Intelligent CIO Middle East Issue 30 | Page 36

EDITOR’S QUESTION To maximise effectiveness, SOCs need to constantly review various threat intelligence sources – along with peer- submitted indicators of compromise – for information about new attacker campaigns and techniques. Organisations therefore need to enlist the services of security vendors that have these capabilities and are able to use this intel to improve their offerings. Security vendors such as Mimecast are helping organisations adapt both by providing third-party threat intelligence, as well as continually assessing and deploying leading technologies. In addition, Mimecast assists by conducting ongoing threat analysis and delivering inline user education based on data collected from user habits to help employees continually stay more cyber-aware and guarded. No proprietary technology is infallible today and as hackers become more innovative and dynamic, needs must constantly evolve and grow. This can be achieved by implementing a layered approach to mitigate risk. By monitoring historical data, sharing data with the broader ecosystem and analysing threats, organisations can detect and react more quickly and holistically against attacker campaigns which may be targeting them. www.intelligentcio.com