Video Shows What To Do When Your Cyber Adversaries Are Automating

July 29, 2014
No Comment

By Bob Gourley

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

The bottom line of this research: Your online adversaries are automating. You must automate your response, including automating the removal of malware and return to a known good state.

Additional context into this topic is available in our research report downloadable here: 

Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 554 times – 918 kB

This paper
Automating Removal Of Advanced Threats (554 downloads)
captures the results of a review of industry technology trends, community standards for information exchange, CISO lessons learned in the domain of automation, and enterprise IT mission needs to produce a draft list of requirements which can be a starting point to accelerate the modernization of your cyber defense enterprise.