Page 6 - CDM-Global-Threat-Intelligence-Vendor-Landscape-2018
P. 6

Implementing a








             Cyber Defense








             Program




















                                                     A fundamental decision for any organization evaluating, designing,
                                                     and implementing a cyber defense program is how much of the res-
                                                     ponsibility and substantive steps to take within the organization and
                                                     which functions are best contracted out to specialists.


                                                     In general, it might seem that the larger the organization the more ef-
                                                     ficient it would be to develop and apply such expertise in house.  For
                                                     smaller entities, such in house capability is likely to be far beyond the
                                                     budgetary and operational means.  However, in this age of specializa-
                   Specialized threat                tion and cutting-edge exploits, the effort and cost involved in such in
                                                     house operations are not likely to be the best choice.
                  intelligence systems

                 and professionals are               In truth organizations of all sizes are most likely to be successful in
                                                     defending against cyber exploits by engaging the services of a pro-
                 the key to a successful             fessional firm dedicated to this activity.  Nowhere is this more accura-
                                                     te than in the world of Threat Intelligence.
                  program to manage
                   this growing risk.                Skilled practitioners of Threat Intelligence concentrate on analyzing
                                                     and evaluating threats which are not even apparent in the daily use
                                                     of information systems.  Active monitoring of system behavior for
                                                     indications that may be too minute to be perceived by conventional
                                                     anti-virus and other security programs can often provide a way to get
                                                     in front of a developing exploit.




       6    2018 - GLOBAL THREAT INTELLIGENCE
   1   2   3   4   5   6   7   8   9   10   11