01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A very small set of next-gen SIEM solutions are innovating through more unified security and risk<br />

analytics capabilities that are crucial <strong>for</strong> success today. In this article, I’d like to explore why the future of<br />

threat detection and response is stemming from these new advancements.<br />

SIEM was initially designed primarily <strong>for</strong> log collection and storage <strong>for</strong> compliance, then evolved to include<br />

the correlation of more log data sources <strong>for</strong> threat detection. Over time that functionality increased to<br />

integrate log, network, and endpoint data into a single location and match it up with security events. This<br />

helped analysts investigate commonalities or groups of related events. And as rules were developed<br />

around these related events, the SIEM could help to detect known threats.<br />

Then came the rise of the terms like Machine Learning and Artificial Intelligence (ML/AI) – offering the<br />

promise of a silver bullet to solve threat detection and response. However, these terms were commonly<br />

misused and in reality were just rule-based analytics engines that would conditionally gather more data<br />

<strong>for</strong> greater context. However, as attackers stayed hidden inside the network longer, rule-based analytics<br />

often failed to correlate seemingly disparate events across time and continued to focus on known attacks.<br />

As a result, new, unknown, and emerging attacks and variants were easily able to avoid detection.<br />

Furthermore, SIEM were also traditionally plagued by the lack of cloud-native offerings that were built to<br />

handle both cloud and hybrid infrastructures equally.<br />

Today, newer advancements in SIEM are focused in several areas designed to make it the primary<br />

plat<strong>for</strong>m <strong>for</strong> the security operations center (SOC). This includes security monitoring, improved threat<br />

detection, and playbooks to drive faster response. Many EDR, XDR and SIEM solutions that claim to use<br />

ML/AI continue to use rule-based engines with finite models, patterns and signatures that are not updated<br />

fast enough when new attacks are discovered.<br />

However, there are next-gen SIEM solutions incorporating unified security and risk analytics that are<br />

taking the extra step to deliver out-of-the-box advanced data modeling across cloud, user, network, asset,<br />

endpoint, and log telemetry. The few that offer true ML/AI can automatically detect new, unknown, and<br />

emerging attacks, including subtle variants. Along with an understanding of user access and entitlements,<br />

behavioral modeling, and risk metrics, the end goal of next generation SIEM is to streamline every facet<br />

of the SOC. This includes reducing noise and false positives, prioritizing which IoCs need to be<br />

investigated, consolidating data <strong>for</strong> easier investigations, and providing a high confidence, low-risk<br />

automated response to prevent a successful attack.<br />

What does that mean? Let’s look at the key elements of unified security and risk analytics in a nextgeneration<br />

SIEM.<br />

• Unified Correlation, Continuous Risk Profiling and Behavioral Anomaly Detection – A Nextgeneration<br />

SIEM must unify data collection across the entire infrastructure, on-prem, cloud and<br />

remote, by gathering endpoint, log, user, access, entity/asset, network, and other data to provide<br />

greater context. With risk profiling applied to abnormal behaviors, a behavior-based risk can be<br />

calculated to elevate which events are truly relevant <strong>for</strong> investigation, or can even be used to<br />

determine an immediate threat with conviction. This shrinks the noise created by false positives<br />

and provides more context to enable a much more targeted response, ideally be<strong>for</strong>e an attack<br />

campaign starts to establish itself.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!