Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

The Positive Impact of the Pandemic on SecOps Collaboration

Collaboration is a Hallmark of Successful Security Teams

Collaboration is a Hallmark of Successful Security Teams

The COVID-19 pandemic has changed forever how we work. Nearly three quarters (72%) of global knowledge workers prefer to continue working in a hybrid remote-office model moving forward, with only 12% wanting to return to the office full time and the remaining 16% wanting to work from home exclusively. Despite some rocky transitions and glitches, most organizations managed to make the switch surprisingly quickly and maintain, if not improve, productivity levels

As we shift our mindsets and embrace a distributed workforce, we also have to rethink how to collaborate effectively. Security Operations Center (SOC) analysts and Incident Response (IR) team members can’t lean across the desk to compare data and analysis or walk down the hall to check in with a threat intel analyst. And managers of security teams can’t tap an analyst on the shoulder to assign them a task or get an update on an investigation. 

Collaboration is a hallmark of successful security teams. But knowledge sharing and coordination have always presented challenges amidst the chaotic environment of security operations and investigations. Now every team needs a way to enable remote collaboration – a virtual cybersecurity situation room, if you will, that fuses together threat data, evidence and users. In this single shared environment, external threat data is augmented and enriched with internal data for context and scored for prioritization. Security analysts can access the intelligence they need to do their jobs as part of their workflow and can actively share learnings to deepen their understanding of threats and campaigns. As new data and learnings are added to the platform, intelligence is automatically reevaluated and reprioritized allowing teams to continue to focus on high-risk threats. Rather than conducting investigations independently and in parallel, which can lead to dead ends or key information falling through the cracks, analysts can directly communicate with each other. They can automatically see the work of others, understand how it impacts and can benefit their own work, and can quickly divvy up tasks to accelerate detection and response. Managers of all the security teams can see the analysis unfolding, which allows them to act when and how they need to, coordinating tasks between teams and monitoring timelines and results.

As security teams have navigated swiftly changing waters over the past several months, we’ve also seen an increase in collaboration with other parts of the organization and with external parties. The SANS 2021 Cyber Threat Intelligence Survey found that more groups are getting involved in defining intelligence requirements – executives and business units outside of cybersecurity, such as legal and compliance. This level of collaboration helps ensure that security teams are bringing in the right external data from sources they may not have considered before because they did not know they were relevant. It also signals that the industry is maturing, probably accelerated during the pandemic by a surge in threats and increased awareness and interest among company leaders to gain a better understanding of risk and how to mitigate it. 

Another interesting survey finding is an increase in participation in Information Sharing and Analysis Centers (ISACs) to nearly 50%, with more value being derived this year from three specific areas: advocacy in the community for security, member meetups and events, and trainings and conferences. This may seem ironic given travel and meeting restrictions imposed since March of 2020, but points to an unintended consequence and why online events should continue to some degree as we move beyond the pandemic. Virtual meetings and events are easier and less costly for people to attend, so more learning, collaboration and information exchange is possible. Bringing into the platform industry-specific threat intelligence, focused on attacks and vulnerabilities specific to your industry, is much more relevant than generic data that include threats that target a specific sector you are not in.

The pandemic has changed many aspects of how we work. The changes that have been detrimental we will shed. But we have also seen changes that have been beneficial and on our roadmap for years, like better security operations collaboration. This is a positive impact of the pandemic – security team members and teams working better together, as well as more closely with other departments across the organization and with industry sharing groups. This is a change we must embrace to strengthen security in a more distributed world.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...