SlideShare a Scribd company logo
1 of 4
Download to read offline
White paper
Your Guide to
OpenText™
and
Filogix®
Collaborative
Document Solutions
Maintaining 66 ABC™
Part 1 Active®
Compliance
The biggest challenges of Life Sciences companies
today are maintaining a robust product pipeline and
reducing time to market while complying with an
increasing and evolving multitude of Federal and
international regulations.
Managed Detection and
Response (MDR):
Investigative Capability as
a Key Selection Factor
Dr. Edward G. Amoroso
Chief Executive Officer, TAG Cyber
Distinguished Research Professor, NYU
Managed detection and response (MDR) solutions benefit from
investigative capabilities, particularly as derived and evolved from the
digital forensic community. Buyers should thus include investigative
experience as a selection factor when reviewing MDR offerings.
Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text.
Managed Detection and Response (MDR):
Investigative Capability as a Key Selection Factor
Introduction
The emergence of managed security service (MSS) offerings in the late 1990’s was
driven primarily by the need for enterprise teams to have experts remotely manage
their firewall and review the log records being generated. As offerings from managed
security service providers (MSSPs) evolved, and as perimeter-based firewalls became
less important, the emphasis of most MSS solutions shifted from device management
toward the analysis of collected logs.
In this report, we outline how this shift has resulted in increased emphasis by
practitioners on new managed detection and response (MDR) commercial offerings.
As will be outlined below, such MDR solutions combine data collection, correlative
processing, incident response, and data analysis support for the enterprise buyer. They
also help to address the security skills gap by augmenting the enterprise team with
outsourced experts.
We also focus in this report on a key selection factor that buyers are advised to
consider in their selection of an MDR partner. This key factor, investigative capability,
involves the MDR vendor’s ability to perform analytic tasks to make sense of the data
from managed infrastructure. The case is made here that investigative capabilities,
including how such expertise has evolved within the vendor team, is a primary predictor
of MDR success.
Baseline MDR Capabilities
The best way to differentiate traditional MSS from evolved MDR is to visualize where
these respective offerings reside in the defensive lifecycle model included in the NIST
Cyber Security Framework (CSF) . Most observers view any shift along this model as
being either a shift-left toward more preventive focus, or a shift-right toward more
detection and response focus. Figure 1 below depicts this shift landscape.
Figure 1. Landscape Shift Options: Left and Right
One of the main reasons MDR solutions have been so successful is that advanced
cyber threats have been so difficult to prevent, especially when they are initiated by
capable actors such as nation-state military groups. Security teams have had to place
their primary focus on addressing on-going incidents, responding to live attacks,
or responding to completed incidents with the necessary remediation and recovery
actions.
The result has been a definitive shift right in the cyber security industry, with major
emphasis on detection and response. In addition to MDR, buyers now have access to
solutions for network detection and response (NDR), endpoint detection and response
(EDR), and even extended (wildcard) detection and response (XDR). Each of these
offerings focuses its attention on dealing with on-going or previous incidents.
Identify Protect Detect Respond Recover
MDR Servce Emphasis
Shift Right
Shift Left
Focus on Preventing
Cyber Attacks
Focus on Dealing with
Cyber Attacks
1
https://www.nist.gov/cyberframework
Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text.
Managed Detection and Response (MDR):
Investigative Capability as a Key Selection Factor
Investigation as a Key MDR Component
As might be evident in this shift, MDR solutions are heavily oriented toward investigation of incidents versus the earlier focus in
previous generations of managed security on prevention and mitigation. This emphasis suggests that the selection process for
an MDR vendor should include sufficient review of the local capability for supporting investigation work, based on collected data
before, during, and after an incident.
One area where such investigative capability has been particularly highlighted is digital forensics. For many years, enterprise
teams, law enforcement, and other stakeholders have used digital forensic methods to investigate the characteristics and data
on targeted devices, systems, and software (including stored and ephemeral data). The resulting best practices offer excellent
insight into the types of methods that should be included in any MDR offer.
Elements of Digital Forensic Investigation
When law enforcement and other forensic examiners are working a digital investigation, they must engage either explicitly or
implicitly with a four-step lifecycle model that includes many discrete tasks. Each task in this model – which is represented below
as a de facto guide, rather than a formal standard – is designed to help uncover insights from artifacts, and most are now heavily
reliant on technology support for proper execution.
