• Home
  • Applications
      • App Analytics
      • Blockchain
      • BPM
      • Collaboration
      • Configuration Management
      • CPQ
      • Container Management
      • Customer Experience Management
      • Cyber Security
      • Data Center
      • Data Platform
      • DMS
      • EAM
      • Enterprise Mobility
      • ERP
      • Enterprise Search
      • Enterprise Telecom
      • GIS
      • GRC
      • HR
      • IT Services
      • Legal
      • Machine Vision and Imaging
      • Marketing
      • Master Data Management
      • Portal Software
      • Predictive Analytics
      • Procurement
      • Project Management
      • Sales
      • Supply Chain
      • Unified Communications
      • Workflow
  • Verticals
      • Aerospace & Defense
      • Banking
      • Bioinformatics
      • BioTechnology
      • Construction
      • Contact Center
      • E-commerce
      • Education
      • Field Service
      • Food and Beverages
      • Government
      • Healthcare
      • Insurance
      • Life Sciences
      • Logistics
      • Manufacturing
      • Oil & Gas
      • Remote Monitoring
      • Retail
      • Robotics
      • Utilities
  • Technologies
      • Adobe
      • Amazon
      • Artificial Intelligence
      • Augmented Reality
      • Avaya
      • Big Data
      • Business Continuity
      • BI
      • Chatbot
      • Cloud
      • Content Delivery Network
      • DevOps
      • Drone Technology
      • e-Discovery
      • EA
      • Graphics Tech
      • IBM
      • IoT
      • Machine to Machine
      • Microsoft
      • Nintex
      • Oracle
      • Robotic Process Automation
      • Salesforce
      • SAP
      • Telematics
      • Testing
      • Video Surveillance
      • Wireless
  • partner conferences
  • Subscribe
  • Whitepapers
  • About us
  • Home
  • Cyber Security
  • Vendors
  • Ingalls Information Security
Previous
Next
Ingalls Information Security

Ingalls Information Security: Before They Become Data Security Breaches

CIO VendorJason Ingalls, Founder and CEO
A decade ago, getting immediate help after a breach was close to impossible for commercial business, considering the amount of paperwork involved, and cybersecurity being predominantly handled by large businesses with Department of Defense contracts. This meant that the damage done by the attack just kept getting worse. In recent years, proliferating malware and attack tools have driven cybersecurity needs for enterprises and individuals alike to an all-time high. Understanding the importance of having the right resources available within a quick turnaround time in the event of a breach, Jason Ingalls founded Ingalls Information Security in 2010. Talking about the challenges faced by the industry, Jason Ingalls, Founder and CEO, discusses the services his firm provides.

What are the key cybersecurity challenges faced by enterprises today?

The three primary challenges that companies face are lack of expert personnel, enormous amounts of data that must be reviewed for indications of intrusion or successful cyberattacks, and poor implementation and management of cybersecurity technology. All three of these factors prevent companies and organizations from being resilient to cyberattacks. I’ll briefly explain each of them.

Acute shortage of talented and experienced workforce has become a great concern for companies recognize the need for a skilled cybersecurity team. Today there are over 365,000 open cybersecurity jobs in the United States alone. It is estimated that there will be over six million total cybersecurity jobs worldwide by 2019, so the industry is growing faster than the talent pool can catch up. This creates enormous challenges for companies who must compete for talent that is in short supply.

The exponential growth of cybersecurity data is the next big challenge. As computer networks grow in size and complexity, organizations today have an uphill task of reviewing huge volumes of data to identify suspicious activity and correlate the evidence necessary to address cyberattacks. This problem goes hand in hand with the shortage of talent; there aren’t enough people and there is too much data.

Finally, many companies have invested a significant amount of capital into cybersecurity tools that are designed to defeat known adversaries, however they are unable to see return on their investment because the tools are improperly configured, poorly managed, and not used because of lack of talent.

These three issues facing companies today are the major reasons why companies aren’t able to control their cybersecurity risk and suffer data security breaches.

What is the strategy followed by Ingalls to protect the data and the information systems of its clients?

We practice a defense-in-depth strategy by implementing controls at different layers in the organization, properly managing those controls, and providing expert analysis for cybersecurity tool output.

“Three major cybersecurity challenges that companies face today are lack of expert personnel, an enormous amount of data, and poor implementation and management of cybersecurity risk controls.”


