Blogs

From cybersecurity to enterprise security: Intelligence is the key

Market Segment Manager, IBM

Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.—General Sun Tzu

Securing and protecting your organization requires a comprehensive understanding of both your vulnerabilities and your threats—from cyber crimes to physical crimes, fraud, insider threats and more. Reciprocally, effective attacks take advantage of opportunities and the element of surprise. This holistic approach to offensive defense is one that many commercial organizations are now adopting, especially as opportunistic threat actors, cyber criminals, hactivists and terrorists continue to set their sights on commercial organizations for financial gain or retribution. And financial organizations are leading the way with the adoption of fusion centers.

Break down silos and share information

A fusion center was initially a concept developed by the intelligence community in response to events such as the September 11 attacks in 2001. A fusion center was devised on the concept that information sharing among national security and law enforcement agencies would create a more comprehensive understanding of cyber threats, thereby enabling more effective and efficient responses to those threats.

Today, as commercial and civilian organizations see their threatscape evolve, they too can naturally benefit from a more inclusive understanding of threats against them. Such an understanding breaks down internal silos and facilitates information sharing with law enforcement, when appropriate or necessary—particularly as the lines between national security and commercial security continue to blur.

Using enterprise intelligence to protect your organization

Face it, gone are the days when your competition, or even cybersecurity, was your only concern. Today, executives are being targeted by terrorist networks for removing their propaganda on social media sites. In 2014, 55 percent of all attacks were carried out by either malicious insiders or inadvertent actors. Intellectual property needs to be protected from both corporate and industrial espionage. Malware, cyber attacks, breaches and system abuse are all tactics that can be employed to carry out these criminal strategies, and those tactics are often—and unfortunately—enabled by the interconnected world.

One way organizations can stay in front of these criminal strategies and tactics is by continuously monitoring and analyzing relevant and disparate data sets, so they can stay on top of both their vulnerabilities and threats. This process of enterprise intelligence is essentially what financial fusion centers do. Regardless of whether you have a fusion center in place, however, this process can be facilitated with the right intelligence analysis solution.

How well do you know your threats? Register for IBM i2 Summit for a Safer Planet 2016, 30–31 August 2016, in Washington, DC, and learn how your organization can get ahead of enterprise and cybersecurity threats.

Counter and mitigate enterprise threats