Intelligent CISO Issue 42 | Page 75

because it acts as the first line of defence against cyberattacks . As organisations execute new digital initiatives , they often expand the attack surface at the same time . New web applications and Application Programming Interfaces ( APIs ) can be exposed to dangerous traffic because of web server vulnerabilities , server plugins , or other issues . A WAF helps keep these applications and the content they access secure .
3 . Threat Intelligence sharing
Organisations must have real-time actionable intelligence to help mitigate unseen threats , such as FortiGuard Labs . Information must be shared between the different security layers and products within your environment to provide a proactive defence . In addition , this information sharing should extend to the broader cybersecurity community outside of your organisation , such as Computer Emergency Response Teams ( CERTs ), Information Sharing and Analysis Centers ( ISACs ), and industry coalitions like the Cyber Threat Alliance .
Rapid sharing is the best way to respond quickly to attacks and break the cyber kill chain before it mutates or spreads to other systems or organisations .
4 . Protecting endpoint devices
Traditional antivirus technologies don ’ t always do a good job , and as threats continue to evolve , they typically can ’ t keep up . Organisations need to make sure they are appropriately protecting endpoint devices using an Endpoint Discovery and Response ( EDR ) solution and other technologies .
In the current threat environment , advanced attacks can take minutes or seconds to compromise endpoints . Firstgeneration EDR tools simply can ’ t keep up because they require manual triage and responses . Not only are they too slow for today ’ s lightning-fast threats , but they also generate a massive volume of alarms that burden already overworked cybersecurity teams . Additionally , legacy EDR security tools can drive up the cost of security operations and slow network processes and capabilities , which can have a negative impact on the business .
In contrast , next-generation EDR solutions deliver advanced , real-time threat intelligence , visibility , analysis , management and protection for endpoints – both pre- and post-infection to protect against ransomware . These EDR solutions can detect and defuse potential threats in real time to proactively reduce the attack surface and help prevent malware infection and automate response and remediation procedures with customisable playbooks .
5 . Data backups and incident response
Your organisation should be able to perform backups of all your systems and data and store it off the network . These backups should also be tested to ensure you can properly recover .
Every organisation should have an incident response plan in place , to ensure your business is prepared if www . intelligentciso . com
75