Applying knowledge graph to cyber security will improve data organization and provide a contextual view of digital assets, resulting in a more effective cyber security program.
- A knowledge graph can provide a map of all digital assets and their relationships, allowing for a contextual view of data
- Importing data from various sources, such as HR tools, can create an abstract layer for the knowledge graph
- Using a knowledge graph can surface vulnerabilities and prioritize mediation
- Managed services, such as Amazon Web Services Neptune, can be leveraged for a graph database system
- Tools like Cartography and OpenCSPM can be used to map assets and create relationships
Imagine being able to import and create a mapping not just of laptops, but also of the people who have access to those laptops and what type of vulnerabilities are in that specific endpoint. All of this can be surfaced from a contextual view of all of these digital assets.