This content is part of the Essential Guide: Network security basics for building better corporate systems
Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Information security monitoring, analytics for the digital age

Cybersecurity threats have become a major headache for modern businesses, but they do have their benefits: The rising number of attacks has led to a big increase in cybersecurity intelligence data that can be analyzed to prevent future incidents.

Traditional approaches to information security monitoring techniques have failed, however, because as businesses move faster than ever, IT security teams can't keep up with the analytics data, said Demetrios "Laz" Lazarikos, vArmour's Chief Information Security Officer. With companies increasingly handing over data management duties to the cloud, the Internet-of-Things and third parties, it makes it difficult for organizations to monitor corporate data being stored across multiple networks.

"This is where a lot of enterprises today are struggling, because they have legacy environments, they have virtual environments, they're building out new technologies," Lazarikos said in a recent SearchCompliance webcast titled "InfoSec monitoring and analytics in the age of IoT and digital transformation."

"The challenge is how do you monitor and look at the information and develop ways to alert, report and respond to different types of events."

This digital disruption forces big changes to how companies access and use cybersecurity analytics, Lazarikos said: Companies are increasingly moving away from a reactive, compliance-driven approach to information security that lack sufficient reporting metrics. Instead, modern companies are increasingly leaning toward a risk-based, proactive approach to information security monitoring due to the readily-available analytic information.

The criminals are evolving, and we have to as well with our programs and audit controls where we have to be able to say 'this is how I'm storing and processing data, and this is how I'm protecting it.'

The risk-based approach provides numerous benefits, especially from a cybersecurity intelligence standpoint, he added.

"Using a risk-based approach, you have data at your fingertips. You have the ability to take the data, and make informed decisions," Lazarikos said. "Then you can create visibility across multiple disciplines within your organization."

But as business continues to move faster than ever in the digital age, critical corporate components such as IT, infrastructure, DevOps and, of course, information security often struggle to keep up. Companies must automate their monitoring activities in near real time, putting a burden on these departments as they struggle to analyze cyberthreat intelligence.

As both the number and source of security breaches continues to dramatically increase, companies need processes in place that constantly evaluate cyberthreat analytics data throughout the organization, Lazarikos said.

"Cyberthreat data is critical for you and your program for monitoring and alerting," Lazarikos said.

"It's important to consider new ways of looking at that data, which is across all the different types of business units in your organization."

There are several ways that companies can modify business processes to use cyberthreat intelligence data to benefit information security monitoring, Lazarikos said. In this webcast, learn more from Lazarikos about developing what he calls the "InfoSec Maturity Model" that uses cybersecurity analytics data to protect company information. By taking advantage of this readily available cyberthreat intelligence, Lazarikos said businesses can help avoid information security threats stemming from rapidly advancing technology.

"The criminals are evolving, and we have to as well with our programs and audit controls where we have to be able to say 'this is how I'm storing and processing data, and this is how I'm protecting it,'" Lazarikos said. "We know the cybercriminal is going to access your information. It's not 'if,' it's 'when.'"

View All Videos