How To Respond To The Threat Landscape

All too often, employees are told they are the weakest link, but this should not be the case. They can also be a huge asset to any security team if they are given the right tools and trained properly. Like many of the conflicts that we see in the world today, the number of cyber threats has grown exponentially in size and scope, from within the confines of the firewall to traversing the whole internet. What should the response be? #CIOCSS

0
730

The days of the reactive approach to cyber attack vectors are fast fading. The problem is, in this new age of cyber attacks targeting organisations on the open internet, you can no longer wait for the threats to come to you.

With our modern dependence on technology and security, responses to the threat landscape have slowly but surely evolved into an aspect of cyber resilience. It is now part and personal for organisations to understand that security culture needs to be embedded into everything an organisation does.

“Responding to the threat landscape is an art of dynamism, and adapting away from legacy security systems” explained Harrison Mwashuma, an IT Security Consultant at Fortinet. This gives rise to the understanding that threat intelligence is knowledge that allows you to prevent or mitigate those attacks.

Rooted in data, threat intelligence provides context — like who is attacking you, what their motivation and capabilities are, and what indicators of compromise in your systems to look for — that helps you make informed decisions about your security.

“Threats are evolving just as fast as defence mechanisms” added Mwashuma. Despite efforts from organizations, these attacks show no sign of slowing down. The level of sophistication and the capabilities of the perpetrators continue to grow.

To overcome the challenge of skills shortage, appropriate responses to the threat environment revolve around security teams to focus less on repetitive tasks and more on threat hunting. By gathering events and alerts from disparate security tools, the information can be aggregated into a unified platform which acts as force multiplier and reduces response time.

The Cloud and Security Summit unfolds as the digital revolution begins to take root in Kenya. The country’s digital imprint is on the verge of making considerable strides through the advent of new and upcoming technologies. To realize the full potential of digital business, security and risk management must be idealized. The Cloud and Security summit bridged the gap between IT practitioners and the ever evolving link between cloud and security.

 

 

Do you have a story that you think would interest our readers?
Write to us editorial@cio.co.ke

LEAVE A REPLY

Please enter your comment!
Please enter your name here
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.