Detect Advanced Cyberthreats with Security Analytics

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Jamescon
User Rank
Editor
Re: Security Analytics
Jamescon   8/11/2016 10:36:05 AM
NO RATINGS
@Antal. Great point about the 80.5 days between the time of an intrusion and discovery and possible remediation. It may be easy to look at that as just a number sitting on a computer that we should do something about. However, I have become convinced that the only way we are going to address computer security and take meaningful action on it is to view it in non-computer terms.

Security analytics are a good start, giving us the tools to detect and take action. However tools won't help until we change our mindset. We might be pleased if we can lower that 80.5 day statistic to 50 or 25 days. But that isn't good enough.

We need to supplement tools such as security analytics (and invest in those tools and experts to work with them) with that new mindset. We have to take hacking out of the realm of computing and view it as criminal activity. We wouldn't want a criminal having access at will to our homes for 80.5 days (or 50 or 25). We still view hackers as anything from "just kids" to actual "heroes" (if they steal data that helps our political or business mission).

If the image of a burglar doesn't inspire people to get serious about security, maybe an analogy to personal health will work. Imagine being satisfied that we allow a virus, a tumor, or a bacterial infection to live in our bodies for 25 or 50, instead of 80 days. In reality we tell our doctors, "Get that thing out of me, now!"

 

 

Latest Blogs
HIPAA is supposed to protect the privacy of your medical information, but the sale of anonymized medical data and advances in analytics have made it possible for organizations to re-link your name to your private records.
Career prospects are hot for both data analytics pros and cyber security specialists. Now CompTIA is introducing a certification that combines these specialities to apply analytics to cyber security.
There has been plenty of talk about the need for a chief analytics officer or chief data officer. But do you ever wonder what they do for a living?
Visual analytics tools, can enable non-statistician citizen data scientist to create models that use predictive or prescriptive analytics. These professionals can embed their business knowledge into the models they're testing, prototyping, or building.
Are your digital marketers creating gaps in customer privacy? They could be unless they vet tags and third-party app access.  Here's how to do the vetting.
Radio Show
A2 Conversations
UPCOMING
Jessica Davis
Data Analysts in Training: Meeting Tomorrow's Demand


3/8/2017   REGISTER   0
ARCHIVE
Jessica Davis
Our Bodies, Our Data: Medical Records For Sale


2/21/2017  LISTEN   62
ARCHIVE
Jessica Davis
Energy Analytics: Using Data to Find Savings


2/14/2017  LISTEN   44
ARCHIVE
Jessica Davis
Sharpen Your Analytics & Data Management Strategy


2/8/2017  LISTEN   74
ARCHIVE
Jessica Davis
Analytics: Make the Most of Data's Potential in 2017


1/19/2017  LISTEN   19
ARCHIVE
Jessica Davis
A2 Radio: Can You Trust Your Data?


12/20/2016  LISTEN   70
ARCHIVE
James M. Connolly
Retail Analytics: See Where Style Meets Statistics


12/6/2016  LISTEN   53
ARCHIVE
James M. Connolly
Why the IoT Matters to Your Business


11/29/2016  LISTEN   45
ARCHIVE
James M. Connolly
Will Data and Humans Become Friends in 2017?


11/22/2016  LISTEN   40
ARCHIVE
James M. Connolly
We Can Build Smarter Cities


10/20/2016  LISTEN   31
ARCHIVE
James M. Connolly
Visualization: Let Your Data Speak


10/13/2016  LISTEN   70
Information Resources
Quick Poll
Quick Poll
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS