In this era of rapidly escalating cyber attacks, companies need to protect themselves with a solid risk management strategy. This ebook, based on the latest ZDNet/TechRepublic special feature
, offers a detailed look at how to build policies to protect your critical digital assets. From the ebook:
In 2017, as in previous years, cybersecurity incidents made the news on a regular basis: Equifax, Verizon, Shadow Brokers, WannaCry, NotPetya, Bad Rabbit, Uber (a covered-up 2016 hack, admitted in 2017)...the list goes on. Already in 2018 we’ve seen the Meltdown/Spectre CPU vulnerabilities and a huge row over the governance and usage of Facebook data. Beneath these headlining cyber-incidents is a continuous background level of activity that is the inevitable result of organisations failing to monitor and protect their networks, and of users neglecting basic security hygiene.
How should businesses respond to the clear, present and ever-evolving threat of cyber-attack? Completely locking down their IT systems isn’t an option, but neither is complacency. Vulnerabilities will almost inevitably be discovered and exploited, and once security breaches have happened they’re usually expensive and time-consuming to remediate, often resulting in lasting damage to the victim’s reputation and bottom line.
The trick is to work out the attacks you’re most likely to face, guard against them to the best of your ability, and review this process regularly. Where to start? Well, no military commander would charge headlong into battle without a clear strategic picture of the conflict, and the same applies in the cyber theatre. That’s where business risk intelligence (BRI), or cyber threat intelligence (CTI), comes in.