2017 Security Transformation Study In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?

In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?

Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks, even months as they gather intel and prepare to strike. How prepared is your security organization to respond to these attackers? Is yours a proactive security posture that is able to leverage state-of-the-art threat-hunting tools and skills to find attackers or look for attack patterns before they actually strike? Or is yours the traditional, reactive security posture that simply responds as best it can after the strike is discovered?

Most enterprises have a conscious desire to move from the prevalent model of a reactive security organization that detects and responds to incidents and tracks compliance to a proactive posture that leverages the eco-system and threat intelligence to focus on external and insider threats that are still in the initial stages.

Take the 2017 Security Transformation Study to help determine where your organization's posture is in the transformation from reactive to proactive mode. Take the survey (below) and help us determine:

  • What is the state of your organization's security posture in 2017?
  • Which factors most prevent organizations from enhancing their threat-hunting capabilities?
  • Which key investments will be made over the next 12 months to create a more proactive security organization?
  • What is the path to proactivity in terms of utilization of MSSP?

    1. As compared to peer organizations within your sector, how do you rate the overall strength of your own organization's current cybersecurity posture (detecting and responding effectively to external and internal threats)?
    2. Over the past 12 months, how would you describe the pace of advanced threats that target your critical information systems?
    3. When it comes to detecting and stopping these advanced threats before they result in damage to your organization, do you consider your current security posture to be more reactive or proactive?
    4. In your opinion, what are the biggest factors preventing your organization from having a proactive response to advanced threats? (check all that apply)
    5. Does your organization have an Annual strategic security planning process that takes into account the fast-changing threat environment and the needs it places on the organization's strategic response and mitigation capabilities?
    6. Given the evolution of threats and threat actors, do you believe your organization today has appropriate visibility into the changing threat landscape relevant to your organization?
    7. What factors do you believe inhibit your organization's ability to provide appropriate visibility into the changing threat landscape? (check all that apply)
    8. How do you rate the effectiveness of your security operations center at detecting and responding to today's advanced threats?
    9. How do you rate your organization's understanding and effective utilization of next-generation security technologies such as analytics, correlation and threat intel feeds and their integration into the SOC?
    10. How do you rate your existing SOC implementation in performing efficient data aggregation, reducing the volume of alerts by contextually removing false-positives, white noise, and low-risk alerts for effective triage and incident handling?

Around the Network