Threat Intel Odyssey: Mapping the Convergence of Social Cyber Risks
- Date:October 31, 2024
- Author(s):
- Tracy Kitten
- Report Details: 7 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Successful threat intelligence sharing–intel that cuts fraud losses and attributes indicators of compromise (IoCs) to responsible threat actors–will hinge on a few key factors and contributors. First, successful threat intel must rely on a breadth of data signals accessed and shared through a wide range of industry sectors. Second, intel has to be digestible, anonymous, and usable—meaning it must be translatable across platforms and technology. Javelin Strategy & Research believes cyber fusion models and/or those that fuse cyber fraud and anti-money-laundering intel will help industries accomplish successful sharing of threat intel, but cyber fusion is only one piece of the information-sharing puzzle. Without the right players at the table, information sharing that relies on meaningful threat intel will provide little more than it does today: views of accountholder data that are limited to specific types of financial accounts and fails to bring in the multitude of digital complexities and data that can make IoC signals around threat intel richer and more insightful.
This impact note reviews why the sharing of threat intel must expand beyond traditional financial services and governments to include the more traditionally casual and peripheral digital channels of social media, which are now the breeding ground for cybercrime and nation-state threats.
Learn More About This Report & Javelin
Related content
2024 Cyber Trust in Banking Scorecard
In this scorecard, Javelin evaluates leading financial institutions’ level of cyber trust based on key components: privacy, cybersecurity, education and resolution support. Shiftin...
Cyber Trust in Banking: Privacy Path to Maturity
For consumers, privacy is the fundamental determinant of cyber trust. The degree to which financial institutions protect consumer privacy and enhance authentication and identity ve...
Employees: The Weakest Link, Even for Security Powerhouses
No company is immune from insider attacks. Employees are the weakest link in the prevention of cybersecurity attacks and are actually the cause of many major cybersecurity incident...
Make informed decisions in a digital financial world