Figure 2. Elements of Cyber Investigation
Step 1: Preservation
This involves freezing any activity that might damage or change important digital evidence. This type of activity applies to
MDR offerings, where collected logs, telemetry and other ephemeral data must be stored securely — without the possibility
of tampering or damage.
Step 2: Collection
This involves obtaining the digital evidence that will be required for the investigation. MDR solutions have analogous
collection capability with the capture of remote logs, audit records, alerts, alarms, and other telemetry from the managed
infrastructure.
Step 3: Examination
This involves technical and systematic review and search of evidence relevant to the investigation. Every MDR must include
similar examination capability, usually performed using a combination of automated and manual procedures in the MDR SOC.
Step 4: Analysis
This important task involves the correlative and logical review of digital evidence to draw conclusions. Increasingly, MDR
solutions use intelligent algorithms to perform the analysis task. Such solutions typically combine the best elements of
signature, behavioral, and artificial intelligence-based processing.
Step 5: Reporting
This final step involves documenting findings in a manner useful to all participants in the investigation. Every MDR now
includes the requirement to support reporting requirements, often with the nuance that summary analyses be consumable by
both cyber experts and business executives.
This analysis of digital forensics methods suggests that any selected MDR platform and supporting vendor should be rooted
deeply in proper digital investigative capability. As outlined above, MDR solutions focus on detection and response – both of which
are essential aspects of the five-step process for digital forensic investigation. It therefore stands to reason that an MDR vendor
must have deep understanding in this area.
Preservation Collection Examination Analysis Reporting
Progress in Digital Forensic Investigation
Several academic works (including https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&rep=rep1&type=pdf)
use this basic model to describe digital forensic examination.
Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text.
Managed Detection and Response (MDR):
Investigative Capability as a Key Selection Factor
Questions to Ask Your MDR Vendor
The TAG Cyber analyst team recommends that buyers considering MDR options should adjust their conventional source
selection process to include increased emphasis on investigative expertise and experience amongst the MDR principals. To that
end, we have created a series of simple questions that might be asked of the MDR solution provider to help gauge this level of
investigative capability which we believe helps to predict the success of an MDR engagement:
About TAG Cyber
TAG Cyber is a trusted cyber security research analyst firm, providing unbiased industry insights and recommendations to security
solution providers and Fortune 100 enterprises. Founded in 2016 by Dr. Edward Amoroso, former SVP/CSO of AT&T, the company
bucks the trend of pay-for-play research by offering in-depth research, market analysis, consulting, and personalized content
based on hundreds of engagements with clients and non-clients alike—all from a former practitioner perspective.
Copyright © 2021 TAG Cyber LLC. This report may not be reproduced, distributed, or shared without TAG Cyber’s written permission. The material in this report is comprised
of the opinions of the TAG Cyber analysts and is not to be interpreted as consisting of factual assertions. All warranties regarding the correctness, usefulness, accuracy, or
completeness of this report are disclaimed herein.
To what degree does the MDR vendor possess direct forensic investigative
experience with modern digital scenarios?
Obviously, digital forensics and MDR are different activities, and we fully understand that contracts for MDR will likely
not include work items for forensic analysis of devices and other systems. Having local experience with digital forensics,
however, strikes the TAG Cyber analyst team as being a good predictor of how well the organization can handle digital
review, data analysis, and investigative support.
What platforms and tools is the MDR solution provider familiar with in the context of
modern digital forensic investigation?
The desired level of experience with digital forensics across the MDR team should be complemented with an
understanding and familiarity with best-in-class tools for supporting investigations. MDR teams might not use these
tools directly in their detection and response engagements, but we believe that prior or on-going experience supporting
investigation using the best commercial tools is a reasonable requirement for a good MDR team.
What is the MDR vendor’s methodology for weaving digital forensic capabilities into
their day-to-day detection and response support?
This question does focus on the synergy between digital forensics and MDR support. In particular, it asks the MDR
vendor how investigative experience and expertise can be woven into the detection and response activities in support
of the enterprise customer. This synergy can be strategic, offering framework guidance on how to design a data analysis
program, or it can be tactical, offering more specific step-by-step assistance in dealing with a given task.

