DUBLIN, July 23, 2015 /PRNewswire/ -- Research and Markets (http://www.researchandmarkets.com/research/bt9ptw/countering_cyber) has announced the addition of the "Countering Cyber Attacks with Big Data and Analytics" report to their offering.
Most large organizations have a defense-in-depth policy; that is, they use multiple security systems and processes throughout their IT infrastructure to thwart inappropriate access to their informational assets. Many have a C-level security officer or director, but the management of these security systems and practices is typically the responsibility of the pertinent functional silos. For example, the facilities department handles physical security, the network department handles network security, the system and database administrators handle application and database security, and the human resource department is responsible for training end users on security best practices.
In the event of a data breach, the finance, legal and public relations departments get involved to manage the impact on the organization's customers, shareholders, and other affected parties. After the breach, a forensic investigation is typically undertaken (or contracted) at the C-level, to determine the attack specifics and recommend improved systems and procedures.
If each department is diligently focused on what it does best, how is it that these massive data thefts continue? Certainly, a big part of the problem has to do with keeping all the existing systems updated with the latest software and content (e.g., proper access permissions and levels of authorization for internal users, current subnet and proxy configurations, blacklists of known attackers); as well as monitoring and reacting to anomalous database and network traffic; and making sure that end users are frequently reminded to keep up their end of the protection (e.g., password integrity, file-sharing and remote-work hygiene).
Key Topics Covered:
- Executive Summary
- Why Is Enterprise Security So Complicated?
- How Can Big Data and Analytics Be Used to Improve Enterprise Security?
- Big Data and Analytic Technologies for Heterogeneous Data
- Data-Oriented Challenges in Enterprise Security
- Improving Threat and Vulnerability Intelligence
- Next Steps for Buyers and Sellers
- The Last Word
For more information visit http://www.researchandmarkets.com/research/bt9ptw/countering_cyber
Laura Wood, +353-1-481-1716, firstname.lastname@example.org
SOURCE Research and Markets