August 3, 2021
Joe Ariganello

Answering the Executive Order with Cyber Resilience

<p>Co-written with Jason Burosh</p> <p>As noted previously, President Biden recently signed an Executive Order to improve America's cybersecurity in the wake of major cyberattacks, such as SolarWinds.</p> <p>Although this Executive Order only applies to the federal government and federal government systems. It can also be applied to thousands of government contractors that provide IT goods and services to the US government.</p> <p>The first two sections highlight the need to prioritize detection and response capabilities while sharing threat intelligence. To summarize:</p> <p>Section 1 of the Executive Order covers the Administration’s policy that the prevention, detection, assessment and remediation of cyber incidents is a top priority and essential to national and economic security. You can <a href="" target="_blank">read more here</a>.</p> <p>Section 2 discusses the need to share threat information about the incidents they suffer with the federal government, as well as collect and preserve data that could aid threat detection, investigation and response, highligted by:</p> <p>“The Executive Order ensures that IT Service Providers are able to share information with the government and requires them to share certain breach information. IT providers are often hesitant or unable to voluntarily share information about a compromise. Sometimes this can be due to contractual obligations; in other cases, providers simply may be hesitant to share information about their own security breaches. Removing any contractual barriers and requiring providers to share breach information that could impact Government networks is necessary to enable more effective defenses of Federal departments, and to improve the Nation's cybersecurity as a whole.”</p> <p>You can find out more info by reading the <a href="" target="_blank">FACT SHEET</a></p> <h2>The Paradigm Shift</h2> <p>Historically, organizations have not shared threat information from the incidents they've suffered.</p> <p>Why? No organization wants to share bad news, especially when it comes to their cybersecurity capabilities. They risk damaging their reputation, losing their customers' trust, and making it seem like they wasted money on their current cybersecurity tools if they share information about incidents that they have suffered.</p> <p>With this Executive Order, the federal government is creating a central authority to collect this threat information and share it publicly. But this approach will work only if organizations step up and rapidly share their incident information.</p> <p>Before we share information as an industry, organizations need to break down their own silos as well.</p> <p>Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open. By breaking barriers between security information silos and functions, organizations can unify key processes and close significant gaps between detection and response capabilities. To eliminate barriers and build bridges, organizations need to focus on joining threat intelligence and defensive operations internally to effectively share what's needed to win the war against cyber attackers.</p> <h2>Becoming Cyber Resilient</h2> <p>While we have a long way to go until the Executive Order comes into fruition, we at Anomali believe strengthening cybersecurity begins with cyber resilience.</p> <p>To achieve a state of resilience, organizations need to elevate their security posture by taking a holistic approach to cybersecurity with a security strategy that includes global, actionable intelligence that provides:</p> <ul> <li>Relevant Intelligence at Scale</li> <li>Precision Attack Detection</li> <li>Optimized Response across Security Ecosystems</li> </ul> <h3>Relevant Intelligence at Scale</h3> <p>The cost of intelligence, insufficient team skills to cultivate relevancy, and the inability to operationalize are some of the reasons why security strategies lack this critical capability.</p> <p>Anomali takes intelligence and makes it relevant to what matters, giving CISOs the power to monitor global cybersecurity risks, detect potential attacks and perform investigations required to determine gaps in security coverage. Anomali provides relevant intelligence at scale that:</p> <ul> <li>Access to global threat intelligence knowledge at your fingertips, identify new and known threats, and understand if you’ve been impacted – in seconds.</li> <li>Leverages machine learning and automation to score and prioritize active threat intelligence</li> <li>Eliminates false positives and expired indicators improving efficiency of security teams</li> <li>Enables secure collaboration with internal teams, external suppliers, partners, &amp; industry peers</li> <li>Provides increased visibility to monitor global trends to identify relevant cybersecurity risks</li> </ul> <h3>Precision Attack Detection</h3> <p>When it comes to detecting threats, the accuracy of the intelligence used in the detection process is critical. If the detection model is riddled with false positives, detection alerts are useless.</p> <p>Anomali’s threat detection capabilities are fueled by constantly curated global intelligence that help prioritize and operationalize relevant threats at scale. This provides analysts with the data required to investigate the root cause of an attack and enables them to immediately respond. Anomali provides precision attack detection that:</p> <ul> <li>Machine learning that eliminates redundant data and reduces costly false positives that send security teams in the wrong direction</li> <li>Integrated big data management that allows organizations to leverage threat intelligence at scale to quickly understand the historical impact of new threat intelligence in their environment</li> <li>Continuously evolves with the ever-changing global threat landscape to help accurately detect threats with pinpoint precision</li> <li>Integrates automated enrichments that increase the fidelity of intelligence to deliver more accurate detection of threats in an environment</li> <li>Provides a seamless workflow of human created and automated investigation between Security Operations, Threat Intelligence, and Incident Response functions to increase the accuracy of threat detection and response efforts</li> </ul> <h3>Optimized Response across Security Ecosystems</h3> <p>When under attack, security teams need to make decisions fast. Anomali allows security teams to effectively respond to attacks by giving them the tools and actionable intelligence needed to make informed decisions. Anomali helps provide an optimized response for security teams by:</p> <ul> <li>Providing relevant global intelligence at their fingertips to make quick informed decisions</li> <li>Enabling visualization of threat actor trends, attack activity, and relevance that enable analysts to prioritize investigations and effectively respond</li> <li>Automating response that enhances security posture after an identified breach and helps protect from future attacks</li> </ul> <p>Anomali helps organizations achieve cyber resilience. We are committed to helping the federal government, its agencies and its suppliers become cyber resilient to meet the objectives of the Executive Order, and beyond, to defend against today’s sophisticated cyber threats.</p> <p><em>To find out how we can help you understand and meet the needs of the Executive Order, download our white paper “<a href="{page_5738}"><strong>Executive Order on Improving the Nation’s Cybersecurity</strong></a>”.</em></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.