Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join Tiff Cook, eSentire's Sr. Director of Incident Response and Bill…
eSentire will be participating in ILTA LegalSEC Summit.
Join eSentire as they explore how to build a comprehensive training and…
This year’s RSA Conference drew an unbelievable number of security professionals from around the globe. The electricity was palpable, as more than 28,000 descended on San Francisco to dissect last year’s major breaches, the lessons learned and emerging trends. And while a large number of sessions focused on the pressures facing professionals working in the field, they also built on the conversation around the state of the industry’s maturity and repeatedly asked the question, is InfoSec having an identity crisis?
Information Security is a young industry, especially when compared to other industrialized fields. The discipline is growing at an unbelievable pace, though this should come as no surprise given the steep rise in cybercrime. Like any growing discipline, InfoSec is experiencing its own brand of growing pains. From an adoption standpoint, the industry has made great strides in convincing the boardroom that cybersecurity is a critical organizational function. However even with that recognition, many organizations are still lagging when it comes to implementing cybersecurity policies and measures. The pendulum swung quickly in large enterprise, especially as the effects of the 2014 mega breach stories were realized. But what about the smaller companies - the small to mid-sized organizations?
Through regular surveys we’ve observed that small to mid-sized enterprise is still having a difficult time adapting and adopting cybersecurity infrastructure. Leaders in this space are contending with a cybersecurity trifecta: while they understand that they too have high-risk data, they’re having a difficult time reconciling internal cybersecurity bandwidth, resources and dollars, especially when balancing it with other crucial business functions. To some degree, many businesses in this space are still consider themselves below the radar of cyber threats. And if they are wise enough to realize they are the achilles heel of larger industry, they struggle with monumental task of protecting themselves, particularly when they see the F500 falling victim time and time again.
One walk through RSAC’s exhibition floor amplified the industry’s explosive growth. More and more cybersecurity services are emerging to help organizations build out defenses. On the show floor and in the RSAC lecture rooms, it became evident that InfoSec is in fact, having an identity crisis. Without question, ours is an industry that’s outpacing all other global industry. As a discipline, we recognize the risks, threats and implications our environment presents and are pivoting constantly to stay ahead of the threat curve.
We have an abundance of data that we can use to help educate enterprise at all levels. And really, it’s our duty to share resources to help establish the need for proactive cybersecurity programs and solidify the commitment towards action. Like any immature industry, we’re having a hard time defining who we are. We use variant language to describe what we do and unfortunately for us, this is complicating the conversation that's happening in boardrooms, where business decisions are made.
So what can we do? The conference sent us on our way with an answer - a call to action, if you will. As a discipline, we have to collaborate together to elevate our already tenacious discipline. We need to drive the definitions that will define the discipline’s identity and continue to foster the profession's collaboration that has already proved invaluable in today’s shifting landscape. Think of the ISAC’s as just one example. Back in late 2013, eSentire issued a service advisory to its client base giving visibility to a .docm file circulating through the hedge fund atmosphere. Then, the intent of the attack was to drive a spear-phishing campaign with the explicit intent of accessing sensitive financial data in the hedge fund market through credential harvesting. At the time, eSentire’s Security Operations Center flagged what became known in 2014 news reports as “FIN4”. In addition to our client advisory, eSentire shared this information with FS-ISAC (we’ve been a member of the ISAC community for several years) to help warn others in the financial community of this emerging threat.
At the end of the day, every professional working in the InfoSec industry is an influencer. Every professional possesses the data and resources that can help define industry-wide policies, drive best practices and perhaps most importantly, help the industry shake its identity crisis.
Mandy leads a team of savvy communicators who continually strive to interpret to share thought provoking news and resources with the InfoSec community.