The U.K. Cyber Strategy and Minimizing the Impact of Cybersecurity Incidents

The following is the fourth installment of our blog series outlining how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy for 2022-2030

The objective that we will focus on here is Minimizing the Impact of Cybersecurity Incidents. Cybereason XDR supports all four capability outcomes (Outcomes 16-19) for minimizing the impact of cybersecurity incidents.

Outcome 16: Government is fully prepared to respond to cyber incidents

Cybersecurity is about achieving resilience, not perfection. It would be remiss to not have an action plan in place for responding to cybersecurity incidents, as we can never predict how an attacker might bypass whatever security protections have been employed. 

Cybereason helps to build resilience through tabletop exercises. These tabletop exercises are leveraged to evaluate IR programs and help strengthen an organization’s security posture. They are designed to ensure incident response procedures are effective across an entire organization: from the security team to legal, public relations, and beyond. Responses will be scored against an existing incident response plan to evaluate an organization’s readiness and identify any gaps.

An important aspect of responding to cyber incidents is doing so in a timely manner. Attackers exploit the amount of time it takes SOCs to investigate and triage alerts. Cybereason’s Managed Detection and Response (MDR) service provides the fastest times in the industry: 1 minute to detect, 5 minutes to triage, and 30 minutes to respond to an incident.  

Outcome 17: Government rapidly responds to cyber incidents, both organizationally and across government

Cybereason is uniquely positioned to provide rapid response to cyber incidents. The Cybereason MalOp™ (as a part of our XDR platform) provides guided response actions, such as kill process, quarantine asset, and remote shell, which can be automated or accomplished remotely with a click to all affected endpoints and beyond. Further automation and playbooks are supported by our Managed Detection & Response services. 

Outcome 18: Government restores systems and assets affected by cyberSecurity incidents and resumes the operation of its functions with minimal disruption

An essential part of business continuity is reducing the time to recovery, something that is achieved through the Cybereason XDR MalOp Detection Engine, which processes more data than any other vendor in the market. Better data collection and advanced behavior-based analytics mean much faster detection of threats and higher-fidelity alerts. The increased accuracy that follows the data-rich detections yields much more accurate guided response actions, meaning that analysts can act on attacks confidently and comprehensively across multiple endpoints in one click. This ends attacks before material damage occurs, reducing downtime and impact. 

Outcome 19: Lessons learned from cyber incidents drive improvements in government’s cyberSecurity

With the Cybereason XDR MalOp, analysts have an end-to-end view of an attack, with a timeline that includes the root cause and affected machines and users. Understanding the full story of an attack, and being able to define the root cause, enables analysts to clearly communicate the full scope of the incident and where the attack started, and how it propagated. 

Learn more about how to protect your organization against these attacks here.

Cybereason is dedicated to teaming with Defenders to end attacks on the endpoint, across the enterprise, to everywhere the battle is taking place. Learn more about AI-driven Cybereason XDR here or schedule a demo today to learn how your organization can benefit from an operation-centric approach to security.

Karishma Asthana
About the Author

Karishma Asthana

Karishma is a Product Marketing Manager at Cybereason. She was previously with Accenture Security where she worked as a penetration tester and was responsible for helping clients understand and manage their security vulnerabilities. Karishma is passionate about exploring large shifts in the cybersecurity industry from a technical and strategic point of view.

All Posts by Karishma Asthana