CIOApplications
static-image
  • Home
  • Applications
      • Auction Software
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Club Management
      • Collaboration
      • Custom Software Development
      • CRM
      • Digital Experience
      • EAM
      • Enterprise Mobility
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Infrastructure
      • IT Operations Management
      • IT Service Management
      • License Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Mobile Application
      • Order Management
      • Parking Management
      • Personalization
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Asset Management
      • Software Testing
      • Task Management
      • Unified Communications
      • Visitor Management
      • Voice Recognition
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Casino
      • Construction
      • Contact Center
      • Education
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • DevOps
      • Digital Transformation
      • Drone
      • Graphics
      • Hyper Converged Infrastructure
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • RF and Microwave
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
      • Space Tech
      • Virtual Assistant
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • Microsoft
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Cloud
      • Cyber Security
      • Esri
      • Human Resource
      • IT Service Management
      • Machine Learning
      • Parking Management
      • Robotic Process Automation
  • Business Continuity
  • Parking Management
  • Cyber Security
  • Esri
  • Human Resource
  • IT Service Management
  • Machine Learning
Specials
  • Specials

  • Business Continuity
  • Cloud
  • Cyber Security
  • Esri
  • Human Resource
  • IT Service Management
  • Machine Learning
  • Parking Management
  • Robotic Process Automation
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading

Thank you for Subscribing to CIO Applications Weekly Brief

  • Home
  • Cyber Security
  • Top Companies
  • CyberHat

CyberHat: The Cybersecurity Masterminds

CyberHat

Nadav Arbel, Founder and CEO , CyberHatNadav Arbel, Founder and CEO
Despite the constant flow of security updates and patches, the number of cyberattacks, ranging from simple malware and phishing attacks to high profile network breaches, continue to rise unabated. The changing cybersecurity landscape demands advanced security solutions and robust security operations centers (SOCs) that can shield enterprises from attacks round the clock. Based in New York, CyberHat’s mission is to protect organizations with a range of innovative cybersecurity solutions and unmatched industry expertise. Offering advanced cyber strategies and highly focused responses from CyberHat is a team of elite Israeli cyber experts comprising white hat hackers, cyber defenders, and state level investigators. In an interview with CIO Applications, Nadav Arbel, Founder and CEO of CyberHat, speaks about the changing cybersecurity landscape as well as the challenges inhibiting SOC’s evolution and explains how businesses can be made more secure.

Give us an overview of the challenges in the SOC space and help us understand how CyberHat’s solutions address them?

The main challenge within the SOC market is a lack of professional and domain expertise amongst employees — all the way from the design to the operation phase. While most existing tier 1-2 SOCs are commodity services that provide basic offerings like monitoring and auditing for reporting of processes, controls, and compliance. Further, most SOC providers claim to support the full stack of tier 1-4 level of services but fall woefully short of delivering advanced SOC features like incidence response (IR), forensics, and proactive monitoring. Unfortunately, most enterprises do not have the expertise to make an educated decision when choosing a SOC provider. Put bluntly, most SOC providers today are only able to assist in compliance issues or basic security operations on daily low-level topics, but in large, will neither identify a real attack nor block it. Moreover, most SOC providers cannot proactively stop attacks and lack the ability to run post-mortem forensic investigations to prevent future attacks, thereby leaving their customer’s reputations and brand at risk.

CyberHat provides the most crucial element in today’s SOCs—the skill sets, experience, and capabilities beyond a specific tool, system, or vendor. Our solution CYREBRO, the world’s first smart SOC, offers advanced cybersecurity capabilities and functionality. It has been explicitly designed to extend expert cyber defense services while providing proactive and efficient identification and response capabilities to users. CYREBRO is 100 percent technology agnostic and is an extension of our operational experience in the offensive and investigative world combined with our experience in building defense and SOC management.

How is CyberHat different from others?

CyberHat differentiates itself in multiple ways; First, we are 100 percent technology agnostic; Secondly, our team has real-world incident response, forensic and investigative expertise, Third, we employ a proactive approach from a hacker and investigator point of view to monitor, assess, and secure the entire infrastructure.

Our solution CYREBRO is the world’s first smart SOC with advanced cybersecurity capabilities and is explicitly designed to provide expert cyber defense services, to be proactive and efficient in providing identification and response capabilities to users.


