Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Monumental cyber events, such as the recent Equifax breach, draw enormous press attention, public outrage and government scrutiny. The coverage is almost exclusively negative, challenging the security capabilities of the firm and questioning whether negligence played a role.
These breach stories fuel a security industry that all too often feeds on fear, uncertainty and doubt — a practice collectively referred to as selling FUD. The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible. When the industry gets wise to this cycle of promise and disappointment, security vendors switch to the other side of their mouth to espouse a security strategy of multiple systems and technologies, known as defense in depth.
For the most part, this practice prevails, and perhaps even suits, an economy built on free market companies that overlook cybersecurity until they suffer a cyber near miss, a devastating cybersecurity event, or when the government and regulators turn their investigatory sights on their industry and operations (jovially referred to as the Eye of Sauron, in reference to the Lord of the Rings). Only then do most companies adopt a more hardened security practice. However, there is a movement towards a security first approach within more proactive organizations.
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. With this shift, service providers can tailor their offering to clients in heavily regulated industries, or those that control highly confidential information such as financial information, healthcare records, or other forms of sensitive personally identifiable information (PII).
Most regulatory frameworks, including those of the Securities Exchange Commission (SEC) and Health Insurance Portability and Accountability Act (HIPAA), include provisions for vendors, business associates, consultants, and other third-parties with access to controlled data. The security first approach provides a significant advantage to firms with existing regulated clients, or building a new practice as a third-party within regulated industries.
Security first plays a dual role for law firms. First, any law firm engaging with SEC-regulated financial institutions, such as hedge funds or healthcare providers (HIPAA governed), will no doubt have to build out a robust and documented cybersecurity program in order to pass the scrutiny of their clients. Completing due diligence questionnaires (DDQ) for banks and hospitals is now all too common and incredibly time-intensive for those teams involved.
Within financial services, alternative investment funds (generally referred to as hedge funds) adopted a security first approach in response to the proliferation of due diligence requests from banks and potential investors.
AITEC was founded by investment technology leaders as a private secure community of senior management experts who share advice, knowledge, insights, and best practices with each other for the betterment of the alternative investment industry.
In response to the pressures presented by answering constant and varying DDQs, they partnered with AIMA (Alternative Investment Management Association) to create a standardized security DDQ that worked as a framework for investment firms upon which to build their cybersecurity policies and procedures. It gave investors and clients a way of accurately measuring those firms and their cybersecurity policies and procedures. There are now over100 vendors using the DDQ within the industry.
A security first approach starts with the legal industry building its own standard, leveraging guidance from the American Bar Association (ABA), the International Legal Technology Association (ILTA) LegalSEC council, and the Association of Legal Administrator (ALA).
The approaches described leverage security first as a means of retaining existing business or perhaps entering new opportunities within highly regulated, or at least controlled, industries. More progressive law firms have moved beyond this effort to build out their own privacy and data security practices founded on their enriched security posture.
Law firms are uniquely positioned to provide privacy and data security guidance and expertise. As I have been known to say, “all roads lead to Rome,” which in this case refers to law firms. Firms help write legislation at all levels of government, and then interpret these laws on behalf of their clients. Law firms broker business insurance, establish governance and legal policies at the business level, broker financial deals, lead mergers and acquisitions, file patents and copyrights, and so on. Law firms are the nexus of the economy.
As such, law firms are actively engaged in numerous facets of cybersecurity from planning, prevention, response and post-event litigation:
Litigation and Defense:
Law firms have a unique opportunity to promote the adoption of an enriched security program across the economy, while building a business based on a security first philosophy. It’s a win-win situation. However, the window for a distinct advantage leveraging security will only remain open for a finite period. Once a few prospectors strike gold, every hopeful will descend on the same claimed opportunity with a shovel and pick. Those that stake a claim early will have a significant advantage as a security first provider, and will remain both technically and economically ahead of those parties who begrudgingly adopt an updated security posture because everyone else is.
eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.