Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Modeling, Simulation Tools Help Identify Threats Before an Attack

Interview with Skybox Security's Michelle Cobb

Enterprises should employ new modeling, simulation and intelligence tools to provide insight into potential exploitable attack vectors before an incident occurs, says Michelle Cobb, vice president of worldwide marketing at Skybox Security.

See Also: Hunt Cloud Threats or Be Hunted | CISO Guide to Cloud Compromise Assessments

"We can take a vast amount of data from a variety of different sources and put it in a format where it can be analyzed very quickly," Cobb said in this interview with Information Security Media Group following her presentation titled "The Visible Attack Surface: What It Is and Why It Matters" at the ISMG Fraud and Prevention Summit in Toronto.

"That means that as your network grows, your ability to analyze it still keeps pace," she said. "You use modeling simulation when you have a very complex problem, with a lot of different factors that you want to figure out what it means."

In the interview click player above to watch), Cobb:

  • Defines the term "incidents of exposure" and how it can be used to identify threats and vulnerabilities;
  • Explains who in an organization should be responsible for using modeling tools; and
  • Discusses how Skybox Security solutions help enterprises focus on the most critical exposures that must be addressed.

Cobb joined Skybox Security in 2009. Previously, she served as president of the consultancy Spire Marketing. Cobb holds two degrees from the University of Michigan, a BS in computer science and an MBA in corporate strategy and marketing.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.