More Related Content

What's hot

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOARSiemplify
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesLearningwithRayYT
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 

What's hot (20)

Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOAR
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 

Similar to Guide to OpenText and Filogix Collaborative Document Solutions

Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler Service2Media
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Wp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityWp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityAi K
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...John D. Haden
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...Ulf Mattsson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 

Similar to Guide to OpenText and Filogix Collaborative Document Solutions (20)

Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
 
Information Security
Information SecurityInformation Security
Information Security
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Wp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityWp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-security
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 

More from Marc St-Pierre

Opentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilienceOpentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilienceMarc St-Pierre
 
OpenText Security Health Check Service
OpenText Security Health Check ServiceOpenText Security Health Check Service
OpenText Security Health Check ServiceMarc St-Pierre
 
OpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseOpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseMarc St-Pierre
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
OpenText Cyber Resilience Program
OpenText Cyber Resilience ProgramOpenText Cyber Resilience Program
OpenText Cyber Resilience ProgramMarc St-Pierre
 
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMarc St-Pierre
 
OpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions CatalogOpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions CatalogMarc St-Pierre
 
OpenText Threat Hunting Service
OpenText Threat Hunting ServiceOpenText Threat Hunting Service
OpenText Threat Hunting ServiceMarc St-Pierre
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision TreeMarc St-Pierre
 
US Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdfUS Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdfMarc St-Pierre
 
OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)Marc St-Pierre
 
Opentext Translation and Localization Services
Opentext Translation and Localization ServicesOpentext Translation and Localization Services
Opentext Translation and Localization ServicesMarc St-Pierre
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk AssessmentMarc St-Pierre
 
OpenText Translation & Localization Services
OpenText Translation & Localization ServicesOpenText Translation & Localization Services
OpenText Translation & Localization ServicesMarc St-Pierre
 
OpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & ServicesOpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & ServicesMarc St-Pierre
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalogMarc St-Pierre
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology SolutionsMarc St-Pierre
 
Smart migration Solution overview
Smart migration Solution overviewSmart migration Solution overview
Smart migration Solution overviewMarc St-Pierre
 

More from Marc St-Pierre (20)

Opentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilienceOpentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilience
 
OpenText Security Health Check Service
OpenText Security Health Check ServiceOpenText Security Health Check Service
OpenText Security Health Check Service
 
OpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseOpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop Exercise
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
OpenText Cyber Resilience Program
OpenText Cyber Resilience ProgramOpenText Cyber Resilience Program
OpenText Cyber Resilience Program
 
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
 
OpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions CatalogOpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions Catalog
 
OpenText Threat Hunting Service
OpenText Threat Hunting ServiceOpenText Threat Hunting Service
OpenText Threat Hunting Service
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
US Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdfUS Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdf
 
OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)
 
Opentext Translation and Localization Services
Opentext Translation and Localization ServicesOpentext Translation and Localization Services
Opentext Translation and Localization Services
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
OpenText Translation & Localization Services
OpenText Translation & Localization ServicesOpenText Translation & Localization Services
OpenText Translation & Localization Services
 
Opentext Decisiv
Opentext DecisivOpentext Decisiv
Opentext Decisiv
 
OpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & ServicesOpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & Services
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology Solutions
 
Smart migration Solution overview
Smart migration Solution overviewSmart migration Solution overview
Smart migration Solution overview
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
 

Recently uploaded

Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Pooja Nehwal
 
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Ayesha Khan
 
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712Delhi Escorts Service
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...Goa Call Girls Service Goa escort agency
 
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂door45step
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...riyaescorts54
 
JABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KJABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KNiteshKumar82226
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CNiteshKumar82226
 
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...Ayesha Khan
 
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...Ayesha Khan
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝thapagita
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...Ayesha Khan
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Lipikasharma29
 
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...Ayesha Khan
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Availablenitugupta1209
 
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...nishakur201
 
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7Ayesha Khan
 

Recently uploaded (20)

Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
 
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
 
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712
100% Real Call Girls In New Ashok Nagar Delhi | Just Call 9711911712
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
 
CALL GIRLS IN GOA & ESCORTS SERVICE +919540619990
CALL GIRLS IN GOA & ESCORTS SERVICE +919540619990CALL GIRLS IN GOA & ESCORTS SERVICE +919540619990
CALL GIRLS IN GOA & ESCORTS SERVICE +919540619990
 
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
 
JABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KJABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR K
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA C
 
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...
Karachi Escort Girls -03278838827- Top 100 + Independent Call Girls for Night...
 
