MTTD and MTTR

What You Should Know About Driving Down MTTD and MTTR

Effectively connect people, process and technology to minimize MTTD and MTTR

There’s a reason it’s said that what gets measured gets managed. In order to successfully achieve a goal, you have to be able to measure progress. It’s the only way to know if you’re heading in the right direction.

That’s why any security operations team worth their salt will be paying close attention to both their mean time to detect (MTTD) and mean time to respond (MTTR) metrics when it comes to resolving incidents.

The average dwell time for attackers still sits somewhere within the ranges of 100 – 140 days and frankly, we can do better. Security operations teams need to be fanatical when it comes to lowering these metrics within their organizations.

Significantly reducing dwell time, MTTD and MTTR starts with an understanding of attacks. From there, you need multiple groups working together in harmony enabled by technology to automate and orchestrate incident response processes.

Vulnerability assessment

Vulnerability Assessment versus Penetration Assessment

We get asked this question frequently, “What the difference between a vulnerability assessment and penetration assessment?”. It’s a great question and one we’d like to shed a bit more light on throughout this blog. Both engagements are aimed towards shedding light on areas within your cybersecurity posture that need improvement. We regularly perform vulnerability assessments and penetration tests for our clients tasked by regulatory compliance to adhere to a particular standard or to increase their security posture. Both of these tests play an important role within your organization by enlightening you on areas of weakness and decreasing risk from adversaries.

Podcast: CISO Speak – Incident Response

This months podcast features host Larry Bianculli speaking with guest CISO Agim Bracovic from BNB Bank, as well as our very own Matthew Pascucci, cybersecurity practice manager, at CCSI, on Incident Response. How do you build a team of qualified IR resources with current staff? How do you prepare and train an incident response team?…

authentication

Why a Zero-trust Network with Authentication is Essential

Zero-trust networks are often deemed compromised and untrusted, making authentication variables essential to security. Expert Matthew Pascucci explains a zero-trust security model. In the past, we’ve done a great job of making networks accessible. But with this increased availability, we’ve opened the door for attackers to move more easily around networks. However, as we introduce…

cyber

CompTIA Cyber Roundtable, NYC

This past week Matthew Pascucci, Cybersecurity Practice Manager at CCSI participated in a Cyber Roundtable. Check out this article about the roundtable discussion by Teresa Varela-Lauper. Dr. James Stanger is CompTIA’s Chief Technology Evangelist. He’s a CompTIA super hero in my book….traveling all over the world, speaking at events, impacting and representing the IT industry…