Our holistic approach delivers a proactive infrastructure security design that doesn’t merely tell what gets monitored but also explains how, when, and why from a unique Hacker and investigator point of view. Finally, our team has decades of experience in the operations of security centers worldwide. Our one-stop-shop SOC, CYREBRO, provides tier 1-4 services, from malware analysis and reversing code to stopping sophisticated bad actor attacks across the enterprise.

Another aspect that keeps us ahead of the game is the constant and continuous education of our employees in the execution of advanced hacking simulations, in-depth practical assessments, and real-life incident response for our global clients. We have found If one doesn’t actively take part in the offensive and investigative tactical side of cybersecurity, he/she CANNOT be relevant in defense long-term.

Can you share one or two case studies with us wherein your company has helped its clients overcome security challenges and attain desired outcomes?

CyberHat is traditionally hired by organizations wishing to move beyond the “practical” aspects of defensive cybersecurity to the “real-world” practice of proactive cybersecurity. For example, CyberHat was hired to assist a multi-billion-dollar international company, with over 15,000 employees building, implementing, and operating a SOC. The client had already implemented one of the leading security incident and event management (SIEM) systems in the market. However, their IT group had little or no experience in cybersecurity, nor did they have the right personnel in-house to manage more than 60,000 security incidents per week, and expertise in SIEM and other security deterrent tools. CyberHat was called in to re-design, qualify, and operate a SOC-as-a-service from Israel, train the client’s local analyst team, and enable a clean handover of local tier 1 support within two years. At the end of the 18 months, CyberHat had re-designed, structured and were operating a round the clock operational SOC with tier 1-4 analysts’ and expert incident response (IR) teams. We handed over the SOC to the client after 20-months. CyberHat redefined the monitoring strategy, re-defined log sources and types, cleaned out the irrelevant noise, rewrote all the Run books, process, and procedures required for the client’s systems, and built a valid and relevant flow between Tier 1- 4 and a reduction of incidents to under 85 per week.

Today, that client operates a local tier 1-2 team in their local SOC (all CYREBRO certified) on its own, while we provide the required intelligence and tier 3-4 support on an on-going basis.

Where do you see more customer traction today and why? Moving ahead, what does the future for CyberHat look like?

With the rise in the sophistication of cyber-attacks combined with increases in regulatory requirements, especially in the financial services industry, enterprises are finding it increasingly difficult to keep up with the many changes that are occurring. Forward-looking companies are turning to service providers like CyberHat to become proactive and improve their organization’s security. The next segment would be high profile Fortune 500 companies that have growing concerns about cyber threats and a willingness to invest.

Over the last year, 80 percent of CyberHat’s new clients and prospects have been organizations that have bought SOC-as-a-service from big vendors such as IBM, Accenture, and Deloitte but were extremely unhappy and unsatisfied with the service. But essentially, any organization that is truly concerned with its security posture is a valid potential client.

In the coming days, CyberHat will position CYREBRO as an international standard for expert SOC infrastructure, establishing third-party SOCs through our “CYREBRO inside” business model. We also envision providing the ideal balance between expert cybersecurity skills and advanced proprietary technology developed by CyberHat. We will continuously execute advanced hacking simulations and cybersecurity assessments across the globe for Fortune 500 organizations and leading companies, enabling them to stay ahead of the game in the offensive and defensive cyber domain.


Read Also

Institutional Cash Distributors: Flexible, Efficient and Secure Trading

Tory Hazard, CEO, Institutional Cash Distributors

1787fp: Working toward Financial Independence

Jean Jacques Borno, CFP®, Founder & CEO, 1787fp

Advisor Software: Enabling Financial Institutions Revamp Digitally

Andrew Rudd, CEO, Advisor Software

NETSOL Technologies [NASDAQ:NTWK]: How Netsol Technologies Helps Companies Transform Their Asset Financing And Leasing Operations

Douglas Jones, Vice President Operations, NETSOL Technologies

Share this Article:
Tweet
Top 25 Cyber Security Companies - 2018
ON THE DECK

Cyber Security 2020

Top Vendors

Cyber Security 2019

Top Vendors

Previous Next
Tweets by CIOApplications

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://cyber-security.cioapplications.com/vendor/cyberhat-the-cybersecurity-masterminds-cid-1690-mid-97.html