8669820477?profile=original

In last couple of years, there has been a increasing interest in dark web technologies. According to gathered statistics, Dark Web contains 7500 terabytes of data which is incredibly huge. Though there has been an increase in criminal activities due to emergence of dark web technology, on a contrary side, it has several advantages for managing cyber security posture. We had a panel discussion on "Exploring Dark Web for Managing Cyber Posture" on CP 100 and Decision Summit,2018 with industry stalwarts like,

Panelists: 

  1. Kotni Srihari Rao (Reliance Payment)
  2. Mithilesh Singh (IDFC Bank)
  3. Manoj Kuruvanthody (Infosys)
  4. Ravi Mishra (FireCompass) [moderator]

       

 

Key Learning- "Exploring Dark Web For Managing Cyber Security Posture"

  • Key use cases of using dark web intelligence
    • Looking out for breached credentials, zero day vulnerabilities
    • Some sensitive data might be  available on dark web like credentials, emails, documents for key management members
  • Critical Capabilities (People, Process, Technology) required for building dark web intelligence
    • Various elements like separate hardware, good quality anti viruses required for dark web intelligence in order to be cautious and not get infected
    • More than any technology capability, precautionary measures against dark web is essential
  • Responding to interesting information on dark web (Like somebody selling your credit card data)
    • Quick and effective response is a key element - like changing or blocking impacted cards / credentials etc.
    • Continuous monitoring of dark web is required for keep receiving useful information from dark web
  • Sharing dark web intelligence using the power of community
    • A community platform can be useful for such sensitive information to be easily shared within a closed community
    • Industry specific community sharing looks to be a possible outcome in future, without any compromise of security
  • Utilization of dark web intelligence from an audit perspective
    • Selling data over the internet is a tedious task, still hacker community or insiders from the organisation manages to sell off information
    • As a solution, continuous monitoring and auditing becomes necessary

Would you like to share your key learning ? Sign Up and write a blog ! It's free

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform