{"id":284,"date":"2016-10-13T00:00:00","date_gmt":"2016-10-13T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/"},"modified":"2024-06-10T23:33:43","modified_gmt":"2024-06-10T23:33:43","slug":"part-2-fix-the-cyber-market-disfunction","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/","title":{"rendered":"PART 2: Fix the Cyber Market Disfunction"},"content":{"rendered":"<div class=\"prose\">\n<p>In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies.<\/p>\n<p>There are two fundamental challenges faced in the cyber landscape: legal structures and virtually nonexistent market forces. The legal challenge will be discussed in a later part of this series. For Part 2, the focus is on the marketplace.<\/p>\n<p><strong><span class=\"underline\">Supply and Demand<\/span><\/strong><\/p>\n<p>The main problem is the demand side, but a few observations first about the supply side include:<\/p>\n<p>a) simply attend an RSA conference and it is extremely evident that there is no shortage of supply of cybersecurity products; b) products alone do not solve the risk of cyberattack, however; c) integrating different products offering different features is complex, has manpower implications, and is costly; d) the market is shifting toward services, including risk assessments, due diligence and cyberlaw, cyber threat intelligence, and information sharing (to name just a few areas); e) services help customers develop a more mature defensive posture, but similarly carry manpower and cost burdens.<\/p>\n<p>Turning to demand, there are plenty of service providers. That is: consultants, technicians, strategists, and other specialists (albeit, not many cyberlaw attorneys).<span class=\"underline\">What is lacking, however, is demand<\/span>. Just over a week ago, the UK\u2019s intelligence agency GCHQ Director Robert Hannigan declared:<\/p>\n<p><em>\u201cThe global cyber security market is not developing as it needs to: demand is patchy\u2026\u201d<\/em><\/p>\n<p>In the UK, <a href=\"http:\/\/www.scmagazineuk.com\/free-market-is-failing-cyber-security-blasts-gchq-chief\/article\/453809\/\" target=\"_blank\" rel=\"nofollow noopener\">he called upon the UK government to intervene<\/a>:<\/p>\n<p><em>\u201cIt is time to take a hard look at whether the international market for cyber security is working sufficiently well \u2026 something is not quite right here. What is also clear is that we cannot as a country allow this situation to continue.<\/em><br \/>\n<em>\u201cStandards are not yet as high as they need to be. The normal drivers of change, from regulation and incentivization through to insurance cover and legal liability, are still immature.\u201d<\/em><\/p>\n<p>Here in the US, government attempts to spur demand have included engagement with the insurance industry, research and collaboration projects to spur innovation, and flow down provisions through federal contracting mechanisms. To date, none has served to truly catalyze a marketplace for cybersecurity.<\/p>\n<p>The markets that show the most demand for cyber solutions are the sectors where business operations are most at risk and cannot afford a catastrophic attack: large retailers, financials, defense and government contractors, and a few other sectors. Even within these market segments, the big enterprises are the ones spending money on cybersecurity. There is little appetite for increasing capital expenditure for cybersecurity among the vast majority of businesses in America.<\/p>\n<p>An executive once opined to me that he did not see the business case (for a cybersecurity engagement).\u00a0 Others I know, reading reports of recovery costs ranging from $25 &#8211; $50k from the loss of just one unencrypted laptop, fear sharing any cyber data with anyone.\u00a0 Even confidential cyber due diligence discussions under attorney-client privilege is not a palatable endeavor when cyber is not in the budget. In many businesses, demand for cyber services is virtually nonexistent, likely caused by several factors: lack of awareness of risk, recalcitrance, lack of budget, lack of leadership, risk transfer, or risk acceptance.<\/p>\n<p>Hence, Mr. Hannigan\u2019s observation is largely true in the US, and indeed is likely true throughout the world. Based on this assessment, and doubling down on the need for structural change to address an existential risk, we are at a pivotal point where something has to change! Sony and Saudi Aramco were warning signs that a calamitous cyberattack upon critical infrastructure is a very real threat.<\/p>\n<p>When a senior government official takes a firm stand like Mr. Hannigan\u2019s \u2018<em>government cannot allow this to continue<\/em>\u2019 remark, it is evident that regulations are coming (at least in the UK). For advocates of market forces over regulation, a Free Markets Cyber Movement must aggressively alter the current market dynamics. Otherwise, the argument for a baseline of security through compliance measures is likely to be advanced by governments everywhere.<\/p>\n<p><span class=\"underline\"><strong>An Environmentalist Comparison<\/strong><\/span><\/p>\n<p>A quick study of the evolution of environmentalism would be useful in this context. Like cyber risk, this movement originated from risk-based concerns. Activists mobilized society to take action to reduce pollution and other environmental harms to the planet, ultimately leading to systemic efforts at national and international levels.\u00a0 Over time, market forces emerged.\u00a0 Aspects of this movement could be adopted for cyber. For example, there is a Free Markets Environmentalism body of study.<\/p>\n<p>However, we lack time, and kick starting a cyber mobilization could learn from the missteps of the environmental movement in order to leap ahead to the market enabling dimensions of environmentalism.<\/p>\n<p>For example, we should quickly determine whether a centralized carbon credit model is preferred over a true Free Market model. Yet, in either case, the focus has to be establishing the conditions for incentivizing the demand side of the market.