{"id":391,"date":"2013-04-30T00:00:00","date_gmt":"2013-04-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/30\/a-new-source-of-cyberthreat-updates\/"},"modified":"2021-12-30T11:37:11","modified_gmt":"2021-12-30T11:37:11","slug":"a-new-source-of-cyberthreat-updates","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/30\/a-new-source-of-cyberthreat-updates\/","title":{"rendered":"A New Source of Cyberthreat Updates"},"content":{"rendered":"<p style=\"margin: 0px;\">The FS-ISAC is now offering briefings on the latest trends and how to address them, says Bill Nelson, president. Through a new partnership with the cyber-intelligence firm iSIGHT Partners, the Financial Services Information Sharing and Analysis Center is providing its banking institution members with updates on cyber-attack trends, including data from international markets, says Nelson, FS-ISAC president. &#8220;iSIGHT is now providing briefings to our members about how these attacks can be detected and, in some cases, mitigated,&#8221; Nelson says during an interview with Information Security Media Group.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">John Watters, founder of iSIGHT Partners, says obtaining timely, accurate information about the latest cyberthreats is challenging because there&#8217;s so much misinformation available. &#8220;There is not a central place &#8211; or a knowledge center &#8211; where everyone can draw information from to take action,&#8221; he says. Today what we&#8217;ve seen is really the convergence of the threat environment &#8211; now the private and public sectors are being targeted by the same threats.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The recent wave of distributed-denial-of-service attacks illustrates the need to stay well-informed about the very latest threats, Watters says. &#8220;We help our members demystify some of this information, which allows them to prioritize their resources to focus on the real, true threats,&#8221; he says.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Before joining the FS-ISAC, a non-profit association dedicated to protecting financial services firms from physical and cyberattacks, Nelson was elected vice chairman of the ISAC Council, a group dedicated to sharing critical infrastructure information.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Over the past decade, Watters has been involved with numerous cybersecurity companies, including TippingPoint Technologies, Archer Technologies, Netwitness and Lookingglass, in addition to iDEFENSE and iSIGHT Partners.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.bankinfosecurity.com\/interviews\/new-source-cyberthreat-updates-i-1902?rf=2013-04-29-eb&amp;elq=01956b18b1fb4b35b539650c8ea7dc3b&amp;elqCampaignId=6596\">http:\/\/www.bankinfosecurity.com\/interviews\/new-source-cyberthreat-updates-i-1902?rf=2013-04-29-eb&amp;elq=01956b18b1fb4b35b539650c8ea7dc3b&amp;elqCampaignId=6596<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,3],"tags":[],"class_list":["post-391","post","type-post","status-publish","format-standard","hentry","category-financial","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=391"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/391\/revisions"}],"predecessor-version":[{"id":2878,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/391\/revisions\/2878"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}