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...
Call Girls In Islamabad || 03274885999 || 24/7 Service Islamabad Call Girls &...
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...
Call Girls In Islamabad | 03278838827 || 24/7 Service Islamabad Call Girls & ...
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
 
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...
Call Girls In Islamabad ***03255523555*** Red Hot Call Girls In Islamabad Esc...
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
 
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
 
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03081633338 || 50+ Hot Sexy Girls Available 24/7
 

Guide to OpenText and Filogix Collaborative Document Solutions

  • 1. White paper Your Guide to OpenText™ and Filogix® Collaborative Document Solutions Maintaining 66 ABC™ Part 1 Active® Compliance The biggest challenges of Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing and evolving multitude of Federal and international regulations. Managed Detection and Response (MDR): Investigative Capability as a Key Selection Factor Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber Distinguished Research Professor, NYU Managed detection and response (MDR) solutions benefit from investigative capabilities, particularly as derived and evolved from the digital forensic community. Buyers should thus include investigative experience as a selection factor when reviewing MDR offerings.
  • 2. Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text. Managed Detection and Response (MDR): Investigative Capability as a Key Selection Factor Introduction The emergence of managed security service (MSS) offerings in the late 1990’s was driven primarily by the need for enterprise teams to have experts remotely manage their firewall and review the log records being generated. As offerings from managed security service providers (MSSPs) evolved, and as perimeter-based firewalls became less important, the emphasis of most MSS solutions shifted from device management toward the analysis of collected logs. In this report, we outline how this shift has resulted in increased emphasis by practitioners on new managed detection and response (MDR) commercial offerings. As will be outlined below, such MDR solutions combine data collection, correlative processing, incident response, and data analysis support for the enterprise buyer. They also help to address the security skills gap by augmenting the enterprise team with outsourced experts. We also focus in this report on a key selection factor that buyers are advised to consider in their selection of an MDR partner. This key factor, investigative capability, involves the MDR vendor’s ability to perform analytic tasks to make sense of the data from managed infrastructure. The case is made here that investigative capabilities, including how such expertise has evolved within the vendor team, is a primary predictor of MDR success. Baseline MDR Capabilities The best way to differentiate traditional MSS from evolved MDR is to visualize where these respective offerings reside in the defensive lifecycle model included in the NIST Cyber Security Framework (CSF) . Most observers view any shift along this model as being either a shift-left toward more preventive focus, or a shift-right toward more detection and response focus. Figure 1 below depicts this shift landscape. Figure 1. Landscape Shift Options: Left and Right One of the main reasons MDR solutions have been so successful is that advanced cyber threats have been so difficult to prevent, especially when they are initiated by capable actors such as nation-state military groups. Security teams have had to place their primary focus on addressing on-going incidents, responding to live attacks, or responding to completed incidents with the necessary remediation and recovery actions. The result has been a definitive shift right in the cyber security industry, with major emphasis on detection and response. In addition to MDR, buyers now have access to solutions for network detection and response (NDR), endpoint detection and response (EDR), and even extended (wildcard) detection and response (XDR). Each of these offerings focuses its attention on dealing with on-going or previous incidents. Identify Protect Detect Respond Recover MDR Servce Emphasis Shift Right Shift Left Focus on Preventing Cyber Attacks Focus on Dealing with Cyber Attacks 1 https://www.nist.gov/cyberframework
  • 3. Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text. Managed Detection and Response (MDR): Investigative Capability as a Key Selection Factor Investigation as a Key MDR Component As might be evident in this shift, MDR solutions are heavily oriented toward investigation of incidents versus the earlier focus in previous generations of managed security on prevention and mitigation. This emphasis suggests that the selection process for an MDR vendor should include sufficient review of the local capability for supporting investigation work, based on collected data before, during, and after an incident. One area where such investigative capability has been particularly highlighted is digital forensics. For many years, enterprise teams, law enforcement, and other stakeholders have used digital forensic methods to investigate the characteristics and data on targeted devices, systems, and software (including stored and ephemeral data). The resulting best practices offer excellent insight into the types of methods that should be included in any MDR offer. Elements of Digital Forensic Investigation When law enforcement and other forensic examiners are working a digital investigation, they must