<\/p>\n<p>In my own experience, what can work is creating the conditions whereby companies find a competitive advantage in branding themselves as a secure enterprise. Competing on security creates an incentive for spending, which will help the demand side of the market. In my judgment, this can best be accomplished at the community level.<\/p>\n<p><span class=\"underline\"><strong>Focus on Communities<\/strong><\/span><\/p>\n<p>In my professional endeavors, and those include national and international projects, and across focus areas such as cyber intelligence, cyberlaw, information sharing, and community capacity building, I have found that large programs are slow to permeate the national landscape. That\u2019s a top down, government approach. While important for creating a systemic environment and for development of programs that can be imported by local activities, it is ultimately at the local levels where the market building dynamics referenced in this piece must be implemented.<\/p>\n<p>As next Parts in this series will explore, there are structural changes needed to spur a cyber marketplace. The environmental movement provides a model that should be referenced in regard to developing market forces. Most importantly in the cyber context, implementation of structural changes must build cyber market forces at the community level, and it must address the needs among small businesses for improved cyber hygiene.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":285,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[27],"tags":[287],"class_list":["post-284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy","tag-cyber-market"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"PART 2: Fix the Cyber Market Disfunction - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2016-10-13T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:33:43+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"PART 2: Fix the Cyber Market Disfunction - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#blogposting\",\"name\":\"PART 2: Fix the Cyber Market Disfunction - CTIN\",\"headline\":\"PART 2: Fix the Cyber Market Disfunction\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Schneider-Electric-HMI-Gateway-Comes-With-Hard-Coded-FTP-Credentials-470774-2-e1476358428571.jpg\",\"width\":280,\"height\":106},\"datePublished\":\"2016-10-13T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:33:43+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#webpage\"},\"articleSection\":\"Policy, cyber market\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#listItem\",\"name\":\"PART 2: Fix the Cyber Market Disfunction\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#listItem\",\"position\":5,\"name\":\"PART 2: Fix the Cyber Market Disfunction\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/\",\"name\":\"PART 2: Fix the Cyber Market Disfunction - CTIN\",\"description\":\"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Schneider-Electric-HMI-Gateway-Comes-With-Hard-Coded-FTP-Credentials-470774-2-e1476358428571.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#mainImage\",\"width\":280,\"height\":106},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2016\\\/10\\\/13\\\/part-2-fix-the-cyber-market-disfunction\\\/#mainImage\"},\"datePublished\":\"2016-10-13T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:33:43+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>PART 2: Fix the Cyber Market Disfunction - CTIN<\/title>\n\n","aioseo_head_json":{"title":"PART 2: Fix the Cyber Market Disfunction - CTIN","description":"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#blogposting","name":"PART 2: Fix the Cyber Market Disfunction - CTIN","headline":"PART 2: Fix the Cyber Market Disfunction","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2016\/10\/Schneider-Electric-HMI-Gateway-Comes-With-Hard-Coded-FTP-Credentials-470774-2-e1476358428571.jpg","width":280,"height":106},"datePublished":"2016-10-13T00:00:00+00:00","dateModified":"2024-06-10T23:33:43+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#webpage"},"articleSection":"Policy, cyber market"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#listItem","name":"PART 2: Fix the Cyber Market Disfunction"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#listItem","position":5,"name":"PART 2: Fix the Cyber Market Disfunction","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/","name":"PART 2: Fix the Cyber Market Disfunction - CTIN","description":"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2016\/10\/Schneider-Electric-HMI-Gateway-Comes-With-Hard-Coded-FTP-Credentials-470774-2-e1476358428571.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#mainImage","width":280,"height":106},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/#mainImage"},"datePublished":"2016-10-13T00:00:00+00:00","dateModified":"2024-06-10T23:33:43+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"PART 2: Fix the Cyber Market Disfunction - CTIN","og:description":"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2016-10-13T00:00:00+00:00","article:modified_time":"2024-06-10T23:33:43+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"PART 2: Fix the Cyber Market Disfunction - CTIN","twitter:description":"In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would lead to a destabilized world unless structural changes were pursued. The biggest loser in this ongoing destabilization would be Western economies. There are two fundamental challenges faced in the cyber landscape: legal structures","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"284","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:44:58","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:54:16","updated":"2025-08-25 22:44:58"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPART 2: Fix the Cyber Market Disfunction\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"PART 2: Fix the Cyber Market Disfunction","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2016\/10\/13\/part-2-fix-the-cyber-market-disfunction\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":2,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":432,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/284\/revisions\/432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/285"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}