This website uses cookies. By continuing to browse this website, you accept our use of cookies and our Cookie Policy. Close

Detect, Contain and Control Cyberthreats

Today, every organization is a target and attackers can compromise any organization. Large-scale compromises used to be a surprise, but now they are a reality that is often accepted.

The means, methods and techniques that adversaries use to target and ultimately compromise organizations have caused a shift in mind-set. It is not a matter of if an attacker will compromise an organization, but when an attack will occur.

Although prevention is ideal, not all attacks can be prevented, making compromise inevitable. Therefore, a better approach to security is timely detection of the attack - detection that will contain and control the damage.

Organizations that cannot detect and control the damage of an attack will cease to exist, while those that can implement effective security to minimize the impact of attacks will be the successful entities of the future.

This paper helps to define strategies and tactics, to prioritize risks and deploy appropriate defences.