{"id":3456,"date":"2023-01-25T10:30:45","date_gmt":"2023-01-25T10:30:45","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=3456"},"modified":"2023-01-26T10:53:29","modified_gmt":"2023-01-26T10:53:29","slug":"how-can-organisations-understand-the-causes-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2023\/01\/25\/how-can-organisations-understand-the-causes-of-cyber-attacks\/","title":{"rendered":"How can organisations understand the causes of cyber attacks?"},"content":{"rendered":"<p><span class=\"s3\">PhD Student Clare Patterson talks to Dell Technologies on their <\/span><span class=\"s3\">Need to Know <\/span><span class=\"s3\">podcast about how <\/span><span class=\"s3\">organisations can learn to understand incident causation and the underlying causes of a <\/span><span class=\"s3\">cyber attack<\/span><span class=\"s3\">.\u00a0<\/span><\/p>\n<p><span class=\"s3\"><a href=\"https:\/\/open.spotify.com\/show\/44xYy4HDdLNxwBiIHsa92Z?si=Naa3MnpuT6W4_w92nMN6Cg\">Listen to the full podcast on Spotify<\/a><\/span><\/p>\n<p><span class=\"s3\">Clare gained a <\/span><span class=\"s3\">Masters in Information Security<\/span><span class=\"s3\"> in the 1990s, when the organisations principally interested in cyber security were the military and banks. Over the last 30 years, she has worked as a consultant <\/span><span class=\"s3\">and<\/span><span class=\"s3\"> the<\/span><span class=\"s3\">n in<\/span><span class=\"s3\"> industry and last year decided to take time out to study a postgraduate degree in Cyber Security at University of Kent<\/span><span class=\"s3\">. <\/span><span class=\"s3\">Her research focuses on how organisations can learn more from cyber security incidents. <\/span><\/p>\n<p><span class=\"s3\">The <\/span><span class=\"s3\">Need to Know<\/span><span class=\"s3\"> series <\/span><span class=\"s3\">invite<\/span><span class=\"s3\">s<\/span><span class=\"s3\"> leading cyber security specialists and experts to probe into issues and share best practises to combat current and emerging cyber security threats.<\/span> <span class=\"s3\">On this episode<\/span><span class=\"s3\"> of the podcast<\/span><span class=\"s3\">,<\/span> <span class=\"s3\">Clare <\/span><span class=\"s3\">talk<\/span><span class=\"s3\">s<\/span><span class=\"s3\"> about <\/span><span class=\"s3\">her current <\/span><span class=\"s3\">research <\/span><span class=\"s3\">into how organisations <\/span><span class=\"s3\">learn from incidents<\/span><span class=\"s3\">. <\/span><\/p>\n<p><span class=\"s3\">This episode<\/span><span class=\"s3\"> covers <\/span><span class=\"s3\">the <\/span><span class=\"s3\">common<\/span> <span class=\"s3\">causes of <\/span><span class=\"s3\">cyber <\/span><span class=\"s3\">incident<\/span><span class=\"s3\">s<\/span><span class=\"s3\">. <\/span><span class=\"s3\">Where organisations <\/span><span class=\"s3\">are<\/span><span class=\"s3\"> under <\/span><span class=\"s3\">significant <\/span><span class=\"s3\">pressure to deliver more at lower cost<\/span><span class=\"s3\">,<\/span> <span class=\"s3\">with over-stretched teams<\/span><span class=\"s3\">.<\/span> <span class=\"s3\">Although employees <\/span><span class=\"s3\">try their best<\/span><span class=\"s3\">, <\/span><span class=\"s3\">they are <\/span><span class=\"s3\">often <\/span><span class=\"s3\">being <\/span><span class=\"s3\">pushed to deliver more with constrained resources.<\/span> <span class=\"s3\">It <\/span><span class=\"s3\">can be tempting <\/span><span class=\"s3\">for practitioners <\/span><span class=\"s3\">to be enticed <\/span><span class=\"s3\">by <\/span><span class=\"s3\">an <\/span><span class=\"s3\">illusion of <\/span><span class=\"s3\">\u2018p<\/span><span class=\"s3\">aradise by prevention<\/span><span class=\"s3\">\u2019<\/span><span class=\"s3\"> where you have full compliance and full contro<\/span><span class=\"s3\">l. <\/span><span class=\"s3\">However, the requirement to have complete <\/span><span class=\"s3\">reliability on people and systems<\/span> <span class=\"s3\">isn\u2019t realistic in the world <\/span><span class=\"s3\">that <\/span><span class=\"s3\">we operate<\/span><span class=\"s3\"> within<\/span><span class=\"s3\">.<\/span> <span class=\"s3\">When <\/span><span class=\"s3\">it is<\/span><span class=\"s3\"> underst<\/span><span class=\"s3\">oo<\/span><span class=\"s3\">d incidents are enabled by flaws in the overall ecosystem rather than simply caused by one faulty component <\/span><span class=\"s3\">organisations can tackle the underlying causes<\/span> <span class=\"s3\">to become <\/span><span class=\"s3\">more resilience.<\/span> <span class=\"s3\">Good learning from incidents &#8211; needs leaders who involve the right people <\/span><span class=\"s3\">and<\/span><span class=\"s3\"> set the right approach to learning.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PhD Student Clare Patterson talks to Dell Technologies on their Need to Know podcast about how organisations can learn to understand incident causation and the &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2023\/01\/25\/how-can-organisations-understand-the-causes-of-cyber-attacks\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":74034,"featured_media":3083,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[124,122,1,178057],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3456"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/74034"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=3456"}],"version-history":[{"count":3,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3456\/revisions"}],"predecessor-version":[{"id":3460,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3456\/revisions\/3460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/3083"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=3456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=3456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=3456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}