logo
Three Pillars Of Proactive Security: A Threat-Led Approach To Defense

Three Pillars Of Proactive Security: A Threat-Led Approach To Defense

Forbes2 days ago
Tony is CEO at CyberProof and is a CISO at UST. CyberProof, a UST company, is an advanced managed detection and response provider.
It's undeniably becoming harder to stay ahead of the expanding wave of cybersecurity threats. We are witnessing an unprecedented surge in sophisticated, often "branded," cybercriminal enterprises, meticulously targeting everything from critical manufacturing plants to vulnerable hospital networks with devastating ransomware and social engineering attacks. The financial toll is staggering, with the FBI estimating global victim costs totaling over $16 billion in 2024 alone.
Large, complex organizations with siloed teams, running applications and systems both on-premises and in the cloud, add another layer of difficulty. Managing an inventory of assets and applications, the risk they impose and security policies and controls, is often a difficult task for under-resourced teams.
A Strategic Shift: Starting With Clarity, Guided By Threat Intelligence
A more effective approach necessitates a strategic shift from reactive firefighting to informed, threat-led defense. Threat-led defense focuses on providing clarity: understanding what an organization owns in terms of assets and the risk those assets impose, what exposure and priority are relevant to the organization and addressing what matters most—optimizing the defenses and controls where needed. It's a three-phase strategy designed to align asset visibility and risk, threat exposure and detection and response tools in a continuous integrated lifecycle. The overall objective is to transform Governance, Risk and Compliance (GRC) to optimize better outcomes in security investment and security posture.
This strategic shift is fundamentally driven by the MITRE threat-informed defense (TID) concept. It involves collecting and analyzing data about the threat landscape, identifying the most likely and dangerous threats for that organization and using that information to guide the selection and implementation of detection playbooks and security controls. This strategic approach can be viewed as a system built on three interconnected pillars, transitioning from a strategy focused on visibility to one of informed action.
Pillar 1: Estate Management—Understand Your Technology Environment
The first step is to ensure that your asset estate is well-managed. Where IT teams are responsible for onboarding and managing IT assets, security teams should look for policy violations or discrepancies. Security teams have a tremendous amount of telemetry from vulnerability scanners, cloud posture management solutions, cloud inventory and other security solutions. Unfortunately, few organizations utilize this information to enhance the quality of their asset data.
One example is the identification of unmanaged or suspicious assets. The riskiest asset is the one you don't know about, the one that isn't managed by your vulnerability scanner or EDR is not installed. A well-managed cyber estate is one where unmanaged assets are discovered quickly and brought under control, but that's not all. It should also ensure that asset configurations meet policy requirements, assets are tagged accurately and grouped with risk categories and finally, there is a clear, accountable owner.
This continuous understanding of the complete estate is critical for the future of security operations, particularly with the rise of agentic AI. While AI agents for threat hunting or security analysis are emerging, to make them truly effective, these models must have context in terms of the IT environment. This data itself is extremely sensitive as it could provide a clear path for potential attackers if compromised. A well-managed estate, on the other hand, is the essential foundation for this data-driven, AI-enabled future.
Pillar 2: Exposure Management—Prioritize Exposures That Matter
Once you have a clear picture of your estate and your assets are managed by your security solutions, the next step is understanding your threat exposure. This involves identifying where your environment is exposed to threats.
This pillar involves analyzing your exposures from various sources, including vulnerability scanners, cloud posture management solutions, application security solutions, endpoint detection and response solutions and more. It requires correlation of all this information and prioritizing it relative to your organization's top threat actors. Exposure management is the process of deriving insights from your asset inventory and vulnerability data, and contextualizing them with threat intelligence to identify where the real, exploitable risks lie. It prioritizes these exposures based on their business risk, considering whether they are likely to be manipulated by relevant threat actors.
Pillar 3: Defense Management—Detect And Respond
The final pillar is defense management, which includes the ability of your security operations to detect and respond to threats. This phase utilizes technologies such as SIEMs and EDRs to establish a cohesive detection and response framework. It's also where emerging capabilities, such as agentic AI for threat hunting, can be deployed effectively, as they have access to the necessary environment and threat actor data. It prioritizes the development of detection and response, or in use case management, playbooks to guide threat teams in analyzing security event data, identifying incidents of compromise (IoC), triaging and then mitigating incidents.
An optimized defense management model is informed and by insights from targeted threat actors and the tactics and techniques used. It is about proactively creating detection mechanisms that address the entire attack path used by a threat actor versus individual alerts or detections. Effective defense management means taking the prioritized list of threat actors, understanding their attack patterns and using the more advanced orchestration and automation capabilities of a modern security operation, like alert grouping by time, to provide more sophisticated and accurate detection and faster response.
A Framework For Continuous Risk Reduction
Combining these three pillars creates a powerful framework:
• Asset Estate Management: Knowing if your environment is well-managed
• Exposure Management: Prioritizing exposures that matter most to you
• Defense Management: Prioritizing detection and response for optimal remediation
This integrated approach, supported by a platform that connects these areas, enables organizations to gain a unified view of risk and a quantitative approach to prioritizing the right investments needed to manage that risk. It also helps security teams achieve better security outcomes by providing clarity on what matters. As a result, security is transformed from a reactive, siloed struggle into a proactive, intelligent and continuously improving function focused on reducing risks that truly impact the business.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Shares in South Korean chipmaker SK Hynix tumble on US tariffs
Shares in South Korean chipmaker SK Hynix tumble on US tariffs

