It's not enough to follow a rough outline of your incident response strategy. Conduct regular, intensive, detailed exercises within a well-defined framework to establish cybersecurity muscle memory.
SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
Security gamification engineer Richard Moore designs cyberthreat scenarios to unlock the competitive spirit of cybersecurity professionals and demonstrate how easy it is for anyone to hack a system.
Ten years ago, John Clarke was driving a van in Ireland for a living. Today, he develops games at IBM to help train security professionals on incident response and cyber situational awareness.
IBMer Mike Barcomb draws upon his experience in the U.S. Army Reserve to lead a team of incident response experts through careful planning, regular rehearsals and quick decision-making.
The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.