Intelligent CIO North America Issue 45 | Page 76

t cht lk

t cht lk

industries such as energy , communications , water , banking , health and transport .
Crucially , the directive applies to their supply chains , too . We believe threat intelligence will play a central role in organisations ’ efforts to comply with these regulations , particularly the NIS2 Directive , which has risk visibility , information-sharing , and collaboration at its heart .
As every CISO knows , cybersecurity is a multi-aspect , multidisciplinary activity and you ’ ll never succeed in entirely preventing attacks and breaches .
What you can do – and what the regulations require – is to implement programs to manage and minimise risk and demonstrate that they are effective .
Failure to do this has direct implications for senior leaders as , under NIS2 , members of management bodies may now be found personally liable for failing to establish and oversee effective cybersecurity risk management programs . Getting the assurance required to sign off on the effectiveness of programs requires a solid understanding of where that risk is coming from , which is where threat intelligence comes into its own .
Threat intelligence can be collected from a diverse range of sources including official bulletins from government agencies – like the recent US announcement – private sector threat feeds , intelligence-sharing communities and open-source information , as well as from monitoring and analysis of dark web communications .
There is a huge amount of data available and , as with all large datasets , the key is analysing it effectively in the context of your organisation so you can gain a picture of the threats in your environment .
Just knowing about the threats isn ’ t enough because there ’ s a difference between the existence of a threat , the risk of it happening and the severity of the consequences for your organisation and its stakeholders .
Here , a threat intelligence platform helps organisations correlate threat data within the context of the business , prioritising the threats with the high likelihood and severity .
This allows you to show that you understand risk , and you can establish a prioritised remediation program to minimise the risk of threats becoming reality .
76 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com