Sunday, October 1 2023

We went through the whole CRP life cycle splitting it up into stages to better understand the steps taken in order to recover from security incidents. The apparent thing in all the steps is that someone must actually do it. The security staff in charge of the CRP life cycle process are Information Security professionals in the field of cyber security that have expert knowledge of Information Systems and are able to realize what exactly is going on when an alert triggers. Some companies have few Information security personnel and are limited in their response process. Other companies are increasingly outsourcing their cyber response capabilities to third party Security Operation Centers (SOC).

Cyber Security Response Plan

A SOC team is a centralized department that deals with all security related issues. It can be built in-house or it can be outsourced. There are some companies that choose the hybrid of these two possibilities due to monetary costs related to outsourcing most of its security operations.

An in-house SOC is an internal department in the company that deals with all security policies and procedures, tools, threats and incidents. The main people in the SOC are information Security Analysists that keep an eye on all the detection systems a company has in place. The SOC usually has a Senior Information Security Analyst and a SOC manager to make sure things are running smoothly and that junior analysts are getting the right training in order to be able to detect more sophisticated threats.

An outsourced SOC is a team of experts hired to watch over the company’s security systems and defend the company’s network from all types of attacks. This service is expensive but nonetheless, more and more companies choose this option as it reliefs them of finding the right staff to do the job and insuring the staff stay for a longer period of time. The demand for cyber security experts is very high as finding them is difficult due to the shortage in the workforce. This is an increasing problem globally and hence the salaries of cyber security experts are very high. This in turn creates a bigger overturn of security staff and companies struggle keeping them from leaving the company for a better offer.

To showcase how the entire process works, an example of an incident would do well. Imagine an employee opened a phishing email with an invoice attachment. The employee opens the attachment and triggers a virus. The virus spreads to a few computers in the office before an intrusion detection system triggers an alert. Junior Security analyst would immediately start investigating the alert to determine if it is a false positive or an actual incident. The Analyst would look for the originating hostname, inspect the process tree to determine what happened and in some cases talk to the employee that was sitting at the infected computer. If the analyst determines this is an actual attack, he or she would escalate the incident to a higher-level security analyst.

Since the incident has been identified, the staff would work together with the IT department to contain the spread of malware. Network containing all the machines and monitoring the network is usually the best options to ensure complete containment.

After examining the process tree to determine which process directly triggered the alert from the system, the security analyst can determine the root cause analysis and if needed, talk to the employee that was sitting behind the initially infected computer.

Wiping the infected machines clean and backing them up would eradicate and threat actors and recover the system for further use. In this particular example, lessons learned from the incident are that employees’ awareness of security is low and that they should undergo a Security awareness Training program.

In the past few years, it was determined that most of the cyber incidents occur from employees being tricked into opening malicious emails. Some reports estimate the number to be in the 70 % range which makes almost two thirds of all cyber-attacks. If we consider that human factor is the weakest link in any security system, we shouldn’t find the 70 % number so shocking. Malicious hackers do not want to spend months trying to exploit a certain perimeter device of a company such as a next-generation firewall, so instead just crafts a malicious email and sends it to a large number of employees in the company.

Because of this rise in phishing attacks, companies have started training their employees about the dangers of unknown emails. Almost every major company has a comprehensive Security Awareness Training program in place to decrease the number of employees that fall victim to such emails. The program usually comprises of some type of instructional videos combined with quizzes at the end to test the employee on lessons learned. The videos usually focus on red flags in the emails such as: unknown emails with emphasized urgency they have, urgent invoices that need to be paid with attachments, spoofed links in emails that lead employees to fake login pages etc.

Previous

Maze Ransomware Attack on a leading MNC

Next

Cyber Security Jobs

Check Also

Widget

Don’t Miss

Cyber Executive Moves: Expel, AXA XL

Ellie Buscemi

Expel appoints a new chief product officer, AXA XL announces a new chief executive and DataVisor appoints a new chief revenue officer. Expel, a security operations provider in Herndon, Virginia, appointed Yonni Shelmerdine as the new chief product officer on Aug. 28. Shelmerdine comes to Expel from SentinelOne where he was the vice president of Product Management, endpoint […]

Grip Security Raising $41 Million Series B Led by Third Point Ventures

SecureDisruptions

SaaS security company plans to accelerate growth and extend market leadership SaaS identity risk management platform Grip Security announced a $41 million Series B funding round led by Third Point Ventures, with participation from YL Ventures, Intel Capital and The Syndicate Group. The investment would bring Grip Security’s total funding to $66 million and marks a major milestone for the […]

Partner One Acquires Key Fidelis Cybersecurity Assets

SecureDisruptions

Partner One, one of the fastest growing software conglomerates in the world, has announced its acquisition of Fidelis Cybersecurity software, intellectual property, equipment, inventory and customer and reseller contracts. Fidelis software is a leader in the cybersecurity industry, with innovative eXtended Detection and Response (XDR) and Cloud Native Application Protection Platform (CNAPP). Fidelis solutions protect […]

Healthcare IoT: Risks, Policy, and the Path Forward 

John Powers

When Amazon launched as an online bookstore twenty-eight years ago, few would have imagined that patients could one day go to its website to treat their acid reflux. But times change. Amazon just expanded their virtual healthcare marketplace, Amazon Clinic. Across the U.S., customers can now consult with clinicians through virtual calls and get treatment […]

NIST Updates Cybersecurity Framework in New Draft, Seeks Public Comment

John Powers

The National Institute of Standards and Technology updated their cybersecurity framework for the third time in a new draft. The new framework offers guidance to organizations about reducing cybersecurity risks. It contains a set of outcomes so that any organization can evaluate, prioritize, grasp, and communicate its cybersecurity measures in an effective way. The draft […]

N.Y. Gov. Debuts Premier State Cybersecurity Strategy

John Powers

Governor Kathy Hochul (D-NY) recently introduced New York’s first cybersecurity strategy. The 15-page document lays out a blueprint to expand services to aid under-resourced entities and clarifies agency responsibilities. It provides $500 million to strengthen New York’s healthcare information technology and $7.4 million to expand the New York State Police’s Cyber Analysis Unit, Computer Crimes […]