Cyber Security Articles

It may be time for a corporate updating of the wistful saying, misattributed to John Lennon, that goes, “Life is
I spoke recently with Denny LeCompte, CEO of Portnox, maker of a cloud-native network access control (NAC) solution, among other
Guest Post by By Leonid Belkind, CTO and Co-Founder of Torq   As we’ve all seen, virtually every economic authority, including
Is the cybersecurity venture capital surge coming to an end? Overall, the VC world is experiencing a pullback, with S&P
International Data Corporation (IDC), the market intelligence firm, just released a new InfoBrief that reveals a startling insight into the
Buying a cyber insurance policy is considered an effective way to manage residual cyber risk. Insurance carriers have jumped into
By Shalom Bublil, Chief Product Officer at Kovrr As cybersecurity threats grow larger, organizations struggle to hire enough staff to
Russian Information Warfare: Assault on Democracies in the Cyber Wild West, by Dr. Bilyana Lilly, is the latest title from
I recently sat down to speak with Christopher Prewitt, the CTO of Inversion6, a cybersecurity risk management firm that’s close
In this thought leader video, Howard Ting, CEO of Cyberhaven, discusses the new Comprehensive Cyber Capabilities Working Group (C3WG), which

Cyber Security Articles

What This Cyber Security Articles Page Is About

The goal of Journal of Cyber Policy is to provide commentary and stimulate conversations about important cyber security topics. Our parallel goal is to discuss cyber issues in plain English, liberating this critical subject from the exclusive realm of specialized engineers and hackers. Throughout, we try to talk about cyber security and related issues from the perspectives of public policy, national security, corporate policy and compliance.

 

Why Articles about Cyber Security Matter

We are living in an era where digital technology dominates so much of our lives. Digital risk naturally accompanies this reality. Smartphones, the IoT, the Internet and so forth make our lives easier, but they also expose us to threats. Some of these threats come from nation state actors. We believe Americans could be better-informed about these risks. And, while there’s certainly no lack of content online about cyberthreats, room still exists for cyber security articles that integrate the subject’s diverse themes of technology, politics and business.

For example, Russian disinformation and Chinese espionage are not new, but today’s digital landscape makes these familiar tactics deadly, in political terms. The Cold War was largely analog in nature, with offensive campaigns quite limited in scope and impact. While Cold War dynamics may survive today, they are having a radically different effect on American society and politics than anything that came before.

It can be tricky to tease out the differences between today and a generation ago. American politics and governance have always been messy, dishonest and idiotic, but there were at least some fact-based controls on it. This is no longer the case. Our enemies are exploiting this new reality. In some cases, they’ve created this new reality.

We see the impacts of these new measures, but leaders across the government and business sectors generally fail to understand the transformative nature of technology, e.g. Amazon is not just a bigger mail order store; the iPhone is not just a phone with fancy features, and so forth. These cognitive gaps lead to deficiencies in the perception of risk. They enable our leaders to underestimate our enemies and how they can win without firing a shot. We also tend to overestimate our defenses and resiliency.

The digitization of society, commerce and politics renders America defenseless in ways that we are only beginning to understand. Digital transformation is double edge. America’s rush to digitize its economy and society produces as much risk as it does benefits. For example, we have to manage the tensions between mobility and surveillance, between big data and privacy and so on.

The Topics We Cover in These Articles

We deal with a wide range of cyber security topics in these articles. Some discuss cyber election interference. Others look at geopolitical cyber risks, such as our recent series on Russian disinformation and “Active Measures.” We will frequently check in on the state of enterprise architecture and cloud computing, seeking expert insights into the best practices and new security technologies that are influencing security policies in these areas of information technology. We cover the gamut of security subjects: malware, phishing, identity and access management (IAM), privileged access management (PAM), zero trust, data security, application security, secure DevOps (DevSecOps), red-blue teaming, automation, Security Orchestration, Automation and Response (SOAR), threat monitoring, incident response, intrusion detection, encrypting, key management and on and on. Our cyber security articles look at compliance, government cybersecurity frames like NIST NSF, GDPR, CCPA and more.

Trusting Employees to Make Good IT Decisions

It may be time for a corporate updating of the wistful saying, misattributed to John Lennon, that goes, “Life is what happens when you’re making other plans.” It should now be, “Workplace tech is what happens when IT makes other plans.” With the best of intentions, and not a small amount of professional diligence, IT and security teams carefully select and provision approved applications and digital services for employees to use.

Said employees are not much impressed, it seems, with 63% of Gen Z workers and 40% of millennials thinking their workplace tools are unreliable, hard to navigate and difficult to integrate with other tools. As a result, we are in a “shadow IT crisis.” Employees are taking matters into their own hands and purchasing the tech tools and services they prefer. They use credit cards to bypass official company solutions. Some estimate that as much as 40% of corporate spending on IT is taking place outside of the IT budget.

“The report is an eye opener,” said Matt Chiodi, Chief Trust Officer at Cerby. “It reveals a significant gap between corporate trust practices and employee sentiment.

Is this good or bad? It depends on whom you ask. The IT department doesn’t like it, and it’s not hard to see why. The practice is inherently insecure and costly to manage, if the IT department can even get enough visibility to manage digital services taking place outside their domain. Corporate data can end up anywhere, and often does.

From an employee perspective, though, the practice is a boon to productivity. The consumerization of IT has led employees, especially younger people, to expect a modern user experience that is not always available in enterprise solutions. They also demand more control over how they use tech to do their jobs.

