APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Disaster Recovery
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    3 Phases of Disaster Recovery

    Jerome Oglesby, Deputy CIO -Technology, Deloitte

    The Basics of Business Continuity and Disaster Recovery Planning: Can Your Business Survive When Disaster Strikes

    Tammy Moskites, CIO/CISO, Venafi

    Enterprise Resilience: The Key to Survival in a Time of Technological Upheaval

    Marin Ivezic, Enterprise Resilience and Cyber Security partner, PwC

    Disaster Management through Educational Research

    Dr. Djuwari, Director of Language Laboratory, STIE Perbanas Surabaya, Indonesia

    Building a Highly Effective Plan for Business Continuity when Disaster Strikes

    Benny Lee, Regional Director, Greater China, CenturyLink

    Business Continuity in the Age of Ever Evolving Ransomware

    Andrew Martin, Director APAC & Japan, Zerto

    How do you get your Organisation to be DR (Disaster Recovery) - Ready ?

    Nathan Steiner, Head of Systems Engineering ANZ, Veeam Software

    Top Three Disaster Recovery Planning Tips for Business Continuity

    Clement Goh, Managing Director, South Asia (ASEAN & India),

    right

    Understanding and Combating Insider Threat

    Sanjay Aurora, MD of Asia Pacific, Darktrace

    Tweet
    content-image

    Sanjay Aurora, MD of Asia Pacific, Darktrace

    Do you know that it takes close to eight months for a company to realise that they have been breached and critical systems compromised? Gone are the days of clear-cut breaches such as information being stolen or websites defaced. In its place are the quiet and unseen attacks – or insider threat – where attacks are perpetrated by someone in the organisation, either inadvertently or with malicious intent, and they change systems at will, or install kill switches ready to be activated.

    These attacks are sophisticated, only crossing boundary defences once and never sending information out. Recent headline hoarders from the Panama Papers leak to the hack of the Democratic National Committee’s (DNC) network, all indicate insider threat. These attacks occurred despite the deployment of advanced cyber-security software and policies, underscoring the insidious nature of insider threat. In the case of the DNC breach, the hacker capitalised on Windows vulnerability and remained in the network for allegedly close to a year, outwitting all detection attempts by stealthily relocating his Trojan from one machine to another.

    “ new machine learning technology powered by advanced mathematics can act as an enterprise’s ‘immune system ’  ”

    The impact of such threats would be even more keenly felt closer to home, with the Asia Pacific (APAC) region a growth driver for many companies. In fact, APAC businesses experienced revenue losses of US$ 81.3 billion from cyber-attacks over the past year, significantly more compared to counterparts in Europe and the States. Furthermore, with the Smart City vision sweeping through APAC from Singapore to Seoul, the importance of a strong cyber security posture cannot be ignored.

    Cities are undergoing digital transformation by harnessing the power of connected devices and technologies to improve public services in healthcare, transport and resources. And these developments require a corresponding uptake in cyber security practices to be cyber-safe.

    Fortunately, such circumstances have not gone unnoticed. APAC organisations have projected cyber security investments to increase to US$ 30.39 billion in 2020. That said, even as reactionary measures are ramped up en masse to combat the increasing deluge of cyber-crime, are resources being channelled in the right direction? The majority of such expenditure is rooted in perimeter-based protection, which defend via pre-defined rules or outcomes based on previously-known attacks.

    This does not safeguard against the hackers of this age. They are sophisticated, and pre-emptively change just enough of their malicious code to appear legitimate. The malware they use, perceived as authentic “insiders” by perimeter defences, use machine intelligence to mimic authorised devices and accounts as they gradually infect the network. Embedded in the enterprise, such software can trigger fatal attacks upon a hacker’s command. For perimeter approaches to prevent such devastation, they must have a complete archive of all known and future threats - an undoubtedly impossible feat. This was played out earlier this year, where cyber-criminals under the cloak of legitimate credentials, pulled a US$ 81 million heist of Bangladesh Bank’s accounts. They achieved what was formerly thought impossible, by infiltrating traditionally foolproof methods of financial transactions that were perceived until now as critically secure.

    The magnitude of such “insider” sabotage is compounded with the use of social media and the Internet of Things. With 2.3 billion active social media users and a projected 6.4 billion connected “things” worldwide in 2016, any network connection potentially is an attack vector. Maintaining complete vigilance over, or fortifying the borders of such networks, is virtually impossible for system administrators.

    With the shadow of insider threat looming over, the mindset that APAC organisations should adopt is to assume the worst – that they already have been infiltrated by attackers. The trick is then to use advanced machine learning and mathematics to join the dots, and understand where a cluster of behaviours might point to malicious activity – which then is escalated to an administrator for investigation and intervention.

    This is synonymous with the make-up of our human immune system, which is based on a notion of early detection and intervention. Our body is able to identify viruses because it has learnt a sense of “self” – meaning that it differentiates what is inherent to the body, and what is manifestly ‘anomalous’. The process must be undertaken quickly too, eradicating diseases before they have spread.

    Likewise, new machine learning technology powered by advanced mathematics can act as an enterprise’s ‘immune system’. Such technology is able to learn on its own and intervene early in suspicious activity, without looking for pre-categorised threats. Messy, data-rich networks can thus be transformed from big liabilities into valuable troves of insight for such technology to better identify insider threats.

    To counter the inevitable onslaught of cyber-attacks in an age where fortifying the perimeter is simply not enough, APAC organisations should strongly consider an immune system approach to detect and combat threats that bypass other security controls.

    tag

    Machine Learning

    Financial

    Weekly Brief

    loading
    25 Most Promising Disaster Recovery Solution Providers
    ON THE DECK

    Disaster Recovery 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://disaster-recovery.apacciooutlook.com/views/understanding-and-combating-insider-threat-nwid-3311.html