Featured Download

Threat Intelligence: How vendors are standing out from the crowd

Threat Intelligence: How vendors are standing out from the crowd

At a recent infosec trade show, Cyber IQ explored the exhibition floor to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market...

Read the full feature to get an inside perspective on:

  • The benefits of sizeable data and technology/service integration;
  • The common need for differentiation through trials and demonstrations;
  • The ‘selling point’ of specialist human skills and experience in threat intelligence;
  • The shift towards prevention over detection;
  • The level of buy-in from board level decision-makers;
  • The emerging threats and risks to SMEs;
  • The common questions customers are asking about threat intelligence solutions.
Is your business prepared to respond to a data breach?

Is your business prepared to respond to a data breach?

While many C-level executives have a strategy in place for cyber security, many have not included sufficient planning to handle the aftermath of a successful cyber attack. This infographic offers quick insight into what to be aware of, including:

  • Protecting valuable information
  • Ensuring business operations continue without interruption
  • Maintaining a trustworthy reputation
  • Risk factors that often go overlooked
Guide for Cybersecurity Event Recovery: U.S. Gov (NIST)

Guide for Cybersecurity Event Recovery: U.S. Gov (NIST)

The National Institute of Standards and technology (U.S. Department of Commerce) has released SP800-184, a new draft guide that provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning in the event of a cyber security incident.

The guide reinforces that much of the planning and documentation for recovery needs to be in place before the event occurs. To effectively plan, the draft guide recommends a number of key steps: threat modelling; understanding the identities that exist in the agency’s environment; using access controls, and ensuring data integrity. Read the document to get a sense of how U.S. experts are trying to enhance information security for the commercial sector.

The challenge of finding threat intelligence solutions

The challenge of finding threat intelligence solutions

According to recent figures (MarketsandMarkets), the global threat intelligence security market is expected to grow from $3.7 billion in 2015 to $5.5 billion by 2020 (at a CAGR of 14.3% during the forecast period), with North America expected to be the largest market on the basis of spending and adoption of the threat intelligence security market. 

However, as Cyber IQ recently explored, the concept of threat intelligence remains confusing for many businesses. This is in part due to the fact that many vendors in the information and cyber security space appear to be offering these solutions without necessarily catering to complex and individual needs...

Read what the experts think about the market - including insight from Vicki Gavin (Compliance Director, Head of Business Continuity and Information Security, The Economist Group) and Alan Millar (Senior Cyber Intelligence Manager, Capital One), who will be speaking at the Cyber Threat Intelligence & Incident Response event alongside many other industry end-users.

8 Shocking Facts about Cyber Incident Response

8 Shocking Facts about Cyber Incident Response

“Unfortunately for many organizations, Incident Response is still primarily a reactive premise centered on a plan or policy document that describes how they should handle such an event. Alarmingly, many others have no plan or policy at all,” says Clint Sand, Sr. Director of Global Cyber Readiness and Response Services, Symantec. [Forbes] Companies need to be better trained to deal with cyber incidents and rather than merely trying to stop them from happening, must now make the assumption they will happen. Read all 8 eye-opening facts...

2017 Sample Attendee List

2017 Sample Attendee List

Take a look at the 2017 sample attendee list to see who you will meet at the event.