FINAL WORD
carefully. Companies should look to suppliers
that have access to intelligence based on a
broad sweep of data traffic that’s cross-
checked with other sources – this will provide
a well-rounded view. For example, at Verizon,
we cross-reference data from our global IP
network and our Managed Security Services
engine with intelligence gleaned from over
a decade of analysis from our DBIR series
– this enables us to offer our customers a
treasure trove of cyberintelligence which is
hard to beat.
Enhance visibility of the cyber-risks
out there
Ali Neil, Director of International Security
Solutions at Verizon
to proactively help them take on
cybercriminals and lessen the impact of a
cyberattack. Cyber intelligence will be used
in more meaningful ways this year and
be recognised as the catalyst for greater
proactive threat hunting and security
awareness within the business. Utilising this
‘intelligence posture’ will enable companies
to look under the covers of cybercrime and
hunt threats earlier in the game, increasing
detection speeds and response for more
timely containment of threats.
However, selecting the correct intelligence
partner is key – so consider this decision
86
INTELLIGENTCIO
Research also shows that 90% of board
members do not understand the cyber-risk
profile of their business and considering
today’s changing threat landscape, this
leaves many business vulnerable to cyber
dangers. Preventing and responding to
cyber-risks requires real-time visibility on the
real-time cyber environment.
Verizon Risk Report is an information
framework that is designed to introduce
businesses to the concept of viewing their
own security posture – an outward and
inward valuation of cyber-risk. CIOs making
a business or purchasing decision can use
this dynamic snapshot of their risk profile to
adapt their security posture in real-time to
address any identified gaps.
We will see this type of solution become
more sophisticated as the year continues.
More value-add partners will be introduced
so that these frameworks can embrace
threat analysis from varying perspectives to
deliver an even fuller view of the cyber-threat
environment for customers.
Look for a strategic partner, not a
transactional supplier
With new technologies disrupting traditional
business models, we also can’t expect the
supplier relationships of the past to remain
unchanged. A rethink is required. Security
has changed – it is no longer simply about
boxes, solutions and products, but rather
intelligence, insight and consultancy. It is
no longer a one-off or monthly transaction,
but rather an ongoing journey that needs to
adapt as cyberthreats evolve, technologies
develop and business needs change.
Businesses need to align themselves with a
security strategy partner who understands
this shift and recognises the need to grow
alongside their customers.
Strategic partners will unite unique
combinations of technology know-how,
professional service expertise and global
service model, to make real-time security
a reality, optimising security operations to
work in a real-time environment and beyond
the traditional security perimeter. They
will be able to pull cyber response teams
together when required and run to the cyber
crisis to get it under control and resolved
quickly and efficiently. n
www.intelligentcio.com