Cybersecurity challenges in the EMEA regions just got worse - PowerPoint PPT Presentation

About This Presentation
Title:

Cybersecurity challenges in the EMEA regions just got worse

Description:

Businesses in the EMEA regions are on a rocky turf with regard to cybercrimes. Even as its cybersecurity product market is set to grow at a 7.2 percent CAGR with EU’s General Data Protection Regulation goals, security concerns seem to be on an upward trend. FireEye’s First Mandiant M-Trends EMEA Report talks about a high disparity in their mean dwell times. Organizations here have recorded a mean dwell time (the number of days an attacker can lurk undetected) that is 3 times the global average. – PowerPoint PPT presentation

Number of Views:17

less

Transcript and Presenter's Notes

Title: Cybersecurity challenges in the EMEA regions just got worse


1
Cybersecurity challenges in the EMEA regions just
got worse
Businesses in the EMEA regions are on a rocky
turf with regard to cybercrimes. Even as its
cybersecurity product market is set to grow at a
7.2 percent CAGR with EUs General Data
Protection Regulation goals, security concerns
seem to be on an upward trend. FireEyes First
Mandiant M-Trends EMEA Report talks about a high
disparity in their mean dwell times.
Organizations here have recorded a mean dwell
time (the number of days an attacker can lurk
undetected) that is 3 times the global average.
So whats the problem here? Oftentimes, this
happens to be a case of lack of visibility over
the attack surface, points of entry and
possibility of lateral movement. We see dwell
times as clear-cut indicators of resilience. In
fact, this one metric is singly representative
how well the security strategy, related policies,
procedures and controls have been formulated. A
fragmentary approach to forensic analysis is
often the reason behind the use of obsolete
security practices. But why wait for an intruder
to get in? The situation necessitates threat
modelling that can help in risk-aware security
operations. Knowing where to look for footholds
can greatly limit attack dwell times.
2
Cybersecurity challenges in the EMEA regions just
got worse
The report also talks about their reluctance
in seeking external guidance in detecting
indicators of compromise. A decision to look for
compromises by themselves means having to analyze
large numbers of alerts something that can be a
mammoth task without the kind of expertise it
takes to filter out false positives. Most often,
Organizations in the region are targeted by
persistent threat groups who are after political
intelligence, intellectual property, and brand
image. Besides, the issue of recurring compromise
suggests that the attackers in question are not
ones to pull back easily. Closing a few obvious
gaps will have no effect on their
strongly-motivated plans. We observe a
pronounced limitation in capabilities that will
keep these advanced attack vectors out, and
capture malicious payloads in their tracks.
Understandably, developing context-aware
methodologies can take time and attuning. But
what really reduces response times is the
fundamental understanding of the scope of an
incident. These organizations should seek
fortification through objective reviews by
external advisories and analysts.   EMEA
organizations have a large gap to address in the
light of mounting pressure from their governments
to take control of data breaches both by
defending against them and containing the damage.
The losses in billions of pounds suffered by some
top UK brands last year bear testimony to the
fact that business in the region cannot afford to
fall behind in adopting progressive and
continuous threat protection. That said
advancing to sophisticated controls can be quite
overwhelming in the absence of strategies both
bespoke and mature. Aleph Tav Technologies orchest
rates security operations and threat discovery
with flexibility and modularity so companies can
progress unruffled. Our services include
Ethical Hacking, Managed Security Services,
Application Security, Network Security, Security
Testing, Enterprise Security, Security for IoT,
SCADA Security, Digital Forensics
Write a Comment
User Comments (0)
About PowerShow.com