For example, we provide email helpdesk support so that any employee at our clients’ organization can forward suspicious emails to our Security Operations Center and get a response as to whether or not the email is in fact malicious; this allows the employee to do their job and let our experts identify whether or not an email is safe. We let the employee know what we’ve found and they can take the appropriate action, whether it is to delete the email or respond to it accordingly.

The email helpdesk feature is just one of a number of security controls that are implemented in our Managed Detection and Response (MDR) solution. Our goal with MDR is to identify intrusions or cyberattacks, map them to understand all of various elements of the attack chain, and work with our clients to get these issues resolved before the intrusion creates impact to our client. MDR relies on a suite of tools that collect data that is reviewed by analysts, who look for suspicious activity that is indicative of a cyberattack. The MDR toolset includes intrusion detection, endpoint prevention, and active directory deception technology, all of which help to inform our analysts about any event they feel the need to investigate. This gives us the knowledge to craft a remediation plan for the client, so that the attack is addressed in the fastest possible time and with the least amount of impact to our client.

Our experience and knowledge about cyberattacks is due to our long-standing service as breach responders. We are called in to very large, high-profile breaches, and the knowledge we gain by solving these very complex problems allow us the translate this experience into solutions that can prevent impact by finding intrusions and stopping them before they get worse.

What are the various services offered by Ingalls to secure the business environment?

At Ingalls, our services are designed to provide cyber resiliency for our clients. Resiliency is defined as the ability to survive and recover from an attack within a defined set of objectives, such as the amount of time it takes, and the level of services that must be restored.

Resiliency is a very important concept for the design of security controls, and we classify our services in two broad categories that reflect our commitment to resiliency; reactive and proactive. Reactive services are basically Incident Response services and are designed to understand our client’s environment as fast as possible, develop a plan of action to get our clients back to a normal operating state as quickly as possible, and to document and collect evidence necessary for processing insurance claims and prosecuting the attackers.

Our preventative services are designed to identify risk within our clients’ environments and develop compensating controls to mitigate these risks. We have consultants who perform risk assessments, penetration testers who break into some of the most secure organizations in the world, and cybersecurity analysts who spot advanced attacks in time to stop them before they create impact for our clients.

Could you give us a case study highlighting how clients benefit from your services?

One of our clients provides constituency management software that allows high-profile, elected members of government to contact and communicate with their constituency. In 2013, a data breach exposed the personal information of several high-profile customers of our client. They chose to engage Ingalls to identify, contain, and remediate the security breach.In addition to successfully resolving the breach, our consultants were able to perform risk assessments and work with our client to demonstrate they were in compliance with their contractual obligations for information security, and we have continued to support them as they have successfully provided service without a breach since we were called in.

Previous
Next
Top 25 Cybersecurity Companies - 2018

New Editions

Vendors

  • Courage LLC: Engendering Seamless Oracle Cloud Migration

    Eric Wimer, Co Owner & President, Courage LLC

    FAST: Changing the Way Insurers Think about Technology

    John Gorman, COO and Tom Famularo, CEO, FAST

    Genius Avenue:  The Intelligent Insurtech Optimizers

    Sherry Hoskinson, CEO, Genius Avenue

    Imprezzio: Juggernaut of the Insurance Industry

    Russell Page, CEO, Imprezzio

    ACD: Cracking the Digital Code for Claims Management

    Ernie Bray, CEO, ACD

    edjuster: A Vanguard in the Insurtech Sphere

    Andy Williams, President and CEO, edjuster

  • Systems Consulting Services, Inc.: Streamlining Underwriting Processes

    Ken Wayman, President, Systems Consulting Services, Inc.

    Smart Communications: Delivering More Meaningful Customer Conversations

    Bob Dunfee, VP, Product Marketing, Smart Communications

    Simply Easier Payments: Simplifying Payment Processing in Insurance

    Duke Williams, President, Simply Easier Payments

    CHSI Technologies: Designing software for the next generation of insurance professionals

    Mike Ziethlow, UX Architect, CHSI Technologies

    Virtual Benefits Administrator: Real-Time Claims Payment

    Tom Witter, President, Virtual Benefits Administrator

    InsurIQ:  Driving Innovation through Digital Insurance

    Brian Harrigan, Founder and CEO, InsurIQ

Copyright © 2018 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy.

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplications.com/vendor/ingalls-information-security-before-they-become-data-security-breaches-cid-1689-mid-97.html