Cyber Intelligence-Driven Risk
eBook - ePub

Cyber Intelligence-Driven Risk

How to Build and Use Cyber Intelligence for Business Risk Decisions

Richard O. Moore

Condividi libro
  1. English
  2. ePUB (disponibile sull'app)
  3. Disponibile su iOS e Android
eBook - ePub

Cyber Intelligence-Driven Risk

How to Build and Use Cyber Intelligence for Business Risk Decisions

Richard O. Moore

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events

Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?

In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.

Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to:

  • Building, buying, or outsourcing a cyber intelligence–driven risk program
  • Understanding the functional capabilities needed to sustain the program
  • Using cyber intelligence to support Enterprise Risk Management
  • Reducing loss from cyber events by building new organizational capacities
  • Supporting mergers and acquisitions with predictive analytics

Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Cyber Intelligence-Driven Risk è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Cyber Intelligence-Driven Risk di Richard O. Moore in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Betriebswirtschaft e IT-Industrie. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Editore
Wiley
Anno
2020
ISBN
9781119676898
Edizione
1
Categoria
IT-Industrie

CHAPTER 1
Objectives of a Cyber Intelligence-Driven Risk Program

Knowledge must become capability.
– Carl von Clausewitz, Prussian general
ANY FRAMEWORK, methodology, or process has to have objectives and outcomes. The CI-DR™ program strives to achieve two objectives. First, the program provides accurate, timely, and relevant knowledge about cyber adversaries and the digital environment in which it operates. Adversaries within the cyber ecosystem are internal or external. An internal cyber adversary could be an employee, contractor, or someone with an objective and the physical or logical access to information otherwise not known to the public. External cyber adversaries include malicious actors, nation-states, competitors, or even outsourced platforms or processing environments and those employed or influenced there.
To achieve the first objective of the CI-DR program, there are four tasks that are required to be performed. First, the program must evaluate the existing cyber conditions, cyber risks, and potential operational losses from cyber events and incidents while taking into account the many internal or external adversarial capabilities holistically. Second, based on existing cyber conditions and cyber capabilities, the program estimates possible cyber adversarial courses of action and provides insight into possible future actions. Third, the program aids in identifying vulnerabilities that could be exploited by adversaries and the operational impact it can have on the organization. Fourth, the program and the “knowledge” created assists in the development and evaluation of the organization's courses of action for decisions based on the first three tasks.
The second objective of the CI-DR program is to protect organizations, through cyber counterintelligence activities, intending to deny adversaries valuable information about an organization's situation. These two objectives demonstrate how the CI-DR cyber risk programs support both the exploitative and protective elements necessary to operate in today's digital economy and infrastructure. The program aims to create timely and meaningful images of the situation confronting the decision-maker. CI-DR is the analysis and synthesis of information into knowledge. CI-DR cyber intelligence is “knowledge” that is distinguished from information or data, in that few pieces of information speak for themselves conclusively but must be combined and compared with other pieces of information, analyzed, evaluated, and given meaning.1 Good cyber intelligence does not simply repeat the information that a source may reveal. Rather, it develops this raw material in order to tell us what that information means and identifies the implications for decision-making.2
The two objectives of the CI-DR program are created with simplicity that establishes the boundaries for how the program will operate and the areas in which it will collect information to provide value back to the organization's decision-makers. Additionally, the objectives provide executives and directors with a high-level understanding about what the program goals are, how they can be leveraged, and how they are connected with business leadership, and ultimately what analysis can be expected to support business objectives. The four tasks associated with the first objective provides the initial measurement of whether the options available are feasible or risky. To be able to describe a complete intelligence picture that provides us everything we need to know about a given situation, we would need that description to include knowledge of established conditions that have existed in the past, unfolding conditions as they exist in the present, and conditions which may exist in the future. Our complete image of what has been, what is, and what might be provides us with two classes of intelligence. The first is descriptive cyber intelligence, which describes existing and previously existing conditions. The second class, which attempts to anticipate future possibilities and probabilities, is estimative cyber intelligence.3 This initial measurement does not have to be exact or futuristic, and doesn't have to be either qualitative or quantitative. What it does have to be is factual, and without bias or opinion, specifically when leadership is expecting intelligence and options on a particular subject.
Our CI-DR example for this chapter shows how the frame can support a business decision. Suppose a business leader wants to move an application from the organization's on-premises location to having it hosted at an outsourced provider (i.e. software as a service, platform as a service, or infrastructure as a service). The CI-DR program would begin with the analysis and collection of risk information from the current cyber environment as the baseline. A question would be posed to the team by the business leader, such as: “Is it safer to move existing system from on-premises to an externally hosted provider?” Additionally, the CI-DR program would collect and ingest into the CI-DR's cyber intelligence life cycle–specific information, cyber risks, vulnerabilities, cyber threats, costs, regulatory issues, and other relevant information to analyze and evaluate the various options where the leader wants to move the application. The result for this example could provide two or three options for providers and their risk ratings from a cyber intelligence perspective; they would also incorporate those ratings with the financial review of the provider, giving the business decision-maker the impact, risks, and profit or loss financial information for their review. The business leader is now able make better informed decisions about the outcome of their course of action, and to articulate and defend their position to senior leadership or the board of directors. The CI-DR program is not a stand-alone program. Discussed in the upcoming chapters, the program must have the right capabilities and resources available to evaluate the information collected and analyzed, with the ability to provide risks, options, and decision structures that can be generated for any consumer or leader within the organization. The decisions could be as simple as a “go or no-go” comparison chart or as complicated as total costs of ownership, potential losses, potential savings, or increased revenues, all with cyber risks included.
