What best practices should organizations follow when selecting and implementing an external provider for managed security monitoring or MDR? Which aspects are key to ensuring you’ll get the most out of these services, and avoid surprises during an actual incident?

280 viewscircle icon5 Comments
Sort by:
Information Security Manager7 months ago

There's no one-size-fits-all solution. It's important to onboard providers slowly, starting with basic levels of service and gradually expanding. Your core team should remain involved, as they understand your business better than any vendor. This gradual approach helps ensure that the provider can meet your specific needs.

1 Reply
no title7 months ago

Determining whether a company will be reliable in the long term is vital. You can also use your peer networks to gather insights and experiences from others who have already evaluated these vendors. That can provide you with valuable perspectives to help qualify potential partners.<br>

Chief Data Officer in Healthcare and Biotech7 months ago

As a government entity, we benefit from subsidies that help us access high-end MDR solutions, but for others, I recommend being cautious with new vendors. The market is saturated with startups making big promises, so it's wise to wait and see how they perform before committing. Experience has taught me that it's better to be cautious and not rush into decisions.

Global Chief Cybersecurity Strategist & CISO in Healthcare and Biotech7 months ago

A major challenge is the influx of companies and startups entering this space, many of whom lack experience in specific verticals. It's critical to conduct thorough research on providers and verify their claims by speaking with their existing clients. Don't rely solely on promises or frameworks. It's also important to maintain a hybrid model, as you can't completely shift your risk to a third party.

Chief Information Security Officer in IT Services7 months ago

I use MDR (managed detection and response) in a limited capacity, focusing on specific, high-value environments. The key for us has been finding a provider that can adapt to our unique environment and work closely with our operations and incident response teams. They need to understand what is normal for us and adjust their detection rules accordingly, so flexibility and a willingness to partner with us have been crucial differentiators.

Content you might like

Yes, multiple30%

Yes, one37%

No27%

Don't know3%

View Results

Yes47%

Patching is in progress39%

No9%

Other (please specify in the comments)3%

View Results