Speed is of the essence in digital defense. As the latest Ponemon Institute Cost of a Data Breach Report makes clear, businesses and agencies that are able to respond to and contain an incident rapidly will save millions over their slower peers. The average total cost of a data breach increased by nearly 10%, the largest increase in nearly a decade. However, groups able to identify and contain a breach in less than 200 days saved an average of $1.26 million compared to those that needed more time. So, the right thing to do is put more cybersecurity solutions in place, right?

Not always. There are many tools that speed up breach response times, such as artificial intelligence (AI) and security automation. But these are challenging to implement. Groups with AI and automated security solutions saved 80% in total breach costs over those that did not. The use of such advanced tools is strongly connected with faster time-to-identify and time-to-contain. However, making the architecture more complex can make analysts’ jobs more difficult, too.

Recent research reveals this exact paradox. According to the 2020 Cyber Resilient Organization Report, security operations programs with fewer than 50 different solutions perform better than SecOps programs running more tools. In fact, those using fewer solutions are 9% faster to detect threats, and 7% better at responding to incidents. Past a certain point, adding more tech to the stack does increase network telemetry coverage and visibility. But it actually decreases operational effectiveness.

Shortening the On-Ramp for New Cybersecurity Solutions

How can we get past this dilemma and begin taking full advantage of the value of the new tech that we adopt? In the end, security leaders and vendors alike must work together to support data sharing, product interoperability and an open ecosystem. In the long run, this will support greater speed and responsiveness.

The slow-moving gears of procurement, deployment and internal bureaucracy can pose the largest threat to good posture. Every program must be able to respond nimbly to changes in threat actors’ skills and strategies.

Scaling Up

To do so, it’s key that we find vendors and partners that can help scale up defenses. That will help them keep pace with the demands of the growing business and evolving threat landscape. This means speeding up the process of implementing, customizing and tuning new tools and cybersecurity solutions as much as possible. That’s the case even if all those solutions aren’t from the same vendors. It means keeping the number of lines of code that SecOps workers are asked to write down to a bare minimum. And, most of all, it means ensuring that tools can work together quickly and seamlessly. At best, they should do so right out of the box, or on day one of their deployment.

The need for tool sets that work together smoothly is strong and pressing. Numerous vendors have responded by building architectures of their own. Another popular method is pushing the “single vendor” approach as a means of solving the management and interoperability challenges that different tool sets create. This approach has numerous shortcomings, including preventing people from employing a “best of breed” approach. That can cause them to miss out on the most innovative, advanced or efficient solutions. It can also prevent them from getting the most out of the investments they’ve already made. In the end, it isn’t practical, which is why most enterprise security programs continue to rely on a multi-vendor solution mix.

The Best Path Forward: An Open Approach

 

The approach championed by the Open Cybersecurity Alliance (OCA) and other open source advocates has numerous benefits for developers, workers and vendors alike. With robust data integrations and open APIs, vendors can get the most out of their real-time threat data. SecOps teams can share insights and findings among themselves. They can deploy analytics, orchestrated response tools and AI-powered assistants for incident investigation and case-building. And that’s without taking time away from higher value work, such as threat hunting, to build complex custom integrations.

Focused on enabling data interchange within the security event lifecycle, the people who make up OCA are creating standards and protocols that enable tools to seamlessly work together. It’s hoped that these standards will evolve into an industry-wide norm. That, in turn, might reduce the amount of time, effort and money companies will need to invest in building and maintaining integrations. This will make it so that even the most disparate tech and products can work together.

How Do Open Standards Help?

With open standards in place across cybersecurity solutions, workers will be able to:

  • Share information, analytics and orchestrated response patterns among team members and between tools
  • Gain enhanced visibility into the environment as a whole
  • Maximize the value of existing products and solutions, while reducing the need for new ones
  • Free themselves from vendor lock-in.

In turn, cybersecurity solutions vendors can:

  • Make their products more appealing to a wider customer base
  • Showcase the value of their internal engineering expertise
  • Provide their customers with greater value – and demonstrate this value consistently
  • Take advantage of when their solutions are reusable.

The Future of Cybersecurity Solutions

Numerous global vendors have joined OCA or voiced their support for this mission. In turn, their partnerships in support of interoperability are already speeding up data sharing and reducing integration costs. Cybersecurity workers and service providers are taking advantage of custom scripting or APIs to serve as the ‘glue’ that holds multi-vendor security architectures together. In addition, private enterprises like Netflix are getting into the game by releasing custom integration engines as open source projects.

Security teams have long wished that they could integrate new and advanced solutions into their environments quickly and with little effort. With greater emphasis on open standards and broad support for their adoption across private industry, government agencies, nonprofits and individual workers, OCA’s future looks bright. This brings new promise to the ongoing quest to reduce complexity in cybersecurity solutions.

More from Incident Response

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today