Poking the Bear – Finland, Russia, NATO and Cyber Threat Management

May 12th, 2022

Finland is about to join NATO and Sweden are likely to follow in the near future. This expansion in NATO’s members is antagonising Russia, which shares a border with Finland. This partly explains why Russia justifies the war in Ukraine, being fearful of NATO’s continued expansion closer to its borders and the potential to site nuclear arms, military equipment and intelligence gathering resources. It’s unclear how Russian President Vladimir Putin might retaliate. The Kremlin recently stated that this will not improve European security. Is this a threat?

Poking the Bear – Finland, Russia, NATO and Cyber Threat Management 1

Today’s connected world is open to any number of cyber threats that could bring an organization to its knees, ransomware being perhaps the most prevalent. Threat intelligence can help organizations gain valuable knowledge about these threats, build effective defence mechanisms and mitigate the risks that could damage their bottom line and reputation. After all, targeted threats require targeted defence and cyber threat intelligence delivers the capability to defend more proactively.

The recently published ISO/IEC 27002:2022 controls demonstrate a focus on the threat from cyber attacks. The emphasis of the control changes is on cyber-attack prevention, detection and response, as well as better protecting sensitive data. Moreover, the new controls closely align ISO 27001 with the NIST Risk Management Framework.

Specifically, Control 5.7 covers the need for organisations to collect, analyse and produce threat intelligence relating to information security threats. The purpose being “to provide awareness of the organization’s threat environment so that appropriate mitigation actions can be taken”.

Threat intelligence is the process of gathering, analysing and contextualising information about current and future cyberattacks, providing organizations with a deeper understanding of threats. For example, threat intelligence can be used to identify the tactics, techniques and procedures (TTPs) attackers are using to gain entry into networks or compromise their targets. This can make it easier for businesses to defend against those specific attacks.

In particular, information security threats are risks related to the confidentiality, integrity and availability of information used in an organisation. In addition to helping organisations understand how they might be targeted by hackers, threat intelligence can also help enterprises learn about the types of data attackers are looking for, as well as what they do with that data once it’s been stolen.

The 27k1 ISMS is a total software solution, developed to support companies that wish to comply with and achieve ISO 27001 certification. Within the software, the Risk Manager tool allows the organization to assess individual or grouped information security assets according to any threat or vulnerability. The risk assessment process provides risk scores, which prompt the user to accept, treat, transfer or avoid the risk, implementing any of the controls from either ISO/IEC 27001:2013 Annex A or from the new, ISO/IEC 27002:2022 control set.

Assessing cyber threats and applying the detective, protective and corrective controls required to safeguard the organization is a key feature of the software. The system applies the NIST risk assessment process and automatically generates feature rich reports, so that management are fully informed as to the actions that have been generated.

For more information on the 27k1 ISMS software, please visit:  Contact 27k1 – 27k1 ISMS