Efficient Cyber Threat Investigation and Response with CyberSecurity Platform Survey

Most organization has deployed multiple security products against sophisticated cyber threats such as ransomware attacks. They need to spend more than 45 mins to collect and analyzing the information from multiple security products when a cyber threat happens in their environment. The entire project idea is captured as below research question.

One of previous guest speaker – Ricky Mok, who is also a MSc research student in University of Portsmouth would like conduct a survey research in the CyberThreat Investigation and Response with CyberSecurity Platform in both on premises and Cloud Computing environment.

The research study involves completing a questionnaire that will cover a range of topics related to efficient cyber threat investigation and response with a cybersecurity platform. The questionnaire is designed to be user-friendly and should take approximately 15 mins to complete. Your responses will be treated with the utmost confidentiality, and any identifiable information will be anonymized and kept strictly confidential in accordance with applicable data protection laws.

Your participation in this study is completely voluntary. There are no anticipated risks associated with participating in this research study, and your participation will not have any impact on your current position or affiliation.

To participate, please follow the instructions below:

Subject: Invitation to Participate in a Research Study Questionnaire

I hope this letter finds you well. I am writing to invite you to participate in an important research study that aims to determine the efficient cyber threat investigation and response with a cybersecurity platform

As an esteemed member of the Cloud Security Alliance HK Chapter, your valuable insights and expertise would greatly contribute to the success of this study. Your participation will help us gather comprehensive data and insights that will advance knowledge and contribute to the development of cyber threat detection and response.

The research study involves completing a questionnaire that will cover a range of topics related to efficient cyber threat investigation and response with a cybersecurity platform. The questionnaire is designed to be user-friendly and should take approximately 15 mins to complete. Your responses will be treated with the utmost confidentiality, and any identifiable information will be anonymized and kept strictly confidential in accordance with applicable data protection laws.

Your participation in this study is completely voluntary, and you have the right to withdraw at any time without penalty. There are no anticipated risks associated with participating in this research study, and your participation will not have any impact on your current position or affiliation.

To participate, please follow the instructions below:

  1. Access the online questionnaire using the following link: https://docs.google.com/forms/d/1AXmlvmoGk0inSjNRIcVo8xuOmucBlhMJV8fi2EinIjM/edit
  2. Answer each question to the best of your knowledge and provide any additional information as requested.
  3. Should you have any questions or concerns about the research study or questionnaire, please do not hesitate to contact Ricky Mok at up2086702@myport.ac.uk. Your feedback and input are highly valued, and we are available to address any queries you may have.

[CSA Report] SaaS Governance Best Practices for Cloud Customers

Prepared by the SaaS Governance Working Group under Cloud Security Alliance, the SaaS Governance Best Practices for Cloud Customers report provides a baseline set of SaaS governance best practices to help organizations leverage the full potential of SaaS environments. With the global SaaS industry estimated to reach 441 billion dollars* by 2027, a critical question grows: can organizations shift how they handle cybersecurity?

Adopting SaaS applications and solutions requires updated protocols for protecting data. This new publication provides guidance and defines three components for a cohesive strategy toward SaaS governance and security.

Organizations that fail to adopt an updated security governance mindset may experience: 

  • Breaches that disclose sensitive data 
  • Revenue loss
  • Tarnished reputation
  • Damaged customer trust
  • Regulatory consequences 

Learn how to implement practices that protect sensitive data throughout the entire SaaS lifecycle – evaluation, adoption, usage, and termination. 

Download the report: https://cloudsecurityalliance.org/artifacts/saas-governance-best-practices-for-cloud-customers/

CSA and Google Cloud Launch Survey Report on Measuring Risk and Risk Governance

In collaboration with Google Cloud, CSA released the new survey report Measuring Risk and Risk Governance to provide a deeper understanding of public cloud adoption and risk management practices within the enterprise.

The goal of this research is to assess the maturity of public cloud and risk management within enterprises. Among the survey’s key findings:

  • There is no consistency of data classification across the use of cloud platforms and services — only 21% of users are utilizing cloud service data classification.
  • More than half (52%) of organizations reported that they did not evaluate the risk of their cloud services being used after procurement as product features or business environments changed.

This study shines a light on the opportunity enterprises can take to manage and measure their risk, and will hopefully lead to improved risk management practices.

​​“Increasingly, cloud is becoming … more of a means to manage risks. Continuously evaluating your risk status allows enterprises to properly configure and maximize the effectiveness of [your] security solutions, which in turn, protects their assets and improves business productivity,” said Phil Venables, Chief Information Security Officer and Vice President of Google Cloud. 

This study confirms that IT modernization into the cloud is the best path toward viable risk management.

Download it here.