01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Having worked closely with financial institutions, the problem with this metric is that it paints a dramatic<br />

picture of the threats banks face but requires more context around what that number means to paint a<br />

more factual view of the threats banks face. J.P. Morgan isn’t facing 45 billion attempts by individuals to<br />

hack the banks; I believe that number is an aggregate of automated vulnerability scans, bots, phishing<br />

emails, adware, credit card fraud, BEC, and other automated processes. Language and metrics can be<br />

a minefield in cybersecurity, and it is essential that when security leaders speak to executives, they<br />

provide the appropriate context around the threats faced and ensure they understand and can<br />

communicate the threat clearly to media and their customers without triggering hysteria.<br />

<strong>The</strong> cybersecurity industry has faced similar stories over the years, such as the “<strong>Cyber</strong>pocalypse” or<br />

looming “<strong>Cyber</strong> Pearl Harbor,” terms usually used by overzealous marketing teams and the media to<br />

instill fear in consumers and businesses to buy their tools and click links <strong>for</strong> ad revenue. <strong>The</strong>se “cybermonsters<br />

under the bed” narratives used as scare tactics to keep CISOs up at night do little to mitigate<br />

the real threats organizations face.<br />

Erdoes also mentioned that the 45 billion number is twice what it was last year, that trend is telling as it<br />

indicates threat actors are also exploiting the same adoption of automation and machine learning used<br />

by defenders, a trend we can expect to continue. Geo-politics is also at play as many nation-state<br />

adversaries see the U.S. financial system as a key and legitimate target to weaken our financial system<br />

and economy. This may also play into the exponential growth of adversary activity that J.P. Morgan is<br />

facing.<br />

Improving the security posture of our financial system requires leaders of financial institutions and the<br />

media to become more cyber-literate. Many financial institutions are increasingly bringing current and<br />

<strong>for</strong>mer security leaders onto their boards. CISOs are increasingly reporting to the CFO or CEO aligning<br />

them more closely with risk management, and providing better visibility to the executive team and board.<br />

This is an opportunity <strong>for</strong> banks and regulators to get on the same page regarding language and metrics<br />

when it comes to cybersecurity risk.<br />

About the Author<br />

Ken Westin is Field CISO of Panther Labs. He has been in the cybersecurity<br />

field <strong>for</strong> over 15 years working with companies to improve their security<br />

posture, through detection engineering, threat hunting, insider threat<br />

programs, and vulnerability research. In the past, he has worked closely with<br />

law en<strong>for</strong>cement helping to unveil organized crime groups. His work has been<br />

featured in Wired, Forbes, New York Times, Good Morning America, and<br />

others, and is regularly reached out to as an expert in cybersecurity,<br />

cybercrime, and surveillance.<br />

Ken can be reached online at LinkedIn (https://www.linkedin.com/in/kwestin/) and at our company<br />

website https://panther.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!