Technology that detects. People that defend. 1. The changing threat landscape The security landscape is brimming with diverse and fast-evolving threats. It’s a constant adage in the security industry, one that most security professionals have come to accept. The pressure is heightened by the need to understand, quantify and communicate the risks and how they affect your business. The sheer volume of threats businesses face today is overwhelming. At the same time, the variety is everchanging. Threats have been seen to pivot on targeted operating systems and device types, the Internet of Things and malware varieties are in a constant state of flux. The list is long and one that you need to understand and be able to communicate. It is unlikely you will face this volume and variety all at once, but understanding how someone can make money from your data is a start. Who, why and how are the questions you need to have answers to. Payment card data, personally identifiable information or intellectual property are just a few examples. www.baesystems.com/cyberreveal Technology that detects. People that defend. 2. Targeted attacks are the norm The volume and variety of threats present a constant problem to your existing defenses. However there is also an increasing trend towards greater novelty of threats. Attacks don’t need to be innovative or new, just new to your business. Most cyber criminals are still motivated by monetary reward and if there’s some way they can make money from your data, they will. www.baesystems.com/cyberreveal Through our threat research we have seen evidence of a rise in the practice of crimeas-a-service. Organized criminal groups often see cyber crime as an opportunity to diversify into what is often a low-risk criminal enterprise, and contract out for services. A growing number of threat Attackers operate as a business and, like yours, they actors offer their products and services to these groups, need to show a return on investment. In their pursuit of causing a significant increase of illegal activities and the a competitive edge and increase of well-funded innovative business models, criminal networks. partnerships and channels have appeared within cyber crime networks. The term “targeted attack” often paints a picture of sophisticated hacking operations targeting big business – not true. Ultimately attackers don’t care who they take from and they will go for the easiest target.