Page 25 - Cyber Warnings
P. 25
BRI derived from the Deep & Dark Web was developed to better serve organizations’
diverse needs by addressing a gap in the cyber intelligence market. This gap emerged
years ago after cyber intelligence’s role as a fundamental necessity was initially
established within corporate America under the recognized label of Cyber Threat
Intelligence (CTI). The CTI function facilitates a highly-reactive approach to security, as
it is largely anchored across industry verticals by way of Indicators of Compromise
(IoCs).
It’s important to note that since CTI was developed solely to serve cybersecurity teams,
it does little to support other business functions — many of which would otherwise
benefit from Deep & Dark Web intelligence. Consequently, cybersecurity teams have
typically been the only function to reap the benefits afforded by Deep & Dark Web
intelligence — up until the adoption of BRI, that is.
BRI’s widespread versatility enables organizations to not only bolster cybersecurity but
also confront fraud, detect insider threats, enhance physical security, assess M&A
opportunities, and address vendor risk and supply chain integrity. BRI provides the agile
intelligence necessary to foster interdepartmental risk evaluations, help protect digital
infrastructure, map threats to critical assets, reveal threats to supply chain management
and identify physical security and business travel risks.
Organizations with robust BRI programs have successfully gained an increased
understanding of the impact, relevancy and corresponding business risks from malicious
insiders, hacktivist groups, nation state and cyber threat actors, and radical jihadists.
Given the mounting difficulties many organizations face in navigating a volatile threat
landscape, BRI’s cross-functional, comprehensive approach to intelligence has now
become a requirement. As current economic, political, cultural, and technological
externalities continue to create challenges across the enterprise, these same
externalities have fostered an environment where threat actors thrive and their exploits
become more sophisticated — thereby posing greater risks to organizations.
Such risks stem from our growing susceptibility to damages from attacks against critical
infrastructure, global financial networks, and other elaborate exploits that undermine
society’s safety and confidence in trusted large-scale systems and establishments.
Since such attacks can threaten all business functions across an organization, effective
mitigation strategies should evidently involve collaboration from all business functions,
which BRI facilitates.
25 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide