CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

How The Best Defense Gets Better: Part 2

admin by admin
April 12, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


For many enterprises, incident response is an exercise in chaos. Security teams scramble to figure out how a data breach happened and crash into brick walls as they try to collect information from different departments that are often siloed from everyone else.

It doesn’t have to be that way. Advanced security teams have learned that the saner, more effective approach to incident response is based on:

  • Constantly practicing how to respond to a variety of attacks
  • Proactive maintenance of systems
  • Teamwork based on information sharing across company departments
  • Well-integrated tools

This week, Enterprise Security Weekly sat down with Stephanie Aceves, Senior Director, Threat Response SME Lead at Tanium, to discuss where to start when building an effective threat response plan and how Tanium can help — not just with investigation and remediation, but with preparation, facilitating cross-collaboration internally and with tabletop exercises to help security teams prepare for what may come.

“Knowledge sharing is one of the most important resources we have in the cybersecurity space,” Stephanie said. “I just spoke to a high school student who is interested in learning about cyber. I kept telling her, ‘…you’re never going to know all the things and that if you’re the expert in the room, you’re in the wrong room.’”

This continues a discussion we began last month with Tanium’s Lead Enterprise Services Integration Engineer, Russell From, about the key ingredients and order of priorities for a holistic security program. He stressed the importance of starting with identification and protection — just as the National Institute of Standards and Technologies (NIST) recommends in its Cybersecurity Framework (CSF). By starting with identification and protection, you can detect and respond better. Russell outlined how to do it using the Tanium Platform.

Tanium provides high-fidelity data to inform critical IT decisions. Using a single agent, single console and zero intermediate infrastructure, organizations can query millions of endpoints in seconds and leverage that data to drive workflows spanning multiple domains in IT, including security, operations, risk and compliance.

To learn why the best security teams rely heavily on Tanium to get smarter, faster and better in responding to threats and how your organizations can do the same, watch the demo on Enterprise Security Weekly here, watch part 1 here, or visit securityweekly.com/tanium for more information.

Register and watch Tanium’s on demand webcast, How to Implement Cloud Security That Actually Works: Lessons From the Front Lines, here!



Source link

Previous Post

Amazon Cognito launches support for in-Region integration with Amazon SES and Amazon SNS

Next Post

Microsoft Zero-Days, Wormable Bugs Spark Concern

Related Posts

Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Information Security

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

by admin
May 23, 2022
Information Security

An Interview with a White Hat Hacker

by admin
May 23, 2022
Information Security

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

by admin
May 23, 2022
Information Security

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

by admin
May 22, 2022
Next Post

Microsoft Zero-Days, Wormable Bugs Spark Concern

Leave Comment

Recommended

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

An Interview with a White Hat Hacker

May 23, 2022

Q&A with Kristin Myers, EVP/CIO, Mount Sinai Health System & Dean of Digital & Technology

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.