Operationalizing the Cyber Threat Landscape: Key Considerations and Challenges in Developing a Specific Organizational Program
Downloads
The landscape of cyber threats is multifaceted, encompassing a wide array of attack vectors, including distributed denial of service (DDoS) attacks, phishing, man-in-the-middle attacks, password-based intrusions, remote exploitation, privilege escalation, and malware deployment. As the sophistication of cyber threats continues to advance, coupled with the development of increasingly sophisticated evasion techniques, traditional security mechanisms - such as firewalls, intrusion detection systems, antivirus software, and access control lists - are proving less effective in identifying and mitigating these complex threats. This underscores the urgent need for the development and implementation of innovative, more robust solutions to counteract the growing prevalence of cyber-attacks. The objective of this proposal is to examine the ENISA Cybersecurity Threat Landscape Methodology and explore potential advancements that integrate traditional decision-making frameworks with emerging cybersecurity technologies. As concerns over cyber warfare continue to escalate, nations must adopt adaptable cyber frameworks and methodologies capable of preventing cyber crises. Furthermore, these frameworks should foster greater international collaboration and participation in the ongoing global discourse on cybersecurity.
Downloads
Sean Barnum. 2012. Standardizing cyber threat intelligence information with the structured threat information expression. Mitre Corporation 11(2012), 1-22.
Donald Gerwin & J. Stephen Ferris, 2004. "Organizing New Product Development Projects in Strategic Alliances," Organization Science, INFORMS, vol. 15(1), pages 22-37, February.
Bongsik Shin, Paul Benjamin Lowry, A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished, Computers & Security, Volume 92, 2020.
Fortinet Training Institute, Introduction to the Threat Landscape, https://training.fortinet.com/local/staticpage/view.php?page=library_introduction-to-the-threat-landscape
Top Cybersecurity Statistics for 2024, https://www.cobalt.io/blog/cybersecurity-statistics-2024
Expert Insights Podcast, John Grancarich On the Evolution of the Threat Landscape, How Security Providers Need To Pivot, https://podcasts.apple.com/gb/home
Antonio de Lucas Ancillo, Sorin Gavrila, María Teresa del Val Núñez, Workplace change within the COVID-19 context: The new (next) normal, Technological Forecasting and Social Change, Volume 194, 2023, ISSN 0040-1625.
ENISA Threat Landscape 2024, https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024
ENISA Cybersecurity Threat Landscape (CTL) methodology, July 2022, https://www.enisa.europa.eu/publications/enisa-threat-landscape-methodology
CrowdStrike 2024 Global Threat Report, https://go.crowdstrike.com/rs/281-OBQ-266/images/GlobalThreatReport2024.pdf
I.C. Mihai, C. Ciuchi, and G. Petrică, “Current challenges in the field of cybersecurity - the impact and Romania’s contribution to the field”, Ed. Sitech, 2018.
I.C. Mihai, G. Petrică, C. Ciuchi, L. Giurea, “Cybersecurity challenges and strategies”, Ed. Sitech, 2015.