Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Fill the Gap to Connect Dot, the Cyber Intelligence


Affiliations
1 SME - Information & Cyber Security, Barclays Investment Bank, United States
     

   Subscribe/Renew Journal


As we all are aware of from the recent headlines, hackers routinely steal intellectual property, privileged information, financial data, social security numbers, email addresses - which they sell on the black market for obscene profits and not the last but least costly ransomware attack. In 2020, more than 550 security breaches were reported to the U.S. Privacy Rights Clearinghouse, and 1.1 billion individual records were compromised or stolen since 2005 [1]. Regardless of their industry vertical or scale most organizations are vulnerable to cyber attacks, and yet continue to gamble with their reputations because they are not taking cyber security seriously. It is just a matter of time before they join the countless other firms who have suffered embarrassing and costly privacy and security breaches due to weak process or lack of visibility. Because cyber threats and vulnerabilities constantly evolve, many organizations may not be as effective at managing the associated risk as they might be in managing risk in other areas of the business. Cyber threats are on the rise and growing exponentially in complexity, at the same time, the economy is forcing organizations to drive down their operational costs while still maintaining an aggressive, productive and agile business model.

Keywords

Cyber security, DDOS attack, Incident response, Security awareness, Threat management.
Subscription Login to verify subscription
User
Notifications
Font Size


  • R. A. Clarke, Cyber War: The Next Threat to the National Security. ISBN: 978-0-06-196224-0. [Online]. Available: https://privacyrights.org/
  • NISTIR 8286 - Enterprise Risk Management paper. [Online]. Available: https://csrc.nist.gov/publications/detail/nistir/8286/final
  • Transformation Cyber Security - Digital McKinsey and Global Risk Practice, Mar. 2019, p. 56. [Online]. Available: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashx
  • P. Foreman, Vulnerability Management. ISBN: 1439801509. pp. 103-125. [Online]. Available: https://csrc.nist.gov/glossary/term/vulnerability_ management
  • ISC2, Cyberedge Group - 2022 Cyberthreat Defense Report.
  • C. McNab, Network Security Assessment, 3rd ed. ISBN: 9781491910955. O’Reilly Media, Inc., pp. 92-110.
  • J. R. Vacca, Network and Security System. ISBN: 978-0-12-416689-9. Steven Elliot, pp. 21-73.
  • https://cybersecurity.att.com/blogs/security-essentials/incident-response-steps-comparison-guide
  • https://www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml
  • NIKSUN NetVCR & NetOmni datasheet.

Abstract Views: 185

PDF Views: 0




  • Fill the Gap to Connect Dot, the Cyber Intelligence

Abstract Views: 185  |  PDF Views: 0

Authors

Vinit Thakur
SME - Information & Cyber Security, Barclays Investment Bank, United States

Abstract


As we all are aware of from the recent headlines, hackers routinely steal intellectual property, privileged information, financial data, social security numbers, email addresses - which they sell on the black market for obscene profits and not the last but least costly ransomware attack. In 2020, more than 550 security breaches were reported to the U.S. Privacy Rights Clearinghouse, and 1.1 billion individual records were compromised or stolen since 2005 [1]. Regardless of their industry vertical or scale most organizations are vulnerable to cyber attacks, and yet continue to gamble with their reputations because they are not taking cyber security seriously. It is just a matter of time before they join the countless other firms who have suffered embarrassing and costly privacy and security breaches due to weak process or lack of visibility. Because cyber threats and vulnerabilities constantly evolve, many organizations may not be as effective at managing the associated risk as they might be in managing risk in other areas of the business. Cyber threats are on the rise and growing exponentially in complexity, at the same time, the economy is forcing organizations to drive down their operational costs while still maintaining an aggressive, productive and agile business model.

Keywords


Cyber security, DDOS attack, Incident response, Security awareness, Threat management.

References