Resolve Systems was a showcase sponsor at the M.Tech Security Exchange event to discuss best practices and automation use cases for enterprise-wide security incident response. Primarily speaking to the audience, Resolve Systems explained how to help comply to the omnibus cybersecurity law protecting the 11 Critical Information Infrastructure (CII) sectors: Aviation, financial services, energy, public, healthcare, information and communications services, land and martime transport, security and emergency services, water supply, and media.
“The Act also rightly places the responsibility of cyber security on CII owners by clarifying their responsibility to conduct audits, risk assessments and participate in exercises. These are critical for the effective implementation of good cybersecurity policies and practices,” said David Koh, Cyber Security Agency of Singapore (CSA) CEO and Singapore’s Cybersecurity Commissioner.
Want more information of Singapore’s omnibus legislation? Read the Definitive Guide now.
Attendees of this event play a critical role in security incident response, spanning the 11 sectors most at risk. The Resolve Systems team was able to discuss the 3 most important needs to accelerate security incident response to help comply with the regulation and protect CII.
Need: Empower your Security Operations Team with Out-of-the-Box Automation
As discussed at the event, and confirmed in a recent ServiceNow/Ponemon report, Singapore is struggling with insufficient resources to keep up with cybersecurity vulnerabilities. In fact, 78% of Singapore businesses report they can’t stay ahead of just patch volume, which is a leading cause of breaches.
With a security incident response automation and orchestration platform, you can:
- Capture the knowledge in a single repository
- Make knowledge available in real time
- Identify the most common issues
- Automate steps as needed, across departments
- Selectively automate while providing insight into response and still allowing humans to make decisions
An automation solution that can do a health check to assess software updates and patching issues takes this time consuming task off the plate of the security engineers so they can focus on more pressing issues, while mitigating the risk of a breach.
Need: An Enterprise-wide Solution to Bridge Technology Silos
Security Incident Response and triage requires input from multiple domain experts, from network to IT to security operations, for an effective security incident response plan. Collaboration difficulties between security, IT, and other technical groups choke incident response progress. Regardless of your industry, there is an influx of emerging technology, but how can you connect and extend legacy systems?
- 42% of organizations report aging technology solutions are not effective with their volume of data. So how are you to optimize these investments, reduce the silos, and make sure your current employees are trained on legacy systems?
- 73% of companies do not have a common view between their IT Operations and cybersecurity operations team
Regain the time lost coordinating across these technical and knowledge silos by breaking down the obstacles between security and IT with an enterprise-wide solution. Can the security operations team continue to succeed with only informal, ad hoc support from other technical teams? You’ll see this in the news headlines – the answer is no.
For effective security incident response, look at a solution like Resolve for a single pane of glass view that allows a security analyst to partner with system administrators in the relevant/affected technical team.
Need: Define your Security Incident Response Plan to Alleviate Process Gaps
Since adding cybersecurity talent may not be possible as research suggests cybersecurity skills shortage is in fact getting worse, adding cybersecurity talent may not be possible. Just in Singapore alone, cyberattack volume increased by 14% last year, the severity of which increased by 25%! When you add to this the compounding issues of process gaps – in particular, when 57% say critical data and information for effective response is neglected because emails and spreadsheets are used to manage processes – what can be done?
“Cyber threats show no sign of abating,” said Mr. Koh.
To aide cybersecurity awareness, Singapore’s CSA launched a new campaign called Cyber Tips 4 You, which focuses on:
- Using anti-virus software
- Strengthening passwords and enabling Two-Factor Authentication (2FA)
- Spotting phishing attacks – which are still the leading cause of incidents
- Updating software as soon as possible
These 4 targets are part of a larger plan to improve awareness and increase the resiliency of Singapore. An average of 10 days was lost to Singapore’s security operations teams due to manually coordinating activies across teams and 60% say manual processes put them at a disadvantage with vulnerabilities.
What can be done? Prioritize the response effort with a security incident response plan focused on continuous improvement and automating one step at a time, and always have a contingency plan.
58% of cybersecurity professionals in Singapore attribute the root cause of data breaches in their organization to human errors. There are many vulnerabilities when responding to incidents; is there a way to mitigate the risk of human oversight?
A few steps can be taken to mitigate a breach, unite IT and security teams, and instill process improvement with automation:
- Assemble a cross-functional team for successful, enterprise-wide security incident response
- Decrease dependencies on human interaction using human-guided automation
- Formalize a security incident response plan with standards, roles, and automated response
- Implement the right automation to start small and deliver quick, quality improvements
- Track which processes can either be fully or partially automated to save valuable time and resources and pick a scalable technology platform, like Resolve
If you’re looking to reduce MTTR and do more with less through automation and orchestration, read more about Resolve’s security incident response solution.