Anatomy of Cybersecurity Defense

Once you understand the why behind your cybersecurity defenses, you can begin to focus on the how. How can you protect your organization in a way that aligns with business objectives and brings value to the organization? Part three of SightGain’s Cyber Readiness Principles Series zeroes in on how you can protect against the threats that pose the greatest risk to your organization. Find out what it takes to improve your cybersecurity readiness approach. Watch the video below.

To learn more about how to improve the performance of your cybersecurity system, contact SightGain today for a demo.

Learn More:

Cybersecurity Readiness First Principles: Cybersecurity Protection

Cybersecurity Principle Two: Threat Based Security 101

The Real Truth About Cybersecurity Defense Readiness

Video Transcript


0:00 Intro
0:58 The Truth Is…
1:13 Some Organizations
1:31 SightGain Cybersecurity Readiness Approach
2:05 Cybersecurity Defense Readiness Measurements
2:22 Overcome Challenges
2:55 Overview

Let’s come back to first principles again, and look at and really understand how we protect our systems.

Now that we know what the business objectives are, and the parts, pieces, and components of that, we can really start to zero in on how we actually protect it and make sure that we understand what it’s going to take, and how those things are working and interacting not only with each other but also with the business objective that they’re trying to protect.

The first cybersecurity readiness principle gives us our why our business and organizational objectives that we’re trying to achieve.

One of the next principles is the how: how does cybersecurity interface with those business objectives and processes to provide value to the organization. By understanding that how, we can really start to analyze the overall value of our cybersecurity program.

0:58 The Truth Is…

Some organizations think people can be removed from the equation. However, the truth of the matter is that people are still very much involved. Either directly responding to adversary threats or programming those automated processes that do.

Therefore, we think it’s fundamental that you test those people and their automated responses to know that they’re working well.

1:13 Some Organizations

We found they did not have a systematic way of looking at their overall cybersecurity performance in lieu of the threats that they faced. And because of this, they would have blind spots in their operational performance, and their ability to confidently answer that they could protect their business objectives.

1:31 SightGain Cybersecurity Readiness Approach

The SightGain cybersecurity readiness approach first starts with the business objectives that we’re trying to achieve as an organization. Next, we add in the threats that could come at and degrade those business objectives or take us off our approach. In light of these threats, we finally add in the cybersecurity layer. And we look at it across people, processes, and technology. And then we focus on the telemetry of how do they protect against those threats, and how those threats would threaten our business objectives, how do we detect adversary activity, and finally what actions did we take and how did we respond.

2:05 Cybersecurity Defense Readiness Measurements

The systematic view and overall telemetry provide a rich tableau for us to do an analysis of not only what is performing well, but more importantly, what is performing poorly so that we can make improvements in the areas and very specific areas that are required.

2:22 Overcome Cybersecurity Defense Challenges

One of the biggest challenges to overcome is that organizations must understand these systems, even after great expense don’t work by default. If you’re assuming your systems are working, you’re probably wrong. We must constantly work to test our systems and validate whether these assumptions are true, and consistently in an ongoing way make performance improvements that are required to stop the threats that you face.

2:55 Overview

So in review, large organizations have significant business objectives and information that they need to protect from threats that they face every day. It is important to understand how your overall cybersecurity system is performing in light of those threats in order to know whether you’re protecting those business objectives or not.

Find out more about how we use these cybersecurity principles by clicking the link below. Subscribe today, add a question or comment, and we’d be happy to respond.