Maksim Kabakou - Fotolia

Security Think Tank: Security analytics needs serious resources

What are the main challenges that security analytics can be used to address?

The Information Security Forum (ISF) describes a five-stage cyber attack chain typically seen from adversarial threats – performing reconnaissance, gaining access, maintaining control, compromising information and exploiting information.

Security analytics platforms (which can be described as an extension of SIEM – security information and event management) aim to stop these threats early in the cyber attack chain, combining data sources and analysing information for indicators of compromises (current and potential).

However, these platforms do not work out-of-the-box, requiring configuration and regular fine tuning for individual organisations. In this regard, organisations considering utilising security analytics should not underestimate the depth of resources needed for effective use.

Costs include not only licensing the software but also customisation, any necessary training and specialists (in an employee-led labour market).

Specialists are needed to interpret the outputs from the platform. Cognitive biases (the tendency of humans to think in particular ways, deviating from purely rational judgment) can cause individuals to draw conclusions with incomplete, contradictory or overwhelming amounts of information. Regularly rotated teams can help to mitigate these potential biases.

When problems are spotted, the workflow to follow up should be well defined and integrated with the organisation’s incident management processes.

Normally the domain of larger enterprises (1,000+ employees), smaller organisations will rarely possess the resources to buy and deploy a security analytics platform, let alone manage the outputs. Smaller organisations could investigate appropriate managed security service providers (MSSPs).

Read more from Computer Weekly’s Security Think Tank about cyber attack prevention

The features and functionality of a security analytics platform might include behavioural anomaly detection, real-time and historical threat detection, big data capabilities and threat intelligence.

Data sources is an obvious question to probe potential suppliers with, but also consider asking about how compliance expectations are supported, and how the architecture of the solution helps speed up analytic processes – after all, time is of the essence in detecting, and lessening the impact of, attacks.

This was last published in October 2017

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close