STRENGTHENING THE FRONT-END LINE OF DEFENSE AGAINST CYBER THREATS.

Byline: AHSAN NISAR

The cyber security is still a challenging and diverse field and it has been evolving due to constant technology transformation and enhancement as per changing business environments, needs and practices. In the earlier stage of protecting IT systems or digital assets, primary focus was on 'perimeter security defense' against outside threats as lots of capital and investment was made on perimeter controls like firewalls, intrusion detection systems, proxy servers, etc. to avoid thecyber criminals. Recognizing that perimeter defense alone is insufficient, now 'layered defense' is being adapted to confront insider threats as well because nowadays and in future most destructive security threats are not only originating from malware or malicious outsiders but from both malicious and negligent insiders.

Nowadays, the Cyber Security Operation Center (CSOC) is emerging as a dominant and critical operation for any type of automated and risk-aware institutions and playing a vital role in layered and perimeter security defense for the protection of an institution's critical automated infrastructure and systems.

The CSOC work with a goal to prevent, monitor, detect, analyze, respond and report cyber threats and attacks proactively. A good and mature CSOC is one that supports business objectives, functions and effectively improves an institution risk posture effectively anddiligently over time. A real and active CSOC is one that provides a secure environment for the business to deliver on its core objectives in line with its strategic direction and vision.

Like Information Technology Operation Center (ITOC) or Network Operation Center (NOC), which is focused on continuous performance monitoring of IT infrastructure and systems, the CSOC has emerged as the active security defense and command center and continuous security monitoring mission and critical security platform for any type of business automation and acting as first front end line of defense to handle andrespond against emerging cyber threats through a centralized...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT