4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

In years past cyber security was a relatively straightforward topic. Basic monitoring programs were developed specifically for the detection of threats, such as worms and viruses. And this type of defense was perfectly acceptable and highly effective, mainly due to the fact that the very nature of the attacks was simple and therefore relatively easy to control. Back then, it was all about protection. But in today’s digital age, it’s about response. Specifically, it’s about ensuring that the following cyber security incident response components are put in place in order to successfully identify, address and combat the increasingly complex and persistent attacks.  And as we look to the future of cyber security, we can safely assume that incident response will play an even more critical role.  Four critical components stand out as we prepare for the road ahead.

Observation

This process takes monitoring and extends it to a greater degree. The fact is, in order to address highly sophisticated, advanced persistent threats (APTs), security professionals absolutely must employ tools and technologies that are equally advanced and capable of engaging in real-time threat detection. This includes 24/7 oversight of all networks, systems and applications. It’s also important to point out that security incidents are not all the same. In order to understand and address incoming threats, comprehensive observation across the entire organization is absolutely critical.

Orientation

The moment an incident has been identified, the security team must then orient itself to determine the attack’s specific context. Simply recognizing that a threat is eminent isn’t enough. IT personnel must also obtain valuable insight into the meaning behind that attack. Often times the orientation of an attack can be linked – either directly or indirectly - to what’s happening within the organization. For instance, the adoption of a new software package or the announcement of a new strategic partnership. The more information IT is able to discern about the reasons behind the attack, the more capable they will be to not only address the current threat but also develop a more solid cyber security incident response strategy moving forward.

Decision

With an in-depth understanding of what the incoming threat is, how and why it’s happening, the incident response team must then focus on the next step of determining what actions should be taken. This step can be especially challenging, particularly in organizations that have complex hierarchies, because it often requires executive input, which can impede timely response. Furthermore, all decisions must be properly documented and adequately defensible.  Those who are working on the front line require immediate access to data if they are to take the appropriate steps to combat the attack and mitigate potential damages. This is one area where organizations can and should adopt a proactive approach so as to avoid frustrating bottlenecks and costly delays.

Action

Finally, the decided-upon action must be taken in order to extinguish the threat and effectively limit the level of damages that it has the potential to cause. Because today’s security incidents vary greatly in both complexity as well as context, the cyber security incident response team must maintain comprehensive access to the entire network. Ongoing training and routine audits of this increased access level can help prevent internal problems. Furthermore, the use of best practices based on previous documented incidents can also create a much more effective incident response strategy.

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks. Unfortunately, very few organizations are capable of keeping up without the assistance of technology. So as we head into the unchartered future, automation can be the puzzle piece that ties everything together and facilitates a stronger and more seamless cyber security incident response strategy. With automated IR, every single incoming threat can be instantly detected (observed) and analyzed (oriented). Then, based on the information obtained, the appropriate steps (decisions) can be automatically set into motion (action). Best of all, this can all be done 24/7/365 with little to no human input required.

About the Author

Gabby Nizri is the CEO of Ayehu, Inc. Ayehu provides IT Process Automation solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication and recovery from cyber security breaches.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”