Yahoo

time3 minutes ago

  • Yahoo

Shares in South Korean chipmaker SK Hynix tumble on US tariffs

SEOUL (Reuters) -Shares in South Korean chipmaker SK Hynix fell 3.1% in early Thursday trade, after President Donald Trump said the U.S. will impose a tariff of about 100% on chips. SK Hynix supplies Nvidia with chips called high-bandwidth memory used in artificial intelligence chipsets. Trump said on Wednesday the United States will impose a tariff of about 100% on semiconductors imported from countries not producing in the U.S. or planning to do so. But it would not apply to companies that had made a commitment to manufacture in the U.S. or were in the process of doing so. South Korea's trade envoy said on Thursday that SK Hynix and rival Samsung Electronics would not be subject to a 100% U.S. tariff on chips. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Chevy Just Set An Insane EV Range Record—In A Big Truck
Chevy Just Set An Insane EV Range Record—In A Big Truck

Yahoo

time3 minutes ago

  • Yahoo

Chevy Just Set An Insane EV Range Record—In A Big Truck

Chevy Just Set An Insane EV Range Record—In A Big Truck originally appeared on Autoblog. No hardware or software changes were required to set a new record It's been a record-breaking month for Chevrolet. Already, the company set a new record for American cars at the Nürburgring with the Corvette ZR1 and ZR1X. Its latest record won't be as exciting for gearheads, as it involves the longest range on a full charge for an EV, but it's another stellar technical achievement. 300 miles is generally accepted as the psychological mark of a useful EV range, but Lucid far surpassed this by hitting 749 miles in the Air sedan last month—a record at the time. Chevy has now crushed that figure, and even more impressively, it pulled off the feat with a heavy, full-size pickup, not an aerodynamic 1,000 Miles On A Full Charge The record-breaking achievement came behind the wheel of a 2026 Chevrolet Silverado EV Max Range Work Truck, which went 1,059.2 miles on a full charge, breaking Lucid's 749-mile record. This truck is rated by the EPA for a 493 mile range, so how was it able to more than double that figure? GM says the record attempt began with a casual conversation between GM engineers late last year. They started guessing what sort of range they could achieve if the pickup could be optimized for range and efficiency. 'Getting this kind of range on a full charge doesn't happen by accident,' said Kurt Kelty, VP, battery, propulsion, and sustainability. 'It takes deep integration across battery chemistry, drive unit efficiency, software and vehicle engineering—and that's exactly what the team delivered. This achievement is a great example of how far our EV technology has come, and the kind of innovation we're building on every day at GM.'Real-World Test Sees Staggering Results The GM team performed the record-breaking test on public roads in southeastern Michigan, close to GM's Milford Proving Ground. The team optimized every feasible aspect of the truck, but left the hardware and software as is. While it's technically possible for owners of the truck to put some of these optimizing measures in place, combining them all will be just about impossible in normal driving. These were the measures taken by the team: When conditions allowed, drivers averaged 20 to 25 mph, and hard braking was minimized No passengers were in the truck for most of the test Windshield wiper arms were set to the lowest possible position, reducing drag The highest acceptable tire pressure was used, resulting in lower rolling resistance The wheel alignment was optimized and the spare tire was removed The climate control wasn't used at all For smoother airflow, an accessory tonneau cover was added The test occurred in warmer summer conditions None of these measures are particularly groundbreaking, but the cumulative effect clearly made all the difference. The various engineers who drove the truck did so in one-hour shifts, allowing them to incorporate the project into their normal work schedules. 'If we drove it downhill the whole time, sure, we'd get insane mileage,' said Jon Doremus, propulsion calibration engineering manager. 'But that's not what this was about. We wanted this to be real, on public roads.' The test suggests that by incorporating just a few of these measures, owners of this Chevy pickup should easily be able to squeeze over 500 miles of range from it, a commendable effort. The EPA rating of the Chevy is already better than all other rivals, including the Rivian R1T, Tesla Cybertruck, and Ford F-150 Just Set An Insane EV Range Record—In A Big Truck first appeared on Autoblog on Aug 6, 2025 This story was originally reported by Autoblog on Aug 6, 2025, where it first appeared.

South Korea trade envoy says Samsung, SK Hynix will not be subject to 100% US tariffs on chips
South Korea trade envoy says Samsung, SK Hynix will not be subject to 100% US tariffs on chips

Yahoo

time3 minutes ago

  • Yahoo

South Korea trade envoy says Samsung, SK Hynix will not be subject to 100% US tariffs on chips

SEOUL (Reuters) -South Korea's top trade envoy Yeo Han-koo said on Thursday that chipmakers Samsung Electronics and SK Hynix will not be subject to 100% U.S. tariffs on chips. Yeo said on radio that among various countries South Korea will face the most favourable U.S. tariff rates on chips under the trade deal between Washington and Seoul. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store