Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 4 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber Security Show – Consider intelligence as all are accountable

by The Gurus
April 13, 2015
in Editor's News
Share on FacebookShare on Twitter

Cyber has become a major part of attack and defence, and the board and business are as accountable as IT.
Speaking at the Cyber Security Show which is held under Chatham House Rule, a former director general of a Goverment intelligence agency who is advising for security companies, said he was struck by how much cyber had become the issue of the moment, and how cyber intelligence was a key part of modern knowledge.
They identified six key areas of cyber intelligence to understand and consider: people; person layer; device layer; control layer; network layer; and geography, and said that it was equally important that keeping legal firms up to speed with cyber was one of big challenges we face as it is often “divorced”.
“We dont have a legal context that can adaprt and move to the challenges we face,” they said.
Looking at major threat areas, they said that the first and most important element of defence is cyber intelligence, and understanding the nature of the threat we face and how it operates at this level. “We need a contextual background to make risk decisions and understand what is happening now on your networks to make informed decisions of a more tactical nature,” they said.
“Companies are often not aware of what is happening on their systems and unless you have awareness, all you can do is have effective response mechanisms rather than defence mechanisms.”
They acknowledged that selling security to the board is difficult if you are not a technical expert, but identified the key questions on understanding what your critical data holdings are, as this is not an issue just for the CIO but for the whole company to understand what is critical to you, and then moving on to the question of threat and getting real time visibility on known threats and working out the “unknown unknowns”.
“Then understand what you are trying to protect against, and then you are in a positon to set a risk appetite statement,” they said. “But we don’t find many who have gone through the process with real vigour so the board buys into cyber risk, and without it is difficult to know what the risk is according to where it needs to be.”
They acknowledged that when trying to fix the problems, it starts with people and an executive has to have buy in as it is about the business, culture and technical aspects as well.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Cyber Security Show – Trust nothing, to get the basics right and achieve a strategy

Next Post

Cyber Security Show – Speak in the board's language to get their attention

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information