New Paper: The CISOâs Guide to Advanced Attackers
Much of the security industry spends significant time and effort focused on how hard it is to deal with todayâs attacks. Adversaries continue to improve their tactics. Senior management doesnât get it, until there is a breachâŠÂ then your successor can educate them. And the compliance mandates hanging over your organization like albatross remain 3-4 years behind the attacks you see daily. The vendor community compounds the issues by positioning every product and/or service as a solution to the APT problem. Which means they donât really understand advanced attackers at all. But complaining doesnât solve problems, so we put together a CISOâs Guide to Advanced Attackers to help you structure a programmatic effort to deal with these adversaries. It makes no difference what a security product or service does â they are all positioned as the only viable answer to stop the APT. Of course this isnât useful to security professionals who actually need to protect important things. And itâs definitely not helpful to Chief Information Security Officers (CISOs) who have to explain their organizationâs security programs, set realistic objectives, and manage expectations to senior management and the Board of Directors. So as usual your friends at Securosis are here to help you focus on whatâs important and enable you to wade through the hyperbole to understand whatâs hype and whatâs real. This paper provides a high-level view of these âadvanced attackersâ designed to help a CISO-level audience understand what they need to know, and maps out a clear 4-step process for dealing with advanced attackers and their innovative techniques. The landing page is in our research library. You can also download The CISOâs Guide to Advanced Attackers (PDF) directly. We would like to thank Dell Secureworks for licensing the content in this paper. Obviously we wouldnât be able to do the research we do, or offer it to you without cost, without companies supporting our efforts. Share: