Cybersecurity In-Depth
The Edge

How Can I Help My Team Manage Security Alerts?

Smart prioritization, great staff, and supportive tools are a good start.
Question: What are some of the things I might be doing to worsen the problem of alert fatigue? Chris Morales, head of security analytics at Vectra: Security operations must focus on three key areas: detection, response, and prediction. Security analysts must continuously hunt for attackers already inside the network. They need to be able to respond to the threats that can cause real damage immediately and correctly since not all attacks are the same. Finally, an organization needs to be equipped to learn from attacks, understand its own attack surface and exposure, know the type of attacks it is at risk from, and then combine all this knowledge to predict where an attack could happen next. In short, where is the exposure, what is the motive, where do they need to focus? Doing all the above consistently every day clearly is not easy. Doing all the above quickly while staying consistent to stay ahead of attackers is borderline crazy. Enterprises have three choices here: Hire lots of highly skilled people able to perform security processes consistently at speed day in and day out, use artificial intelligence (AI) to augment existing analysts to be more effective and automate functions to respond in real time, or give up. I believe the most achievable option is to augment security analysts with AI to scale security operations effectively. Related Content: - Surviving Security Alert Fatigue: 7 Tools and Techniques - The 2019 Security Buyer's Guide (from Akamai) - Can I Get More Mileage from My Existing Security Tools? - What Has Cybersecurity Pros So Stressed -- And Why It's Everyone's Problem - The Real Reasons Why the C-Suite Isn't Complying with Security