ey conceptual image using hand to touch image

Unlocking cybersecurity strength: log management for CISOs

Advanced log analysis tools are evolving to manage vast data sources, enhancing correlation and threat detection.


In brief
  • Traditional security information and event management (SIEM) systems fall short tackling evolving cybersecurity threats, leading to operational blind spots.
  • With AI-driven attacks targeting supply chains and digital assets, cybersecurity needs to cover a wider range.
  • Investment in employee welfare and support systems is critical for addressing growing stress in cybersecurity personnel.

Advanced log analysis tools are evolving to manage vast data sources, enhancing correlation and threat detection.

The World Economic Forum projects that by 2025, the total amount of data created and consumed in the world will be 175 zettabytes (ZBs).¹ That’s the equivalent of 175 trillion USB sticks with a 1 gigabyte (GB) capacity.²

This exponential data growth is driving increases in both cost and risk. Data ingestion through traditional Security Information and Event Management (SIEM) systems is expensive, forcing organizations to collect only certain data from certain sources. And despite the increase in the amount of data flowing through networks, data is being retained for shorter timeframes. This leads to significant operational and security blind spots, which elevates the risk of a delayed response to a cybersecurity incident.

 

With technology that is limited in its ability to identify cyber threats in real time and pinpoint impact, chief information security officers (CISOs) are feeling overwhelmed. They are frustrated playing defense with tools and systems that fall short of what is needed to meet these evolving challenges.

 

CISOs and C-suite leaders are looking for solutions to defend their data, improve their security posture and protect relationships with customers. 

Find protection through system integration

The rise of the Internet of Things (IoT) and remote work has created new vulnerability points for hackers to exploit. Cybercriminals are using more sophisticated methods, such as artificial intelligence (AI) and machine learning (ML), to bypass traditional security measures and launch attacks. Not so long ago, most companies felt confident they knew where the threats were and how to safeguard their assets, which were largely internal. Now supply chains and digital assets are regularly being targeted, forcing CISOs to protect a wider perimeter of targets.

Businesses are responding to these new threats by making deeper investments into SIEM technology and by strengthening their endpoint detection and response (EDR) strategy. But these responses are not enough, CISOs say, given the size and scale of datasets in today’s world. The 2022 EY Tech Horizon Survey found that 71% of enterprises report unstructured data growing faster than structured data, and that 90% of all data in existence today was created in the past two years.

The cybersecurity industry recognizes more must be done to help companies build comprehensive security measures for their expanding IT environments. New tools are being developed that leverage cutting-edge technologies to provide another line of defense against a potential attack. For example, a centralized log management platform that can log everything at real-time speed and scale. This enables organizations to make data-driven decisions about the performance, security and resiliency of their IT environment.

There has been a movement away from the idea that one tool on its own can be the sole solution to every problem. Companies are working to integrate cybersecurity operations and risk management, and to combine technologies to build more robust defense mechanisms against cyber threats.

Technology is emerging that can collect, distill and monitor threat data, telemetry and insights from events in real time. Log management systems are becoming applications within a consolidated data platform. These are powerful tools with capabilities that become even greater when leveraged as part of a broader strategy to mitigate the security risks companies face in today’s world.

Here are some ways in which a thoughtful log management strategy solution can help companies strengthen their defenses against cyber threats faster and more efficiently:

Leverage technology to gain scalability

Every enterprise, be it a global financial firm, a manufacturing entity or even a small business, often grapples with decisions regarding data storage due to cost constraints. While effectively securing a network within budget constraints can be a balancing act, the value derived from effective threat prevention and risk mitigation is noteworthy.

Analyzing historical data, beyond just what it can tell us about past infiltrations, can be a powerful tool in preempting and deflecting future cyber threats.

It's crucial to understand how threats infiltrate and maneuver within the network. This retrospective analysis is critical for risk mitigation. Scalability allows companies to handle vast amounts of data and perform real-time interactions and analysis. This capability not only provides an immediate and precise security response, but it also transforms data into deep insights—bolstering security and adding intrinsic value to the organization.

In today’s world, the cost of recovering from a cyber attack often exceeds that of prevention. Thus, it's worth questioning the traditional cost-value dynamics. In terms of cybersecurity, a stronger, proactive security stance may be less an optional expense and more a business necessity.

In the long run, investing in a SIEM has the potential to provide security, scalability and insights in a way that outweighs the initial costs. 

Enhance data management capabilities

EDR telemetry data can amass significantly, especially for organizations with extensive server and workstation environments, often reaching hundreds of thousands of endpoints. The ability to effectively manage this sizeable amount of data and convert it to a scalable log management platform can be a differentiator for a company’s cybersecurity strategy.

Log analysis tools are being developed that can interact with this structured data, carrying out detailed searches, hunting potential threats and forwarding any crucial alerts directly into their existing SIEM environment for correlation with other datasets.

As the market evolves, the reporting dashboards and log monitoring capabilities will be enhanced, especially as other substantial data sources such as firewall data, Managed Detection and Response (MDR) data and Virtual Private Cloud (VPC) data are added to the mix. Consequently, data sources that usually pose a challenge for a SIEM at scale will be able to be productively managed. 

Breakout client story

The EY team collaborated with a leading consumer goods company grappling with data lake inefficiencies, unreliable legacy tools and a cumbersome, manually operated incident management system. Prioritizing design and use case development from inception, EY team guided the client toward integration with a more comprehensive framework, thus establishing a unified control center for security operations.

A state-of-the-art tool supplanted the existing SIEM. Simultaneously, the connection of assorted technologies facilitated a notable decrease in incident response times. Augmented alert system testing and logging provisions enhanced visibility, improved interdepartmental communication and resulted in a more strategic, streamlined approach to manage cybersecurity issues.

Reduce stress on personnel

The stress faced by security organizations, including the CISO and their team, is significant. Ultimately, the focus should be on prioritizing the welfare of these individuals at the heart of the operation and finding ways to alleviate their burden. This involves equipping them with the necessary resources and support to effectively tackle the threats and demands posed by the business landscape.

With security being key for businesses, customers, the wider ecosystem and the supply chain, it's crucial to ensure that those responsible for it are well taken care of and adequately supported.


Summary 

In the face of rising data consumption and complex threats, cybersecurity strategies must evolve. Traditional measures are inadequate in today’s rapidly changing data landscape. A centralized log management approach within a robust defense mechanism can help. By scaling with technology, enhancing data management and easing personnel stress, cybersecurity becomes a crucial business consideration worthy of proactive investment.

About this article