Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Cybersecurity Today

There are only two types of organisations:
those that have been hacked and
those that don’t know it yet

 

Assume breach

 

 Just getting worse…

  • Digital transformation...
    • Creating enormous opportunities while also exposing organizations to significant risks
    • Increases commercial economic incentives to roll out complicated, untested and vulnerable features quickly
  • Convergence occurring rapidly
    • Data security and governance slow to keep up
    • IT and Operations Technology (OT) now the same
    • Increasing cascading risk – Reliance upon a limited number of hardware and software platforms, supply chains and systems
    • WFH and other changes require treating external and internal as one
  • Number and type of organizations targeted increasing
    • Increased malicious users – High return versus low odds of getting caught and lack of serious penalties
    • Number of players, level of sophistication and threat landscape changing constantly
    • Frequency of cyber attacks and size of damage growing
  • "Next normal" changing how workforce, customers, supply chain, channel partners, and peers will work together
    • 3rd & 4th party risk + Supply chain attack increasing
  • Increasing policy, legislation, regulations, disclosure, audit and compliance requirements
    • Obtaining and maintaining compliance is very inefficient
    • Threat intelligence and security analytics becoming mandatory
  • Business Email Compromise (BEC)
    • Phishing e-mail → voice
      • Bespoke Ransomware 
      • Targeted and cloud focused
      • Ransom , IP theft + blackmail
      • Average $300K ransom for small businesses
  • AI changing the attack landscape
    • Attackers utilizing ML/AI to improve and tailor their attacks
    • Deepfakes 
      • Deepfakes-as-a-Service
      • Synthetic identities (ie., voice of CEO)
  • Technical limitation
    • Testing and verify security is increasingly difficult
    • “Indicators of compromise” evolving to “indicators of behavior”
  • Data security needs increasing
    • Secure all data in-flight, in-motion and at-rest
    • Secure both structured and unstructured
    • Persistent and file-less threats increasing
  • Governments don’t want to…
    • Pursue or retaliate against foreign hackers
    • Create a moral hazard by assuming too much responsibility
  • Intelligence, military and LEO
    • Want to harness vulnerabilities versus eliminating them
    • Weapons grade cyber attack tools - Leaked/stolen tools from national cyber weapon arsenals repurposed for anyone to use

Threat Actors

Insider Threats

  • Malicious intent can be motivated by emotional backlash, financial benefit, political ideology or a combination of factors
  • Unintentional threat due to lack of understanding or misplaced technology

Competitors

  • Motivated by financial gains
  • Seek Information research data and intellectual property
  • Exploit for strategic market advantage

"Script Kiddies"

  • Motivated by making names for themselves
  • Usually unskilled but rely on pre-made exploit programs (“scripts”) to attack networks or deface websites

Hacktivists

  • Motivated by ideological activism
  • Bring awareness to a cause (political, economic, social)
  • Exploit to compromise confidentiality, integrity or resilience

Organized Crime

  • Motivated by financial gain and power
  • Exploit and extort organizations to access and monetize personal, financial, or health data

Cyber Terrorists

  • Motivated by malicious intent to gain support for and deter opposition to a cause
  • Attack and damage reputation, inspire fear or threaten harm to force a political change

State-Sponsored Actors

  • Motivated by interests of nation-states
  • Receive direction, funding, technical assistance
  • Highly sophisticated often targeted and persistent

In the News

  • Companies Name One of the Biggest Cybersecurity Threats: Their Employees
  • The Industries Most Vulnerable to Cyberattacks—and Why

Contact us to keep up with the latest in cybersecurity

Cybersecurity Trends

  • Cybersecurity Today
  • Corporations
  • Executives
  • Compliance
  • Benefits
  • Strategy
  • Security by Design
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close