• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Offensive Defense Strategy to Manage Cyber Risks

by CXO Staff
June 17, 2020
in Opinions
Offensive Defense Strategy to Manage Cyber Risks

The Cyber Kill Chain concept developed by Lockheed Martin provides the basis of the intelligence-driven defense. Do note that the attackers have the liberty of time on their side. They may be working on planning an attack for as long as they desire. This is the pre-compromise stage starting with reconnaissance (due diligence) of the target.

 

When attackers are performing reconnaissance, your organization is more probable to be targeted if it has a weak security posture visible from cyberspace. Reconnaissance of a ‘digital footprint’ includes a survey of your cyber inventory with details on your publicly available information such as domains, hosts, digital certificates, social media accounts, etc. Auditing this information against a secure practice will determine how secure you appear from a hacker’s perspective. These gaps give you data points in the form of ‘Indicators of Exposure’.
If and when an attacker does select your organization as the target, they start building the attack pieces. They may register a lookalike domain, a bogus digital certificate, impersonated social media account, or even an executive profile, all these are some of the many ‘Indicators of Warning’ that organizations should take action against.

‘Indicators of Attack’ are the signs (data points) that reflect an ongoing attack specifically targeting your organization. A phishing page, impersonated Email, a malvertising document, your IP or Host in a blacklist are just some of the many data points that reflect a financial scam, malware injection, data exfiltration attack and more.

The big question: Is your current practice of managing attacks within networks (IOCs) sufficient or must it be augmented by an offensive defense approach? Detecting and mitigating at an early stage greatly reduces cyber risk as it tackles data points (IoE, IoW, IoA) in the attacker’s territory. It also means organisations can improve defenses by dismantling an attack in the pre-compromise stage.

The offensive defense approach is challenging because of the evolving nature of cyberattacks where new variations of attack categories need to be continuously identified. Indicators of Exposure, Warning, and Attacks are a moving target requiring innovative and dynamic systems, augmented by qualified threat analysts to effectively detect and mitigate. If done appropriately, the ROI is exponentially high.

Tags: CTM360Cybersecurity
ShareTweet

Related Posts

Why wait for the future, if we can just simulate it
Opinions

Why wait for the future, if we can just simulate it

April 21, 2026

Ashraf Hassan, General Manager, Lenovo Infrastructure Group, Gulf, explores how AI-accelerated simulation is transforming industries by enabling organisations to model,...

Why cybersecurity is at the core of modern surveillance
Middle East

Why cybersecurity is at the core of modern surveillance

April 16, 2026

Steven Kenny, Manager, Architect & Engineering (A&E) Program – EMEA, Axis Communications, on why modern surveillance systems must now be...

Discussion about this post

Latest Issue

Why wait for the future, if we can just simulate it

Why wait for the future, if we can just simulate it

April 21, 2026
ESET previews new AI security features to secure chatbot communications and AI workflows

ESET previews new AI security features to secure chatbot communications and AI workflows

April 21, 2026
NetApp’s new research finds AI is now foundational to modern marketing

NetApp’s new research finds AI is now foundational to modern marketing

April 21, 2026

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
    • CX50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX x AI Everything
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.