David Hétu, Chief Research Officer at Flare Systems, defined what Digital Risk Protection is and who needs it most.
Who is Digital Risk Protection for? The short answer is everyone who stores personal and financial information as well as develops intellectual property.
The long answer is that malicious actors are opportunistic in nature. This means that companies with a security maturity level that is more limited will likely be tested by malicious actors, even if they only have a small number of customers. These companies may believe that their relative anonymity protects them from attacks, but the automation of attacks means that anyone connected to the internet needs to think about the security of their data and their intellectual property. Larger companies, with mature security teams, are already very aware of malicious attacks. Their problem may instead lie in the overwhelming number of alerts that they receive and need to pay attention to.
Digital Risk Protection is a solution that is adaptive to all companies, whether they be SMB or large enterprises. It integrates differently in the attack mitigation framework of companies depending on the industry and the maturity of security teams.
The presentation was introduced by the difference between Digital Risk Protection (DRP) and the Cyber Threat Intelligence (CTI). Then David Hétu listed and went in details into the various prejudices around the DRP:
- DRP is not for small companies
- DRP is too complicated to implement
- DRP is burning too many resources
The presentation was concluded over concrete operational questions:
- what do you need to ask to vendors and yourself while choosing a DRP solution?
- What role and place does the DRP take into your cybersecurity strategy?
About the Speaker
David Hétu – Chief Research Officer at Flare Systems
As Director of Research, David leads scientific research operations at Flare Systems. A PhD in criminology from the Université de Montréal, he focuses his research on illicit markets on the internet and the dark net. His findings, published in over 40 articles over the last 10 years, have provided insights into the structure and inner workings of the criminal underground.