3. Security Intelligence Systems
Companies that have deployed security information and event management (SIEM) systems also are controlling cybercrime costs, Ponemon said. The latest generation SIEM systems are now combining threat intelligence feeds with system logs to spot suspicious activity. To gain the full effectiveness of SIEM, organizations need to provide around-the-clock monitoring and have dedicated incident response personnel to investigate and contain problems as soon as possible.