Intelligent CIO Middle East Issue 29 | Page 36

EDITOR’S QUESTION reduce outbreak exposures. Adopting next-generation endpoint process Monitoring tools Accessing timely, accurate threat intelligence data and processes that allow for that data to be incorporated into security monitoring and eventing Performing deeper and more advanced analytics Reviewing and practicing security response procedures Backing up data often and testing restoration procedures, processes that are critical in a world of fast-moving, network-based ransomware worms and destructive cyber weapons Reviewing third-party efficacy testing of security technologies to help reduce the risk of supply chain attacks Conducting security scanning of microservice, cloud service, and application administration systems Reviewing security systems and exploring the use of SSL analytics, and, if possible, SSL decryption Defenders should also consider adopting advanced security technologies that include machine learning and artificial intelligence capabilities. With malware hiding its communication inside of encrypted web traffic, and rogue insiders sending sensitive data through corporate cloud systems, security teams need effective tools to prevent or detect the use of encryption for concealing malicious activity. www.intelligentcio.com