07/17/2025 | News release | Distributed by Public on 07/17/2025 17:32
Zero-day vulnerabilities, misconfigurations, and human error make cyber breaches inevitable. In 2024 the global average cost of a data breach reached USD 4.88 million, a 10% increase on the previous year. One in three breaches involved unmanaged or unknown data assets - highlighting the challenges in tracking and safeguarding proliferations, and a study analysing over 200 data breaches between April 2024 and April 2025 found 94% of leaked passwords were reused across multiple accounts. The real differentiator in cybersecurity lies in the ability to detect, investigate, and respond to incidents. This is called the DIR model. Detect threats quickly; investigate them confidently, and respond decisively.
Organisations often over-invest in detection and under invest in investigation and response, falling victim to breaches not because they missed the detection, but because their investigation and response was slow, ineffective, or hampered by internal obstacles. Detect, investigate, respond gives you a structure for planning your reactions in advance.
Detection is the first step in incident response. However, effective detection is about precision, not volume - are you detecting the right threats, at the right time? Overloading security teams with alerts can cripple their ability to respond. Detection systems should be smart, scalable, and strategically-aligned to reduce noise and minimise blind spots.
Ensure visibility across endpoints, cloud, and network environments. This comprehensive coverage helps in identifying threats that may be lurking in different parts of the digital estate.
Invest in reducing false positives to maintain analyst trust and efficiency. False positives can degrade the trust in the system and slow down the response time.
Regularly update detection logic with threat intelligence and align it to the tactics, techniques, and procedures (TTPs) used by adversaries. This ensures that the detection mechanisms are always up-to-date with the latest threat landscape.
Once an alert is detected, the real work begins. Effective investigation enables security teams to distinguish between benign and malicious activity quickly.
Rapidly assess alerts to determine their validity and impact. The faster the investigation, the quicker the response, reducing the potential damage.
Understand file systems, operating system internals, network protocols, and malware analysis. This technical knowledge is crucial for accurately identifying and understanding threats.
Act swiftly to prevent data exfiltration, privilege escalation, or total environment compromise. Timeliness is critical in ensuring that threats are contained before they can cause significant damage.
Go beyond containment to understand the root cause and broader implications of an incident.
You've detected the threat, you've investigated its cause, now you must mitigate it effectively. The faster the response, the less damage is done.
Ensure SOCs and IR teams have the permission to take immediate action. This includes isolating machines, disabling user accounts, and blocking network traffic without waiting for board-level approval.
Secure leadership support for short-term disruption to prevent long-term damage. This means having a clear mandate that justifies immediate actions to contain threats.
Sometimes the right move is to observe threat actors to understand their behaviour before taking action. This requires maturity and a defined playbook, but this approach can provide valuable insights into the threat actor's methods and objectives.
A strong response plan covers investigation, containment, and recovery. The starting point is confirming and understanding the threat. Then systems need to be isolated, accounts blocked, and lateral movement stopped. In the recovery phase you should be thinking about remediation and restoring services.
Once all of this is in place you need to reflect on what happened and consider how you can learn from the incident.
The DIR model isn't just a technical process. It's the heart of cyber and operational resilience. Success doesn't come from perfection in one or two of these areas. It comes from building strength across all three.
For more insight and guidance, contact Hitesh Mistry.
Sign up to get the latest role, industry or technical updates by email