Know your enemy: Protect data with situational awareness

Going forward, threat analysts need real situational awareness of the threats and their correlation to the mission environment.

Presented by Perspecta Inc. Perspecta Inc.'s logo

Effective June 1, 2018, DXC U.S. Public Sector became part of Perspecta Inc.

A lot is invested in cyber defense. Crucial resources are at stake: government and military assets, commercial brands, intellectual capital, consumer information and critical infrastructure. Security incident detection and response are needed on a near real-time basis. How do we assure focus on areas of greatest impact?

Security Operations Center teams need to understand and act within a broader operational context. This enables security teams to better identify, assess, prioritize and respond to mission threats.

Security operations centers are bombarded daily with millions, and in some cases billions of pieces of information from multiple sources. How can an organization manage all that information and turn disparate data into actionable intelligence that an analyst can act on?

That requires an ability to ingest vast amounts of data from numerous and differing sources, and to centralize that data into a single, authoritative location.

Security information should be correlated, transformed and normalized. Then security data can be overlaid on top of organizational, geographic and mission data, enabling true situational awareness across the organization’s environment.

Finally, the results of those activities must be presented visually—in a way that allows operators to see security-related events not just from an IT perspective, but also from an operational perspective. This situational approach helps personnel make better decisions and better support and protect vital active missions.

DXC U.S. Public Sector's Cyber Defense Situational Awareness Solution (CDSA) allow security leaders to prioritize threats and risks by mission, so that resources can be focused optimally. Learn more about DXC U.S. Public Sector’s experience in and approach to combating cyber threats here.

This content is made possible by our sponsor. The editorial staff of Government Executive was not involved in its preparation.