Engineering best practices for quantifying cyber risks
Cyber risks, weaknesses, and vulnerabilities are everywhere, but what do we need to fix first? This is a common refrain from asset owners and operators trying to prioritize limited mitigation resources. In the last few years, there has been a significant growth in vulnerability discovery.
Despite these growth areas, cyber threat intelligence has failed to keep pace with adversary advancement and capabilities. Defensive efforts continually fall behind adversary activities designed to attack and hold critical infrastructure at risk. Infrastructure susceptibility analysis (ISA) is a repeatable, proactive methodology designed to leverage threat actor information commonly overlooked by normal threat cyber intelligence practices. ISA expands on existing engineering best practices to enable asset and system owners to understand not only the most damaging outcomes of a cyberattack but also the most likely ones.
This session is designed to provide the audience with a background in relevant engineering practices for understanding cyber risk, as well as the limitations of these approaches. It will introduce the audience to the ISA process and highlight key differentiators from past approaches. This session will also expose the audience to term and trend cyber threat intelligence practices and provide recommendations for how to track adversary capability growth against their own systems and infrastructure.