Learn more about us.
[VIDEO] - Cybercriminality: From rule-based to anomaly detection
Data has become the "new oil" and can be found everywhere in the business world. But, while data represents a tremendous opportunity for businesses, it also represents a risk: data can be compromised by hackers, criminals -and sometimes even nations. This risk emanates from the potential c...
Sandro Sinigaglia |Author
Former Head of Cybercrime at ING Belgium
/en/blog/cybercriminality-from-rule-based-to-anomaly-detection
Table of contents
Stay connected
Never miss the latest insights, blogs and news. Subscribe to our newsletter.
Data has become the "new oil" and can be found everywhere in the business world. But, while data represents a tremendous opportunity for businesses, it also represents a risk: data can be compromised by hackers, criminals -and sometimes even nations.
This risk emanates from the potential compromise of data integrity, as malevolent actors, including hackers, cybercriminals, and, in certain instances, nation-states, pose significant threats to the confidentiality, availability, and authenticity of sensitive information. Therefore, while leveraging data can fuel organizational growth and competitiveness, businesses must remain vigilant in implementing robust cybersecurity measures to safeguard against potential breaches and uphold the integrity of their data assets.
To protect themselves against these cyber-attacks, security managers often struggle to know where to start. There are 3 key steps:
- Prevent: The first step is to understand what could attract a hacker to your company and - accordingly - prepare in advance a defence model
- Detect: Next, detect where the attack might come from - you cannot handle what you cannot see.
- Respond: And finally, the last step is the response to an attack.
Finally, my last advice is to know your company and its threats well enough to be able to focus on them. It's a bit like in martial arts. It's about knowing yourself better: your weaknesses, and your strengths so you can deal with your opponents.
If you have an interest in such a hot topic and aspire to become more knowledgeable in the management of information security, do not hesitate to consult our website for the next intake of our Executive Master in Cybersecurity Management. Develop your career as a cybersecurity leader - get the practices, skills and knowledge.
- Are you interested in joining our latest cohort of The Executive Master in Cybersecurity Management? See all the information about it on our programme page!
Stay connected
Never miss the latest insights, blogs and news. Subscribe to our newsletter.
Newsletter subscription
Never miss the latest insights, blogs and news
Subscribe to our newsletter and never miss the latest insights, events and blogs.
What other people like
Related blogs
Louis de Diesbach & Georges Ataya
| Author
Georges Ataya is a professor at Solvay Brussels School, partner at Ataya & Partners and vice-president and co-founder of the Belgian cybersecurity coalition. Louis de Diesbach is a consultant at BCG and a technical ethicist.
4/11/24
Marianna Rousaki
| Author
Marianna is the Content & Social Media Coordinator at Solvay Brussels School - Lifelong Learning.
30/09/24
Marianna Rousaki
| Author
Marianna is the Content & Social Media Coordinator at Solvay Brussels School - Lifelong Learning.
30/09/24