Beyond Continuous Monitoring: Threat Modeling for Real-time Response

by Mark Hardy
Sept. 1, 2017 0 comments SANS Institute Pen Testing & Audits threats/vulnerabilities

Malware. Hackers. Espionage. Advanced Persistent Threat. Cyberwar. Dangers to the enterprise abound and are getting worse. Arrays of attackers seek to exploit vulnerabilities in military, government and civilian systems. Every element of our IT enterprise is a target, from laptops to network infrastructure. Defenders must block all attacks; to win, attackers need to succeed at only one. Factor in increasing complexity, tightening budgets and a limited pool of security experts, and the prospect for maintaining effective security appears bleak.