Cyber Security Europe - Autumn 2019

Page 26

FEATURE

STRATEG OPERATIONAL THREAT DATA FEEDS

cybersecurityeurope

MACHINE LEARNING

FRAUD PREVENTION

MANAGE TACTICAL BROWSER EXTENSION,

DATA

Effective enterprise Threat Intelligence programmes must make information sharing – at all levels of an organisation – a top priority for full-function cyber defence strategies.

AS THEY ACQUIRE GREATER LEVELS OF RESPONSIBILITY FOR THE CYBER GOVERNANCE OF THE ORGANISATIONS they run, cyber-savvy senior executives can not only have oversight of their enterprises’ security operations’ Threat Intelligence (TI) activities, but also direct input into them. This is because there are points of intersection between business intelligence and cyber threat intelligence – points that cyber experts won’t see, but the business-minded will. TI is based on the collection of intelligence using open source intelligence (‘OSINT’), social media intelligence (‘SOCMINT’), human intelligence (‘HUMINT’), technical intelligence or intelligence from the Deep Web and the Dark Web. TI’s main objective is to research and analyse trends and technical developments in key threat IN BRIEF

areas such as cyber crime, cyber espionage, and hacktivism. By definition, executives in both public and private sector entities deal with business risk – but it’s not always easy to ascertain it fully. The market for assessing some elements of business risk is relatively mature. For example, most firms will build-in redundancy to data centre operations and/or back-up data the cloud. However, digital risk, and particularly that which manifests from outside an organisation‘s traditional boundary, is less understood and is a critical missing part of a company‘s overall risk profile.

It is most vital that all leadership teams keep their IT security counterparts up-to-date on the information that must be protected. As organisations become more digitally-interconnected to their supply chain, customers, and partners, new types of risk have emerged. Unmanaged, these can lead to the loss of sensitive corporate data, violation of privacy laws, and damaged reputations. When surveyed by the Ponemon Institute for its Bridging the Digital Transformation Divide report (2018), 72% of

NATION SHALL SPEAK CYBER INTEL UNTO TO NATION... In the context of Threat Intelligence, private sector organisations can learn from nation states. In many ways, the world’s nation states are ahead of their commercial counterparts – international networks

26

such as Europol, called ‘Five Eyes’ between the United Kingdom, Canada,

and the soarrangement States, United Australia and


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.