Intelligent CISO Issue 16 | Page 16

latest intelligence HOW TO PREPARE FOR A CYBER ATTACK Six core capabilities model ”I PRESENTED BY DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS n our current state of cyber security, security breaches are inevitable. This is an important fact, so I am intentionally repeating it. In our current state of cyber security, security breaches are inevitable.” when you are breached,” despite your best efforts at prevention. With those words, FireEye Chief Executive Officer Kevin Mandia opened his testimony to the U.S. House Permanent Select Committee on Intelligence in a previous hearing. He was speaking in the wake of several high-profile data breaches that had piqued concern among law-makers. As recent headlines demonstrate, his prediction is more relevant than ever. Having detection technology in place is only the start of a thorough defense. Today’s threat landscape also requires a detailed incident response strategy to detect, respond to, and contain a breach, along with staff expertise to implement that strategy. The question is no longer “will you be breached,” but “how will you respond 16 The organization with a well-designed incident response plan has a much greater advantage than the organization without one. Once it’s determined that an attacker has infiltrated your network, you must move quickly to minimize damage to your organization’s infrastructure, brand and customer base. u Issue 16 | www.intelligentciso.com