The news of continued cyberattacks, suspected cyberattacks, ongoing state-sponsored influence operations, or any other number of buzzwords can leave security folks feeling overwhelmed and hopeless. Particularly for those of us who have spent time on the Blue Team (read: defenders), there’s more than a kernel of truth in the old adage that the attacker must be right only once, and defenders must be right every time.

But that doesn’t tell the whole story—there are techniques to slow attackers, detect attacks before they exfiltrate data, limit exposure, etc. Defense in Depth and Diversity of Defense are both very real techniques, but like many cybersecurity solutions, they require a large investment in time, money, and effort to be properly deployed and maintained. In fact, this is the single largest challenge for those tasked with defending high value networks and assets: Even with a large number of resources, the landscape seems so large, the risks so great, and opportunities for exploitation lurk around every corner. Where do you start—particularly when you’ve already got some security measures in place?

Building the Plane While Flying It

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]