Enterprises Need A Panic Button for Security Breaches

Enterprises Need A Panic Button for Security Breaches

Most home security systems have a panic button - if you hear something go bump in the night you can push a panic button to starts the sirens wailing, call the cops and hopefully sends the bad guys scurrying. As useful as this is for home owners, enterprises need a security panic button even more.

Maybe a good analogy is that a silent burglar alarm is only useful if it automatically calls the cops. Enterprise security that doesn't automatically invoke some sort of thoughtful response to an attack is guaranteeing that the company will respond in an ad hoc and sub-optimal fashion to any security breaches it does detect.

Security spending is heavily weighted towards keeping bad guys out. Media coverage has demonstrated how often they get in anyway. So far, there is relatively little automation focused on what to do when you find the bad guys have gotten in. 

According to the CyberEdge Group, 71% of large enterprises reported at least 1 successful hacking attack in 2014. Sometimes this will be as a result of intrusion detection or some other internal security mechanism. Sometimes this will be as a result of an external site reporting a hack - many of the big hacks are first reported by external sources!

While there is extensive advice around the manual steps to take to respond to a malicious attack, there is little in the way of an automated response to an attack. This is important area to extend enterprise automation.

What might a Panic Button for automated response to security incidents look like? Essentially this would be an automated workflow that would implement a set of tasks to eliminate the current attack, identify existing losses and minimize future damage. An example workflow could include:

  1. Identify compromised systems from intrusion detection tools and disconnect compromised systems from network
  2. Search for unauthorized processes or applications currently running or set to run on startup and remediate
  3. Run file integrity checks and restore files to last known good state
  4. Examine authentication system for unauthorized entries/changes and role back suspect changes 
  5. Make backup copies of breached systems for forensic analysis
  6. Identify information stolen from OS and database logs

In fact, companies should have automated responses prepared for a number of different scenarios. There is no a one size fits all automation solution that addresses every type of attack.


By creating automated “Panic Button” workflows that respond to security incidents, enterprises can reduce the damage of an attack. This automated approach can also show customers that an enterprise is taking full precautions to protect their personal information from falling into the wrong hands.

Good post! However security management at enterprise level, proactive and reactive, requires whole new innovative approach. There are many challenges especially for organically grown large organizations. If there are weaknesses in data classification or fire walled systems (just to name few), panic button or security systems will not be effective. Multi-level re-architecture at be prerequisite Anyways Panic button or kill switch is always nice to have

Great post. Given the number of breaches and amount of sensitive information in play, a reaction plan including PR crisis management should in in place everywhere.

Like
Reply

According to Gartner, “By 2019, 40% of large enterprises will require specialized, automated tools to meet regulatory obligations in the event of a serious information security incident.” Since the vast majority of Security Operations Centers (SOC) today investigate security incidents manually, this forecast heralds significant changes ahead for how enterprises deal with breaches to their IT environments. Manual responses are no longer sufficient to keep pace with the rising volume and variety of cyber security attacks. These attacks are generating a geometric increase in security alerts, which must be sifted through to differentiate real threats from false positives, before taking proper counter measures. Expecting human operators to effectively defend against this digital onslaught with manual procedures is neither prudent nor realistic. When looking for an OOTB security automation solution, consider a tool that requires no programming skills, and has broad integration capabilities with other security systems, network monitoring systems, and ITSM platforms. Ayehu's eyeShare is one such option: http://ayehu.com/solutions/security-operations-center-soc/

Like
Reply

Interesting post. So if your currently implemented platforms, analytics, and security practices didn't detect the compromise before you hit the panic button, hitting the panic button does what function for these platforms? Shouldn't every item you listed as part of a reactive button, be something all your defensive systems were doing proactively, ongoingly and in real-time?

Like
Reply

To view or add a comment, sign in

More articles by Christopher Keene

  • Challenger Sale Is Really Challenger GTM

    The Challenger Sale can be an effective way to sell new technology products by reversing the role of the sales person…

    3 Comments
  • Pick A Go-To-Market Lane

    Go-To-Market strategy is fundamentally about resource allocation, with decisions revolving around product features…

    1 Comment
  • Go To Market is CEO's Top Job

    The first and biggest mistake a CEO can make in embarking on a new Go To Market project is to delegate it to someone…

    1 Comment
  • New Gig At Gigster

    After three months on the job, it can now be announced that I have a new CEO gig. Does anyone else find the whole PR…

    1 Comment
  • Be The Steamroller, Not The Asphalt

    My predictions on what CEOs need to do in 2019 to drive digital disruption - if you're not part of the steamroller…

  • Gigster CTO Makes AI Predictions

    Gigster's CTO, Debo Olaosebikan makes AI Predictions For 2019. Specific AI technologies are increasingly important for…

  • Internet Myth #6: China Performance Problems Can't be Fixed

    Welcome to the sixth posting of Teridion’s weekly series debunking Internet performance myths. This week’s myth is:…

  • Internet Myth #5: Internet Performance is Good Enough

    Welcome to the fifth posting of Teridion’s weekly series debunking Internet performance myths. This week’s myth is:…

    2 Comments
  • Teridion Makes Thru Customers Happy While Reducing Thru Data Centers

    Thru Inc is an Irving, Texas-based enterprise file sync and share company with a global customer base. Blazing fast…

  • Internet Myth #4: Upload Performance Always Stinks!

    Welcome to the fourth posting of Teridion’s weekly series debunking Internet performance myths. This week’s myth is:…

Others also viewed

Explore content categories