• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Visibility: The Missing Layer of Information Security

November 6, 2015 By Corey Nachreiner

No one wants an attacker or malware in their systems. That’s why the information security community spends so much time and effort on prevention. We try our best to implement defenses that stop today’s threats, while imagining new safeguards to catch future ones.

The problem is, complete prevention is simply an infeasible goal. We’re all human. No matter their competence, engineers will occasionally make mistakes that expose new vulnerabilities. Furthermore, even if we had that unattainable “perfect security system,” users would still mess up and introduce new threats. Meanwhile, crafty hackers continue to find new holes to exploit. No matter how great your defense, it’ll never be perfect.

Visibility: The Missing Layer of InfosecThat’s why visibility should play an important role in your information security strategy. Since you can’t stop every attack, you need to have mechanisms that help you detect them. That way, you may be able to respond before it’s too late.

Recently at Gartner’s ITxpo Symposium, I gave a presentation called Visibility: The Missing Layer of InformationSecurity. In this talk, I share how data breaches have increased, while at the same time, it takes us to longer to identify them. I also share a detailed timeline covering four major breaches from the headlines, and illustrate how long the attackers were in these organizations before the breach was even discovered. Next, I show how visibility tools can help you discover breaches more quickly, perhaps even allowing you to mitigate them before the attackers make off with your data. Finally, I offer six things we can learn from these breaches.

If any of this sounds interesting to you, Garter has made my presentation available on-demand. Click here to learn how visibility tools, such as WatchGuard Dimension, can plug the missing gap in your information security program. — Corey Nachreiner, CISSP (@SecAdept)

Corey Nachreiner, CTO, speaking at Gartner IT Expo

Share This:

Related

Filed Under: Uncategorized Tagged With: breaches, Forensics, Gartner, information security, IT Expo and Symposium, Security breach, visibility

Comments

  1. Andrew Beck says

    December 7, 2015 at 4:52 am

    Is this presentation still available anywhere?

    Will WatchGuard help me setup Dimension?

    Thanks.

    Sent from my iPhone

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • The RCE Vulnerability That Wasn’t
  • Cybersecurity News: ACLU Unveils Mass Surveillance Program, (More) Malvertising, and Breaches

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • CISA Warns of Weaponized RMM Software
  • Cybersecurity News: ACLU Unveils Mass Surveillance Program, (More) Malvertising, and Breaches
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • Report Roundup
  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use