Click me
Transcribed

The Evolving Cyber Battlefield

THE EVOLVING OYBER BATTLEFIELD 49% EXECUTIVES OF SECURITY said that their organization has been victim to a targeted cyber attack in the last 12 months THE MOST RELIED UPON SECURITY PRODUCTS TO DEFEND AGAINST APTS AND OTHER ADVANCED THREATS FIREWALLS INTRUSION PREVENTION ANTI-VIRUS DATA ENCRYPTION MONOTORING TECHNOLOGIES The majority of enterprise organizations are relying on a cyber security arsenal that focuses on identifying threats and preventing them from entering an IT infrastructure. These outmoded solutions only show what's in the rear view, as they are largely based on known threats and previous attacks; predictions based on external/global data and past activities are extremely limited in today's rapidly evolving threat environment. The bottom line: focusing on yesterday's threats won't necessarily thwart the attacks you face today. THE MANY HATS WORN B4 SECURITY EXECUTIVES WARRIOR PROTECTOR DETECTIVE 21% 21% 58% ..... Despite diminishing returns on perimeter defense methods in the face of advanced threats, IT security teams still focus the vast majority of their time and resources on this protector role. 80% of respondents believe that enterprise could benefit from adopting a military- style approach security learned from physical battlefields - such as situational awareness and intelligence gathering To defend the enterprise, IT security executives must become cyber warriors, who use real-time attack intelligence to monitor the battles unfolding within their own IT borders and adjust their defense strate- gies minute-by-minute, in real-time, to isolate, avoid and even deceive the attacker. Broad situational awareness is critical for organizations to operate their businesses effectively while navigating through their own cyber battlefields. TODAY'S CYBER WARRIOR MUST BE ANTICIPATORY_ ADAPTIVE_ AGILE_ WELL-EQUIPPED_ PROACTIVE_ WELL-TRAINED_ ALTHOUGH KEEPING INTRUDERS OUT REMAINS A PRIORITY, A GROWING NUMBER OF ORGANIZATIONS ARE LOOKING AT NEW STRATEGIES AND APPROACHES AT CYBER DEFENSE Forensic investigation to gain intelligence on previous attacks Purchasing new cyber intelligence technologies to identify & understand in-progress attacks 14% 18% Re-vamping internal processes, strategies & approaches 19% Staff training & education 19% Purchasing new defensive technologies to keep out intruders 25% www.countertack.com/report CounterTack

The Evolving Cyber Battlefield

shared by CounterTack on Aug 14
523 views
5 shares
0 comments
CounterTack's "Cyber-readiness Reality Check" surveyed 100 information security executives at enterprise organizations with revenues greater than $100 million, spanning a number of industries includin...

Publisher

CounterTack

Designer

InkHouse

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size