Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Acronyms Aside, the SOC of the Future Needs These 3 Capabilities

Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as different security teams, their certifications and the tools they use. There’s nothing wrong with acronyms, but when they are used to describe emerging solutions, an interesting phenomenon occurs…that new acronym becomes the next silver bullet technology that will solve all our security problems.

Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as different security teams, their certifications and the tools they use. There’s nothing wrong with acronyms, but when they are used to describe emerging solutions, an interesting phenomenon occurs…that new acronym becomes the next silver bullet technology that will solve all our security problems. Unfortunately, that never turns out to be true.

Acronyms and Promises

Let’s go back a decade to unified threat management (UTM) which Gartner defines as a converged platform of point security products, particularly suited to small and midsize businesses, with feature sets that fall into three main subsets: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security and messaging security. UTMs were supposed to address everything the network needed to stay secure, only they did not. So, next-generation firewalls (NGFWs) emerged to provide more customization for the unique needs of enterprises and even then, they did not become an end all, be all. 

UTMs and NGFWs focused on defending the network. However, as endpoints proliferated and the spotlight shifted to this expanded attack surface, like moths to a flame the industry shifted to Endpoint Protection Products (EPP). But what about threats that evaded these solutions? Enter Endpoint Detection and Response (EDR) tools.

One of the more recent acronyms being thrown around is XDR which stands for Extended Detection and Response. Initial definitions of XDR describe it as a solution built from EDR solutions, where “X” is simply an “extension” or “next-generation” of EDR. But what about the other “DR” variations that we haven’t even touched on yet, specifically Network Detection and Response (NDR) and Cloud Detection and Response (CDR)? XDR must include those too, plus the dozens of existing security tools organizations have already deployed across their infrastructure. And the cycle continues with emerging Threat Detection, Investigation and Response (TDIR) platforms aimed at addressing the fact that Security Operations Centers (SOCs) also need investigation tools within a “DR” solution. And there’s a cockpit concept for security operations that also should be included in any SOC platform worth its salt. 

Security Operations Summit

The goal of XDR and subsequent variations is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises. So, how do we get there? XDR is a destination, not a solution, that can only be reached with a holistic, architectural approach. Viewing it as another silver bullet technology, another acronym with another promise, is history repeating itself. It is not a path forward to SOC efficiency and effectiveness. 

Shift from Acronyms to Use Cases

The only thing more relentless than this constant wave of acronyms, is the wave of attacks that we need to combat. So, let’s put acronyms aside. Instead, let’s focus on what it is going to take to address the use cases of the SOC as it modernizes and transitions to become a detection and response organization, these include: alert triage, spear phishing, incident response, threat hunting and threat intelligence management.

Advertisement. Scroll to continue reading.

To be efficient and effective, the SOC of the future needs to be able to: 

1. Focus on data. Data is the lifeblood of security because it provides context from a wide range of internal and external sources, including systems, threats, vulnerabilities, identities and more. When security is data-driven, teams have the context to focus on relevant, high-priority issues, make the best decisions and take the right action. Data-driven security also provides a continuous feedback loop that enables teams to store and use data to improve future analysis. 

2. Ensure systems and tools can work together. Since the data that teams need for analysis is spread throughout the typical organization, bi-directional integrations enable teams to bring that data together in a common work surface. An open integration architecture provides the greatest access to data from technologies, threat feeds and other third-party sources. It also enables teams to drive action back to those technologies once a decision is made. 

3. Balance automation with human response. The most effective way to empower teams is to apply automation to repetitive, low-risk, time-consuming tasks, and recognize that the need for human analysis remains. Irregular, high-impact, times-sensitive investigations are best led by a human analyst with automation simply augmenting the work. Automation, when there is a balance between human and machine, ensures that teams always have the best tool for the job. 

Security Operations Centers do not need another acronym. What they need are capabilities that enable them to address their top use cases faster and more thoroughly in the face of evolving attacks. That’s the promise the security industry needs to make and can only deliver with the right architectural approach. We’ll take a deeper dive into each of these three areas in the future.

Register for SecurityWeek’s Security Operations Summit | Virtual Event

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...