Showing 2 ideas for tag "strategy"

3. Breach-to-Response Acceleration

Response Time--Combines Technology, Threat Knowledge, & Skills

Community Member kudos icon +
Community Member
Agencies must plan for success. Increasing response time is a combination of technology, threat knowledge, and skill sets of cybersecurity practitioners. Lag time exists because organizations unable to effectively integrate practitioner skills, threat knowledge, and technology. Although agencies are in possession of effective tools (e.g., Einstein and CDM) that collect indicators and signatures of malicious traffic crisscrossing... more »

Voting

2 votes
Public Input

3. Breach-to-Response Acceleration

Cyber Battlerooms to learn to recognize adversary action

Community Member kudos icon +
Community Member
The old adage "it takes 10,000 hours of practice to become an expert" is very true in cyber defense. We can't teach people to prevent zero day exploits but we can provide an inexpensive way to show what happens when an exploit is used. Technology today is finally available to provide ubiquitous Cyber Battlerooms, like Netflix, where you log into the cloud and "play" on a Virtual Clone Network of a government agency,... more »

Voting

1 vote
Public Input