Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
UK monitoring group to classify cyber incidents on earthquake-like scale
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Risk management: The CMC hopes this increased understanding will spur the development of improved incident response planning. Experts quizzed by CSO on CMC welcomed its launch.Ivan Milenkovich, vice president of cyber risk technology in EMEA at Qualys, said data from the CMC has the potential to allow IT security professionals to make better risk assessments, but only providing it is used correctly.”By introducing a standardised cyber event categorisation system, the CMC is addressing a critical gap: the lack of consistent, large-scale data to support cyber risk quantification (CRQ),” Milenkovich said. “This means security teams will finally have access to reliable, aggregated information that can inform risk assessments, threat modelling, and decision-making.”By introducing standardised cyber event categorisation, the CMC is laying the foundation for a more structured and measurable approach to cyber risk. However cyber risk professionals will still need to integrate the CMC’s risk assessments with their own internal data to factor in their organisation’s specific industry, infrastructure, and threat profile, according to Milenkovich.”For many dealing with cyber risk and with cyber insurance and risk operations background and knowledge, this initiative could help bridge the gap between qualitative and quantitative risk management, making it easier to justify security investments with data-backed reasoning,” Milenkovich concluded. “However, success will depend on how well organisations leverage this information alongside their own internal risk frameworks.”Other experts agreed that establishing a consistent standard to measure the severity of cyber incidents will bring clarity to what can be a complex process.”Organisations will hopefully be enabled to provide a standardised method for assessing incidents, identifying patterns and vulnerabilities across their cyber landscape,” said Martin Greenfield, CEO of cyber monitoring firm Quod Orbis. “This not only improves real-time incident response but also strengthens proactive threat hunting and long-term resilience planning.”Dr. Ilia Kolochenko, CEO at application security testing vendor ImmuniWeb and a fellow at the British Computer Society (BCS), described the CMC as a “very promising and long-awaited project” while urging caution about publicly sharing some of the cyber intelligence because it might inadvertently assist attackers.”A growing number of state-backed hacking groups and professional cyber mercenaries are actively exploiting data from similar resources run by other governments and NGOs,” according to Kolochenko. “The bad guys happily explore and discover what their victims know about them to both better conceal their future intrusions and create novel attack vectors that are not yet on the radar.”

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3822449/uk-monitoring-group-to-classify-cyber-incidents-on-earthquake-like-scale.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link