0% found this document useful (0 votes)
94 views

Cyber Security & Digital Transformation

This document discusses building modern cybersecurity programs using digital transformation strategies. It notes that while cybersecurity awareness is high, there are also challenges like a talent shortage and an overabundance of security tools. It then outlines key aspects of digital transformation like scale, automation, and being data-driven. Specifically for cybersecurity, it advocates applying these strategies through on-demand security, automation of repetitive tasks, and leveraging analytics and machine learning across network, endpoint, and cloud data to detect sophisticated attacks. The document concludes that the right approach requires integrating great prevention, AI/ML for detection, and automated investigations.

Uploaded by

Azzam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Cyber Security & Digital Transformation

This document discusses building modern cybersecurity programs using digital transformation strategies. It notes that while cybersecurity awareness is high, there are also challenges like a talent shortage and an overabundance of security tools. It then outlines key aspects of digital transformation like scale, automation, and being data-driven. Specifically for cybersecurity, it advocates applying these strategies through on-demand security, automation of repetitive tasks, and leveraging analytics and machine learning across network, endpoint, and cloud data to detect sophisticated attacks. The document concludes that the right approach requires integrating great prevention, AI/ML for detection, and automated investigations.

Uploaded by

Azzam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Building Modern Cybersecurity Programs:

Using Digital Transformation Strategies

Abdelmajed Saeed
Cyber Security Consultant

Riyadh March 2022


Conditions on the ground today
Awareness for improved cyber security programs is at an all time high!
But…

More cybersecurity Too much


Talent shortage
tools information

1.8 million unfilled Possibly increases IoT $800 billion


positions, according complexity, distracts us, industry, with over
to the Center for drives more staffing 8.4 billion connected
Cyber Safety and needs devices online, and
Education by 2022 spending predicted
to reach nearly $1.4
trillion by 2021
On deck: IoT + 5G
Common Responses

Increase Transfer the Modernize


staff burden

Money… Managed Digital


services Transformation
Candidates… Cloud

Can one transfer


risk?

Insurance
Key Characteristics of a Digital Transformation

Scale compute on-demand, often built within


minutes

Automation speed and agility are often what we see,


but automation is the glue

Data Driven knowing your customer, analytics, data


analysis driving outcomes
Continuous Evolution
50% of CEOs expect their industries to be substantially or
unrecognizably transformed

Cloud Automation Analytics

Enablers of digital transformation

Distributed users, apps, and data | Delivers flexibility and speed; increases risk

IoT SaaS Cloud/Virtualization Mobility


Highly Automated Adversaries
Cyber Transformation: applying these Digital
Transformation strategies to your
cybersecurity program
SCALE
On-demand security is about building dynamic process into your cyber
program. Examples…
Regionalized “security towers”
often cloud-based allowing for flexible consumption, growth and change
to occur “locally” independent of security services.
“Data processing Offloading”
Balances security data collection (locally) with centralized processing. We
want to be agile with “sensors” that have a small foot print.
Balancing your talent with partnerships
“Right-Sizing” your technology and teams. Often organizations focus on
areas in cyber that are better left to on-demand talent.
AUTOMATION
The most important element of Cyber Transformation
• Adversarial Transformation
• They too have applied digital concepts.
• We need to our own defense automation.
• Play Books
• the act of identifying manual repetitive process and automating it
into an agile repeatable process
• Natively integrated platforms
• Automation + orchestration = leverage
Data Driven
Cyber Analytics
Machine learning & analytics are key to managing the
balance between reactive and proactive activities.
Your cyber analytics program needs to integrate data
generated from SIEM’s, external threat intelligence, forensics,
and hunting activities and become actionable.
With as little human handling as possible
Data lakes are key to a foundation, but don’t let them
become a liability
(data showing threats after the breach or incident).
Advanced Attacks Require Detection &
Response

Known threats Evasive Zero-day Fileless attacks • Targeted attacks


malware attacks • Low and slow
• Insider threats

99%+ of attacks can be <1% require analysis over time &


prevented with the right tools across layers with machine learning
The right approach requires three integrated
capabilities

Great Prevention AI & Machine Learning Automated Investigations

to stop everything you can to detect sophisticated to accelerate response


attacks

ACROSS NETWORK, ENDPOINT AND CLOUD DATA


Thank you!

Q&A

Abdelmajed Saeed
Cyber Security Consultant
Riyadh March 2022

You might also like