Your cyber intelligence source

Know your enemy: how to become a cybercriminal

Know your enemy: how to become a cybercriminal

In the first of a two-part series looking into how cybercriminals operate, organised crime consultant, lecturer and researcher Chris Allen looks at how and why people become cybercriminals and what we can do to stop them…


At first glance, stopping individuals engaging in nefarious activities at an early age seems more the remit of a government or charity than a CISO, but when you dig a little deeper it makes perfect sense.

A CISO’s primary role is the protection of their firm’s system security. By investing money into prevention and engagement activities, the number of people willing to perpetuate these sorts of attacks reduces in the longer term: enticing criminals rather than punishing them – the ‘hug a hacker’ brigade – is worthwhile.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image
share