How to Find Proactive, Risk-Based Security

A cybersecurity executive order emphasizes the dire need to protect critical infrastructure. Our CTO details the type of security analytics that will achieve that.


Share this page
risk security analytics technology

Last months’ executive order on cybersecurity didn’t just acknowledge the government’s intention to correct failures in defending critical infrastructure. It also stressed the importance of “maintenance, improvements, and modernization” of security protocols. In other words: It’s holding agency heads accountable for cybersecurity that is both proactive and evolving.

Private companies would also benefit by heeding these warnings. Of course, “implementing risk-management measures commensurate with the risk and magnitude of the harm” sounds great on paper. But finding such a solution has eluded most enterprises, or they’d already be using them.

This inspired Interset’s CTO, Stephan Jou, to pen “Breakthroughs in Risk-Based Cyberattack Detection” for FCW, the publication that explores new technology for federal executives. In the story, he emphasizes products that focus on risk, because they stop threats and strengthen the enterprise by mitigating future ones.

To illustrate his points, Jou cites the case study of a utility company. In writing about advanced security analytics—or a more powerful approach to user and entity based analytics (also know as UBA or UEBA)—he explores the failings of common security such as SIEM platforms and perimeter programs. He also explains what any technology claiming to embrace big data and machine learning should actually be able to accomplish.

The over all goal of these technologies,” Jou says, “is to compute a short, prioritized list of threats along with the users, machines, applications, and files involved, rather than a flood of alerts and little understanding of context. Security analysts describe such risk-based approaches to threat detection as ‘finding the threats that matter.'”

Read “Breakthroughs in Risk-Based Cyberattack Detection” on FCW’s site.


Share this page