News - Swiss Cyber Solutions


Folgender Blog wird von Petra Wildemann in englisch geführt. Vielen Dank Petra!

About the Authors

Denny Wan and Petra Wildemann are co-authors of the White Paper “Pro-active cyber insurance pricing model” from 29 July 2018, which has been published on Social Media, Cyber-risk-insurance and Security Express

Denny Wan is the principal consultant of Security Express (, a Sydney Australia based cyber security consulting practice. His specialisation includes security policy development, IT security audit, GRC risk management, virtualisation and hybrid cloud security architecture. He is the chair of the Open Group FAIR Sydney Chapter ( and currently undertaking postgraduate research into Cyber Insurance Pricing Strategy at Macquarie University ( under an Australian Government Commonwealth Scholarship.

Petra Wildemann is the Chair and Founder of the Swiss Cyber Think Tank (, a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms. As a qualified actuary for Life Insurance and Property & Casualty Insurance in Switzerland (SAV), Germany (DAV) and UK (IFoA Affiliate), her specialisation includes risk management on a variety of local and global risks. Of late, she has expanded her focus to also include the challenges of modelling the risks in the age of cyber risk ( and the mismatch between measurement and pricing of cyber-risk insurance policies (

Real Time Cyber Threat Intelligence
Petra Wildemann, SAV, DAV, IFoA (Affiliate) 30 April 2019

Remembering the early days of the Internet and mass accessibility of data, it’s hard to believe how much things have changed – and where wide-scale access to data has brought us. It’s important not to lose sight of the fact that, from a historical perspective, „personal data“ as a hot-button topic is a very new phenomenon.

As hard as it might be for the younger generation to believe this, there was a time when medical reports usually didn’t go beyond doctors, patients and their families. Intimate photos were the exclusive province of family and trusted friends.

Over (roughly) the last two decades, the IoT has cast its spell over us. All over the world, people wake up and send personal data around the world, on a variety of platforms, using different applications, before they even start to prepare for their day. The spread of personal data which in the past would have been generally considered to be nobody else’s business goes on for most people through the whole day. The most popular messaging app is Whatsapp, with usage figures between 78% to 84%, depending on the age group 1) . The apps from the Facebook Universe (Whatsapp, Messenger) dominate communication for all but ten countries in the entire world. Sharing private photos and videos is also showing rapid growth, with Instagram leading the way. Ashley Poland 2) is observing the usage of Instagram to share personal data with a high-quality visual content. More than one eighth of the world’s population use Instagram with a growing community mainly with younger users 3).

The leaders of the platforms foresee a high growth potential for their business. And herein lies the dilemma. While users tend to trust platforms to protect their personal data, they might be less inclined to so trust them if they truly appreciated how the use of social media differs from the exchange of hardcopy letters, notes, etc. Data which is shared through digital applications cannot reliably be destroyed or retracted unless the providers of the platforms allow and support this, and sometimes not even then.

The giant and increasing volume of private and professional data on a large variety of data sources such as networks, applications, peripheral devices, cloud, darknet, social media and others creates a greater risk of manipulation and other data misuse than most users are aware of.

Is there an awareness of real time cyber threat intelligence (CTI)?

People and businesses need to be aware of their digital footprint4 and its variations, such as cyber shadow, digital shadow, electronic footprint and internet footprint 4). All such footprints can have passive and active data-use aspects, from data collection to the release of data, for a variety of purposes. Data may be „left behind“ intentionally or unintentionally, but in either case, it is highly unlikely that it will ever be completely deleted.

The danger inherent in electronic footprints is the use or misuse by businesses seeking to effectively market and sell their products. Such businesses typically have no interest in the people who left the footprints. The Real Time Cyber Threats Intelligence Petra Wildemann, SAV, DAV, IFoA (Affiliate) Petra Wildemann, SAV, DAV, IFoA (Affiliate) 30 April 2019 2 situation is different with internet footprints, where interested parties might range from law enforcement agencies and other legitimate agencies engaged in cyber-vetting of online activities to criminals (the dark net) searching for potential victims.

Cyber Threat Intelligence 5) addresses cyber threats on the strategic and on the operational level in order to enable decisions based on actual threat information. Such information ranges from automatic detection of data security threats to human analysis, and provides the basis for a decision process in a continuous interaction between people and software. CTI is used in security programs from governance to the private sector in order to identify and protect cyber-attacks on IT and computer systems, and on Telco networks.

Beyond immediate protection, there is a continuous effort to acquire a deeper understanding of the goals of the attackers and of their patterns of behavior, as the attackers interact with those who are using the internet in good faith. Digital shadows also need to monitor what is going on outside the system, hopefully to forestall malicious entry into the system.

The majority of cyber threat intelligence comes from communities and industry groups 6) . But other sources, such as internal sources and security vendors, also play important roles in the development of CTI in proactively stopping malware, ransomware and advanced threats, and in improving detection capabilities. Threat models require real-life data and expertise as well as re-utilization of data to secure awareness. There is much more to do, and the task is more complicated, than simply having security teams collect and use CTI for security operations and direct responses.

IT governance is an important factor in securing data and information. More and better governance is needed. Boards of directors, management and security leadership must forge a strong working relationship in order to create and implement a secure strategy to protect business and private data, „inside“ and „outside“, in order to mitigate risk as well as to meet compliance and regulatory requirements.

1 Statistics on Messaging Apps (

2 Uses of Instagram in Social Media / Ashley Poland (

3 22+ Instagram Stats that Marketers Can’t Ignore this year (2019) (

4 Digital footprint (

5 Dr. Svilen Ivanov: What is Cyber Threat Intelligence (

6 Cyber Threat Intelligence in Action (

Schreibe einen Kommentar

Diese Website verwendet Akismet, um Spam zu reduzieren. Erfahren Sie mehr darüber, wie Ihre Kommentardaten verarbeitet werden .

Wishlist 0
Open wishlist page Continue shopping