01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Identity and Access Analytics – Next-gen SIEM uses Identity Analytics (IdA) leveraging data<br />

science that monitors <strong>for</strong> and identifies risky access controls, entitlements, user behaviors, and<br />

associated abnormal or deviant activity. These types of advanced analytics data can also serve<br />

key indicators <strong>for</strong> provisioning, de-provisioning, authentication, and privileged access<br />

management by IAM teams. IdA surpasses human capabilities by leveraging machine learning<br />

models to define, review and confirm accounts and entitlements <strong>for</strong> access, and works with risk<br />

analytics to prioritize suspicious activity as more malicious.<br />

• Cross-Channel Fraud Prevention – Next-gen SIEM offers modern fraud detection capabilities with<br />

the ability to link data from a multitude of sources to provide a contextual view of what’s happening<br />

in the environment. Such plat<strong>for</strong>ms highlight anomalous transactions based on historic user and<br />

community profiles so analysts can initiate investigations or execute automated remediation<br />

actions. It analyzes online and offline activity, including public records, contact center interactions,<br />

point of sale transactions, ATM transactions, and more. It mines and normalizes data and then<br />

creates a risk score <strong>for</strong> fraud and abuse which can be used <strong>for</strong> real-time decision making.<br />

The ability to combine these elements to best suit the needs of an organization offer SecOps power and<br />

flexibility when protecting users and the business from data exfiltration, cyber fraud, privilege access<br />

abuse, account compromise and more – using behavior and context. As a result, teams can prioritize<br />

risks and alerts, quickly investigate problems, automate risk response, have a comprehensive view of<br />

case management, conduct contextual natural language search and more, all consolidated into a single<br />

management console.<br />

As the consolidation of security capabilities continues, providers are working to layer on more capabilities<br />

to further unify security, including UEBA, SOAR and XDR. They’re also working to provide better security<br />

and to lower capital and operational requirements, including scaling, training, management, and<br />

maintenance. In addition, security operations teams have long invested and been focused on external<br />

threats. This has led to a lack of monitoring <strong>for</strong> insider threats. As part of the foundation of a successful<br />

security program, teams must monitor <strong>for</strong> both external and internal threats. And a mature UEBA set of<br />

capabilities should be incorporated to fully protect the organization.<br />

What questions should you be asking today about your SIEM or to your SIEM provider?<br />

• How is the SIEM plat<strong>for</strong>m delivered? The ability to run as a collection of services entirely within<br />

the cloud makes it ideal <strong>for</strong> risk analysis of security data. Organizations have the advantage of<br />

aggregating and analyzing data from worldwide sources in a single application instance. These<br />

plat<strong>for</strong>ms must also scale (both up and down) to accommodate varying workloads. Furthermore,<br />

a cloud-native solution is often easier to maintain over time since the vendor can per<strong>for</strong>m<br />

upgrades quickly, and in real-time.<br />

• Do they offer open analytics and allow teams to easily modify and build customer ML models?<br />

Open analytics are critical <strong>for</strong> security teams to be able to customize their ML models to suit their<br />

specific needs or build their own models. It’s important to understand exactly what goes into a<br />

model to be confident in its output. With black box analytics, results must be taken on faith since<br />

nobody knows how the answers are obtained, or if the results are valid.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!