Endpoint protection provider CrowdStrike has announced the release of the 2018 CrowdStrike Services Cyber Intrusion Casebook, which provides insights into the frontlines of incident response (IR) cases spanning 2018.
It offers recommendations for organisations looking to safeguard critical data and improve overall breach preparedness, detection and response capabilities.
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 notable cyber intrusion cases, spanning a multitude of industries, that CrowdStrike Services engaged on during the past year. The Casebook provides a look at distinct IR use cases to offer trends in adversary behaviour, motivation, and tactics, as well as response scenarios. It provides an investigative analysis of specific cases, dives into forensic artefacts uncovered in multiple instances referencing the MITRE ATT&CK framework, and offers best practices for organisations looking to improve cyber defences.
Some key findings include:
CrowdStrike Services chief security officer and president Shawn Henry says, “Cyber-related attacks continue to proliferate as eCrime actors and nation-states ramp up their sophistication.
“It’s absolutely critical that today’s businesses are aware of emerging attack trends and adversary motivations in order to implement a more proactive stance to cybersecurity.”
“It is not a question of if you will be targeted, because it will happen to everyone. This is a business risk, and Boards of Directors and the C-Suite need to have a sense of urgency to protect their organisations’ viability.
“The CrowdStrike Services Casebook contains indispensable content that provides valuable insights into proactively preparing for security incidents and responding efficiently in the wake of an attack.”
The 2018 Casebook offers guidance on remaining protected against today’s ever-evolving threat landscape, including integrating next-generation endpoint security and proactive strategies to increase cyber resiliency.
Tools such as machine learning and behavioural analytics help prevent exploits and never-before-seen threats, while proactive threat hunting can help uncover even the most stealthy adversary.
Additionally, solutions that provide for efficient remediation capabilities can aid in mitigating the threat before a small infection or compromise turns into something larger and more costly to the organisation.