelmed managing false positive and negative flags triggered by legacy cybersecurity solutions.
Cybersecurity teams working in municipal settings face a constant struggle — protecting vital public network infrastructure with limited resources. The situation can reach a breaking point when these teams become overwhelmed managing false positive and negative flags triggered by legacy cybersecurity solutions.
Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day and novel threats that are often imperceptible by legacy systems.
Keeping up with security alerts can be a Herculean task without the right tools on board. Security teams face more than 11,000 alerts per day on average, according to industry analysts — including thousands of false positives triggered by legacy security solutions.
Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects and even bank fraud,” according to DeepAI and described in three main forms of anomaly detection as: unsupervised, supervised and semi-supervised. Security Operations Center (SOC) analysts use each of these approaches to varying degrees of effectiveness in Cybersecurity applications.
A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the technology itself.
An enterprise’s inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the cost of recovery.
The fundamental SIEM flaws lie in the platform’s need for continual adjustment, endless data stores, and a tendency to create an overwhelming number of false positives. When organizations instead turn to a next-generation cybersecurity solution, which predicts behavior with an unsupervised (zero tuning) system, they are poised to save on both financial and human resources.
When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams up for failure, especially with tools like SIEM, NDR, and NTA.
Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to better protect their now-remote team of employees.
While SIEM is undoubtedly a step up from unmonitored network environments, the inherent nature of today’s SIEM software often falls short in several important ways. SIEM is an outdated solution for adequately protecting networks within the modern threatscape.
As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing regulatory compliance oversight. Over time, the role of the security analyst has expanded to include threat hunting tasks. That is, evaluating security platform …
How the Role of the Modern Security Analyst is Changing Read More →
The world’s reliance on fast, reliable, secure networks has likely never been as apparent as it became in early 2020, when the world responded to the Coronavirus pandemic. Suddenly, vast swaths of the global workforce needed to access and send enormous stores of data from home. In some ways, it couldn’t have happened at a worse time.