One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2901455
Date de publication 2021-06-10 10:00:00 (vue: 2021-06-10 10:05:43)
Titre Threat Intelligence and Energy and Utilities
Texte This is the second in a blog series dedicated to the energy and utility industries. Read the first blog in the series here. Introduction It is increasingly common to hear about cyber threats to energy and utility industries. These are malicious acts by adversaries that target our data, intellectual property, or other digital assets. All too often it seems as though energy and utility companies are put in a defensive position to battle it out with these cyber intruders. How can the industry switch to a more offensive position when it comes to understanding these threats? Threat intelligence is a way to make sure your cybersecurity teams can minimize the impact of a threat against your assets. Let’s take a look at how threat intelligence can be an effective source of information for energy and utilities. What is threat intelligence? If you have an adversary threatening your system, it is a good idea to learn who they are, why they want to attack you, and where they are most likely to attack. You also want to know if they have ever been undetected on your network or in your applications, if they are currently there, or if it is likely they will try to breach your business. Threat intelligence is a way to collect that information and make informed and data-driven decisions on how to prepare for an attack, prevent an attack, and identify cyber threats. All of this helps to make your business more resilient so you can remain operational during and after a cyber incident, with a goal of every cyber incident not being catastrophic. Who uses threat intelligence? Cybersecurity is a business enabler. And, having insight into the psyche and rationale of those who want to inflict harm on your business is a good idea for a variety of stakeholders. Albeit, the technical details for each stakeholder will vary. Users of threat intelligence for energy and utility companies may include: SOC analysts IT analysts IT operations teams Incident response teams Development and quality assurance teams C-suites including CISO Boards of Directors Executives use threat intelligence to understand business risk, communicate with functional team leaders, and quickly deploy funding where appropriate to manage threats or bring on experts to assist. Practitioners use threat intelligence to help set priorities in managing threats, identify vulnerabilities, and act proactively. Threat intelligence data is useful and beneficial beyond the team of cybersecurity professionals. Effective use of threat intelligence helps to remove often deeply engrained silos in organizations.  How can energy and utilities benefit from threat intelligence? Think of threat intelligence as the data that helps to inform the decisions in managing the risk an organization is willing to take. Organizations can create their own threat intelligence feeds or purchase a feed specific to their vertical market or geographic location. Automating threat intelligence helps reduce human error, increases fidelity through pattern matching, and delivers results more quickly. Using automated threat intelligence means the right stakeholders can receive relevant and actionable information more quickly. Overall, threat intelligence can help energy and utility organizations: Prevent catastrophic disruptions to services Reduce costs associated with the impact of a breach Reduce the risk of a cyber incident to steal data Increase collaboration and cross-functional work of the IT, development, security, and the rest of the organization With the increase in numbers and growing determination of cyber adversaries, energy and utility organizations need to be more resi
Envoyé Oui
Condensat about act actionable acts adversaries adversary after against ahead albeit alien all also analysts applications appropriate are assets assist associated assurance at&t attack automated automating battle been being beneficial benefit beyond blog boards breach bring business can catastrophic ciso collaboration collect comes common communicate companies company costs create cross currently cyber cybersecurity data decisions dedicated deeply defensive deliver delivers deploy details determination development digital directors disruptions driven during each effective efficient enabler energy engrained error ever every executives experts feed feeds fidelity first from functional funding geographic goal going good growing harm have having hear help helps here how human idea identify impact incident include: includes including increase increases increasingly industries industry inflict inform information informed inside insight intellectual intelligence introduction intruders know labs leaders learn let’s likely location look make malicious manage managing market matching may means minimize more most need network not numbers offensive often operational operations organization organizations organizations: other out overall own part pattern please position practitioners prepare prevent priorities proactive proactively professionals property psyche purchase put quality quickly rationale read receive reduce relevant remain remove resiliency resilient response rest results right risk second security seems series services set silos smart soc source specific stakeholder stakeholders stay steal suites sure switch system systems take target team teams technical these think those though threat threatening threats through too try understand understanding undetected unit use useful users uses using utilities utility variety vary vertical visit vulnerabilities want way what when where who why will willing work your
Tags Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: