Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

Similar documents
Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Combating Cyber Risk in the Supply Chain

Cybersecurity The Evolving Landscape

Governance Ideas Exchange

DeMystifying Data Breaches and Information Security Compliance

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Sage Data Security Services Directory

MITIGATE CYBER ATTACK RISK

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

What It Takes to be a CISO in 2017

Vendor Risk Management. How to Confront Third-Party Cyber Risk in Your Supply Chain

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017

Why you MUST protect your customer data

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Teradata and Protegrity High-Value Protection for High-Value Data

Take Risks in Life, Not with Your Security

Cyber Insurance: What is your bank doing to manage risk? presented by

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

ID Theft and Data Breach Mitigation

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Cybersecurity and Nonprofit

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

How Cyber-Criminals Steal and Profit from your Data

SecurityScorecard 2018 Healthcare Report. A Pulse on the Healthcare Industry's Cybersecurity Risks

Critical Security Controls. COL Stef Horvath MNARNG Oct 21, 2015

Cybersecurity in Higher Ed

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Incident Response and Cybersecurity: A View from the Boardroom

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

How to Establish Security & Privacy Due Diligence in the Cloud

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

Legal Aspects of Cybersecurity

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cyber-Threats and Countermeasures in Financial Sector

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

A practical guide to IT security

From Russia With Love

Sales Presentation Case 2018 Dell EMC

Using international standards to improve US cybersecurity

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

HEALTH CARE AND CYBER SECURITY:

mhealth SECURITY: STATS AND SOLUTIONS

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016

Cyber Threat Landscape April 2013

THE CYBERSECURITY LITERACY CONFIDENCE GAP

ISACA West Florida Chapter - Cybersecurity Event

The Impact of Cybersecurity, Data Privacy and Social Media

Cyber and data security How prepared is your charity?

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+

Cybersecurity Session IIA Conference 2018

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

THE ACCENTURE CYBER DEFENSE SOLUTION

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

A CFO s Guide to Cyber Security in the Coming Year

Protecting your next investment: The importance of cybersecurity due diligence

Legal Considerations and Case Studies

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Fraud What can you do about it?

ANATOMY OF A DATA BREACH: DEVELOPMENTS IN DATA SECURITY AND CLOUD COMPUTING LAW

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Hacking and Cyber Espionage

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Introduction to Ethical Hacking. Chapter 1

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

M&A Cyber Security Due Diligence

Cyber Risks in the Boardroom Conference

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Moving from Prevention to Detection March 2017

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

How to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

FOR FINANCIAL SERVICES ORGANIZATIONS

Defense in Depth Security in the Enterprise

Healthcare HIPAA and Cybersecurity Update

THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY

Are we breached? Deloitte's Cyber Threat Hunting

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Keep the Door Open for Users and Closed to Hackers

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

How to Improve Your. Cyber Health. Cybersecurity Ten Best Practices For a Healthy Network

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

Effective Data Security Takes More Than Just Technology

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Transcription:

Building a Business Case for Cyber Threat Intelligence 5Reasons Your Organization Needs a Risk-Based 5Approach to Cybersecurity

5 Reasons for a Risk-Based Approach to Cybersecurity The Bad Guys are Winning Target, Home Depot, Sony, Anthem, the U.S. Office of Personnel Management even the biggest organizations cannot keep themselves out of the headlines. Many of these organizations had staff and myriad cybersecurity tools in place (anti-virus, firewalls, intrusion detection systems, etc.), yet they were still breached. Clearly, the current approach is not working. Businesses cannot keep building higher walls and deploying the same technologies without the INTEL to focus on what matters most. You need cyber threat intelligence to: 1. Know the specific cyber threats targeting your business 2. Limit the impact of your data for sale on the Dark Web 3. Bring cybersecurity into the broader risk discussion 4. Be able to show due diligence in a court of law 5. Redirect your cyber tactics for the most effective defense 45% past of businesses have experienced a data breach within the two years. The Ponemon Institute

1. Security Breaches Keep Happening 0101100010110100 Even with Security Tools Cybersecurity reports have consistently painted a bleak picture for organizations. There have been 80-90 million cybersecurity events per year, or up to 250,000 attacks per day in recent years, according to The RIC Report. The expanding supply Threat Intel Helps You: Gain a complete picture of your cyber risk Focus on the most relevant cyber threats Act on threats before they impact your organization chain of vendors, partners, and technology is an increasingly exploited backdoor into organizations. It takes more than 200 days for businesses to even know they ve been breached. It s no wonder that time and time again we see long-term breaches that aren t even discovered by the compromised organization, but rather by an outside party such as law 70% go of attacks are thought to undetected. enforcement. With so many attack vectors, not to mention the ease of which cybercriminals can circumvent cybersecurity tools through social engineering, deciding where to deploy your troops can be difficult. With an intelligence-driven defense, you know what threats are coming and you can The RIC Report, Bank of America/Merrill Lynch, Oct 2015 redirect your resources to focus on what matters most.

