Organisations are raising pay , recruiting from underserved communities , and making cybersecurity careers more accessible to students without a traditional degree .
Many solutions already exist that can provide this kind of automation , orchestration and context . For example , if you are monitoring the DNS traffic of your network and your DNS Firewall blocks a request to a malicious site , solutions that can automatically trigger a response to the network access control ( NAC ) system to quarantine that user into a sandbox until it can be further researched by an analyst can dramatically reduce the time and effort needed to track down and isolate infected devices . At the same time , systems that automatically send additional context about that user and the request ( Who is the user ? What kind of machine are they using ? Where was the request sent ?) to the analyst can give them a head start into researching and ultimately mitigating the threat .
Vulnerability scanners are also a point of note . Oftentimes , they only scan networks at a given interval ( once a day , week , or even month . Yes , monthly scans are a thing ). Organisations can quickly , easily and automatically improve their security posture by scanning a device as soon as it connects to the network by leveraging an orchestration flow where the DHCP server automatically identifies the new machine and triggers the scan .
These and other technology solutions that leverage automation , context , and the skills your team already has are not merely a bridge between now and a fullystaffed cybersecurity industry of the future . They are a critical part of a robust cybersecurity platform today , one that both improves network security and extends the capabilities of the team you already have . p
38 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com