CISO2CISO.COM & CYBER SECURITY GROUP

The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK coverage for productions SIEMs

EXECUTIVE SUMMARY

“Use cases are the core of security monitoring activities. A structured process to identify, prioritize, implement, and maintain use cases allows organizations to align monitoring efforts to security strategy, choose the best solutions and maximize the value obtained from security monitoring tools.”

  • Dr. Anton Chuvakin

SIEMs are foundational to the modern SOC, providing the essential role of helping security
teams rapidly detect and respond to cyberattacks before they can have a material impact on the
business of the organization. In order to be effective, SIEMs now aggregate log and event data from an exponentially-growing number of data sources across the infrastructure (applications, network and endpoint security tools, cloud monitoring tools, identity providers, etc.).
This data is then analyzed using predefined threat detection rules and queries to identify suspicious or
unauthorized behavior. In this 2nd annual data-driven report, CardinalOps set out to gain visibility into the current state of threat detection coverage in enterprise SOCs.

Leave a Reply

Your email address will not be published.