relentless 7 steps for cyber security operation
TRANSCRIPT
![Page 1: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/1.jpg)
RELENTLESSWhy your cyber security operation can never rest and seven ways to keep it one step ahead
![Page 2: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/2.jpg)
SAY WHAT YOU WANT ABOUT CYBER SECURITY
![Page 3: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/3.jpg)
IT
![Page 4: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/4.jpg)
NEVER
![Page 5: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/5.jpg)
GETS
![Page 6: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/6.jpg)
BORING
![Page 7: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/7.jpg)
On the one hand, you’re dealing with a threat landscape that won’t stop changing, with new hackers and tactics and threats emerging every day.
![Page 8: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/8.jpg)
On the other, you’re dealing with rapid change in your own infrastructure, with new users and apps and data and devices…
![Page 9: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/9.jpg)
IN SHORT,
CYBER SECURITY NEVER STOPS.
![Page 10: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/10.jpg)
You can’t stop your business from developing the new applications it needs.
![Page 11: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/11.jpg)
You can’t stop attackers from discovering and distributing new ways to breach your defenses.
![Page 12: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/12.jpg)
And you certainly can’t afford to stop patching your systems and learning from the latest threat intelligence.
![Page 13: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/13.jpg)
IF YOU SLOW DOWN YOU’RE JUST MAKING YOURSELF AN EASY TARGET.
![Page 14: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/14.jpg)
It’s what makes cyber security so endlessly interesting and ruthlessly challenging all at once.
![Page 15: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/15.jpg)
But even though change is the only constant, cyber defenses are often still too rigid.
![Page 16: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/16.jpg)
MOBILE + DYNAMICEndpoints are
but the ability to monitor and manage them has struggled to keep up.
![Page 17: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/17.jpg)
HUMAN + VERSATILEAttackers are
but too many defenses are automated and homogenous.
![Page 18: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/18.jpg)
+ USER PRODUCTIVITY
Processes get in the way of
so it’s no surprise that people find ways around them.
![Page 19: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/19.jpg)
HERE’S THE CHALLENGE: CYBER SECURITY CAN’T BE TREATED LIKE A STATIC, PREVENTATIVE DISCIPLINE.
![Page 20: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/20.jpg)
And it can’t be seen as just an IT thing, either. If you’re going to deliver innovative new services, cyber security needs to be at the heart of everything you do. This is about growth, too.
![Page 21: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/21.jpg)
Cyber security must be treated like a never-ending process of continuous improvement.
![Page 22: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/22.jpg)
A process that evolves and adapts as rapidly as the criminals trying so hard to beat us.
![Page 23: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/23.jpg)
predict
respond
preventdetect
One that takes a holistic approach to every aspect of cyber security, to predict, prevent, detect and respond to emerging threats with confidence and speed.
![Page 24: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/24.jpg)
And one that supports businesses to meet their evolving strategic goals.
![Page 25: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/25.jpg)
WE CALL THIS APPROACH LIVE SECURITY.
![Page 26: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/26.jpg)
And we believe it takes a tacit commitment to seven fundamental principles to effectively predict, prevent, detect and respond to attacks.
![Page 27: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/27.jpg)
1. IT TAKES MAN AND MACHINE TO WIN.
![Page 28: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/28.jpg)
Attackers combine people, process and technology to get past your defences. You need the same thing
the right combination of people, process and technology to fend them off.
![Page 29: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/29.jpg)
It takes the scalability of software to secure all your endpoints and constantly incorporate the latest threat intelligence.
![Page 30: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/30.jpg)
But it takes real-world human and hacker expertise to assess your operations, find vulnerabilities, configure your software the right way and then respond to the right signs.
![Page 31: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/31.jpg)
2 LOCAL AND INDUSTRY-SPECIFIC EXPERTISE MATTERS
![Page 32: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/32.jpg)
Different industries need to deal with different types of attacks and regulations.
![Page 33: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/33.jpg)
It takes a very different approach to cyber security to protect a global brand’s intellectual property than it does to protect a bank’s sensitive data in a highly regulated environment.
![Page 34: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/34.jpg)
You can deliver effective security because you understand your industry’s unique needs. So any partners you work with will need to have the same, specific expertise your industry needs.
![Page 35: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/35.jpg)
When you move into new markets, your cyber security operations need to adapt to the situation on the ground.
For example, the new EU General Data Protection Regulation (GDPR) changes the way businesses handle EU citizens’ data.
![Page 36: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/36.jpg)
Unless you can take these regional and industry-specific nuances into account, you can’t appropriately organize and prioritize your cyber strategy.
![Page 37: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/37.jpg)
3 YOU CANNOT IGNORE THE LATEST THREAT INTELLIGENCE
![Page 38: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/38.jpg)
Every single week of every single month, new threats, tactics and malware emerge to exploit vulnerabilities.
From Sony to Yahoo to Ashley Madison, we’ve already seen the level of all-out extortion tactics hackers will increasingly use. And IoT botnets, for example, will only become a bigger problem as businesses make strategic moves into IoT technology.
![Page 39: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/39.jpg)
The trouble is that too many cyber security operations don’t have the time or infrastructure to deal with this rate of change.
![Page 40: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/40.jpg)
Keeping up with the latest threat intelligence can be a struggle. Applying it across the cyber security operation can be even tougher. But it’s a vital foundation for constantly improving your defenses.
![Page 41: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/41.jpg)
4 CYBER SECURITY MUST BE AGILE
![Page 42: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/42.jpg)
Attackers can pivot in an instant, seizing new opportunities the moment they open up.
