Expert Speak
RACE Model: Building Cyber Resiliency and Mitigating Network Risks by Going Back to Basics

Written by H.E. Dr. Mohamad Al Kuwaiti, Head of Cybersecurity, UAE Government, and Dr. Aloysius Cheang, Chief Security Officer, Huawei Middle East & Central Asia
Jim Rohn once famously said, “Without a sense of urgency, desire loses its value.” Resilience is key to surviving in today’s world full of emerging technologies and hot-button buzzwords. It is a race towards all that is good, towards cyber survivability, a race of the utmost urgency and importance. As such, cybersecurity and, in particular, cyber resiliency is more than just having an incident response plan or a computer security policy. It is about ensuring that your entire security posture can withstand a wide range of threats, which includes hybrid, blended attack vectors that can transcend time and space through the interplay of physical, cyber, and virtual planes that take apart traditional brick-and-mortar aspects of any organizations and cross-borders jurisdiction.
Hence, we need to design a more holistic security framework by integrating cyber and physical security measures, hardening critical systems, and creating cross-functional teams and multi-disciplinary teams that will involve team members not only from our organization but also from other stakeholders in our ecosystem that can address risks from multiple angles. Indeed, designing an auto-adaptable, self-evolving security framework that will evolve alongside the volatile and rapidly evolving threat landscape will be crucial to maintaining cyber resiliency and, therefore, safeguarding the business in the new intelligent era. But, without a doubt, there’s an urgent need to prioritize building cyber resiliency above all other matters.
Leonardo Da Vinci said, “I have been impressed with the urgency of doing. Knowing is not enough. We must apply. Being willing is not enough. We must do.” To build resilience, having a lofty mission statement with an ambitious plan is not enough; the efforts must be grounded in the practicality of getting our hands dirty and being able to paddle in and out of the mudflats regardless of how much the mud will engulf you.
Figure 1 shows our proposed RACE model as a simple four-part process to look at how organizations can build cyber-resiliency with a feasible and actionable plan to achieve our objective of securing any organization by going back to basics. By going back to basics and doing them well, it will at least address 90% of the problems that most organizations are facing today. The solution needs not to be complex nor flamboyant; it just needs to be practical, and if one can cut through the levels of complexity and zero in on the crux of the problem and put in place basic security controls that are effective and efficient, it will lay the groundwork for success.
Borrowing the analogy of racing, would you be driving a race car that has a manual gearbox for full control and is tuned for the race track, or would you just take any car straight from the garage untuned for the conditions of the race track and relying on the car’s automatic gearbox to take care of the driving? Thus, it is clear that returning to basics and tuning your security measures for accuracy and precision is a much better bet than pouring huge investments into advanced systems and mechanics, building layers and layers of security indiscriminately.
Being accurate and precise will enable us to build quantifiability into our cybersecurity program. Accuracy and precision are both ways to measure results. Accuracy measures how close results are to the true or known value, while precision, on the other hand, measures how close results are to one another or, in other words, how well our defences are designed and executed. This is our motivation behind the development of the RACE model. The subsequent paragraph will describe each key component of the model in greater detail.

Figure 1: The RACE model, a simple 4-part plan for building cyber resilience
Firstly, resiliency in modern cybersecurity speaks to the capability to provide value for the customer. In simplistic terms, it is to provide robustness and survivability of the organization’s cyber footprint in the face of adversaries and threats, meet compliance needs for business governance while excelling and providing a competitive advantage, using whatever security capabilities are based on established best practices, processes, and frameworks that achieve repeatable results. Figure 2 below summarizes what it takes to build cyber resilience and the value it brings to the table, taking into consideration the interplay between being compliant and building capabilities to support the resiliency of the entire information infrastructure that supports the business of an organization.

