Technology Record - Issue 26: Autumn 2022

100 I NT E R V I EW Combatting cybersecurity challenges Tony Velleca outlines how businesses can overcome the growing risks of cyberattacks with the help of well-defined strategies, advanced technologies and expert partners like CyberProof From ransomware to malware, phishing emails, denialof-service attacks, and more – businesses around the world are being bombarded with hundreds, if not thousands, of new and increasingly sophisticated cyberthreats every day. “Now that everything is becoming connected and businesses are migrating vast workloads to the cloud, there has been tremendous growth in the potential attack surface and the range of possible cyberthreats over the past couple of years,” says Tony Velleca, CEO of CyberProof. “And businesses are only going to become more vulnerable as the number of connected devices continues to grow exponentially, and cybercriminals increasingly exploit cloud capabilities to automate attacks and make the software freely available on the dark net. “Consequently, every business must now assume that it will be attacked and implement solutions to quickly detect and respond to threats before they cause widespread operational, financial or reputational damage.” Velleca advises that businesses adopt a threat-centric approach to managing cybersecurity if they want to ensure their critical assets are protected, both now and in the future. “We must approach cybersecurity from the perspective of an attacker to identify all the new areas of vulnerability and develop effective detection rules and response playbooks,” he says. “CyberProof has developed a Use Case Factory methodology so we can continuously create, test and deploy new detection rules, response playbooks, automations and integrations. This allows us to easily adapt our cybersecurity solutions alongside the changing threat surface.” Finding a way to expediting response times is a key focus. “Organisations must act fast to block an attack, so it’s vital for them to reduce the volume of work associated with analysing the threat alert and their data,” says Velleca. “For example, a ransomware attack might hit 100 machines and trigger 100 alerts, but rather than dealing with each one individually, we need to consolidate them and enrich them with data for the analyst so that we can rapidly respond to them all as one threat. If we don’t do this, we can’t mitigate or contain the attack fast enough. Ideally, the response should be automated too.” CyberProof offers a full range of managed cybersecurity services that can help with this. They include targeted threat intelligence, end-point detection and response, extended detection and response, and 24/7 triaging, enrichment and investigation services for security alerts. “Our solutions are integrated with Microsoft’s entire platform – including the cloud-native security event and information (SIEM) system in Microsoft Sentinel and Defender. We combine this BY R E B E CCA G I B SON “ Collaboration will certainly be the key to success in the future cybersecurity landscape”