Evaluating changing cyber security risks in real time

28th June 2013

By: Schalk Burger

Creamer Media Senior Deputy Editor

  

Font size: - +

Analysis of large volumes of data entering companies can be used to assess infor- mation technology (IT) and cyber security risks in real time as they change, says global software giant IBM security services associate practice leader Greg Sinclair.

For example, the impact on operations from a denial-of-service attack can be reduced by analysing the trends of data coming into a company. These attacks are often conducted in concert and over a short time, making timely response difficult.

However, analytics systems, often deployed in large companies to analyse large volumes of business data, enable a company to identify the patterns of denial of service attacks and to prepare ways of mitigating risk threats, he says.

“Taking a framework approach to identify risks from Internet exposure in real time enables companies to map trends from suspicious hosts and build capacity in ways to respond. We advise clients not to take a narrow view, but to use the capabilities that big data analytics provide to proactively monitor changing risks to the business,” explains Sinclair.

IBM South Africa has helped a local company overcome a denial of service risk, which was compounded by the constrained bandwidth environment in South Africa.

“While the bandwidth constraints in South Africa are slowly fading, IBM, in the US, detected multigigabit attacks on the banking industry in 2012 that were sustained over a lengthy period, highlighting the growing risks of large corporate companies being exposed to cyber crime,” he highlights.

“Our advice to clients is not to focus on a specific event or attack, but to analyse data to measure the risks to the business and then develop a long-term plan to mitigate these risks as part of the business strategy.”

The reality of cyber risks necessitates that they be dealt with at company board level and as part of long-term strategic planning and business development.

“Cyber security threats should be monitored and managed using the integrated systems that many businesses have on site. Companies can also use integrated systems to reduce IT costs in the company, while retaining their business software systems.”

Companies can use analytics to understand where users are accessing their networks, what applications are on the networks and what access rights people have, including remote access rights, enabling companies to understand their security across the business and risks to various parts of the networks.

“The traditional approach to combat cyber threats no longer fits. Security intelligence can be used to map and manage the threats, exposure and mitigation measures to information security risks in big corporate companies.”

IBM has expertise in using big data analysis to produce business intelligence that helps companies mitigate business risks, including cyber threats, concludes Sinclair.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION