Upcoming Virtual Event: Cloud Security Summit | July 17 - Register Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

The World of Cybercrime is Becoming Mythical

Unless you’ve just awakened from a multi-year coma, you know all about the growth in cybercrime. It’s not just the crime that’s exploding—so is board awareness, technology investment, proactive intelligence gathering, news coverage, conferences and more.  But one of the fastest growing trends in cyber crime seems to be the adoption of mythical names. 

Unless you’ve just awakened from a multi-year coma, you know all about the growth in cybercrime. It’s not just the crime that’s exploding—so is board awareness, technology investment, proactive intelligence gathering, news coverage, conferences and more.  But one of the fastest growing trends in cyber crime seems to be the adoption of mythical names. 

I’ve recently heard people in my profession refer to “cyber Unicorns.”  Now Unicorn is a term used by the venture capitalist community to describe companies that reach over $1 billion in capitalization.  The reference, of course, is the rarity with which these events happen. There are many successful VC backed companies, but reaching $1 billion is as rare as finding a Unicorn. 

The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job. Criminal organizations pursue every means necessary to gain access to internal systems and then use multiple schemes to monetize that access.

Typical schemes include “cyber ransom” – where a company’s data is encrypted and the key provided only on payment of a ransom; exfiltration of intellectual property; acquisition and selling of customer data (especially uniquely identifying data) that facilitates identify theft; creation of phony invoices; illicit transferring of funds, and more. The number of schemes seems to be infinite.

To combat these cyber Unicorns, and all the wannabes, firms have to invest in both people and technology.

People are needed because they have the ability to make good decisions, do conduct investigations and see obscure patterns quickly. Technology is required because the volume of attacks is sufficient to overwhelm manual efforts no matter how skilled or dedicated the staff.  This augmentation of people by technology is sometimes called creating Centaurs, an homage to the mythical creature that was half-man and half-horse. SOC analysts, and other security and cyber crime investigators, are the modern version of the Centaur, leveraging technology to sift through the universe of data to find relevant data upon which to act. VC’s also have a class of investments called Centaurs—companies that exceed $100 million in valuation.      

So when it all comes down to it, in this the 21st Century–when the world is hyper-connected, where big data analytics drive decision making–the world is still very mythical.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Craig Boundy has left Experian to join McAfee as President and CEO.

Forcepoint has promoted Ryan Windham from Chief Customer and Strategy Officer to Chief Executive Officer.

ICS and OT cybersecurity solutions provider TXOne Networks appointed Stephen Driggers as its new CRO.

More People On The Move

Expert Insights