{"id":996,"date":"2013-07-09T00:00:00","date_gmt":"2013-07-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/07\/09\/companeis-lack-the-intelligence-to-deal-with-cyber-threats\/"},"modified":"2021-12-30T11:38:33","modified_gmt":"2021-12-30T11:38:33","slug":"companeis-lack-the-intelligence-to-deal-with-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/07\/09\/companeis-lack-the-intelligence-to-deal-with-cyber-threats\/","title":{"rendered":"Companeis lack the &#8216;intelligence&#8217; to deal with cyber threats"},"content":{"rendered":"<p>Businesses across the UK may be more aware of cyber security threats, but they still have a long way to go to balance the cyber crime odds back in their favour. A report released today by KPMG suggests that by learning from the intelligence approach adopted in the fight against terrorism, organisations can improve their safety-net and meet the ever-changing challenges of cyber attacks. KPMG\u2019s Data Loss barometer, for example, shows that the hacking of information held by businesses has jumped globally from only 8% of total incidents in 2010 to a shocking 52% in 2012.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">Malcolm Marshall, KPMG partner and head of the firm\u2019s Information Protection &amp; Business Resilience team, says: \u201cIncreased awareness of cyber security threats is a positive trend, but indications are that organisations now need to focus on putting into place the fundamentals of intelligence management to gain real value from what they know. These revolve around creating an intelligence-led mindset within organisations, implementing an operating model similar to those employed by the intelligence community and building a decision-making process which is centred on a tightly controlled \u2018information gathering programme\u2019.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u2018Cyber threat: intelligence and lessons from law enforcement\u2019 argues that an intelligence-led mindset establishes a direct connection between the threats and vulnerabilities organisations face and the consequences of their compliance or inaction.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">For example, rather than simply collating data, KPMG\u2019s report urges organisations to set parameters for the type of information being gathered, so that haphazard approaches to analysis and actions can be avoided.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.actuarialpost.co.uk\/article\/companeis-lack-the-----039intelligence----039-to-deal-with-cyber-threats-5096.htm\">http:\/\/www.actuarialpost.co.uk\/article\/companeis-lack-the&#8212;&#8211;039intelligence&#8212;-039-to-deal-with-cyber-threats-5096.htm<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-996","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=996"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/996\/revisions"}],"predecessor-version":[{"id":3483,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/996\/revisions\/3483"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}