No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights

Cyber Crime is Professional

by David Gormley
December 7, 2016
in Uncategorized
guarding against cyber threats

In 2016, we have seen the largest cyber bank theft in history, hacking of emails in the U.S. presidential election and a massive denial-of-service attack linked to the Internet of Things.

Attackers – ranging from nation-states to organized criminal gangs – have moved well beyond crude, scattergun approaches to defeat weak security. Today they are skilled, determined and focused – and quite possibly already inside an organization’s network, either because they’ve breached it or because they are an employee or partner with access. They are varied in motivation, capability and tactics.

BAE Systems recently conducted a survey that reveals the majority of information technology professionals (97 percent) believe business security and defense is a priority for their organizations. Yet more than half (54 percent) admit they assess cyber threats just once a week or less. The recent survey of 200 IT professionals at U.S. organizations also revealed:

  • 87 percent believe their organization’s leadership understands the serious impact of a cyber attack;
  • Compromising sensitive company financial data (63 percent) and compromising customer information (58 percent) are top concerns when it comes to cyber attacks;
  • 50 percent are concerned about the hijacking of credentials to compromise customers or suppliers;
  • 33 percent worry that too many employees are not aware of the cyber risks involved in using social media and digital channels.

As cyber attacks can occur at any time and often go undetected for weeks or months, it is critical that organizations employ round-the-clock threat assessment with a human in the loop to focus on genuine threats and fortify business defenses. Determined, capable cyber criminals use research, advanced capabilities and repeated attacks to penetrate any organization they deem vulnerable.

But many companies simply don’t have the resources to respond. They’re trying to keep pace with business and technological change, using tools and services delivered over the internet, as well as those held in-house. They cannot afford to hire the right people, take the right training or buy the right technology every single time. That means they can’t defend their networks, their data or their people and customers. Many organizations are overwhelmed by the sheer pace of attacks and lack the knowledge or the technology needed to mount an effective defense against increasingly sophisticated opponents.

Going to the experts for a managed or outsourced service is a fact of business life, and the same applies when it comes to securing one’s data, security devices and networks. It’s a sensible, logical business and technology decision that allows organizations to focus on their core business objectives.

The MSS provider market is large, with at least 300 companies offering services in the U.S. alone. Some simply offer packaged approaches: one size fits all. Many traditional managed service providers focus the majority of their efforts on “known attacks” and miss the more targeted, hidden threats. These more sophisticated methods are increasing with modern, dedicated attackers. They will create custom malware to evade detection, hide in a network for months or years and leave little or no evidence of their intrusion. Skilled, professional attackers will persist, and if they don’t break in the first time, they’ll be back – with more powerful and capable tools.

This calls for defenders to take a proactive approach: one that goes looking for threats, rather than waiting to stumble over them later in the attack process. When assessing MSS offerings, organizations should consider:

  • Does the provider go hunting for malicious patterns in the everyday data your organization creates?
  • Does it use sophisticated analytics to ask the right questions – and hunt for breaches, past and present?
  • Does it use the latest generation of big data technologies – artificial intelligence and machine learning – to find patterns that might otherwise never be seen?
  • Does it share information, pattern data, lab research and national security resources to uncover new malicious tactics, techniques and procedures?
  • Does it minimize the noisy alerting from security equipment and the daily fire drills investigating what turn out to be false positives?

In today’s world, a traditional approach to cybersecurity is not enough to prevent attacks. Crime occurs where there are opportunities, and the same is true for cyber crime. By outsourcing cybersecurity to threat-hunting experts, businesses can now receive real-time, continuous monitoring and threat assessment.


Tags: Commodity Futures Trading Commission (CFTC)Communications Management
Previous Post

How Chile’s Recent Political Scandals Led to Reforms

Next Post

Facing Critical Risks and Threats to Compliance

David Gormley

David Gormley

David-GormleyDavid Gormley, a leader on the product and strategy team at BAE Systems, is a CISSP with over 15 years of experience in the technology industry. He was recently a Product Marketing Director at CA Technologies and earlier in his career he was a consultant at A.T. Kearney working on technology solutions and partnerships with Fortune 500 clients.  Prior to that, he worked at Forrester Research, evaluating technology environments and consulting with partners on the adoption of emerging technologies. David holds a B.S. in Business/Marketing from Skidmore College and an M.B.A. with a concentration in Information Technology from the University of Texas at Austin.

Related Posts

vintage image new york stock exchange

2024: The Year (So Far) in Market Manipulation

by Shayne Ganeson
September 3, 2024

FinServ community advised to redouble control efforts

person looking at whatsapp thread

B-ASIC Instructions on Aussie Business Communications

by Harriet Christie
September 2, 2024

Australian financial regulator issues new guidance on communications monitoring & archiving

cftc sec seals

SEC, CFTC Combine for $9B+ in Penalties in 2023

by Staff and Wire Reports
January 25, 2024

UK sees fines from FCA fall for first time in more than a half-decade

cubist style art of robot holding a pencil

Want to Be Part of the Generative AI Revolution? Start With Treating It Like an Assistant.

by Dave Cumberland
October 31, 2023

Integrating AI into internal communications can streamline how teams talk to each other

Next Post
Facing Critical Risks and Threats to Compliance

Facing Critical Risks and Threats to Compliance

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights