Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Know Your Options When Dealing With Alert Overload

Talent, Technology and Process Can Deliver Relief From Security Alert Overload

Talent, Technology and Process Can Deliver Relief From Security Alert Overload

Last month marked the 50th anniversary of the Apollo 11 moon landing. Most of us watched at least one special and the TV images at the time were so grainy it’s striking, given our high-resolution screens of today. We’ve gone from tiny monitors where you could see individual pixels, to refresh rates so frequent and pixels so dense that the difference between what’s real and what’s displayed is no longer discernible to the human eye. Having solved the initial challenge, manufacturers are innovating in different ways to deliver value to users, for example through connectivity options, brightness, thinness, and curve. 

We’re experiencing a similar phenomenon in security. We now collect security data from hundreds of different types of devices – not just firewalls, but laptops, smartphones, routers, switches, the cloud, web servers, and an ever-expanding array of IoT devices. The volume, velocity, and variety of data in the Security Operations Center has exceeded human capacity for interpretation. While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse. Respondents to the Cisco 2019 CISO Benchmark Study say they are responding to fewer alerts than ever, 50.7% in 2018 vs 55.6% in 2017. They also report that number of legitimate alerts that get remediated has dropped to only 42.8% in 2018 vs 50.5% in 2017.

So, what do we do? There are three ways to tackle the challenge – talent, technology, and process. Let’s look at each.

1. Talent: As a security professional, your first inclination may be to try to hire your way out of the problem, but skilled resources are hard to find and even harder to retain. The industry already faces a cybersecurity talent shortage. Despite an emphasis on programs to fill the talent pipeline, relying on people to make sense of the growing mound of data isn’t a viable strategy. Furthermore, even if you do manage to increase your staff, you are likely to experience turnover due to burnout. This leaves you with two other options to pursue – technology and process. 

2. Technology: The Cisco 2019 CISO Benchmark Study also reports that 79% of respondents find it is somewhat or very challenging to orchestrate alerts from multiple vendor products, compared to 74% in 2018. Security teams are gaining efficiency by lowering the number of security vendors. Cybersecurity vendors can help by providing an enterprise security architecture that aligns with and advances your business initiatives and streamlines integration across multiple, individual products and platforms. Integration can also allow you to take advantage of custom automation capabilities so that your multiple best-in-class offerings work in concert to deliver security that is less complex and more effective. For example, something as simple as applying automation to pull data from these different security products and aggregating them into a single, easy to read pane can save a tremendous amount of time and frustration while delivering greater visibility and control. Security analytics, machine learning, and artificial intelligence can also help by automating the initial stages of alert prioritization and management. With consolidation and integration, your overall security posture gets better – it becomes easier for human to interpret vast amounts of data, expenses go down, and you’re fundamentally more secure.

3. Process: Managed detection and response (MDR) services have emerged to ease the burden on security teams of dealing with a growing volume of tickets that managed security service providers (MSSPs) directed their way to investigate. MDR service providers offer an end-to-end service that includes security monitoring, advanced threat detection, and incident readiness and response. These services are delivered by highly skilled teams with access to technology like big data platforms and advanced analytics to quickly separate non-events from serious events, eliminate blind spots, and mitigate risk. Incident response retainer services are changing too, enabling you to become more proactive. When these third-party experts aren’t actively engaged in incident response, they’re helping you and your team sharpen your skills and improve your security posture. They provide a range of services including working with you to develop IR plans, conducting readiness and compromise assessments, engaging in red team/blue team and purple teaming exercises, and leading cyber range workshops. These services focus on improving preparedness, response, and resiliency.

Display technology will continue to evolve and it’s exciting to imagine the viewing experience when humans land on Mars in the future. It’s also exciting to think about how the security industry will continue to innovate. There will always be new devices and systems generating more data and alerts to analyze and understand. Our opportunity is to find new ways to handle the exponential increase in data and resulting alerts. A critical component is the new security industry imperative around customer experience (CX), where the lines between products and services are blurring as the emphasis shifts to total solutions. CX is becoming a key driver for success for security professionals and their organizations and that’s good news, as it’s the blending of all your options – talent, technology and process – that will deliver relief from alert overload. 

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...