Figure 2: Building trust, enhancing cyber resilience, and mitigating risks in action
Next, awareness refers not only to imbuing a culture of cybersecurity among all the staff in an organization to the extent that basic cyber hygiene can be practised but also to targeting the team focusing on delivery and maintaining ICT and security services within the organization so that they pay attention to cementing their core competencies and fundamentals. Hereby, it is recommended that harnessing risks and hedging your bet against the barrage of threats based on a risk-based approach is the best way, given that resources on hand are always scarce, limited, and, to some extent, expensive. Given that is the case, we have identified five basic core fundamentals that every cybersecurity team in any organization needs to build up on their basics (and manage them well) based on common cybersecurity issues faced, as depicted in Figure 3. While it may seem simple, the devil is always in the details to ensure a job is done well.

Figure 3: Managing five common risks (end-to-end) comprehensively as a basis for building cyber resilience
One man, organization, or country cannot resolve cybersecurity issues alone. It takes an entire village to address cybersecurity issues as they affect everyone if anything goes awry. Cybersecurity is a team sport, and all the stakeholders within the ecosystem must contribute towards addressing the elephant in the room, as shown in Figure 4. We always find strength in numbers because “united we stand, divided we fall.” We see the Blackhat community is doing that exactly, and that is why they are always a step ahead of the good guys every time, thereby summarizing the urgency to Collaborate as a key differentiating measure.

Figure 4: Cybersecurity is a team sport. So, who is on the team?
Last but not least, we need to bring everything together to build or Engineer the process, putting the cogwheels into their rightful places to drive the engine forward. We have identified five key fundamental security measures that, if done diligently, will be key to building an end-to-end resilient system and reducing network risks. As shown in Figure 3, the five key fundamental security measures are 1) software integrity protection, 2) security configuration, 3) digital certification management, 4) vulnerability remediation, and 5) product lifecycle management. Take “Security configuration” as an example. To engineer and address the risk brought about by system misconfiguration, we need to break it down into its elements or identify its Work Breakdown Structure or WBS, which is a key step for planning project tasks and allocating resources.

Figure 5: Security Configuration Example: Optimize the Security Configuration Baseline based on Service Scenarios
Figure 5 summarizes typical work done to break down “security configuration” into its WBS. While this figure does not depict the complete picture, it does show a deep dive into each piece of work. One should keep working on breaking it down until the project scope and all the tasks required to complete the project can be visualized in one snapshot.
In conclusion, we have distilled the entire RACE model in detail in this paper. Achieving RACE is key to building resiliency for any organization. The important thing to note is to keep it simple and go back to basics. Build an auto-evolving, adaptable security framework based on the strategy that is designed to shape-shift alongside emerging blended, hybrid threats by leveraging on actionable intelligence, building resilience, and fostering collaboration so that individuals, organizations, and nations. Establishing public-private partnerships (PPP) with governmental entities and authorities enables public sector players, such as the UAE Cyber Security Council, to act as the fulcrum for coordinating and pooling resources and intelligence. This will enable our modern society to defend against today’s threat and safeguard one’s digital journey by addressing the challenges of tomorrow’s Age of Intelligence.
Artificial Intelligence
How AI is Reinventing Cybersecurity for the Automotive Industry

Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)
Cyber Security
Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits

Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.
Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.
Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.
Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.
Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”
Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.
Expert Speak
What the Bybit Hack Reveals About the Future of Crypto Security

Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)
-
Cyber Security1 week ago
Dubai Hosts GISEC 2025, Driving Billion-Dollar Cyber Growth
-
Cyber Security6 days ago
GISEC 2025 Launches OT Security Conference Amid 49% Infrastructure Attack Surge
-
Cyber Security1 week ago
DESC to Highlight Dubai’s Cyber Defense Strategies as GISEC 2025 Government Partner
-
Cyber Security1 week ago
GISEC Global 2025: A Vital Platform to Connect With Customers and Partners in the Region
-
Artificial Intelligence6 days ago
CyberKnight Partners with Ridge Security for AI-Powered Security Validation
-
Cyber Security7 days ago
Huawei Experts Reiterate the Importance of a Unified Cybersecurity Foundation at GISEC Global 2025
-
Cyber Security1 week ago
Inside the Shadowy World of Investment Scams: How Fraudsters Use Facebook and Fake News
-
Cyber Security1 week ago
Rising Cyber Insurance Pressures Push UAE Firms to Fix Identity Silos and AI Vulnerabilities