Intelligent CISO Issue 06 | Page 66

industry and do not have an identifiable signature. IPS may be combined with IDS to automatically protect your network from identified threats.
The key features of intrusion prevention and detection systems( IDPS):
Comprehensive, automated detection capabilities
The IDPS should be as automated as possible and empower the security team to monitor and investigate alerts, tune detection capabilities and ensure that the system is not only looking for the latest threats but can deal with them.
Abnormal behaviour detection mechanism
intelligent NETWORK SECURITY
This capability uses smart algorithms to monitor network traffic and activity on a constant basis and to store and compare the traffic behaviour for specific days and hours. It studies‘ normal’ patterns and then compares against what may seem to be abnormal traffic activity for a similar or particular day of the week, time of the month, etc. The mechanism should notify security administrators of possible excesses in expected thresholds.
Security Information and Event Management( SIEM)
This module collects, logs and manages warnings and alerts. A SIEM is entirely out-of-band, typically not even processing a copy of the data traffic directly but logs metadata and alerts from other tools. It integrates and evaluates threat intelligence against known system weaknesses for better management and prioritisation of security controls.
Staff training
A critical but often overlooked line of defence in protecting the network is the ability of the staff to prevent breaches. The most sophisticated
IPS may be combined with IDS to automatically protect your network from identified threats.
‘ locks’ and‘ measures’ will be virtually powerless if someone‘ leaves the door open’ so to speak.
According to Verizon’ s 2018 Data Breach Investigations Report, 4 % of recipients will click on any given phishing campaign – which means that if you have 100 employees, four of them will regularly invite cybercriminals directly into your organisation. The Anti-Phishing Working Group reported that there were more than 233,613 reports in Q4 of 2017 alone.
Training staff to be aware of the variety of attacks and their essential role in stopping them, as well as precise instructions on what to do in case of
a breach, are critical to complete an enterprise’ s network security strategy.
In his Cybersecurity Business Report entitled Please Don’ t Send Me to Cybersecurity Training, Steve Morgan lists several companies’ offerings from security awareness training vendors that provide training, simulations and network security related tips.
Your internal or external trainers and vendors should provide general IT training, best security practices and periodic extended training on new issues, system risks and counter-methods, periodic refresher courses, either inperson or online, and a brief test to check staff awareness and comprehension.
Summary
A good defence against network breaches includes pre-emptive action and actual breach prevention. These can be attained technologically with next-generation intrusion detection and prevention systems.
At the same time – and even more critical – your entire organisation needs training in prevention and response methods. u
66 Issue 06 | www. intelligentciso. com