PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Cutting SecOps breach response time is key to success
This article is part of the Information Security issue of February 2019, Vol. 20, No. 1
Many companies measure the success of their security operations by how many threats their systems thwart. But even if 95% are stopped, what about the 5% that do get through? A more effective measure of SecOps maturity is how long it takes to detect, understand and contain breaches that actually happen, said Nemertes Research CEO Johna Johnson. Security teams must address three phases in sequence to gauge their SecOps success: detect an event that may be good or bad, determine whether the event is an actual attack and seal off the affected system. After talking to leaders at 625 companies in 12 countries, the Nemertes 2018 Cybersecurity and Risk Management Study revealed vast differences in the time it takes SecOps teams to contain breaches. The top 2% of companies -- primarily financial services, aerospace companies and a few major universities -- can accomplish all three steps in 8 minutes or less. But many organizations take days, weeks or even months to analyze and address a threat, Johnson said.
Features in this issue
-
Battling nation-state cyberattacks in a federal leadership vacuum
Nation-state cyberattacks could be better fought with a united front. But the U.S. government has failed to find a reliable way to deter or stop attackers.
-
Cutting SecOps breach response time is key to success
A new survey measures the success of security operations breach response by how long it takes to complete a three-step process to detect, understand and contain incidents.
News in this issue
-
What a proactive cybersecurity stance means in 2019
Meeting cyberthreats head-on is no longer a choice but a necessity. Learn what dangers IT security teams may face in 2019 and why a proactive attitude is vital.
Columns in this issue
-
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations.