The three realities of ICT security all senior executives must accept

My colleagues and I are often asked by senior executives how they can make sure their organisation’s data is secure from loss. Security professionals know better than to ask, but they sometimes place false trust in tools that promise greater visibility or better defences. They also often ask us how they can make better sense of all the security data and event logs they’re drowning in.

There is no guarantee, tool or level of resourcing that can possibly protect 100% of your intellectual property 100% of the time. In the digital world, it is simply no longer feasible. But accepting three realities will help you form the best strategy.

Reality #1: Your enterprise is connected

Enterprise security professionals have spent most of the past decades on building fortresses against intruders. But as my colleague Clem Coleman pointed out in his recent article Man the barricades? The future of the network fortress, the assets and users you need to protect can no longer be confined in the ‘castle’ and each system or device requires its own intrinsic, embedded security. It’s become more about stopping your assets or intellectual property getting out than warding off what or who comes in.

As more services and applications migrate to the cloud, there are new channels for leaks to occur. But we can’t plug every leak in advance unless we have visibility over where organisational data exists. Policies and decisions on its protection can’t be made unless we’ve answered the questions: Where is it? How’s it being protected? Is it encrypted when it’s at rest?

Data loss prevention (DLP) technologies go some way to helping, by enabling you to impose security policies and business rules over what data users can transfer out of your enterprise. The challenge has also increased the value of cloud security access brokers, a term originally coined by Gartner to describe security policy enforcement between cloud service users and providers.

They add information about where connections go to, while interposing an enterprise’s security policies as cloud-based resources are accessed.

But before you can get any value from tools like these, your data and cloud security strategies must reflect the realities of being connected.

Reality #2: Your security will be breached

Hard though it is, you must accept that your organisation’s security will be breached. Even cyber security companies themselves are not spared (as evidenced by RSA and Kaspersky breaches). What’s really important is determining how (and how fast) you will respond. In this scenario, the focus must be on resilience. In my opinion, Kaspersky responded brilliantly — as opposed to Sony’s inaction when they were breached, which cost them dearly.

You need proactive strategies to deal immediately with a breach. This doesn’t mean recruiting a large number of security and forensic staff to deal with the inevitable breach. You wouldn’t have a plumber on staff just in case a tap leaks or cistern bursts. But you should have a rehearsed incident response plan and external resources primed and ready to help you deal rapidly with a security incident.

Reality #3: You may not know when your security is breached

One of our clients was sold a cyber-security ‘seeing tool’ to monitor their network and track suspicious activity. The vendor had made it sound wonderful, but unfortunately it was only running on part of their network and, anyway, no one was looking at the logs! This left our client with no strategy for protecting their information.

In my experience, it’s not the tool that fails but the way in which it’s deployed. For example, any security tools you deploy must be tuned; otherwise, you’ll be getting too many false positives. Eventually, even the most assiduous security teams will ignore cries of, “Wolf!” Subscribing to a suitable risk management service will deliver early alerts to potential breaches of systems you own or operate — and centralise access to fixes issued by major vendors such as Cisco, IBM, HP and so on.

By being aware that you’re an imminent target, you can be more targeted in your use of resources to prevent a breach. It will also sharpen your risk assessments.

A way to increase the value of security monitoring, and other tools, is to correlate your event logs with Open Source Intelligence (OSINT). This is like listening to internet ‘chatter’ in the same way the military or anti-terrorism agencies do. OSINT can warn you when the bad guys are trying to hurt you or your industry — for example, circulating ideas or tips for targeting utilities or transport systems.

Again, benefiting from OSINT doesn’t mean becoming a military-strength cyber security intelligence listening post; there are several global risk management services you can subscribe to that tap into OSINT and correlate intelligence to help you protect potentially vulnerable areas of your ICT systems and intellectual property.

It all comes down to strategy

Information security realities have shifted over the years, and this will continue. Similarly, our enterprise perimeters continue to dissolve, new threats evolve and players emerge.

Getting the information security strategy right for your specific enterprise and its appropriate level of risk tolerance is essential. Any subsequent policies you create, tools you deploy, resources you put in place and testing you perform will all be informed by this strategy. Only then can you have any sense of confidence you’ve done the best you can in the areas most important to your business.


Davis Jarvis

David Jarvis is a partner focused on business strategy and digital transformation in DXC Technology’s consulting practice, and leads the Saltbush business unit. He is accredited to undertake ISO/IEC 27001 certification audits, and the first to accredit an Australian organisation to that standard. He also helped establish the Standards Australia certification arm for Information Security Management Systems (ISMS).

RELATED LINKS

Managing enterprise risk in a connected world

Industry 4.0 and IoT pose new security challenges

Moving beyond risk management to antifragility

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: