Get Your Cyber Security Plan In Place Now

As many more businesses are moving online as part of the process of digital transformation, so cyber crime like data theft, phishing emails and ransomware is increasing. Furthermore, the COVID-19 pandemic has pushed many  businesses with immature IT and security processes online and into the cloud, where they sometimes make mistakes that can leave them victim to criminal hacking groups. 

The cyber security industry has reached a critical point with the increasing sophistication of cyber criminals.A strong cyber threat intelligence strategy and planning program is more relevant than ever to all organisations and now is the time to plan your cyber strategy for 2021. 

In the 2020 annual SANS Cyber Threat Intelligence Survey  about 50% of respondents reported having a dedicated team of employees focused on cyber threat intelligence. Nearly 61% said they relied on a mix of in-house personnel and third-party providers to fulfill their threat intelligence needs, up from 54% a year ago, while a small slice, about 8%, said a single employee was assigned to the task.

Despite increased perceptions about the value of cyber threat intelligence, many businesses and industries with less mature security programs still struggle to define what it actually means to them, which capabilities to incorporate, and how to do the ground level planning necessary to support the telemetry and technological tools they put in place.

Part of the reason some businesses can struggle to incorporate cyber threat intelligence is because the  term itself is widely misunderstood. While there are certain fundamental issues, like monitoring one’s own internal telemetry for malicious behavior, the phrase is often used as a collective term of quite different tools, processes and analyses that can be used to track and respond to security threats.

Much of the business world is still grappling with how cyber security has become vital to the integrity of their operations. 

For a business to determine which slices they might need requires documentation, gathering intelligence requirements and engaging with various stakeholders throughout the organisation. The SANS 2020 survey found some progress along this front, with 43% of respondents reporting that they have taken steps to formally document their intelligence requirements, up from just 30% who said the same a year ago. Scoping out those requirements in human terms is important.

The reality is that while some cyber security threats and defensive capabilities are universal, the vast majority of organisations will derive value from just a small fraction of threat intelligence activities.

As cyber security becomes a strategic priority, the CISO role needs to evolve to match its influence within an organisation. 
In some PWC research it was shown that more than a quarter (27%) of UK organisations said the CISO's primary role should be as a transformational leader. This compares to 20% among global respondents. 

The transformational CISO needs the ability to lead cross-functional teams to create agile, forward-thinking security operations that can support an organisation's strategic transformation goals. In contrast, just 15% of UK respondents said the CISO should primarily be an operational leader and master tactician compared to 20% globally.

SANS:         PWC:          SC Magazine:        Cyber Leaders Unite:       Image: Unsplash

For help with your cyber planning strategy please contact Cyber Security Intelligence for advice and recommendations on defining an effective Cyber Strategy Plan.

You Might Also Read: 

Critical Cyber Security Threats & Solutions For Business:

 

« 5G Will Disrupt Cyber Security
British Parliament Wakes Up To Huawei »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Cyberspatial

Cyberspatial

Cyberspatial Teleseer - Discover and map your network in minutes. Next-gen packet analysis and network visualization. All from your web browser.