15th - 16th November 2017 | London, UK

Media Center

Exclusive Content

Threat Intelligence: How vendors are standing out from the crowd

At a recent infosec trade show, Cyber IQ explored the exhibition floor to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market...

Read the full feature to get an inside perspective on:

  • The benefits of sizeable data and technology/service integration;
  • The common need for differentiation through trials and demonstrations;
  • The ‘selling point’ of specialist human skills and experience in threat intelligence;
  • The shift towards prevention over detection;
  • The level of buy-in from board level decision-makers;
  • The emerging threats and risks to SMEs;
  • The common questions customers are asking about threat intelligence solutions.

The challenge of finding threat intelligence solutions

According to recent figures (MarketsandMarkets), the global threat intelligence security market is expected to grow from $3.7 billion in 2015 to $5.5 billion by 2020 (at a CAGR of 14.3% during the forecast period), with North America expected to be the largest market on the basis of spending and adoption of the threat intelligence security market. 

However, as Cyber IQ recently explored, the concept of threat intelligence remains confusing for many businesses. This is in part due to the fact that many vendors in the information and cyber security space appear to be offering these solutions without necessarily catering to complex and individual needs...

Read what the experts think about the market - including insight from Vicki Gavin (Compliance Director, Head of Business Continuity and Information Security, The Economist Group) and Alan Millar (Senior Cyber Intelligence Manager, Capital One), who will be speaking at the Cyber Threat Intelligence & Incident Response event alongside many other industry end-users.

Cyber IQ Review [Summer 2016]

Welcome to the summer 2016 issue of the Cyber IQ Review. The past few months have been as active as ever when it comes to the increase and emergence of sophisticated threats to our digital information. Headline issues have spanned from flaws in daily security measures to global-scale controversy and serious commercial fallout.

This e-book includes new insight from experts within the field of information security, including strategic expert Ryan Lai on ransomware, and Dr. Chris Rivinus on developing an ‘InfoSec culture’. Alongside these, we offer access to some of the most impactful articles that Cyber IQ has released in the past six months, covering elements from national infrastructure protection to incident response. Meanwhile, readers will be able to find the results of our summer survey of cybersecurity professionals, in which we uncover some interesting trends and statistics, including what they believe to be the most critical vulnerabilities and where organizations are failing on implementing policies and procedures. Download the Cyber IQ Review today.

Sharing Cyber Threat Intelligence: Why business and law enforcement must renew its collaborative effort

As information security threats to private businesses continue to increase, the risk to public data broadens, undoubtedly demanding a stronger and more coordinated effort between the private industry and the authorities. From the Wikileaks (and alleged Russian hacker) involvement in the Democratic National Committee email dump this summer to the Sony email fallout of last year, attacks on organisations have had a frighteningly real impact on political influence, national security, foreign relations, health and safety, civil liberties, and the local economy. Law enforcement agencies, responsible as they are for maintaining peace and security, cannot simply sit back and expect vulnerable companies to come to them for assistance or guidance.

Read up on how law enforcement agencies and businesses are performing when it comes to integration on threat intelligence and incident response, including the latest initiatives to combat ransomware. The UK National Crime Agency, FBI and the City of London Police will all be addressing the delegation at this year's conference.


Guide for Cybersecurity Event Recovery: U.S. Gov (NIST)

The National Institute of Standards and technology (U.S. Department of Commerce) has released SP800-184, a new draft guide that provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning in the event of a cyber security incident.

The guide reinforces that much of the planning and documentation for recovery needs to be in place before the event occurs. To effectively plan, the draft guide recommends a number of key steps: threat modelling; understanding the identities that exist in the agency’s environment; using access controls, and ensuring data integrity. Read the document to get a sense of how U.S. experts are trying to enhance information security for the commercial sector.


Cyber Response Solutions: Waiting in the Grass

Italy-based Tiger Security caters to international organisations that are at a particularly high-level of risk from cyber attacks, including governments and militaries. Defence IQ spoke with CFO, Partner and Head of Business Development, Damiano Cimignolo, to find out whether the company's solutions burn brighter than the rest...

Find out:
•  About the need for honest information sharing between enterprises and solution-providers;
•  How intelligence allows the company to contextualise malicious activities and transfer this knowledge to its clients;
•  How many companies are unaware that they are being (or have been) attacked and that key information has already been exfiltrated.

The Perfect PR Playbook for Responding to a Cyber Incident

Cyber attacks now present a clear threat to all businesses and customers. While the problem is recognised among most large-scale enterprises (i.e. those with the capital to invest in high-end cyber security), there remains an inability for any network to remain 100 percent secure. This means that, for now, the average likelihood of a data breach remains high across the spectrum while the capacity for prevention is worryingly outpaced by the capacity of the threat. Today, there is no excuse for not having developed a full plan for responding effectively to a data breach, beginning with an airtight PR strategy...

8 Shocking Facts about Cyber Incident Response

“Unfortunately for many organizations, Incident Response is still primarily a reactive premise centered on a plan or policy document that describes how they should handle such an event. Alarmingly, many others have no plan or policy at all,” says Clint Sand, Sr. Director of Global Cyber Readiness and Response Services, Symantec. [Forbes] Companies need to be better trained to deal with cyber incidents and rather than merely trying to stop them from happening, must now make the assumption they will happen. Read all 8 eye-opening facts...


Is your business prepared to respond to a data breach?

While many C-level executives have a strategy in place for cyber security, many have not included sufficient planning to handle the aftermath of a successful cyber attack. This infographic offers quick insight into what to be aware of, including:

  • Protecting valuable information
  • Ensuring business operations continue without interruption
  • Maintaining a trustworthy reputation
  • Risk factors that often go overlooked