Five Things Every Organization Should Know about Detecting And Responding To Targeted CyberattacksFive Things Every Organization Should Know about Detecting And Responding To Targeted Cyberattacks
Most companies continue to try to protect themselves using approaches that are years out of date, according to a new how-to book published by ISACA and written by Ernst & Young
May 16, 2013

PRESS RELEASE
Rolling Meadows, IL, USA (15 May 2013)--The advanced persistent threat (APT) is waging an all-out attack on enterprises' intellectual property. Yet most companies continue to try to protect themselves using approaches that are years out of date. That is one of the conclusions in Responding to Targeted Cyberattacks, a frank new how-to book published by global IT association ISACA and written by Ernst & Young LLP.
The threat landscape has progressed from unsophisticated "script kiddies" to hackers to insiders to today's state-sponsored attacks, where enterprises are attacked because of who they are, what they do and the value of their intellectual property (IP).
"There are no universal solutions to prevent being infiltrated," said James Holley, leader for Ernst & Young LLP's Information Security Incident Response services and co-author of the book. "If sophisticated and well-funded attackers target a specific environment, they will get in. In this rapidly evolving threat landscape, information security professionals need to adopt the mindset that their network is already compromised or soon will be."
In a detailed look at an escalating global problem, the authors highlight five things every organization should know:
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025