Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

How Deep and Dark Web Intelligence Supports Executive Protection

Security Operations Center

Security Operations Center

Many organizations apply cyber threat intelligence (CTI) solely in limited ways that serve the functionality of its namesake — that is, they appropriate all CTI-related operations solely to cybersecurity and IT teams for use in addressing cyber threats. The problem is that this approach is far too narrow given the threat landscape and the types of risks that organizations are now facing. While threats to an organization’s cybersecurity, systems, and technical infrastructure are critical and do require immediate attention and mitigation, these aren’t the only areas that threats emerging from the Deep & Dark Web are affecting.

Just because CTI may reveal a threat that originated from the Internet does not mean that such a threat’s scope of influence will remain restricted to all things cyber. A comprehensive, cross-functional approach that applies intelligence across an enterprise is even more crucial given the increasing number of threats and indicators that extend beyond the cyber domain — such as those pertaining to physical security and, more specifically, executive protection.

So, what happens when a threat originating on the Internet becomes one that threatens an executive’s physical safety? Although these threats can take various forms and pose dangers of varying levels, they all can be quite complex to address and mitigate without visibility into the Deep & Dark Web. Here are a few recent examples:

• Cyber and/or physical targeting of mobile devices. The mobile devices that enable most executives to stay connected and store sensitive data are desirable targets for threat actors. Financially-motivated actors have known been to target seemingly high-value mobile devices by either physical theft or cyber compromise to access the device owner’s personal financial information and critical business data. In many cases, threat actors will sell corporate data and trade secrets to competitors or even nation states seeking a larger market share or a favored economic or political advantage. For executives, the compromise of such information can lead to damaged personal and brand reputation, loss of competitive advantage, threats to physical safety posed by disgruntled stakeholders, or worse.

• Terrorism. The threat of terrorism requires significant consideration for executives with plans to travel abroad and/or attend high-profile public events. One recent example pertains to threats surrounding the 2016 Rio Olympics, when terrorist groups such as ISIS took to numerous cyber outlets ranging from private Deep & Dark Web forums and the encrypted social media app Telegram to Twitter to publicize their intentions of launching terror attacks in Brazil during the games. While such threats fortunately never materialized, they serve to illustrate how terrorists’ use of technology and operations on the Internet can lead to threats endangering physical safety.

 Large-scale cyber attacks. It should come as no surprise that cyber attacks including ransomware, DDoS, or large-scale fraud schemes can wreak havoc on a brand’s reputation, which in turn can cause harm to sales, stakeholders to become disgruntled, and high-profile executives to become the target of unwanted attention, ridicule, and threats. While cybersecurity and IT teams may bear the bulk of the responsibility in preventing such attacks from occurring, prevention may not always possible. As such, if a large-scale cyber attack or breach becomes public knowledge, the entire organization — especially key executives — may face an increased risk to their business functions.

While the three threats above are best addressed and mitigated by analyzing and applying intelligence in a manner that fosters collaboration across the enterprise, such a strategy is rarely operationalized, and, as a result, many executive protection teams are unknowingly not as prepared or informed as they could be.

To further illustrate my point, let’s look at some common differences between public- and private-sector executive protection programs.

Advertisement. Scroll to continue reading.

While those in the public-sector are often lauded for their comprehensive efficacy, efficiency, and precision, many private-sector programs tend to lag. One reason for this discrepancy is that most public-sector programs receive support from and collaborate with public-sector intelligence agencies, which provide them with a more comprehensive picture into all relevant threats — cyber or physical — that could potentially endanger an executive or agency. However, many private-sector programs are rarely afforded such visibility due to a lack of information-sharing between executive protection and other business functions. Since cybersecurity and IT are often the only private-sector business functions with any sort of visibility into the Deep & Dark Web, if these teams receive no direction or reason to seek out threats originating on the internet that could potentially inform an executive’s protection, they are unlikely to do so.

As a hypothetical example, let’s say that the CEO of a Fortune 100 retailer will travel abroad to Asia to represent her company at a high-profile public event. In preparation for her trip, her executive protection team has conducted extensive research into the safety of the surrounding area, mapped out emergency evacuation routes, and constructed a well-equipped team of physical security professionals ready to protect her.

Meanwhile, a cyber intelligence analyst on the company’s cybersecurity team has been tasked with researching an English-speaking hacktivist group that has recently defaced a series of websites linked to leading North American retailers. While monitoring a Deep Web forum known to be frequented by hacktivists, the analyst notices that a well-known member of an international hacktivist group has authored several posts about plans to launch a cyber attack in an effort to shut down the power supply of an upcoming high-profile public event in Asia. Indeed, such intelligence could absolutely be of high interest to the CEO’s executive protection team to understand the CEO’s risk profile better. But, since the cyber intelligence analyst was unaware of the CEO’s upcoming trip, he did not consider the information relevant to the executive protection team or any other business function at his organization for that matter. Evidently, despite the executive protection team’s exhaustive research and preparation to ensure the CEO’s safety during her upcoming trip, lack of visibility into the threats emerging from the Deep & Dark Web means that the team was not as prepared as they could have been. 

While cyber threat intelligence can undoubtedly be integral to bolstering an organization’s physical security, the current landscape prevents numerous challeng
es that continue to prevent many organizations from reaping the full value of their CTI. In today’s day and age of unprecedented technological advancements and threat actors capable of evading even the most robust security measures, few organizations are fully aware of all ways in which they are vulnerable to the risks presented by increasingly-advanced cyber and physical threats.

This lack of awareness can be especially detrimental to executive protection teams because failing to acknowledge relevant threats means that the team cannot accurately assess and address the executive’s overall risk. As such, it is crucial for executive protection and physical security teams not only to leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats but also ensure open collaboration and information sharing with all business functions to address threats and mitigate risk across the enterprise.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...