Endpoint Security Survival Guide

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 40

Scroll down to view the document on your mobile browser.
1 HENDPOINT SECURITY SURVIVAL GUIDE TW-BRESSG16A Field Manual for Cybersecurity ProfessionalsOffice of Cybersecurity Preparedness
1 H    INTRODUCTIONDuring the past decade, attackers have demonstrated incredible creativity in adjusting to changes in the security industry. Each time security vendors create a new type of “lock” to protect enterprise assets and data, the criminal underground builds a new set of lock picks in the form of malware to help them circumvent the new controls. A proactive cybersecurity defense is the best strategy for protecting your business against cyber threats. In the past, security approaches have focused on understanding attacks to stop cybercriminals from accessing corporate networks and systems, but this approach has become less effective. Endpoint Detection and Response (EDR) is a new, proactive approach that focuses on behavior that indicates an attack is underway rather than just indicators of compromise (IoC). In this way, it helps you protect your network against zero-day threats and a wide range of emerging threats. It also reframes the security problem so you’re not just focused on keeping the bad guys out. Instead, you’re also working to quickly detect intrusions, minimize cyber attackers’ abilities and reduce the potential damage they can cause if they do get in. This is a subtle, but critical, shift in strategy that works to disrupt criminal activi-ties. Even if attackers do manage to breach your network, EDR helps make sure they leave empty-handed.

Navigation menu