{"id":102978,"date":"2019-10-25T07:09:07","date_gmt":"2019-10-25T14:09:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=102978"},"modified":"2020-04-21T14:17:31","modified_gmt":"2020-04-21T21:17:31","slug":"cyber-canon-data-driven-computer-security-defense","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/10\/cyber-canon-data-driven-computer-security-defense\/","title":{"rendered":"Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using"},"content":{"rendered":"<p><b>Cyber Canon Book Review:<\/b>\u00a0\u201cA Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using,\u201d 2017, by Roger A. Grimes<\/p>\n<p><b>Book reviewed by:<\/b>\u00a0Paul Calatayud<\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><\/p>\n<p><b>Review: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">This book is a must-read for all network defenders. First and foremost, it book is based on the author\u2019s real-world experiences as a cybersecurity consultant. It provides valuable insights into why companies of any size struggle to address their top risks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Simply put, they don\u2019t know which risks are the most important, and often this means all findings, vulnerabilities and threats are treated equally. They employ too many security technologies and spread their employees\u2019 time thin, resulting in defenders ineffectively handling real-world threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re looking for a new approach to disrupt and improve your cybersecurity program, this book is a must-read.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies are struggling to implement cybersecurity operations and strategies that can make positive impacts and make cybersecurity efforts more effective. Often, organizations learn their biggest security risks, but fail to take action in a timely manner. Network defenders spend time on too many top priorities or pet projects coming from leadership.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you had one project you set out to accomplish this year, what would that be? How would you know you\u2019re addressing the top risks to the company? Modern cyber security programs need a data-driven approach to ensure focus on the most impactful initiatives. In some cases, this means stopping non-essential projects in order to make the greatest impact in your network defense programs. Sounds difficult, but data can be your compass.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security programs need to focus on ensuring they have the right technologies to generate the right level of data. There are several key ways to approach a data-driven cybersecurity approach:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Metrics \u2013 Data analysis efforts need to focus on your top impacts, but also your top assets. Not all risks are equal.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data Gaps \u2013 Do you have the right level of data in order to make the right decisions?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data Management \u2013 Data is king, and as such it needs to be properly managed.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Threat Intelligence Needs a Goal \u2013 Focus on answering one question above all: What is the number one way I will be attacked?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Discernment \u2013 Some data is good, but other data can be bad.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Organizations struggle with prioritization. The result is, network defenders are spread thin and cannot apply the proper time and focus on the most impactful, beneficial work efforts. To make it worse, cyber leaders may change directions, or upper management may read something in the news and want that risk to be addressed. It\u2019s true that awareness of all potential risks that could occur is very important, but without prioritization, awareness can become a pitfall. In this example, the news article was very impactful to the organization affected, but does that translate into the most critical risk and threat to <\/span><i><span style=\"font-weight: 400;\">your <\/span><\/i><span style=\"font-weight: 400;\">organization?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The overall goal of a data- driven cyber program is to not have to make decisions about which risks are not worth working on and which deserve time and effort. It\u2019s about picking the most impactful, beneficial projects and effects, aligned to the data, in order to deliver a risk-driven, data-driven prioritization to your leadership, board and team.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The case for data is clear, but recognizing the value of data is only the first step in developing a cybersecurity program that can make data-driven decisions for your organization.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The biggest challenge lies with data itself. Often, organizations have a lot of data. But data quality is not the same as data volume. If your security information and event management (SIEM) software generates millions of events a day, one has to ask the question, how can you manage this? Before you take actions against data, you need to make sure the data you\u2019re collecting has the quality necessary to allow you to make decisions against it. You should:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Filter data that is no longer necessary for action.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Look at threat intelligence data differently, making sure it\u2019s addressing the goal of relevance to your company, not just offering a broader look at national state attackers.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, with the right level of data, you are able to take a step back and\u00a0 look at all your assets, data, business tolerances to taking risks. Then you can approach your board with the two or three projects that will address the real risks that are most likely going to impact the business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stop what you are doing and take a different look at how you should be managing your cybersecurity program. You should be able to gather the data you need and formulate priorities and efforts based on the data. It\u2019s a great way to navigate emotions, politics and conflicts that occur within any successful cybersecurity program. The way I like to put it, if you don\u2019t agree with me, you need to convince me otherwise, and you\u2019d better be able to create the data necessary to convince me I need to look at it in a different way. This book is a very real and practical way to help you get into the right frame of mind.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">We modeled the\u00a0<\/span><\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i><span style=\"font-weight: 400;\">Cybersecurity Canon<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/span><\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i><span style=\"font-weight: 400;\">directly participate in the process<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. Please do so! <\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recommend \u201cA Data-Driven Computer Security Defense\u201d for the Cybersecurity Canon Hall of Fame.<\/p>\n","protected":false},"author":471,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270,673,6786],"coauthors":[4989],"class_list":["post-102978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review","tag-security-operations-center","tag-threat-hunting"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/471"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=102978"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102978\/revisions"}],"predecessor-version":[{"id":102981,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102978\/revisions\/102981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=102978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=102978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=102978"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=102978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}