Remove incident-response-vs-threat-prevention-ciso
article thumbnail

Recapping Cisco Secure at Black Hat USA 2021

Cisco Security

In case you missed them, below is a brief recap of some of the Cisco sessions, including a fight that almost broke out between the Incident Response (IR) team represented by Matt Olney, Talos’ Intel Director, and Wendy Nather, Head of Advisory CISOs. Matt emphasized the importance of practicing for incident responses ahead.

Backups 142
article thumbnail

On Trust and Transparency in Detection

Anton on Security

This blog / mini-paper is written jointly with Oliver Rochford. When we detect threats we expect to know what we are detecting. Some EDR vendors today already run mostly off opaque detections, hiding their rules, threat intelligence and their algorithmic detections. Sounds painfully obvious, right? Who is accountable?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

Managed Detection and Response (MDR) services offer their clients 24/7 turnkey threat monitoring, detection and remote response capabilities. Having an entire external team devoted solely to threat detection and response increases the chances of identifying threats that may otherwise elude internal teams.

article thumbnail

Invest vs. Optimize: Industry Leaders Weigh in on Simplifying Security Tech Stacks 

NetSpi Executives

NetSPI Partners bring a fresh perspective to the lofty goal of simplifying detection and response outcomes by weighing in on the long-term effects of complexity, discussing when to optimize versus invest in technology, and explaining how automation can ease workflows and enhance efficiency in detecting, investigating, and responding to threats.

CISO 105
article thumbnail

SOC vs MITRE APT29 evaluation – Racing with Cozy Bear

McAfee

However, as all practitioners know, cyber defense is more complicated than what raw data can express, especially when dealing with sophisticated threat actors. Time Based Security – Protection, Detection & Response in context. How long before we detect a compromise? How long before we respond?

CISO 55