How To Use Cybersecurity Big Data Effectively

A survey of US Federal  Agencies finds the sheer volume of cybersecurity data is overwhelming and that most of it goes unused.

150 US Federal cybersecurity professionals were asked to examine how agencies are using big data and advanced analytics to better understand cybersecurity trends and mitigate threats. The study found that while 81% of Feds are using big data analytics for cybersecurity in some capacity, just 45% found their efforts to be “highly effective”.

The study was directed by MeriTalk, a public-private partnership focused on improving the outcomes of government IT.

According to its website, breaches continue to afflict agencies with 59% of Feds reporting their agency deals with a cybersecurity compromise at least once a month due to their inability to fully analyze data.

88% of Federal agencies face challenges drawing cybersecurity intelligence from data and the majority says the task has become more difficult in the past two years.

Respondents stated the following as top challenges:

  • Sheer volume of cybersecurity data is overwhelming (49 percent)
  • Agencies don’t have the right systems in place to gather the cybersecurity information they need (33 percent)
  • Information is no longer timely when it makes it to cybersecurity managers (30 percent)

As a result, more than 40% of their data goes unanalyzed. In addition to obvious budget issues, Feds’ efforts are hindered by: lack of skilled personnel, potential privacy concerns, and lack of management support/awareness.

I-HLS

 

« Internet Takes The Wheel Inside Driverless Cars
Australia Hardest Hit By Cybersecurity Skills Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Cyber Data-Risk Managers

Cyber Data-Risk Managers

Cyber Data-Risk Managers Pty Ltd is an insurance broker based in Melbourne, Australia specializing in Cyber insurance / Data breach insurance.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.