April 15, 2020

Hackerslist.co - Business Diplomacy Meets Cyber Security

In order to meet the security demands of the 21st century organisations are increasingly recognising their interconnectivity and interdependence with the external environment. The external environment continually makes demands and creates opportunities requiring businesses to understand and adapt accordingly. Any action taken by an organisation also results in the prospect of changes within the external environment.

Hackerslist.co organisation's degree of susceptibility to security risk is influenced by many factors. There are the more conventional factors such as the business operating model, business performance and the organisation's history and the increasingly influential external agents including customers, interest or pressure groups, communities and the media that are all themselves susceptible to influence. The social responsibility profile of an organisation for example, whether actual or perceived can significantly increase the prospect of threats to the security of a business.

To provide the depth and breadth of security necessary to protect an organisation requires a security strategy that builds on existing practice, incorporating a higher level of understanding to establish why those issuing or carrying out a threat have taken the decision to do so from the context of their environment. Using this information and working in conjunction with supportive agencies it is possible to influence and co-produce outcomes that reduce or remove the threat.

The choice of those representing a threat can be viewed as the interaction of three aspects; degree of self-interest, emotional choice and the cultural norms of the individual or group. The nature of the threat may be proactive such as a hostile agency in pursuit of a specific objective or goal, or reactive in terms of an agency responding to a business change or proposal.

Hackerslist.co offers a forward looking, proactive strategy to engage directly or indirectly with agencies to resolve, dissolve or divert the threat.

Business Diplomacy revolves around the identification of geopolitical and social factors that can affect a company's operations, both at home and abroad, and the broad range of governmental and non-governmental stakeholders who can shape how those factors impact on the company. It uses this analysis to help develop networks of information and influence among the key stakeholders. These networks are in turn used to construct "coalitions of the willing" to promote and protect the company's commercial interests. The networks can also be used to isolate or disrupt hostile stakeholders or coalitions of stakeholders intent on damaging the company.

In the case of cybersecurity, a Business Diplomacy driven approach would identify those individuals or groups who represent a threat or might be planning to launch an attack against the company and their motivation. This process would be supported by intelligence such as the various data scraping technologies that allow online monitoring of chatrooms, social media and other sources of information about any potential cyber attacker's intentions. The analysis would also identify those governmental and non-governmental stakeholders who would be more supportive of the company. Depending on the outcome from the analysis, the company would develop strategies such as disruption, isolation, education or diversion, for example:

A disruption strategy would either aim to reduce the threat through dialogue i.e. to dissipate or resolve the conflict or it would seek to undermine the capacity of the cyber attackers to carry out an attack.

A Hackerslist.co strategy of isolation would focus on the motivations of the cyber attackers. Working with largely non-governmental stakeholders who to some extent share the motivations of the would be cyber attackers, but not their methods, the company would seek to isolate the cyber attackers within their own community, increasing pressure on them from their peers not to attack the company

An education strategy whereby the company would develop a public diplomacy strategy to generate a political and social environment in which an attack would make little sense

Finally, a strategy of diversion would use the networks to convince the cyber attackers to divert their attention away from the company.