%0 Conference Proceedings %T Towards a C2I Platform for Combating the Cyber-Threat %+ BT Innovate (BT) %A Kearney, Paul %Z Part 1: Keynotes %< avec comité de lecture %( Lecture Notes in Computer Science %B 6th International Workshop on Information Security Theory and Practice (WISTP) %C Egham, United Kingdom %Y Ioannis Askoxylakis %Y Henrich C. Pöhls %Y Joachim Posegga %I Springer %3 Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems %V LNCS-7322 %P 17-19 %8 2012-06-20 %D 2012 %R 10.1007/978-3-642-30955-7_2 %K Cybersecurity %K Cyber-threat %K Managed Security Service %Z Computer Science [cs]Conference papers %X In my talk, I outline a number of cyber-attacks that have been reported in recent years, and examine the vulnerability of organisations and critical infrastructure to them. I then discuss an approach to combating cyber-threats that integrates specialised tools within a managed service platform to create a command, control an intelligence (C2I) system used to co-ordinated defences against a diverse collection of resourceful and persistent opponents. The discussion is illustrated with examples from BT research and development projects. Such a system will have to be refreshed and up-graded regularly to keep pace with challenges such as: The escalating arms race against threat agents,Innovations in technology and business practice,Changing regulations and compliance demands,A cyber-Moore’s Law that dictates a continual shrinking of required response timesUltimately it will need to be adaptive and to learn from experience. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01534309/document %2 https://inria.hal.science/hal-01534309/file/978-3-642-30955-7_2_Chapter.pdf %L hal-01534309 %U https://inria.hal.science/hal-01534309 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-7322