engage either explicitly or implicitly with a four-step lifecycle model that includes many discrete tasks. Each task in this model – which is represented below as a de facto guide, rather than a formal standard – is designed to help uncover insights from artifacts, and most are now heavily reliant on technology support for proper execution. Figure 2. Elements of Cyber Investigation Step 1: Preservation This involves freezing any activity that might damage or change important digital evidence. This type of activity applies to MDR offerings, where collected logs, telemetry and other ephemeral data must be stored securely — without the possibility of tampering or damage. Step 2: Collection This involves obtaining the digital evidence that will be required for the investigation. MDR solutions have analogous collection capability with the capture of remote logs, audit records, alerts, alarms, and other telemetry from the managed infrastructure. Step 3: Examination This involves technical and systematic review and search of evidence relevant to the investigation. Every MDR must include similar examination capability, usually performed using a combination of automated and manual procedures in the MDR SOC. Step 4: Analysis This important task involves the correlative and logical review of digital evidence to draw conclusions. Increasingly, MDR solutions use intelligent algorithms to perform the analysis task. Such solutions typically combine the best elements of signature, behavioral, and artificial intelligence-based processing. Step 5: Reporting This final step involves documenting findings in a manner useful to all participants in the investigation. Every MDR now includes the requirement to support reporting requirements, often with the nuance that summary analyses be consumable by both cyber experts and business executives. This analysis of digital forensics methods suggests that any selected MDR platform and supporting vendor should be rooted deeply in proper digital investigative capability. As outlined above, MDR solutions focus on detection and response – both of which are essential aspects of the five-step process for digital forensic investigation. It therefore stands to reason that an MDR vendor must have deep understanding in this area. Preservation Collection Examination Analysis Reporting Progress in Digital Forensic Investigation Several academic works (including https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.7882&rep=rep1&type=pdf) use this basic model to describe digital forensic examination.
  • 4. Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text. Managed Detection and Response (MDR): Investigative Capability as a Key Selection Factor Questions to Ask Your MDR Vendor The TAG Cyber analyst team recommends that buyers considering MDR options should adjust their conventional source selection process to include increased emphasis on investigative expertise and experience amongst the MDR principals. To that end, we have created a series of simple questions that might be asked of the MDR solution provider to help gauge this level of investigative capability which we believe helps to predict the success of an MDR engagement: About TAG Cyber TAG Cyber is a trusted cyber security research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. Founded in 2016 by Dr. Edward Amoroso, former SVP/CSO of AT&T, the company bucks the trend of pay-for-play research by offering in-depth research, market analysis, consulting, and personalized content based on hundreds of engagements with clients and non-clients alike—all from a former practitioner perspective. Copyright © 2021 TAG Cyber LLC. This report may not be reproduced, distributed, or shared without TAG Cyber’s written permission. The material in this report is comprised of the opinions of the TAG Cyber analysts and is not to be interpreted as consisting of factual assertions. All warranties regarding the correctness, usefulness, accuracy, or completeness of this report are disclaimed herein. To what degree does the MDR vendor possess direct forensic investigative experience with modern digital scenarios? Obviously, digital forensics and MDR are different activities, and we fully understand that contracts for MDR will likely not include work items for forensic analysis of devices and other systems. Having local experience with digital forensics, however, strikes the TAG Cyber analyst team as being a good predictor of how well the organization can handle digital review, data analysis, and investigative support. What platforms and tools is the MDR solution provider familiar with in the context of modern digital forensic investigation? The desired level of experience with digital forensics across the MDR team should be complemented with an understanding and familiarity with best-in-class tools for supporting investigations. MDR teams might not use these tools directly in their detection and response engagements, but we believe that prior or on-going experience supporting investigation using the best commercial tools is a reasonable requirement for a good MDR team. What is the MDR vendor’s methodology for weaving digital forensic capabilities into their day-to-day detection and response support? This question does focus on the synergy between digital forensics and MDR support. In particular, it asks the MDR vendor how investigative experience and expertise can be woven into the detection and response activities in support of the enterprise customer. This synergy can be strategic, offering framework guidance on how to design a data analysis program, or it can be tactical, offering more specific step-by-step assistance in dealing with a given task.