Cultivating a cyber counterintelligence maturity model

Victor Jaquire, Sebastiaan Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Just as the utilisation of cyberspace became more mainstream, intricate and advanced during the past decade, so did the intricacy and advancement of threats mature-paralleling the conveniences and essentials that cyberspace provide. It is now vigorously recognised that traditional approaches to cyber defence have become deficient [Heckman et al, 2012]. The respected solutions that we loyally hanged on to throughout the decades, trusting them to defend our environments are no longer sufficient. Unyielding breaches and cyber-attacks are relentlessly intensifying and becoming the order of the day [PWC, 2015]. Farchi [2016] argues that "Staying vulnerable while waiting for a security patch from your software vendor is an anachronistic method that won't survive this new world". This notion corresponds with Bodmer [2012] who stresses that "Just as intelligence organisations are tracking the activities of terrorist cells trying to stop them before they take action, going after the malicious attackers before they are able to commit attacks is the desired approach". This article flows from, and builds on previous discussions and publications with regard to the concept of a maturity model for cyber counterintelligence (CCI). It aims to also resonate with and add to previous publications and maturing debates through the proposition of cultivating and implementing such model. It explores the notion of a CCI maturity model and argues that cybersecurity can be intensified-and will be more effective when incorporating a dedicated focus on defensive, offensive, passive and active measures in a multi-disciplinary and integrated CCI approach. The article provides a brief look at the benefits that the implementation of such a model hold for both government and the private sector. It deliberates on the need for cyber counterintelligence (CCI) practices in conjunction with traditional defensive and/or offensive cyber measures within both government and the private sector (business). It also discusses the ideal for the establishment of such a maturity model that can be customised, in a similar way, for organisations (public and private sector), and crowns in discussions on implementation and control.

Original languageEnglish
Title of host publicationProceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017
EditorsMark Scanlon, Nhien-An Le-Khac
PublisherCurran Associates Inc.
Pages176-183
Number of pages8
ISBN (Electronic)9781911218432
Publication statusPublished - 2017
Event16th European Conference on Cyber Warfare and Security, ECCWS 2017 - Dublin, Ireland
Duration: 29 Jun 201730 Jun 2017

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
Volume0
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference16th European Conference on Cyber Warfare and Security, ECCWS 2017
Country/TerritoryIreland
CityDublin
Period29/06/1730/06/17

Keywords

  • Cyber counterintelligence
  • Cyber counterintelligence levels
  • Cyber counterintelligence maturity
  • Cyber threat intelligence
  • Defensive and offensive cybersecurity

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Cultivating a cyber counterintelligence maturity model'. Together they form a unique fingerprint.

Cite this