These are use cases for specific profiles in an organization to show how they can utilize the report’s data to improve their workflow. Check our documentation to learn more about the content of Lumu Reports.
We will take a look at three vital roles:
Lumu Reports contain data about the cybersecurity state of the organization which CISOs can use to make informed decisions that will have a positive impact on the cybersecurity state of their company.
The most valuable data in the report for the CISO can be found in the Open Incidents section of the report, more specifically, in the subsections focusing on risk level.
Risk level is a great tool for CISOs as it informs them of the stage of attacks within the network, and which actions have been taken against them. This, combined with the information provided by the incidents’ labels, will provide a holistic view of the network's cybersecurity state which the CISO can use to make informed strategic decisions.
Knowing which of the open incidents in your network are being operated on, and having an accurate estimation of progress of these attacks can allow the CISO to prioritize the organization’s cybersecurity team’s resources to tackle the adversaries currently affecting the network, and strengthen the organization’s cybersecurity posture against relevant threats.
After dealing with active threats, they can use the factual data acquired throughout the process to acquire relevant technologies to further protect the network from common attacks. They can also adjust the organization’s cybersecurity policy based on factual data on threat types affecting your network and monitored labels, and even design and implement disaster recovery protocols with a very clear picture of a worst case scenario.
Let’s take a look at a potential scenario:
The SOC director leads the team and oversees their goals, training and activities. As such, the most valuable data they can find in the report would be metrics, most specifically the ones in the Security Operation Summary section. These metrics provide the SOC director with insights on the operation expediency and efficiency of the team.
For example, they can measure the holdover open incidents from previous periods to know whether the current team composition can handle all the incident load, or if their current assets aren’t being used as effectively as possible.
They can also look at the number of resolved incidents versus detected incidents and set an incident resolution goal between them for the next period, for instance.
The average resolution time can also tell them how old the incidents resolved during the analyzed period are, which can provide ideas to improve practice and procedures to prevent incidents to linger in your network and advance to stages where they can potentially harm the organization.
Another important metric is the Mean Time to response (MTTR) which tells you how fast the team is responding to incidents to start operating them. Manual operation can lead to high values in this indicator as there is a limit to human capacity to handle such large loads of data; however, this can be severely mitigated by Lumu’s automated out-of-the-box integrations.
These integrations, which are available to Lumu Defender customers, provide SOC directors with an estimate of the number of work hours saved given that automated integrations can respond to incidents faster than any human could.
Last, but certainly not least, the most important metric, and the one that can be used to verify the team’s effectiveness with more certainty would be the capacity to operate, as it measures the team’s ability to operate the organization’s cybersecurity. Ideally, you should aim for a high value in this metric, as anything below may imply that either the team’s policies, training, practices, or even team composition must be evaluated and adjusted.
Let’s take a look at a potential scenario:
The report also contains data relevant to those operating the organization’s cybersecurity at a tactical level, namely, the team’s analysts.
Analysts can benefit greatly from incident specific data provided throughout the report to make decisions on individual incidents which give the analyst insights to prioritize and operate incidents effectively. The analyst can also access the MITRE Framework from the portal’s Incidents view to find effective mitigation strategies and countermeasures against specific threats.
It also provides detailed data regarding affected endpoints that may require special attention and direct intervention lest they become the adversary’s foothold into the network.
There isn’t a single criteria to determine which incidents should be prioritized; however, Lumu provides all the required information for the analysts to do so. Business relevance is always the first priority since this should be determined by the organization when setting up their labels, so other data such as the incident’s activity, affected endpoints, and contacts should be considered while keeping the business relevance in mind.
With the data provided by the report, analysts should have a better view of the organization’s cybersecurity landscape allowing them to make correct and timely tactical decisions.
Let’s take a look at a potential scenario: