Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 1|回復: 0

Cyber-private security company rushes to help

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-11-9 15:14:01 | 顯示全部樓層 |閱讀模式
The range of tasks transferred externally requires a comprehensive study of the company's risk profile, the criticality of business processes, as well as an assessment of the current level of maturity of information security processes and development plans.

Based on the analysis, each individual organization forms a list of what should be outsourced and what should be left under the control of its own specialists. The main criterion here is the lack of resources and highly specialized competencies.

The second sorting filter is the reluctance of security professionals to perform certain low-priority tasks at the expense of more complex and high-priority ones.

The third criterion is company policies that dictate that certain tasks and processes (such as internal threat assessment) should be outsourced.

For obvious reasons, even in the context of the growing popularity of outsourcing scenarios in cybersecurity, the hybrid approach dominates, since a certain range of information security tasks still remains the internal practice of the company.

According to Deloitte , 99% of organizations content writing service have outsourced at least one element of their information security landscape: the most common functions outsourced are vulnerability management, monitoring, training, and cybersecurity auditing.



In Russia, information security competencies in the corporate sector have sagged in the area of ​​incident investigation and development of recommendations for further work on identified vulnerabilities and threats. Requests to establish the causes of cyber incidents have become significantly more frequent. For example, a company's application has crashed, but its employees cannot determine the reason for this.

Meanwhile, the reasons can be anything from infrastructure to the quality of protection of the application code development environment (updates, launch of new functions, etc.).

Security incident response and investigation services are becoming increasingly in demand due to the growing number of cyber attacks.

These may be Computer Emergency Response Teams (CERTs), which help organizations gather evidence and mitigate identified risks.

Monitoring in the Security Operation Center (SOC) format is effective. This is a kind of "control center" for the information security component of the company's work. It may include specialists of different profiles, in different technologies and tasks, which form a hub of the necessary level of competence for resolving incidents.

As a rule, this is a team of more than two dozen people: recruiting them into the staff of small and medium-sized companies from scratch and loading them with work so that it is economically profitable is a task that is practically impossible today. It is simpler and more profitable to buy SOCs according to the as-a-service model with agreed service levels (SLA).

Another recent trend is the administration of security tools. If previously companies usually did not allow third parties to “get into” this sensitive area from the information security point of view, today, with the growing number of cyber attacks, everything has changed.

It can be said that the lack of expertise due to the personnel shortage, as well as due to the challenges of the current moment (the outflow of domestic specialists, the shortage of information security tools due to the departure of global vendors) leads to a situation where the necessary information security skills are concentrated in certain points on the market map. This is the only way to ensure their availability to the maximum number of companies.
回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|GameHost抗攻擊論壇

GMT+8, 2024-11-27 11:34 , Processed in 0.038928 second(s), 27 queries .

抗攻擊 by GameHost X3.4

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |