Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Contact Us
Terms and Conditions
Skip main navigation (Press Enter).
Toggle navigation
Home
Communities
Connect
The Inner Circle
Communities
Directory
Learn
Certificates & Trainings
Cloudbytes Webinars
Blog
Videos
Cloud Security
Zero Trust
Technology Maps
Cloud Security Map
Zero Trust Map
Engage
Volunteer
Opportunities
Events
The Inner Circle
View Only
Community Home
Discussion
4.8K
Library
1.2K
Events
0
Members
29.2K
Back to discussions
Expand all
|
Collapse all
Threat intelligence and Risk Management
1.
Threat intelligence and Risk Management
Like
Raquel Fabiani TOUOYEM
Posted Aug 30, 2024 11:26:00 AM
Reply
Reply Privately
Options Dropdown
I'll like to introduce this very first series on Threat Intelligence by a commonly asked question: in your opinion, how long would it take your incident response team to detect and contain a compromission or data leak?
According to
the 2023
IBM Security
report on the Cost of a Data Breach, it's take around 240 (8 𝐦𝐨𝐧𝐭𝐡𝐬) days to identify and contain a breach by the internal team, and this can time set can grow up to 320 days when the breach is disclosed by an attacker, which is quite huge.
This is where Threat intelligence come in action, and you can leverage it to understand several aspects of your threat environment (identification of vulnerabilities, nature of threats...) and tailor solutions to match your risk appetite.
So here are the building blocks of Threat intelligence in Risk Management:
- 𝐅𝐫𝐚𝐦𝐞: Threat intelligence helps you to understand the direction and operations needed to perform your Risk Management.
- 𝐀𝐬𝐬𝐞𝐬𝐬: you can use Threat Intelligence to identify, assess and track potential threats and vulnerabilities.
- 𝐑𝐞𝐬𝐩𝐨𝐧𝐝: you can use Threat Intelligence to evaluate and implement courses of action to take after th risk identification.
- 𝐌𝐨𝐧𝐢𝐭𝐨𝐫: you can use Threat Intelligence to monitor the threat changes and provide a strong support to your security decisions and practices.
Afficher la traduction
Activez pour voir l'image en plus grand.
------------------------------
Raquel Fabiani TOUOYEM
Cybersecurity Architect
Credit Agricole
------------------------------
×
New Best Answer
This thread already has a best answer. Would you like to mark this message as the new best answer?
Privacy Notice
|
Terms & Conditions
Copyright 2025. All rights reserved.
Powered by Higher Logic