This option involves shutting down critical parts of the trading system to prevent further unauthorized access. The lockdown would be targeted at systems identified as compromised or at high risk. The implementation time is 1 hour and the technical risk is low to moderate.
Advantages
Disadvantages
This strategy involves isolating sections of the network that are believed to be compromised, allowing parts of the system to continue operating while affected areas are dealt with. The implementation time is 2-3 hours and the technical risk is moderate, due to the need for precise network mapping and execution.
Advantages
Disadvantages
Your approach is to upgrade system monitoring tools and protocols to detect unusual activities more efficiently and effectively, focusing on the most critical areas of the network and trading systems. The implementation time is 2 days and the technical risk is moderate to high to achieve the desired level of efficacy and using a streamlined deployment and systems integration approach.
Advantages
Disadvantages
This strategy involves setting up decoy servers or databases (i.e. honeypots) to mislead attackers into targeting non-critical system parts, thereby protecting valuable data and gathering intelligence on their methods. The implementation time is 2-3 days and the technical risk is high, due to the complexity of creating convincing decoys that are effective against sophisticated threats.
Advantages
Disadvantages
This option involves transitioning the LSE’s cybersecurity framework to a Zero Trust model, where no entity inside or outside the network is trusted by default. All access requests are verified rigorously before granting access, ensuring that security is maintained through continuous validation of both credentials and device health. The implementation will take place incrementally over 3-6 months and the technical risk is assessed moderate to high due to the comprehensive changes required in both infrastructure and operational procedures.
Advantages
Disadvantages
This approach leverages a combination of advanced threat hunting by cybersecurity experts and AI-driven automated defence systems to detect, respond, and neutralize threats in real time. Threat hunters use AI-enhanced tools to conduct deep investigations into potential malicious activity while automated defense mechanisms respond to and contain threats as they are identified.
Advantages:
Disadvantages: