Welcome!

Digital Advertising Authors: John Smith

Related Topics: @ThingsExpo, @CloudExpo, Cloud Security

@ThingsExpo: Blog Post

Effective SOC and an Automated Process | @ThingsExpo #IoT #M2M #Cybersecurity

There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity

Why 2017 Is the Time to Invest in an Effective SOC and an Automated Process

Every Security Operations Center (SOC) manager and security analyst is struggling to some degree to stay one step ahead of the dramatic growth in cybercrime and the ransomware epidemic. In fact, according to the Cybersecurity Market Report published by Cybersecurity Ventures, a cyber security research and publishing firm, spending on cybersecurity is predicted to top $1 trillion between 2017 and 2021.

There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity. While the high profile Mirai attacks with the Dyn IoT botnet attack affecting more than 100,000 endpoints is just the latest, the reality is that this is just the tip of the emerging iceberg.

With a developing reality of billions of under-protected Internet of Things (IoT) devices, the threat landscape can no longer be successfully traversed with outmoded processes. In 2017, organizations are increasingly seeing the benefits of investing in an automation platform within the SOC for effectively fighting cyber threats.

Because it's a very lucrative criminal enterprise, ransomware will only get bigger in 2018. The challenge of handling the nearly limitless generated alerts by network-connected devices alone will strain the SOC human resource element beyond its capacity, which only increases malware vulnerability. What is clear is that attacks in 2017 and 2018 will become more sophisticated and targeted against businesses, governments, educational institutions, and consumers on a global scale.

While IoT and the cloud will continue to be major sources of concern around managing cyber security, open source is exponentially adding to those challenges. Only a few major companies were heavily invested in open source in 2007. In 2017, things have drastically changed, as open Docker, OpenStack, and other open source technologies are the building blocks to the digital infrastructure. Around this time last year, it was reported that 87 percent of open-source vulnerabilities are cross-site scripting (XSS) and SQL Injection. Being free, open to everyone, and customizable to fit any need has enabled an open source community of perhaps millions. However, the benefits of open source also expose its vulnerabilities as cyber criminals can see exploitable flaws in the code as well.

It's challenging enough for security experts to design and implement a cybersecurity playbook, let alone integrating, managing and continuously improving it. Every organization is resource-constrained in this regard, which is why many are automating processes to fight cyber threats in 2017 as part of an effective SOC. Since replacing existing solutions falls far short of meeting the challenges, organizations and their security professionals will be looking to ways to create new automated layers of defense. These automated prevention and response technologies are the ideal solution to providing the tools that can adapt to emerging threats. Simultaneously, they will enable these organizations and their security teams to maximize the capabilities of existing human and technological resources.

Cyber Criminals Wreak Havoc
It's true that cyber threats are coming from many multiple places as cyber criminals wreak havoc, commit fraud, steal information, and ultimately cripple corporations and governments. The promise of automated prevention and response technologies is the foundation of a strong cyber security playbook that enables the prepared SOC to have clear approaches and automated processes for an informed threat outlook. This level of better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high impact security events.

A Holistic Approach to Win This Situation
The growing threat landscape has shown organizations that cybersecurity is a vital component that must become part of the fabric of the business. This means having a holistic, intuitive and automated communication, process fulfillment and response platform in order to be competitive in the digital age. These solutions must enable a high level of intuitive product and platform integration with both infrastructure as well as security components of the organization. By integrating advanced automation technologies with cloud architectures and communication platforms, organizations can quickly identify and respond to threats while positioning the business competitively by reducing costs and risks.

This is a growing trend as evidenced by the PwC Global State of Information Security® Survey 2017. The survey shows how "executives are adopting technology and collaborative approaches to cybersecurity and privacy to manage threats and achieve competitive advantages."

More Stories By Slavik Markovich

Slavik Markovich is CEO and Founder of Demisto. He's a serial entrepreneur with a passion to solve hard technology problems. He enjoys reverse engineering things and believes that big things can be built with the right building blocks and strong foundation.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Cloud Expo Breaking News
“We just completed the roll out of our first public and private cloud offerings, which are a combination of public, hybrid, and private cloud,” stated Erik Levitt, CEO of Open Data Centers, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the...
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every appli...
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In their General Session at 15th Cloud Expo, Phil Jackson, Development Community Advocate at SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, to discuss how to take advantage of a multitude of compute option...
With the explosion of the cloud, more businesses are transitioning to a recurring revenue model to generate reliable sales, grow profits, and open new markets. This opportunity requires businesses to get to market quickly with the pricing and packaging options customers want. In addition, you will want to take advantage of the ensuing tidal wave of data to more effectively upsell, cross-sell and manage your customers. All of this is possible, but only with the right approach. At 15th Cloud Exp...
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, moving it to the cloud, or taking a hybrid approach. She will use real customer examples to illustrate the tradeoffs, key decision points, and how to be successful with a cloud or hybrid cloud solution.
Planning scalable environments isn't terribly difficult, but it does require a change of perspective. In his session at 15th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will broaden your views to think on an Internet scale by dissecting a video publishing application built with The SoftLayer Platform, Message Queuing, Object Storage, and Drupal. By examining a scalable modular application build that can handle unpredictable traffic, attendees will able to grow your de...
The cloud provides an easy onramp to building and deploying Big Data solutions. Transitioning from initial deployment to large-scale, highly performant operations may not be as easy. In his session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, will discuss the benefits, weaknesses, and performance characteristics of public and bare metal cloud deployments that can help you make the right decisions.
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? I...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using...