Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Five People Who Can Benefit from Thinking about Intelligence Differently

Business Risk Intelligence (BRI) Expands the Scope of Intelligence Beyond Technical Indicators

Business Risk Intelligence (BRI) Expands the Scope of Intelligence Beyond Technical Indicators

Threats that originate on the Internet but can result in damage across the entire enterprise have become an all-too-familiar phenomenon in recent years. Indeed, the days of cybersecurity issues that solely impact cybersecurity teams are far behind us — a fact that is further solidified by the industry-wide shift away from indicator-centric cyber threat intelligence (CTI) and towards the more strategic, cross-functional nature of Business Risk Intelligence (BRI). BRI not only transcends the boundaries of CTI use cases, it necessitates a change in how all business units and, more specifically, decision-makers, perceive the value and function of intelligence.

As leaders of business units to which BRI can provide immense value, the following five decision-makers in particular can avail themselves of a broader  approach to intelligence: 

VP of Fraud

Fraud remains one of the most persistent and multifaceted threats facing transactional lines of business. Although CTI can help VPs of Fraud to pinpoint the existence of some fraudulent schemes — particularly ones involving malware and/or technical vulnerabilities — those who rely on CTI as their sole source of intelligence may struggle to address more complex instances of fraud proactively. Often referred to as the “whack-a-mole” approach, reacting to fraud in the aftermath is highly inefficient yet relatively common as fraudsters continue to develop new tactics capable of bypassing even the most robust anti-fraud controls.

Indeed, the most effective way to address fraud is to gain visibility into schemes that are still in the planning stages. Gleaned from communities in the Deep & Dark Web where fraudsters congregate and develop these schemes, BRI helps VPs of Fraud to:

 Identify fraudulent schemes and track emerging trends before the damage is done

 Inform countermeasures and anti-fraud controls to mitigate fraud risks proactively

Advertisement. Scroll to continue reading.

 Enhance the efficiency, productivity, and capabilities of anti-fraud teams

Head of Physical Security

The Head of Physical Security’s role has only grown more complex in recent years amid the mounting entanglement of the cyber and physical threat landscapes. Unlike various other roles, Heads of Physical Security tend to have less exposure to CTI because it does not address physical assets — even when a physical threat (or indicator thereof) originates on the Internet. BRI, on the other hand, was designed specifically to help organizations address a full spectrum of cyber and physical risks. 

As physical adversaries continue to leverage the Deep & Dark Web to plot schemes ranging from terrorist attacks and executive kidnappings to large-scale compromises of energy and healthcare infrastructure, BRI has become a must-have. 

Heads of Physical Security who leverage BRI can:

• Obtain advance visibility into physical threats to employees, physical assets, and physical infrastructure

• Evaluate the credibility, relevancy, and motivations of physical threat actors to prioritize resources and personnel effectively 

• Develop and inform physical security policies to uphold standards of physical safety 

VP of Business Development

By nature, business development initiatives expand the surface area upon which a threat and/or vulnerability can manifest. For VPs of Business Development who routinely establish and develop external partnerships and/or pursue M&A engagements, due diligence on target companies is essential. While CTI is typically far removed from business development efforts, BRI can and does play an integral role in business development due diligence.

After all, any unknowns pertaining to a target company’s finances, reputation, strategy, liabilities, or compliance could hinder the success of any business development engagement. Given that an abundance of such unknowns exist in the form of threats emerging from the Deep & Dark Web, gaining visibility into these online regions is crucial. BRI not only provides such visibility, it enables VPs of Business Development to:

 Proactively detect and address a broad spectrum of cyber and physical threats to which target companies may be susceptible

 Identify previously-unknown vulnerabilities affecting a target company’s technologies, infrastructure, and/or personnel

 Assess the integrity of a target company’s capabilities and the value of their assets accurately 

Insider Threat Specialist

Although most Insider Threat Specialists leverage certain types of intelligence to varying degrees, many rely largely on insider threat program (ITP) tools to support their threat detection efforts. Typically marketed as “all-in-one” solutions, ITP tools combine and analyze disparate data sets to detect threats. As is the case with any security or intelligence offering, however, solutions that are truly “all-in-one” don’t really exist.

Rather than reactively searching for threats, BRI complements ITP tools by enabling Insider Threat Specialists to monitor for potential threats and identify relevant trends proactively. In many cases, BRI has successfully revealed yet-to-be-deployed insider threat recruitment and insider trading schemes, among others. 

Insider Threat Specialists who apply BRI are able to:

 Compile data and intelligence from any source — including ITP tools — and make informed decisions to mitigate their organization’s risk

 Proactively address a broad spectrum of insider threats, such as those pertaining to insider trading, insider recruitment, intellectual property theft, vendor risk, and others

 Collaborate with stakeholders across all business units to develop and enforce insider threat prevention trainings and organizational policies 

Chief Risk Officer

Maintaining comprehensive visibility into risks intertwined with all business units has long been a top priority for the Chief Risk Officer (CRO). And yet historically, intelligence has played a relatively small role in this process. While CTI can and does help CR
Os to detect some threats that fall under the jurisdiction of cybersecurity teams, those seeking to expand this visibility to encompass a full spectrum of risks across the enterprise are increasingly turning to BRI. 

After all, the CRO role revolves around risk — not just individual threats, which is why BRI is essential. CROs that integrate BRI into existing organizational risk management (ORM) efforts can:

 Proactively detect and address threats and vulnerabilities with the potential to pose risks to all business units

 Gain insight into the context around these threats and vulnerabilities to assess relevancy and inform prioritization efforts

 Develop and enforce risk reduction and management policies to strengthen operational risk posture 

When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face. It’s crucial to recognize, however, that not all types of intelligence are created equal. I’ve written previously about how CTI’s indicator-centric approach is far too narrow to address threats and subsequent risks that fall outside the jurisdiction of cybersecurity teams. But since BRI, on the other hand, expands the scope of intelligence beyond technical indicators, it truly can and does enable decision-makers across all lines of business to gain a decision advantage over a broad spectrum of relevant threats and adversaries.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...