Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
11/8/2016
02:47 PM
Ned Miller
Ned Miller
Partner Perspectives
50%
50%

Every Minute Of Security Planning Will Save You 10 Minutes In Execution

Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

Time management guru Brian Tracy is often quoted as saying, “Every minute of planning you do now will save you 10 minutes in execution; this gives you a 1,000% return on energy.”

In cybersecurity, where we are faced with a volume of threats and events that exceeds the capacity of available resources, achieving this level of return on time and energy is essential. Whether you need to update existing plans or build new ones, investing in cyber defensive strategies, incident response plans, security personnel, and operational processes has to be part of your organization’s continuous improvement practice.

When building and updating plans, look to industry best practices. In cybersecurity, this means promoting the use of as much interoperability, automation, and orchestration as possible within an organization’s security operations. However, you will not necessarily get optimal results and maximum velocity by simply adding these capabilities on top of existing architectures, policies, and processes.

Architecture Enables Velocity

Increasing velocity requires an architecture that can actually be sped up. Most organizations rely on a multivendor, siloed security infrastructure, where products do not communicate with each other. These types of security architectures lack sufficient interoperability of the inspection, intelligence gathering, analytics, and enforcement components to gain much from automation.

Interoperability enables automation and improves effectiveness. The active sharing of data makes it practical and possible for every security control to leverage each other’s strengths and experiences. Rather than treating each malware interaction as a standalone event, adaptive threat prevention integrates processes and data through an efficient messaging layer. This approach reinforces levels of inspection and analysis and connects end-to-end components to generate and consume as much actionable intelligence as possible from each event.

Processes And Policies Are Lubricants

An adaptive and interoperable security architecture helps overcome the all too common functional fences that impede detection, response, and any chance of improved prevention. However, this is only possible when the organization’s processes and policies complement the architecture. Unintegrated security functions keep organizations in firefighting mode, always reacting and pouring human resources into every breach. Process inefficiency exhausts scarce investigative resources and lengthens the timeline during which data and networks are exposed to determined attackers, which is directly correlated with the extent of damage.

Automation And Orchestration Are Accelerants

Enabled by an interoperable architecture and efficient processes, automation and orchestration become a force multiplier, augmenting human capabilities, increasing processing capacity, reducing workloads, and significantly improving incident response times. Security products, integrated with a real-time, bidirectional messaging layer, can directly share event data, context, and threat intelligence, regardless of location and with little or no human interaction. This means that you can communicate security policies and commands from centralized security controls to remote branches, home offices, mobile devices, cloud services, and IoT devices.

It is simply no longer acceptable for the time-to-detection to reaction to containment to take hours or even minutes. To accelerate this process and keep up with the enormous volume of sophisticated threats, security architectures and processes must evolve and be automated.

Intel Security’s Data Exchange Layer (DXL) is an open and easily integrated messaging fabric that enables security components from a large ecosystem of vendors to share relevant data. By providing near real-time command and control options for otherwise inaccessible systems, it benefits organizations by facilitating automated response, vastly reduced response times, and better containment. The goal of DXL is to promote collaborative security, enable active command and control, forge interoperability (plug-and-play) among distributed elements from disparate vendors, and ensure consistency and speed of outcomes.

In closing, get started planning today so that you can benefit from the savings on execution time tomorrow. Remember to apply your security reference architecture planning across all phases of your protection domains, including your IoT ecosystems. One last quote from Brian Tracy: “Imagine no limitations; decide what's right and desirable before you decide what's possible.”

Ned Miller, a 30+ year technology industry veteran, is the Chief Technology Strategist for the Intel Security Public Sector division. Mr. Miller is responsible for working with industry and government thought leaders and worldwide public sector customers to ensure that ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.