[VIDEO] - Cybercriminality: From rule-based to anomaly detection

Data has become the "new oil" and can be found everywhere in the business world. But, while data represents a tremendous opportunity for businesses, it also represents a risk: data can be compromised by hackers, criminals -and sometimes even nations. This risk emanates from the potential c...

Sandro Sinigaglia |Author

Former Head of Cybercrime at ING Belgium

Blog Inner Image
Table of contents
subscription

Stay connected


Never miss the latest insights, blogs and news. Subscribe to our newsletter.

Subscribe

Data has become the "new oil" and can be found everywhere in the business world. But, while data represents a tremendous opportunity for businesses, it also represents a risk: data can be compromised by hackers, criminals -and sometimes even nations.

This risk emanates from the potential compromise of data integrity, as malevolent actors, including hackers, cybercriminals, and, in certain instances, nation-states, pose significant threats to the confidentiality, availability, and authenticity of sensitive information. Therefore, while leveraging data can fuel organizational growth and competitiveness, businesses must remain vigilant in implementing robust cybersecurity measures to safeguard against potential breaches and uphold the integrity of their data assets.

To protect themselves against these cyber-attacks, security managers often struggle to know where to start. There are 3 key steps:

  1. Prevent: The first step is to understand what could attract a hacker to your company and - accordingly - prepare in advance a defence model
  2. Detect: Next, detect where the attack might come from - you cannot handle what you cannot see.
  3. Respond: And finally, the last step is the response to an attack.

 

Finally, my last advice is to know your company and its threats well enough to be able to focus on them. It's a bit like in martial arts. It's about knowing yourself better: your weaknesses, and your strengths so you can deal with your opponents. 

If you have an interest in such a hot topic and aspire to become more knowledgeable in the management of information security, do not hesitate to consult our website for the next intake of our Executive Master in Cybersecurity Management. Develop your career as a cybersecurity leader - get the practices, skills and knowledge.

 

 


  • Are you interested in joining our latest cohort of The Executive Master in Cybersecurity Management? See all the information about it on our programme page! 

 

Stay connected


Never miss the latest insights, blogs and news. Subscribe to our newsletter.

Subscribe

two_column_section_image
Newsletter subscription

Never miss the latest insights, blogs and news

Subscribe to our newsletter and never miss the latest insights, events and blogs.