Understanding Threat Actors For Better Cyber Incident Response & Resilience
Date: 27 May 2020
In any discussion on cyber incident response & resilience, it is imperative to deliberate upon the subject of threat actors. After all, if you can’t identify who could potentially harm your business, how will you anticipate the kind and scale of damage they can cause?
In this blog, we cover:
- What/who are your threat actors?
- Why is understanding your threat actors imperative for good CIPR?
- Common threat actor types
- Threat actor attributes
What/who are threat actors?
As the name suggests, threat actors or agents can be any individual/ group that is capable of causing harm to your business and data security. Their inherent ability to cause harm, despite what their intentions may be, justifies the tag ‘threat actors’ and it is advisable to stick to one uniform term when discussing such agents instead of creating too many verbal categorizations.
While this blog aims to offer a surface-level understanding of the importance of knowing one’s threat actors, Cyber Management Alliance's NCSC-Certified Cyber Incident Response & Planning Course delves into the subject deeply and will help the management and technical teams agree on a threat library. In fact, our module on Threat Actors is currently available free of charge on our training platform. You can click on the link below to access this free module and get an in-depth understanding of who your potential business adversaries can be.
Why is understanding your threat actors imperative for good CIPR?
Quite simply, if you don’t know who your threat actors are, you’ll not be able to get any clarity on their motivations, their modus operandi, their capabilities or what assets they may be after.
Further, clearly identifying the threat agents will allow you to effectively allocate resources (budgets and time) to the most relevant risks and threats.
So how do you go about enlisting your threat actors? The idea is to have the technology and management teams reach a consensus about who the possible threat actors are and what their attributes are like. This simple exercise on its own can be a huge step forward in enabling everyone to better understand the business’s threat landscape and build a solid response strategy.
Common threat actor types
- Disgruntled insiders
- Careless employees
- Nation states
Threat Actor Attributes
Enlisting the threat actors, however, isn’t enough and the organisation will need to evaluate their attributes to correctly assess the threat to the business. A cursory understanding of attributes can be gathered on the basis of the following considerations:
- Intent - Depending on whether a threat actor harms the business intentionally or accidentally, he/she is classified as a hostile or a non-hostile agent, respectively.
- Access – This refers to whether the threat actor had internal access or was able to gain access externally.
- Skill Level – This classification is based on the skill level of the threat actor and can range from ‘none’ to ‘adept’.
- Resources - This determines the resources available to the agent for use in an attack.
- Visibility – Visibility refers to the extent to which the agent wishes to reveal his/her identity.
- Objective – As the name suggests, here we try to identify the objective of what the threat actor is doing - is it to make a copy of an asset, destroy it, take control of it or if the agent has no defined motive at all?
- Outcome – Outcome means the primary goal of the attack. It can range from theft or gaining a competitive market advantage to simply causing embarrassment to the business. In many cases, if the threat actor is non-hostile the outcome could be totally unintentional.
These classifications and considerations offer a preliminary understanding of the vast and highly relevant subject of Threat Actors.
Our NCSC-Certified course on Cyber Incident Planning & Response covers this topic in great detail and is an excellent way for organisations to not only identify threats to their business but also prepare to combat them successfully.
The good news is that for a limited period of time, you can access our module on Threat Actors, from our NCSC-Certified course, free of charge here.