01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• What are my options <strong>for</strong> data lake? Where and how data is stored is a critical factor in the flexibility,<br />

speed, quality, and cost of security data processing, ingestion, and storage. Open choice of big<br />

data offers major economic advantages over traditional data warehouses <strong>for</strong> scaling to terabytes<br />

or petabytes. It’s imperative that a SIEM plat<strong>for</strong>m works with what you already have or plan to<br />

purchase versus being locked into a proprietary vendor data lake.<br />

• What does the risk modeling approach look like? Look <strong>for</strong> a plat<strong>for</strong>m that offers self-learning, selftraining,<br />

and contextually aware algorithms that score every transaction as they’re evaluated in<br />

near real time. This requires a comprehensive risk engine that per<strong>for</strong>ms continuous risk scoring<br />

and can provide real time risk prioritized alerts <strong>for</strong> incident analysis. The risk scoring framework<br />

needs to roll up risk scores from multiple contributing elements (with the ability to deliver<br />

normalized user and entity risk scores). As a result, a finite number of targeted response actions<br />

can be defined that are both targeted and driven by high-fidelity automation, and thereby<br />

accelerating threat response.<br />

SIEM is not just about ingesting data sources. To empower security teams these solutions must deliver<br />

a variety of capabilities. This includes providing actionable context of the ingested data, reducing noise,<br />

and identifying and prioritizing the right events associated with an attack. It also means delivering highly<br />

accurate and targeted investigation capabilities with confirmation of the attack and high-confidence<br />

automated responses. Finally, these solutions need to thwart the successful detonation of ransomware<br />

or the execution of the main attack purpose (corruption, disruption, or theft).<br />

A next-generation SIEM with unified security and risk analytics should be the core of a successful security<br />

operations program. Security teams must evaluate innovative technologies that continue to improve and<br />

consolidate analytical capabilities to provide a more usable plat<strong>for</strong>m that also improves the ROI of the<br />

SOC program.<br />

About the Author<br />

Sanjay Raja brings over 20 years of experience in building, marketing<br />

and selling cyber security and networking solutions to enterprises,<br />

medium-to-small business, and managed service providers.<br />

Previously, Sanjay was VP of Marketing at Prevailion, a cyber<br />

intelligence startup. Sanjay has also several successful leadership<br />

roles in Marketing, Product Strategy, Alliances and Engineering at<br />

Digital <strong>Defense</strong> (acquired by Help Systems), Lumeta (acquired by<br />

Firemon), RSA (Netwitness), Cisco Systems, HP Enterprise<br />

Security, Crossbeam Systems, Arbor Networks, Top Layer<br />

Networks, Caw Networks (acquired by Spirent Communications),<br />

Nexsi Systems, 3Com, and Cabletron Systems. Sanjay holds a<br />

B.S.EE and an MBA from Worcester Polytechnic Institute.<br />

Sanjay can be reached online at our company website https://gurucul.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!