Enterprise Appropriate Responses to Disinformation Risks

Enterprise Appropriate Responses to Disinformation Risks

705 5th AVE S | SUITE 800 SEATTLE, WA | 98104 206-800-1700 WWW.FIVEBY.COM Enterprise Appropriate Responses to Disinformation Risks 2021 Report Executive Summary Disinformation is a growing threat to communities and organizations, as it often manifests as changes in public narratives, beliefs, emotions, and actions. These changes are triggered by actors who use false, misleading or misattributed information with the intent to do harm, benefit financially or geopolitically, or damage social infrastructures. Disinformation campaigns exploit enterprise platforms, data, and communities almost daily; these, and organizations that confer credibility on domains, are part of both the campaigns and the potential defenses against them. Many of these organizations can monitor for and respond to relevant disinformation either themselves or through trusted third parties and groups. This report describes disinformation from a threat response perspective. We begin by describing the business aspects of disinformation, then address disinformation as an information security issue, providing solutions for adapting existing cybersecurity processes, tools, and teams to include “cognitive security” in their security enablement, operations, and test and validation work. We address specific areas, such as the data engineering needed to handle disinformation’s three Vs: Volume, Velocity, and Variety. We also tackle the adaptation of InfoSec standards, to allow rapid sharing of disinformation incident information to responders and the data governance issues involved in monitoring and patching systems whose boundaries are outside an information security team’s control. We cover cognitive security framed as a risk management activity and ways to predict, assess, reduce, and disrupt those risks, and we outline how disinformation response can be added either to an existing Security Operations Center (SOC) or organized as a standalone SOC. This report was written by FiveBy Solutions, a specialized risk intelligence services firm. FiveBy consultants are experienced professionals with deep expertise in security, technology, computer crime, data science, brand protection, and business operations. By working closely with enterprises to identify and solve critical fraud, piracy, and compliance issues, we can empower businesses to develop, produce, market, and sell without fear of impact from abuse, fraud, or sanction. Enterprise Appropriate Responses to Disinformation Risks [Report]. (2021). 2 Seattle, WA: FiveBy Solutions. Table of Contents Executive Summary ........................................................................................................................................................ 2 Introduction .................................................................................................................................................................... 5 Understanding Disinformation ...................................................................................................................................... 6 Disinformation Threat Actors ..................................................................................................................................... 8 Disinformation and Business ..................................................................................................................................... 8 Cognitive Security: Disinformation Defenses as Information Security .................................................................... 10 Cognitive Security Functions ................................................................................................................................... 11 Cognitive Security as Risk Management ................................................................................................................ 11 Options for Disrupting Disinformation .................................................................................................................... 12 Cognitive Security Enablement: Making Defense Possible ...................................................................................... 13 Disinformation Data Engineering ........................................................................................................................... 13 Handling the “Three Vs” ...................................................................................................................................... 13 Handling Boundaries and Variety ....................................................................................................................... 14 Describing Disinformation: Adapting InfoSec Standards ...................................................................................... 14 Disinformation Layers: The Disinformation Pyramid ............................................................................................. 15 Disinformation Objects and Relationships: STIX/TAXII ...................................................................................... 16 Disinformation Behavior Models: AMITT ............................................................................................................ 17 Cognitive Security Test & Validation: Reducing Disinformation Risk ....................................................................... 19 Disinformation Risk ................................................................................................................................................. 19 Organization Risk Assessment ............................................................................................................................... 19 Organization Risks and Vulnerabilities ............................................................................................................... 20 Organization Capabilities ..................................................................................................................................... 20 Damage Reduction and Remediation................................................................................................................. 20 Disinformation Risk Prediction ............................................................................................................................... 21 Look for Relevant TTPs and Counters ................................................................................................................ 21 Map Known Vulnerabilities .................................................................................................................................. 21 Analyze Existing Incidents ................................................................................................................................... 21 Exercises and Simulations .................................................................................................................................. 21 Cognitive Security Operations: Real-time Defense ................................................................................................... 22 Disinformation SOC functions ................................................................................................................................. 22 3 Threat Monitoring and Detection ........................................................................................................................ 23 Threat Analysis and Response ............................................................................................................................ 24 Threat hunting ...................................................................................................................................................... 24 Cooperation and Reporting ................................................................................................................................. 24 SOC Organization ..................................................................................................................................................... 25 Organization Size ................................................................................................................................................. 25 SOC Tiers .............................................................................................................................................................. 26 Other Considerations .................................................................................................................................................. 27 Disinformation Strategies ........................................................................................................................................... 28 Reframing Piracy Conversion .................................................................................................................................. 28 Understanding Disinformation ................................................................................................................................ 29 Value-based Segmentation and Taxonomy ........................................................................................................ 29 Cognitive Security .................................................................................................................................................... 29 Creating response teams .................................................................................................................................... 30 Enabling Disinformation Management .................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    35 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us