I’ve just returned from a few great days in Nashville, the country music capital of the world, for a fantastic event with FS-ISAC. The event’s overarching theme, as to be expected, was on intel sharing and general collaboration for better security across organisations in the financial services community.
But specific security topics were also notably present and top-of-mind: ransomware, the increasing prevalence of mobile/smart devices as points of entry for attackers, challenges with the cloud, machine learning to aid in catching attackers, and facilitating threat hunting—just to name a few!
I was impressed by the high quality mix of attendees, with CISO and senior security staff from most of the big banks and a wide range of Finserv and even Legal organizations. That caliber was reflected in some of the of the great conversations we had at the Corvil booth.
A conversation that stuck with me was on the importance of correlation. Getting all your data to one place is great, but not close to the final step. From there, there is still a challenge to correlate, and analyze on that larger scale to find higher level insights. And as always, operationalizing threat intelligence was a continued issue for many. Much work is put into collecting and curating threat intelligence data, but the struggle is to make best use of that data.
I’m happy to say that Corvil’s Carbon Black and Splunk integrations, which are good answers to some of these problems, continue to be well-received. We’ve heard how these integrations benefit customers by saving time for their teams and making security incident triage much more efficient. Our packet-based visibility and insight goes beyond what most teams currently (logs, flows or some combination thereof).
The FS-ISAC community is a vibrant and highly collaborative mix of passionate practitioners who have embraced the continually morphing challenge of cyber defense, and we at Corvil are proud to join in the battle! Learn more about Corvil’s cyber security solution here.