The second objective is not overly difficult to implement, but many U.S. commercial businesses are not as familiar with this approach as would military commanders be and maybe a few foreign countries that leverage cyber counterintelligence methods regularly. We can recall from our denial-of-service attack example against the banks in the Introduction that some organizations did leverage cyber counterintelligence and cyber deception methods to move the attacker's mindset into thinking they crippled the bank, thereby having them focus and move on to other targets while the banks resumed operations and returned to online activities that same day. Additionally, while U.S. businesses do protect their information from cyber adversaries in more traditional approaches, the cyber counterintelligence objective is a new concept for many businesses, except for a few of the Fortune 100 organizations.
Within the CI-DR functions and capabilities the cyber counterintelligence capability can be used within commercial businesses for mergers and acquisitions, for protecting information systems security strategies, or as part of the overall use of deception technologies or information to gain advantages in proactively identifying what cyber adversaries might be searching for within your networks. Organizations can test their cyber deceptive capabilities through tasks such as “red-teaming” activities. Red-teaming is usually performed by external organizations with the overall objective of gaining access to your facilities, systems, and data, and reporting on physical and digital compromises. The deceptive technologies are useful in validating those activities, as they could lead the testing team to encounter the deception systems and give them false information. Implementing the cyber counterintelligence portion of the CI-DR program will assist organizations in determining reconnaissance activities from adversaries, and assist with appropriate business or technology strategies to counter known cyber adversarial techniques, technologies, and processes. Organizations are performing some type of counterintelligence activity all the time, through marketing, delaying of products based on market research, keeping startups in “stealth,” or by controlling access and release of information about their strategy or business processes. The counterintelligence activities are there, but the term or rational connection to that term has not been formally used for cyber activities. We are asking the reader to accept that the CI-DR cyber counterintelligence–type practices are occurring in organizations and to accept our usage of the term as not just a military action or function.
For example, passive cyber counterintelligence measures are designed to conceal, deceive, and deny information to adversaries, whether internal or external. Many businesses today do this by creating shared folders or locations where access is restricted to certain individuals. These folders are created by thinking about the content, the sensitivity, or the regulatory requirements to keep them separate to a select few. However, many businesses have missed the key components of restricting that information by not implementing either concealment or deceptive tactics to protect, restrict, and identify who may be trying to access the information, thereby usually providing a false sense of protection.
Another key objective for formally recognizing and having cyber counterintelligence as part of the CI-DR program is to protect personnel from subversion and acts of hostilities. Again, many organizations have travel security programs for executives and key personnel, implement phishing training and education, have evacuation drills, and provide some type of education for active shooters, etc., but again do not formally embrace the counterintelligence benefit or create formal counterintelligence objectives. An easy formal objective of using counterintelligence could be to protect facilities (i.e. removing signs for data centers or key processing facilities, etc.) and material against sabotage (internal, external, or even competitors). The full measures of counterintelligence can include security of restricted material, personnel security, physical security, security education, communications security, data security, electromagnetic emission security (i.e. Bluetooth, Wi-Fi, NFC, Bonjour, etc.), and censorship.4 The overlooked counterintelligence objective can be useful and provide value to industries such as financial services, manufacturing, utilities, pharmaceuticals, insurance, social media, and many others that are often overlooked as critical infrastructure or social services.
Another key concept we want the reader to understand is that a CI-DR program should not be thought of just as a product, but also as the processes which produce specific needed knowledge in order to make better business decisions. Process activities and capabilities are driven by the need to answer questions that are crucial to both the tactical and strategic interests of the organization or to meet business objectives. A CI-DR program operates in an environment characterized by uncertainty and with it risks that must be understood and reduced by the decision-makers.

NOTES

  1. Cyber counterintelligence is a key objective for organizations to have and is built into the CI-DR framework.
  2. Using this book can help with building guidelines to help you create a CI-DR program tailored to your organization and help build its charter and boundaries.
  3. It is important to identify the formal boundaries for a CI-DR program due to all the interconnective functions and collection methods that a CI-DR program can touch.
  4. Organizations and individuals should consider cyber counterintelligence and cyber deception programs if they already have a mature cybersecurity strategy aligned with business objectives.
  5. Cyber counterintelligence programs can be tasked with identifying faint digital signals being used in your organization to view information that has been deemed sensitive.
  6. A CI-DR program with all...

Indice dei contenuti