Security starts before detection and response, but many organizations focus there first. Mature security teams understand the importance of identification and protection. Establishing good cyber hygiene and taking proactive measures to secure themselves against the ever-increasing threat landscape is a critical first step in a holistic security program. How should organizations build a holistic security program and in what order?
The National Institute of Standards and Technologies (NIST) developed the best guide for building a holistic security program, known as the Cybersecurity Framework (CSF). The NIST CSF identifies the 5 core domains of a security program:
Notice that Identify and Protect come before Detect and Respond, as this is also the logical order for developing and implementing your security program. By implementing your best defenses first, you can detect and respond better.
To illustrate this approach, Russell From, Enterprise Services Integration Engineer Lead, at Tanium joined Enterprise Security Weekly to talk through a holistic approach to security using the Tanium platform approach. Commonly thought of as an Operational or Cybersecurity vendor, Tanium has built an integrated platform that covers Identify, Protect, Detect, and Respond that differentiates by being able to both discover issues and take action to resolve issues.
To learn ..
Support the originator by clicking the read the rest link below.