In intelligent
// LATEST INTELLIGENCE //
HOW TO PREPARE FOR A CYBER ATTACK
SIX CORE CAPABILITIES MODEL
“ our current state of cyber security , security breaches are inevitable . This is an important fact , so I am intentionally repeating it . In our current state of cyber security , security breaches are inevitable .”
With those words , FireEye Chief Executive Officer Kevin Mandia opened his testimony to the U . S . House Permanent Select Committee on Intelligence in a previous hearing .
He was speaking in the wake of several highprofile data breaches that had piqued concern among law-makers . As recent headlines demonstrate , his prediction is more relevant than ever .
The question is no longer “ will you be breached ,” but “ how will you respond when you are breached ,” despite your best efforts at prevention . The organization with a welldesigned incident response plan has a much greater advantage than the organization without one .
Having detection technology in place is only the start of a thorough defense .
Today ’ s threat landscape also requires a detailed incident response strategy to detect , respond to , and contain a breach , along with staff expertise to implement that strategy .
Once it ’ s determined that an attacker has infiltrated your network , you must move quickly to minimize damage to your organization ’ s infrastructure , brand and customer base . �
PRESENTED BY
Intelligent SME . tech |
|
. tech |
13 |