Skip to main content

3 Key Ways To Improve Your Incident Response

October 08, 2018

An increasing cyber security challenge facing enterprises across the globe is how to effectively respond to security events in a prompt manner.

As modern businesses continue to progress in their digital transformations, they increasingly move to the cloud, adopt IoT and add new tools. This expanding attack surface increases security, financial and reputational risk. In fact, IDC reports that 40% of U.S. firms are attacked at least daily1. Meaning, it is critical for enterprises to develop and implement a proactive incident response (IR) plan that combats an increasing lack of perimeter visibility, in-house expertise and proactive incident response.

Detecting, qualifying, investigating and responding to threats is a full-time job that requires vigilance and a specific skill set. However, shrinking security budgets and a cyber security skills shortage make it extremely difficult for businesses to defend themselves from malicious attacks.

So, how can security teams stop fire-fighting and improve incident response (IR)?

  1. Plan. Identify security gaps by shining a light on them to increase visibility. Proactive incident management planning enables businesses to develop and evaluate the efficacy of their programs. Enterprises need to develop an incident response plan so that the entire team understands when an event turns into an incident, and more importantly, identify who the subject matter experts are needed for response efforts. Building and maintaining an incident management playbook enables teams to understand the process to respond to scenarios organizations are likely to face from threat actors.
  2. Automate. Adopting tools and technology to automate repetitive manual tasks enables your security teams to quickly detect, gather data and expedite response to high-risk incidents across the enterprise. Optiv research finds a 96% reduction in the average time to triage an alert after implementing automated workflows.
  3. Orchestrate. Leveraging orchestration in your IR playbook enables you to employ human control in the automation process. Orchestration aligns the people, processes and technologies required to mitigate incidents with intelligent and agile decision making capabilities. It escalates alerts, provides additional context and notifies the right people and tools to remediate incidents.

Thoughtfully architecting an IR plan that leverages automation and orchestration enables enterprise security teams to gain the speed, agility and expertise required to quickly detect, intelligently respond to and mitigate increasingly complex malicious attacks.

(1) IDC InfoBrief Sponsored by Splunk, The State of Security Operations, April 2017.

    Jeff Wichman

By: Jeff Wichman

Managing Security Consultant, Enterprise Incident Management

See More

Related Blogs

October 01, 2018

Staying Cyber Safe During Digital Transformation

It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of...

See Details

August 28, 2018

Gaining Efficiencies in a Cybersecurity Ecosystem

In cybersecurity, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep tr...

See Details

September 05, 2018

We Want Robots to Do (Part of) Our Job

The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best pract...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.