Risk management must be accompanied by strong incident response What’s the best way to protect against security incidents? Most security professionals would agree with the old colloquialism that, “an ounce of prevention is worth a pound of cure.” The theory here is that if you lock down your IT infrastructure, applications, and sensitive data, you’ll make it much harder for bad guys from the start.To achieve this goal, a lot of organizations are embracing risk management. Risk management decisions are made on an IT asset by asset basis depending upon the level of exposure (i.e. threats and vulnerabilities) as well as the asset value (i.e. the relative significance each asset delivers in overall business operations). Armed with these metrics, organizations can make qualitative and quantitative risk management decisions such as risk acceptance, risk assignment or transfer (i.e. transferring potential risk to a 3rd party such as an insurance company), or risk reduction (i.e. mitigating risk by implementing security controls, policies, and procedures). In this case, a control is defined as a “mechanism used to restrain, regulate, or reduce vulnerabilities.” The trend toward risk management is illustrated in the recently-published ESG Research Report, U.S Advanced Persistent Threat Analysis. When asked about their organization’s security philosophy, 61% of security professionals responded, “my organization prioritizes information security policies, procedures, and technical controls to minimize the risk of a cybersecurity incident,” while 39% of respondents said, “my organization prioritizes information security policies, procedures, and technical controls for detecting and remediating cybersecurity incidents if/when we are attacked.” Clearly the “ounce of prevention” strategy is gaining momentum and that’s a good thing but only if security professionals continue to invest in and improve the “pound of cure.” Unfortunately, this is not always the case. ESG research indicates that many large organizations have numerous problems with regard to incident response. Specifically, they don’t have the right tools, analysis skills, or processes for event detection and remediation. Furthermore, there are almost no security incident response business processes in place. When a security breach occurs, the legal, PR, HR, and executive management team have very little guidance for what to do next. This leads to lost time which typically exacerbates the damages.My point here is simple. It’s critically important to build security into all aspects of IT as this WILL make any organization far less vulnerable to cybersecurity attacks. That said, it is equally important to assume that you will be attacked and make sure you are adequately prepared for this eventuality. Without best practices for risk management AND incident response, large organizations face far greater risks than they realize. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe