[BreachExchange] Working Smarter, Not Harder: Bridging the Cyber Security Skills Gap
audrey at riskbasedsecurity.com
Thu Jan 11 18:48:38 EST 2018
>From WannaCry to NotPetya, 2017 brought with it a new wave of
cyber-threats, with machine-speed attacks dominating the headlines on a
regular basis. But while a lot of the commentary in the aftermath of
ransomware attacks was either concerned with finding out who was behind the
attacks, or lamenting our failure to patch, a bigger issue also emerged.
Security teams struggle to react quickly enough in the face of automated
attacks. Sadly, as defenders, we struggle to keep pace with the attackers.
With a skills gap of over a million cyber security professionals worldwide,
how can organizations stay ahead of sophisticated and fast-moving attacks?
Let’s take a look at some tactics that may help you do more with the same
resources in 2018.
Let AI Do the Heavy-lifting
We are facing a dramatic cyber skills shortage, with the demand for skilled
practitioners consistently outstripping supply. Companies struggle to find
the right people for the job but beyond that, analysts have to stay
motivated – avoiding alert fatigue and burnout.
AI technology can not only make our existing teams more efficient, but can
also help with retention by doing the heavy lifting and enabling security
teams to focus on higher-level, strategic work.
By dramatically reducing false positives and alerting security teams to
genuine threats, these technologies can ensure your security team can focus
on researching and remediating the most serious threats on your network.
Additionally, in an era where employers struggle to hire security analysts,
ensure that your cyber professionals remain engaged and avoid burnout.
Be Creative in Your Hiring
Consider rethinking your hiring strategy. Traditionally, most security
teams have consisted of seasoned security professionals and cyber analysts,
who use their experience to identify indicators of threats. However, armed
with AI technology, budding cyber security experts can also catch even the
most pernicious threats.
The most effective security teams aren’t necessarily the largest or the
most experienced, but the most diverse – complete with skilled cyber
professionals, engineers, analysts, and intuitive business thinkers. In
2018, we need to restructure and train our teams to work in tandem with new
AI technologies that catch and respond to threats.
Find Out What’s Happening on the Inside
Armed with a badge into the building and a password to the network, some of
the most impactful breaches start with an insider gone rogue—and yet these
are often the most difficult threats to detect.
A recent Ponemon study found that on average it takes organizations 50 days
to remediate a malicious insider attack. Yet it might take just one day for
an employee with the right access level to obtain a proprietary drug
formula, the details of an upcoming merger, or the launch date of a new
project and exfiltrate the information to a competitor.
In light of this, you should be asking yourself a critical question - Do I
have a tool in my stack that can detect insider threat?
All too often, organizations lack understanding of the normal patterns of
their own employees, let alone rogue devices or third-party exposure.
Without this knowledge, early indicators of threat are often lost in the
noise, not to be discovered until the problem becomes a crisis.
The days of retrospective cyber defense have to be over. In order to
accurately detect insider threat, we need teams and technology that can
quickly identify, understand, and report threatening user and device
behavior—alerting our teams to shifts or changes indicative of early stage
Less is More: Prioritize Threats in Order of Severity
We are drowning in data. ESG research found that 38 percent of
organizations collect, process, and analyze more than 10 terabytes of data
as part of security operations each month, while an Ovum report found that
over a third of banks receive more than 200,000 security alerts daily.
Finding an indicator of the next NotPetya or WannaCry is like trying to
find a needle in a haystack for security teams. Organizations need to not
only find that threat, but find it before it starts inflicting damage – in
other words, in real time. But how can you find the subtle threat lurking
in your network when your team is sifting through 200,000 alerts a day?
Our security teams face the insurmountable task of triaging thousands of
these false positives, traveling between web proxy logs, anti-virus logs,
SIEM logs, and more to ultimately – and unfortunately – find an incomplete
picture of what transpired. The last thing a SOC needs is yet another tool
producing a profusion of alerts.
Investing in methods to effectively visualize and prioritize threats in
order of their severity can prove the difference between finding a threat
as it emerges and finding a threat hundreds of days later. By implementing
a system to rank genuine threats by their level of deviation from ‘normal’,
security teams of all sizes can rapidly investigate, remediate, and move on
to the next incident, resulting in hours saved and a more effective
Equifax is not the only company that has identified a hack long after the
damage is done. As attacks become faster and hackers become smarter, we
need to evolve as well—thinking creatively and finding ways to buy back
time for security teams. Artificial intelligence can do much of the heavy
lifting for us, prioritizing alerts and autonomously responding to slow
threats, while strategic hiring can make our teams more efficient and
effective. These strategies can provide us and our teams with the time to
focus on priorities and strategic initiatives, enabling us to take a more
proactive approach to cyber defense.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the BreachExchange