meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

SOAR - a first principle idea. [CSO Perspectives}

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 17 January 2022

⏱️ 18 minutes

🧾️ Download transcript

Summary

Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference, 2020. "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, last visited 30 April 2020. “Malware? Cyber-crime? Call the ICOPs!” by Jon Oltsik, CSO, Cybersecurity Snippets, 22 June 2015. “Market Guide for Security Orchestration, Automation and Response Solutions,” by Gartner, ID G00727304, 21 September 2020. “MITRE ATT&CK,” by Mitre. “The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” book review by Rick Howard, Palo Alto Networks, 21 October 2016. “The Cyber Kill Chain is making us dumber: A Rebuttal,” by Rick Howard, LinkedIn, 29 July 2017. “The Evolution of SOAR Platforms,” by Stan Engelbrecht, SecurityWeek, 27 July 2018. “What is SOAR (Security Orchestration, Automation, and Response)?” by Kevin Casey, The Enterprisers Project, 30 October 2020.

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Don't

0:14.0

don't struggle to align your organization's

0:17.0

cybersecurity with business risk.

0:19.0

Get the only solution that goes beyond reacting to threats

0:22.0

with vulnerability and risk monitoring.

0:25.1

You need the next evolution of MDR and only Critical Start delivers it.

0:30.8

Critical Start doesn't just monitor and respond to threats.

0:34.0

They put you in control by detecting suspicious activities,

0:38.0

quickly responding to contain threats and identifying your most critical assets

0:42.0

and protecting them against vulnerabilities and exposures.

0:45.8

With continuous visibility, expert guidance and measurable risk reduction, critical start

0:50.9

has redefined what it means to manage cyber risk.

0:54.0

Demonstrate provable security maturity to your leadership

0:58.0

while positioning your program to achieve the greatest risk reduction per dollar spent, stop fearing risk and start managing it with

1:05.8

critical start. Visit critical start.com and request a demo today. That's Critical Start.com.

1:14.0

What to have your voice heard?

1:21.0

Listeners, what are you most proud of this week?

1:24.0

Hello, caller 1.

1:25.0

I moved into my first flat.

1:27.0

Now I just need to find the kettle.

1:28.0

Great stuff.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.