Gartner Blog Network


2018 is the year of enterprise-ready counterintelligence.

by Lawrence Pingree  |  June 17, 2017  |  1 Comment

Imagine for a moment, a future where enterprises get to remotely control the actions of the threat actor. A future where you will be able to engage products or services to monitor and inject the right information at the right time in order to disrupt or mislead the threat actor, pushing them towards the deceptive assets and applications that you want them to go to. A future that allows you to move the attacker away from sensitive assets and evolve their attack as they target you whether on premise or in the cloud.

 

In 2018, let’s re-imagine the security landscape, where we use active enterprise-ready counterintelligence operations to mislead the attacker and create havoc for their operational activities while disrupting them throughout the attack kill-chain. We will reap havoc in their attack discussions and planning cycles because attackers are vulnerable to deception and misdirection as they discuss the many ways to attack enterprises and their assets. We must rethink the future of security detection and response strategies in order to best leverage counterintelligence operations in countering the threat actor.

Additional Resources

Category: security  

Lawrence Pingree Research Vice President 8+ years at Gartner 24+ years IT security Industry Lawrence Pingree's responsibilities include providing critical insights to technology providers and product leaders on emerging technologies and trends. Mr. Pingree closely tracks the security markets, emerging technologies, trends and competitive market dynamics. He regularly reviews security technologies, provider businesses and their go-to market strategies and focuses on helping Gartner clients plan, choose and evolve as market dynamics shift. His analysis includes an examination of emerging technologies, market changes, go-to-market strategies, end-user buying behaviors, development plans and various business attributes to identify key competitive differentiation and competitive strategies. Read Full Bio




Thoughts on 2018 is the year of enterprise-ready counterintelligence.


  1. Gadi Evron says:

    Thank you for writing this Lawrence. It’s high time we took control of our networks and became dynamic in our response. We believe in the approach strongly, which is why we created a free version of MazeRunner, our cyber deception platform. Anyone can download and use it. Counter intelligence is no longer just for governments. It’s for security professionals who want to go to work every morning knowing that we are not destined to lose.



Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.