Welcome!

SDN Journal Authors: Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @ThingsExpo, @CloudExpo, Cloud Security

@ThingsExpo: Blog Post

Effective SOC and an Automated Process | @ThingsExpo #IoT #M2M #Cybersecurity

There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity

Why 2017 Is the Time to Invest in an Effective SOC and an Automated Process

Every Security Operations Center (SOC) manager and security analyst is struggling to some degree to stay one step ahead of the dramatic growth in cybercrime and the ransomware epidemic. In fact, according to the Cybersecurity Market Report published by Cybersecurity Ventures, a cyber security research and publishing firm, spending on cybersecurity is predicted to top $1 trillion between 2017 and 2021.

There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity. While the high profile Mirai attacks with the Dyn IoT botnet attack affecting more than 100,000 endpoints is just the latest, the reality is that this is just the tip of the emerging iceberg.

With a developing reality of billions of under-protected Internet of Things (IoT) devices, the threat landscape can no longer be successfully traversed with outmoded processes. In 2017, organizations are increasingly seeing the benefits of investing in an automation platform within the SOC for effectively fighting cyber threats.

Because it's a very lucrative criminal enterprise, ransomware will only get bigger in 2018. The challenge of handling the nearly limitless generated alerts by network-connected devices alone will strain the SOC human resource element beyond its capacity, which only increases malware vulnerability. What is clear is that attacks in 2017 and 2018 will become more sophisticated and targeted against businesses, governments, educational institutions, and consumers on a global scale.

While IoT and the cloud will continue to be major sources of concern around managing cyber security, open source is exponentially adding to those challenges. Only a few major companies were heavily invested in open source in 2007. In 2017, things have drastically changed, as open Docker, OpenStack, and other open source technologies are the building blocks to the digital infrastructure. Around this time last year, it was reported that 87 percent of open-source vulnerabilities are cross-site scripting (XSS) and SQL Injection. Being free, open to everyone, and customizable to fit any need has enabled an open source community of perhaps millions. However, the benefits of open source also expose its vulnerabilities as cyber criminals can see exploitable flaws in the code as well.

It's challenging enough for security experts to design and implement a cybersecurity playbook, let alone integrating, managing and continuously improving it. Every organization is resource-constrained in this regard, which is why many are automating processes to fight cyber threats in 2017 as part of an effective SOC. Since replacing existing solutions falls far short of meeting the challenges, organizations and their security professionals will be looking to ways to create new automated layers of defense. These automated prevention and response technologies are the ideal solution to providing the tools that can adapt to emerging threats. Simultaneously, they will enable these organizations and their security teams to maximize the capabilities of existing human and technological resources.

Cyber Criminals Wreak Havoc
It's true that cyber threats are coming from many multiple places as cyber criminals wreak havoc, commit fraud, steal information, and ultimately cripple corporations and governments. The promise of automated prevention and response technologies is the foundation of a strong cyber security playbook that enables the prepared SOC to have clear approaches and automated processes for an informed threat outlook. This level of better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high impact security events.

A Holistic Approach to Win This Situation
The growing threat landscape has shown organizations that cybersecurity is a vital component that must become part of the fabric of the business. This means having a holistic, intuitive and automated communication, process fulfillment and response platform in order to be competitive in the digital age. These solutions must enable a high level of intuitive product and platform integration with both infrastructure as well as security components of the organization. By integrating advanced automation technologies with cloud architectures and communication platforms, organizations can quickly identify and respond to threats while positioning the business competitively by reducing costs and risks.

This is a growing trend as evidenced by the PwC Global State of Information Security® Survey 2017. The survey shows how "executives are adopting technology and collaborative approaches to cybersecurity and privacy to manage threats and achieve competitive advantages."

More Stories By Slavik Markovich

Slavik Markovich is CEO and Founder of Demisto. He's a serial entrepreneur with a passion to solve hard technology problems. He enjoys reverse engineering things and believes that big things can be built with the right building blocks and strong foundation.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by sharing information within the building and with outside city infrastructure via real time shared cloud capabilities.
In addition to 22 Keynotes and General Sessions, attend all FinTechEXPO Blockchain "education sessions" plus 40 in two tracks: (1) Enterprise Cloud (2) Digital Transformation. PRICE EXPIRES AUGUST 31, 2018. Ticket prices: ($295-Aug 31) ($395-Oct 31) ($495-Nov 12) ($995-Walk-in) Does NOT include lunch.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 Cloud Computing Blogger for IT Integrators" by CRN (2015). Mr. Jackson's professional career includes service in the US Navy Space Systems Command, Vice President J.P. Morgan Chase, Worldwide Sales Executive for IBM and NJVC Vice President, Cloud Services. He is currently part of a team responsible for onboarding mission applications to the US Intelligence Community cloud computing environment (IC ...