R ecent cyberattacks on retailers in the UK and US have shifted to target the financial and now the aviation sector, with news on breaches reaching headlines almost daily. These stories track how today’ s threat actors operate: they are strategic, pivot quickly, exploit weak links and are highly opportunistic.
This opportunism means that if threat actors discover an unlocked door in one business within an industry, they will try every door within that industry to find a common weakness. As shrewd businessmen, they are more likely to target industries rich in customer data and personally identifiable information( PII) and with large, complex supply chains – such as retail and finance.
Chris Jacob, VP of Global Field Operations at ThreatQuotient
Industry-specific weaknesses and single points of failure within a supply chain are cybersecurity soft spots that regulations such as The Digital Operational Resilience Act( DORA) within the financial sector and the NIS2 Directive aim to address directly: both emphasising structured information flows, sectorlevel cooperation and operational resilience. One valuable tool for meeting these requirements and increasing pro-activity is through the tactic of threat intelligence sharing.
Shifting from isolation to collaboration
Cybersecurity teams are justifiably cautious to share threat intelligence too broadly as it can lead to indicators being released prematurely or posted into the wrong forum and could alert threat actors to change their tactics.
Chris Jacob, VP of Global Field Operations at ThreatQuotient, a Securonix Company, explores how collaborative threat intelligence sharing can help organisations strengthen cyberresilience. As cyberattacks escalate across sectors, trusted communities and advanced platforms offer a vital way to share insights, reduce risk and outpace increasingly opportunistic threat actors.
However, working in isolation against threat actor networks, such as Scattered Spider, leaves cybersecurity teams at a distinct disadvantage. Cyberattacks, increasing in scale and sophistication, are being launched persistently. According to recent research by Everfox, FS & B organisations are facing 114 cyberattacks a week – a staggering number of attacks, and a rich pool of actionable threat intelligence to warn and prepare other organisations, if securely shared.
The power of trusted communities
The good news is that facilitators for secure, structured intelligence sharing already exist. Sector-specific communities like FS-ISAC( for financial services) and RH-ISAC for( retail and
In the age of AI-enabled deepfakes, professionals can never be too careful.
WWW. INTELLIGENTCISO. COM 37