![Page 43: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/43.jpg)
It’s essential that you have at least as much agility to stay ahead of them.
That starts with a versatile foundation of processes.
![Page 44: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/44.jpg)
To get it right, you need to be able to predict potential incidents, prevent the vast majority from ever happening, detect them when they do happen and then respond quickly and appropriately once you’ve been breached.
predict
respond
preventdetect
![Page 45: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/45.jpg)
That calls for everything from patch management to crisis management to be prepared. A lot of which might seem like very basic cyber security for most of us but it can also be very effective.
![Page 46: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/46.jpg)
Starting with a solid foundation of endpoint protection and adding advanced technology such as analytics and vulnerability management on top makes sense to help predict and prevent incidents.
![Page 47: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/47.jpg)
But equally, unless you’ve got a predetermined and rehearsed plan for things like breach detection or incident response, you’ll find your company in a state of chaos when something does go wrong.
![Page 48: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/48.jpg)
5 A DISTRIBUTED ATTACK SURFACE CALLS FOR DISTRIBUTED SECURITY
![Page 49: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/49.jpg)
Attackers should never know your own infrastructure better than you do.
A successful business relies on clear, constant visibility across complex organizational and IT infrastructures. And today’s mobile workforces depend on constant access to data and services through an ever-growing array of devices.
![Page 50: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/50.jpg)
But the increasingly distributed and dynamic nature of corporate infrastructures makes it incredibly hard for IT and security leaders to see the edges of their attack surface and even harder to protect it.
![Page 51: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/51.jpg)
Until you prioritize a centralized view of every endpoint in your networks, you’ll always be flying blind.
But just seeing every endpoint isn’t enough you’ve also got to harden every potentially vulnerable device.
![Page 52: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/52.jpg)
80%80%
In fact, in 80% of the incidents we’ve responded to, patch management would’ve prevented access. This kind of endpoint protection should be second nature for cyber security operations.
It’s low-hanging fruit and it gets the job done.
![Page 53: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/53.jpg)
6 COMPLIANCE IS TABLE STAKES
![Page 54: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/54.jpg)
Regulatory compliance is vital for any business – it’s an essential safeguard for the entire organization, from the boardroom to the shopfloor.
Regulators set the minimum requirements. But that’s just the starting point, not the end goal.
![Page 55: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/55.jpg)
Most large companies will be compliant but it hasn’t prevented them from being breached. Take Yahoo, for example, regulatory compliance didn’t stop hackers stealing 500 million user accounts.1
1. http://fortune.com/2016/09/22/yahoo-hack/
![Page 56: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/56.jpg)
For instance, payment regulations such as PCI-DSS don’t cover the full spectrum of preventative defences you could need, let alone the predictive, responsive and detection capabilities you should also consider.
Regulators will react to known issues and compel businesses to fix them, but it takes a proactive approach to keep ahead of the persistent innovation of attackers.
![Page 57: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/57.jpg)
Regulations are an important starting point for cyber security. But cyber attackers move faster than regulators do. So a relentlessly proactive approach to cyber security is essential.
![Page 58: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/58.jpg)
7
7 YOU’RE NEVER DONE
![Page 59: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/59.jpg)
If you take one thing away from this, we’d hope it is this in cyber security, you’re never done.
![Page 60: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/60.jpg)
THIS MUCH
WE KNOW:
![Page 61: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/61.jpg)
Your attackers will never relent. So your cyber security operation can never relent. That means it must constantly evolve and improve.
![Page 62: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/62.jpg)
So rather than expecting a silver bullet technology to come and save the day, it’s important to confront the fundamental reality of cyber security…
![Page 63: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/63.jpg)
REACTING ISN’T ENOUGH.
![Page 64: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/64.jpg)
You need a proactive process that’s designed to continuously improve and adapt.
Only then can you effectively predict, prevent, detect and respond to incidents.
![Page 65: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/65.jpg)
The average cost of a data breach is now $4 million3.
2. 2014 Cyber attack to cost Sony $35 million in IT repairs, Computer World, 20153. 2016 Cost of Data Breach study, Ponemon Institute, sponsored by IBM
THE STAKES
HAVE NEVER BEEN HIGHER²
![Page 66: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/66.jpg)
The corporate victims have never been more varied.
From retail giants and global financial institutions to hospitals and universities.
![Page 67: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/67.jpg)
And the role of the cyber security professional has never been harder.
But when you’re armed with the right people, processes and tools
there’s nothing more rewarding
![Page 68: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/68.jpg)
AND NOTHING MORE IMPORTANT.
![Page 69: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/69.jpg)
BEHIND THE SCENES OF A REAL WORLD BREACH
Breaches are inevitable. But most companies are worryingly underprepared to handle the consequences of one.
Read ‘The Chaos of a Corporate Attack’ to find out how one company was breached and how they reacted.
Read the eBook
Use our stress test to learn more about the current state of your cyber security operations. Find out what you’re getting right – and where you need to make changes.
Take the stress test
AND PUT YOUR SECURITY OPERATION TO THE TEST
![Page 70: Relentless 7 steps for cyber security operation](https://reader033.vdocuments.net/reader033/viewer/2022052705/58757a461a28ab78498b5c55/html5/thumbnails/70.jpg)
And our cyber security experts (and white-hat hackers) are constantly bringing back new insights, tactics and lessons learned from their experiences out on the frontline of cyber security. It’s how our Live Security approach powers scalable software that continuously improves to predict, prevent, detect and respond to breaches. So if you’re looking for an approach to cyber security that’s relentlessly moving forward, we should talk.
WE’RE F-SECURE