How To Use Cybersecurity Big Data Effectively

A survey of US Federal  Agencies finds the sheer volume of cybersecurity data is overwhelming and that most of it goes unused.

150 US Federal cybersecurity professionals were asked to examine how agencies are using big data and advanced analytics to better understand cybersecurity trends and mitigate threats. The study found that while 81% of Feds are using big data analytics for cybersecurity in some capacity, just 45% found their efforts to be “highly effective”.

The study was directed by MeriTalk, a public-private partnership focused on improving the outcomes of government IT.

According to its website, breaches continue to afflict agencies with 59% of Feds reporting their agency deals with a cybersecurity compromise at least once a month due to their inability to fully analyze data.

88% of Federal agencies face challenges drawing cybersecurity intelligence from data and the majority says the task has become more difficult in the past two years.

Respondents stated the following as top challenges:

  • Sheer volume of cybersecurity data is overwhelming (49 percent)
  • Agencies don’t have the right systems in place to gather the cybersecurity information they need (33 percent)
  • Information is no longer timely when it makes it to cybersecurity managers (30 percent)

As a result, more than 40% of their data goes unanalyzed. In addition to obvious budget issues, Feds’ efforts are hindered by: lack of skilled personnel, potential privacy concerns, and lack of management support/awareness.

I-HLS

 

« Internet Takes The Wheel Inside Driverless Cars
Australia Hardest Hit By Cybersecurity Skills Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.