At a recent infosec trade show, Cyber IQ explored the exhibition floor to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market...
Read the full feature to get an inside perspective on:
- The benefits of sizeable data and technology/service integration;
- The common need for differentiation through trials and demonstrations;
- The ‘selling point’ of specialist human skills and experience in threat intelligence;
- The shift towards prevention over detection;
- The level of buy-in from board level decision-makers;
- The emerging threats and risks to SMEs;
- The common questions customers are asking about threat intelligence solutions.
While many C-level executives have a strategy in place for cyber security, many have not included sufficient planning to handle the aftermath of a successful cyber attack. This infographic offers quick insight into what to be aware of, including:
- Protecting valuable information
- Ensuring business operations continue without interruption
- Maintaining a trustworthy reputation
- Risk factors that often go overlooked
The National Institute of Standards and technology (U.S. Department of Commerce) has released SP800-184, a new draft guide that provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning in the event of a cyber security incident.
The guide reinforces that much of the planning and documentation for recovery needs to be in place before the event occurs. To effectively plan, the draft guide recommends a number of key steps: threat modelling; understanding the identities that exist in the agency’s environment; using access controls, and ensuring data integrity. Read the document to get a sense of how U.S. experts are trying to enhance information security for the commercial sector.
According to recent figures (MarketsandMarkets), the global threat intelligence security market is expected to grow from $3.7 billion in 2015 to $5.5 billion by 2020 (at a CAGR of 14.3% during the forecast period), with North America expected to be the largest market on the basis of spending and adoption of the threat intelligence security market.
However, as Cyber IQ recently explored, the concept of threat intelligence remains confusing for many businesses. This is in part due to the fact that many vendors in the information and cyber security space appear to be offering these solutions without necessarily catering to complex and individual needs...
Read what the experts think about the market - including insight from Vicki Gavin (Compliance Director, Head of Business Continuity and Information Security, The Economist Group) and Alan Millar (Senior Cyber Intelligence Manager, Capital One), who will be speaking at the Cyber Threat Intelligence & Incident Response event alongside many other industry end-users.
“Unfortunately for many organizations, Incident Response is still primarily a reactive premise centered on a plan or policy document that describes how they should handle such an event. Alarmingly, many others have no plan or policy at all,” says Clint Sand, Sr. Director of Global Cyber Readiness and Response Services, Symantec. [Forbes] Companies need to be better trained to deal with cyber incidents and rather than merely trying to stop them from happening, must now make the assumption they will happen. Read all 8 eye-opening facts...
Take a look at the 2017 sample attendee list to see who you will meet at the event.
The cyber threat landscape is changing rapidly, making life more difficult for SOC Managers who are responsible for overseeing the cyber security of their company. Ahead of the Threat Intelligence and Incident Response conference, Defence IQ interviewed Peter Culley, SOC Manager and Cyber Intelligence Authority at Vodafone. Here, he discusses the challenges SOC Managers face in their day-to-day job and what impacts the shaping of the cyber security policy.