Skip to main content

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | Pardot Privacy Policy | Oktopost Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Leveraging data the right way to build security for your organization

Farah Rigal

Global SOC Transformation Program Director

Posted on: February 18, 2019 by Farah Rigal

Creating value from data is considered the biggest area of opportunity for organizations today. But often, data is kept in different silos of an organization, potentially resulting in missed opportunities. Consider, however, what impact these silos can have when the data is relevant for the organizations security. These silos of data can mean low or no visibility of the full potential attack surface (IT, ICT, IoT).

Data silos and security

You can only protect the areas you see need protecting. These silos or data pockets mean blindness and potential entry points for hackers to build fragmented and low signal attack scenarios, which remain under the radar of most traditional controls. They can also make an organization’s reaction to a security breach slow and ineffective.

A lot of recent well-known attacks have illustrated how these silos can be easily exploited by attackers. They demonstrate the need for effective situational cybersecurity, for data convergence and correlation with all relevant business data - in and outside the enterprise - through an increased depth of data analysis. Data analysis should find the most effective ways to achieve security without necessarily requiring all data to be held in the same place. For example, running distributed forms of analytics/artificial intelligence and merging results.

Closing the loop

 

The Security Operations Centers strive to detect, identify and qualify threats and remediate them before they create damage. When a security issue is found, the response team usually responds by alerting and instructing other teams to make changes in systems they cannot access. The convergence of detection-to-reaction processes in as closed a loop as possible exponentially impacts the enterprise’s ability to manage threats and crises effectively. This is an example of where orchestration and automation can bridge gaps between silos without decreeing that teams, tools or environments must merge as one or consolidate their data in one place.

We have developed the concept of the Prescriptive Security Operations Center in order to effectively break data silos, increase depth of analysis and compress the time it takes to react with the combination of meaningful data analytics, artificial intelligence, orchestration and automation.

 

At Atos Technology Days, Farah will share the latest breakthroughs on our Security Operation Centers. Learn more from the event here.

Download the Prescriptive Security Operations Centers (SOC) – White Paper

The pace of digital change will never be as slow as it is today as the digital economy will continue to accelerate in the coming years, unleashing new digital disruptive innovations.

Read more>>

Share this blog article


About Farah Rigal
Global SOC Transformation Program Director
Prescriptive Security Operations Center expert, Farah works to create innovative solutions to be a step ahead in the cybersecurity domain for the Atos customers. Also risk Manager and Certified Information Systems Security Professional (CISSP), she is enthusiastic about analytics, Data strategies, Bigdata, Artificial Intelligence, IoT… Farah has been working within the security area for more than 18 years moving from engineer, consultant, chief architect, to offering lead and SOC Transformation manager role within several Service Provider organizations.

Follow or contact Farah