Intelligent CIO Middle East Issue 08 | Page 36

FEATURE: CYBER SECURITY IN THE UAE, SYMANTEC’S INTERNET SECURITY THREAT REPORT 2016 RANKS THE UAE AS THE EIGHTH MOST TARGETED COUNTRY BY CYBER ATTACKS IN THE WORLD IN 2015, BUT YET THE COUNTRY’S POPULATION RANKS IT IN 113TH POSITION GLOBALLY truth that you can’t protect what you don’t understand; a thorough audit is vital at the start of any mitigation process. Sophisticated mapping software can certainly accelerate this process, but ultimately a comprehensive audit requires people on the ground to ask the right questions and find the location of servers and access rights. Intelligence relates individual system’s characteristics to the known threats and a network’s vulnerabilities in relation to them; it takes the threat intelligence gathered in the risk assessment process and relates it to the specifics of the organisation’s system. Integration aggregates the information found in the first two phases, and 36 INTELLIGENTCIO displays them in a format that can be readily understood by decision makers to enable them to act quickly. In particular, attacks should be logged and diagnosed in a systematic fashion. Awareness and understanding of the scale and scope of cyber security threats needs to be communicated widely, resulting in an appreciation that technologies, tools, processes and systems that helped secure data in the past, are exactly that, from the past. As nations digitise, resiliency and security become paramount. Innovative, end-to-end, and dynamic methods of protection are required, as digital infrastructure becomes more integrated, more things become connected and the amounts of data being transmitted increases exponentially. www.intelligentcio.com