2. Shining a Light on the Dark Web Find Your Dirty Laundry Those unfamiliar with the Dark Web tend to imagine it as something akin to the Wild West. However, markets on the Dark Web tend to work more like illicit versions of consumer friendly services such as ebay or Amazon. Cybercriminals actively sell and trade a wide variety of illegal goods and services complete with user reviews, refund policies and other forms of customer service. Users can easily purchase stolen credit cards, user accounts, credentials, reward points, intellectual property and cybercrime-as-a-service offerings, such as exploit kits, malware and phishing pages. It s sensitive, valuable information and the organizations it belongs to are often completely in the dark. Knowing what is being sold is a crucial step in both understanding what types of information criminals are after and mitigating the threat before it gets worse. Threat Intel Helps You: Understand what cybercriminals are after Discover active threats against your organization Understand your fraud footprint

3. Cybersecurity isn t a Technical Problem It s a Business Problem A data breach can cost millions, but its effects are even more widespread: CEOs lose their jobs, profits drop, customers leave, brands are damaged. Then there s the costs of incident response, customer notifications, class-action lawsuits, Threat Intel Helps You: Tie specific threats to the impact on your business Connect the server room to the board room Share cyber intel across the organization and supply chain 85% M&A of execs have major cybersecurity concerns around Activity. Global Capital Confidence Barometer Survey regulatory fines, and audits. Cybersecurity is a risk that must be managed at the board level, but business leaders are struggling, finding it hard to align security strategies with realworld business strategies (EY, Cyber Program Management, Oct 2014). There remains a gap between the language of cybersecurity and the language of business operations. A successful cyber risk management program helps close that gap by directly tying relevant cyber threats to business impact. This is crucial as cyber-attacks are the number one source of IP theft and economic attacks against governments (BoA/ Merrill Lynch). In fact, loss of Intellectual Property has grown 71% over the past 3 years according to Check Point.

4. Changing Rules for Legal Liability You re Liable for Poor Security Legal liability with regards to cybersecurity continues to evolve. In July 2015, the Seventh Circuit Court of Appeals in Remijas v. Neiman Marcus Group found that just the theft of customer financial information was enough to satisfy standing, potentially opening the door for more breach litigation or a Supreme Court ruling on the issue. In August 2015, the Third Circuit Court of Appeals in FTC v. Wyndham Hotels & Resorts confirmed that the Federal Trade Commission does have the authority to take action against companies over weak data protection standards. In addition to the FTC, organizations can see legal action from various agencies such as the Securities and Exchange Commission, the Department of Health and Human Services, and others. Organizations also have to deal with many state and federal laws regarding consumer privacy as well as evolving definitions of what are best practices and Threat Intel Helps You: Understand the most critical areas of cyber risk Identify and address gaps in your security program Show due diligence in the court of law reasonable efforts.

5. Focusing on What Matters Most A Risk-Based Approach Rather than try to stay on top of every cyber threat which may or may not even be targeting your business a risk-based approach focuses on only the threats that are relevant to your organization, your supply chain and your customers. This ensures that your cybersecurity resources can be maximized to get the most bang for your buck by addressing your top areas of cyber risk. Without threat intelligence, organizations may be blind to supply chain risks and Dark Web threats, and their efforts may be unfocused. As the UK Government Communications Headquarters Top 10 Security Steps Threat Intel Helps You: Prioritize your cyber defenses Reduce any cybersecurity blind spots Account for all aspects of business risk emphasizes, organizations need to apply the same degree of rigor to assessing cyber risk as they do to other areas such as legal, regulatory, financial or operational risk. After all, cybersecurity is not just a technical issue, but one that impacts all aspects a business. Using threat intelligence can help you gain a clearer picture of your organization s overall cyber risk.

Bridging the Cyber Threat Intelligence Gap From Tactical to Strategic Something is missing from the current state of cybersecurity. Security is often stuck at the network level and risks aren t elevated to understand the impact on the business. Threat intelligence can help bridge this gap between low-level tactics and strategic insights, so you can protect your business and your customers information to help your organization: 1. Know the specific cyber threats targeting your business 2. Limit the impact of your data for sale on the Dark Web 3. Bring cybersecurity into the broader risk discussion 4. Be able to show due diligence in a court of law 5. Redirect your cyber tactics for the most effective defense When it comes to data breaches, it s no longer a matter of if, it s only a question of when. Be prepared and reduce your risk with cyber threat intelligence. Download the How to Choose a Threat Intelligence Vendor ebook Lean more about choosing the right vendor to implement threat intelligence with our complimentary ebook. Schedule a Demo of SurfWatch Cyber Advisor SurfWatch Cyber Advisor provides you with an immediate threat intelligence operation that ensures the best defense.

ABOUT SURFWATCH LABS 45610 WOODLAND ROAD, SUITE 350 STERLING, VA 20166 PHONE: 866.855.5444 INFO@SURFWATCHLABS.COM WWW.SURFWATCHLABS.COM SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. Founded in 2013 by former US Government intelligence analysts, SurfWatch Labs solutions provide a 360-degree view of cyber threats in the context of your business, along with practical and personalized support to create immediate insights and meaningful action.