full transcript

From the Ted Talk by Caleb Barlow: Where is cybercrime really coming from?

Unscramble the Blue Letters

Unfortunately, this is not at all what we see in rpessone to a cyber attack. Organizations are far more likely to keep itrooafinmn on that attack to themselves. Why? Because they're worried about competitive advantage, laogiititn or rtolgeiuan. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's hapenpnig.

Open Cloze

Unfortunately, this is not at all what we see in ________ to a cyber attack. Organizations are far more likely to keep ___________ on that attack to themselves. Why? Because they're worried about competitive advantage, __________ or __________. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's _________.

Solution

  1. response
  2. information
  3. happening
  4. litigation
  5. regulation

Original Text

Unfortunately, this is not at all what we see in response to a cyber attack. Organizations are far more likely to keep information on that attack to themselves. Why? Because they're worried about competitive advantage, litigation or regulation. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's happening.

Frequently Occurring Word Combinations

ngrams of length 2

collocation frequency
bad guys 4
security researchers 3
dyre wolf 3
bilal bot 3
threat intelligence 3
billion dollars 2
attack software 2
share information 2
attack techniques 2
security industry 2

Important Words

  1. advantage
  2. arsenal
  3. attack
  4. bad
  5. competitive
  6. cyber
  7. data
  8. democratize
  9. effectively
  10. faster
  11. guys
  12. happening
  13. information
  14. intelligence
  15. litigation
  16. move
  17. moving
  18. open
  19. organizations
  20. private
  21. regulation
  22. response
  23. share
  24. threat
  25. worried