FEATURE: CYBER SECURITY
IN THE UAE,
SYMANTEC’S INTERNET
SECURITY THREAT
REPORT 2016 RANKS
THE UAE AS THE EIGHTH
MOST TARGETED
COUNTRY BY CYBER
ATTACKS IN THE
WORLD IN 2015, BUT
YET THE COUNTRY’S
POPULATION RANKS
IT IN 113TH POSITION
GLOBALLY
truth that you can’t protect what you
don’t understand; a thorough audit
is vital at the start of any mitigation
process. Sophisticated mapping
software can certainly accelerate this
process, but ultimately a comprehensive
audit requires people on the ground
to ask the right questions and find the
location of servers and access rights.
Intelligence relates individual system’s
characteristics to the known threats and
a network’s vulnerabilities in relation
to them; it takes the threat intelligence
gathered in the risk assessment process
and relates it to the specifics of the
organisation’s system.
Integration aggregates the information
found in the first two phases, and
36
INTELLIGENTCIO
displays them in a format that can be
readily understood by decision makers
to enable them to act quickly. In
particular, attacks should be logged and
diagnosed in a systematic fashion.
Awareness and understanding of the scale
and scope of cyber security threats needs
to be communicated widely, resulting in
an appreciation that technologies, tools,
processes and systems that helped secure
data in the past, are exactly that, from
the past. As nations digitise, resiliency and
security become paramount. Innovative,
end-to-end, and dynamic methods
of protection are required, as digital
infrastructure becomes more integrated,
more things become connected and
the amounts of data being transmitted
increases exponentially.
www.intelligentcio.com