How do you get there? Increase the cost and effort required by the bad guys and boost your efficiency.

Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security

August 26, 2015

3 Min Read

Post-audit, post-breach, post-I-just-started-a-new-job, you know you should boost your incident-response efforts and may wonder where to invest. In a new SANS survey on incident response, co-sponsored by Intel Security, the top impediments to IR success were predictable, with shortage of skills and budget for tools and technology leading the list (see chart below). 

Intel-IR-chart-1.png

Overall, there’s a correlation between many of the top 10 impediments. For example, a company’s visibility across events and domains and its ability to discern malicious from benign events would both be improved if it had the right tools and technology. This is a vicious circle.

How do you get off this hamster wheel? Through two strategies:

  • Increase the cost and effort required by the bad guys

  • Increase your efficiency

Harder For Them

First, make the bad guys lives’ difficult. For example, in a survey at Black Hat 2015, we asked where people were struggling most today across the attack chain (see chart below). 

Intel-IR-chart-2.png

Mitigation of the number one challenge -- exploitation -- requires reducing the attack surface, not just structurally as you might with controls such as application whitelisting, but in an ongoing way with active vulnerability management.

Incident responders can provide the most valuable insights as to the nature and tactics of attacks and where your specific organizations may be vulnerable. Capturing and sharing that feedback quickly so administrators can refine policies and improve countermeasures can be tremendously helpful in staying on the pre-breachside of the attack timeline. And this effort is selfishly beneficial for incident responders: By raising the bar on protection, fewer security events enter their queue.  

Threat-intelligence sharing is another way that you can make the cybercriminal business less profitable. Attackers have to keep moving on, keep evolving, keep investing. For instance, as you discover new malware in your sandbox, use STIX to share its details. In addition, consume select STIX feeds, hunt for those indicators within your infrastructure, and match your internal detections to industry findings to prioritize events (and the utility of external data). These efforts help address the command-and-control and delivery challenges that Black Hat attendees highlighted.

Easier For You

In addition, drive to increase your efficiency. As the SANS survey shows, there are many different opportunities for improvement in both detection and response such as better detection of stealthy maneuvering through expanded visibility and advanced analytics. This survey shows that correlation and anomaly detection are being adopted and having an impact. It aligns with other survey findings about the value of timely data.

Customers tell us they see ROI when they centralize event and threat data, processes, and policy management. They can distill and prioritize events that are most relevant to their organizations (detect the real malicious events), then contain and remediate compromised systems using centralized tools and workflows. These are the challenges the SANS survey respondents highlighted. Together, these strategies shrink dwell time, reduce the costs of attacks, and enhance that virtuous cycle. 

About the Author(s)

Torry Campbell

Chief Technical Officer of Endpoint and Management at Intel Security

Torry Campbell is the Chief Technology Officer for Endpoint and Management technologies for Intel Security, formerly McAfee. From a decade at McAfee, he couples his security operations background with product management, development, and customer implementation experience to guide the product architecture, to better support the protect-detect-correct-adapt workflow within changing threat and risk requirements. Prior to joining McAfee, Campbell worked for a large professional services company, providing rapid response services for active incidents at enterprise accounts. His expertise spans multiple domains of Information Security, shaped by his experience gained through many years in security operations at a large financial services organization.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights