Intelligent CISO Issue 71 | Page 63

BUSINESS surveillance

A SIMPLE YET EFFECTIVE PATH TO MITIGATING CYBERTHREATS

Every day worldwide , CISOs grapple with the daunting challenge of addressing security issues while simultaneously assuring their teams that attack patterns seamlessly align with established controls . This emphasises the importance of a multifaceted approach in identifying and addressing vulnerabilities within an organisation . This article by Recorded Future , an independent threat intelligence cloud platform , delves into a common yet critical narrative of responding to inquiries on the latest cyberthreats . It highlights the security team ’ s responsibility of summarising risks , mapping , monitoring and mitigating cyberthreats specific to an organisation .
t ’ s a Friday afternoon . As the CISO

I for a large manufacturing company , you receive a message from a board member with the subject line : How are we affected by [ insert the latest ] cyberattack ?

Despite the end-of-the-week fatigue , you explain that the Cyberthreat Intelligence ( CTI ) team has already incorporated the attack patterns into existing controls . A member of the infrastructure team updated the email security platform to quarantine the malware-infected file . Credentials recently stolen from RedLine Stealer have already been reset within your Identity Access Management ( IAM ) platform .
In addressing a common scenario of tackling a query regarding the latest cybernews headline , the security team is tasked with efficiently summarising the risks identified in the email . This entails the meticulous mapping , monitoring and mitigation of cyberthreats that are pertinent to your organisation .
Map your company assets
Cybersecurity writings often use the phrase ‘ defending your castle walls ’ but in this scenario , let ’ s envision strategically placed barbed wire fences . As a security team , you prioritise the broken sections instead of rebuilding the entire fence ( wall ) at once . A good place to start mending your fence is understanding the information that is freely available about your company . Amateur open-source sleuths can now discover connections previously available only to those with specialised access . A crowdsourced example includes the discovery of a disgraced Russian general ’ s location based on the photo analysis of trees and a stone patio . Are there old domains still accessible that should be decommissioned ? Security teams can use tools to discover subdomains that are potential candidates for subdomain takeovers .
Also important is understanding what assets are critical to your business functions . If you work for an e-commerce company , any domains that handle payments should be prioritised as any downtime could result in monetary losses . Executives with and without a social media presence should be monitored for fake accounts that could post inflammatory comments and potentially impact stock prices .
If locked out of your house , you do not immediately resort to climbing onto your roof to look for an open
WWW . INTELLIGENTCISO . COM 63