Matt Chiodi, Chief Trust Officer at Cerby

Matt Chiodi, Chief Trust Officer at Cerby

The issue actually goes a bit deeper than just tech and spending. It’s about trust and corporate culture. Should employees be truste

d to select the tools they want? This is the question asked by Cerby, a company whose solutions protect “unmanageable applications” that lack support for common identity standards like single sign-on. They conducted a survey on the subject and released a State of Employee Trust Report.

“The report is an eye opener,” said Matt Chiodi, Chief Trust Officer at Cerby. “It reveals a significant gap between corporate trust practices and employee sentiment. Forcing employees to use only a limited selection of approved digital services sends a message that the company does not trust its people—a message that has an impact on productivity, as well as employee happiness, workplace satisfaction, and loyalty.”

Indeed, the report found, for example, that 92% of respondents agreed with the notion that “IT needs to get out of the way and let me do my job.” It also shows that employees rank trust as more important than financial compensation. Forty-seven percent of employees and managers say they would take a 20% cut in pay in return for higher trust by their employer. Additionally, employees most valued flexibility (48%), autonomy (42%), and being empowered to choose the applications needed to work effectively (39%). A striking 81% of employees felt increased energy, happiness, productivity, and contribution when employers demonstrated trust.

It’s hard to know if people would actually accept a pay cut in return for increased trust, but the finding is startling, nonetheless. It shows how trust could be viewed as an element of employee compensation. Trust apparently has a tangible value to employees. Managers would be wise to pay attention to this insight.

Organizations that don’t recognize the problem are heading for lose-lose scenario where employees download and use unmanageable apps they believe will boost their own productivity. Cyber risk exposure grows while people feel untrusted.

There is a way out of this jam, however. Employees want freedom. They want to be trusted to choose their own tech tools. If an organization wants to extend that trust, it needs to make unmanageable apps manageable and secure.

Cerby offers a solution by connecting unmanageable app to corporate identity providers like Okta and Microsoft’s Azure AD. Cerby discovers new applications and eliminates manual security tasks like offboarding.

Securing unmanageable apps will not solve the entire employee trust problem on its own, but it would be a big step in the right direction. People could use the tools they prefer, while IT and security teams would not have to worry so much about shadow IT.

 

Why Most IoT Cybersecurity Strategies Will Fail with Zero Trust: A Conversation with Denny LeCompte, CEO of Portnox

I spoke recently with Denny LeCompte, CEO of Portnox, maker of a cloud-native network access control (NAC) solution, among other products. In his view, most Internet of Things (IoT) cybersecurity strategies give zero hope for Zero Trust.

 

Q: Why must IoT devices be secured to avoid becoming gateways onto the corporate network by cybercriminals?

A: In general, IoT devices are manufactured with little concern for security. While bypassing security best practices helps keep production costs low for manufacturers, it also puts the often overwhelming onus of securing the device on the end user or administrator. Unfortunately, this means IoT devices are particularly susceptible to cyber-attack. Cybercriminals know IoT is vulnerable and that many administrators and end users simply can’t keep up with the demand for more sophisticated security safeguards, so they exploit these devices with relative impunity. It’s not so much a question then of “why” IoT should be secured anymore, but rather of “how.”

 

Q: What are some of the ways cybercriminals are using IoT devices to gain access?

A: Some of the top ways in which hackers are leveraging IoT devices to gain access is through methods such as vulnerability probing, DNS spoofing, universal Plug & Play (uPNP) exploitation and reverse engineering firmware. And with so many ways “in,” there is no shortage of high-profile incidents involving cybercriminals gaining network access via IoT – recent hacks against TeslaWestern Digital, and even a high-end casino are some recent examples.

 

Q: Why should identifying, authenticating, authorizing, and segmenting IoT devices become a standard mandate of the connected business era?

A: Most businesses have limited visibility into the security posture of the vast web of devices attached to their networks, especially when it comes to IoT. But you can’t protect against what you can’t see. Businesses need to be able to see IoT devices requesting access to the network. By “see,” I mean being able to properly profile the device and determine its type, location, requested access layer, and more. Until that is possible for an organization, authorizing and segmenting those devices is moot, if not impossible. Applying access and control policies to IoT requires at least an understanding of the device’s ID…and an accurate one at that.

 

Once a business can see and profile all IoT devices, they can start configuring and enforcing authorization and micro-segmentation policies for these devices to further strengthen their network security posture. Most companies today can’t see, let alone control access for IoT. But ostensibly, if they could do both, they’d define strict policies that take into account the inherent vulnerability of these devices.  With the right toolset, organizations can enact these policies without additional overhead, architectural changes, or on-premises hardware.

 

Q: Can you explain where fingerprinting fits into establishing and enforcing Zero Trust for IoT?

A: IoT remains the biggest hurdle in achieving universal zero trust across the organization. Since IoT has been so difficult to accurately profile, the zero trust model would argue that no IoT device can be trusted, and thus should not be allowed on the network. Unfortunately, IoT is critical to business operations today – particularly in manufacturing, healthcare, construction and engineering.

Fingerprinting IoT devices is the process of identifying an IoT device’s vital characteristics on the network to define and apply unique policies based on those characteristics. Important characteristics typically include device manufacturer, make and model. These characteristics are then utilized to further classify the device types, such as security cameras IP Phones, gaming consoles, medical devices, etc. Examples of policies that could be defined based upon those characteristics and classifications would be to place all security cameras onto a designated VLAN, apply an ACL to all medical devices which block all uninitiated incoming network traffic to the devices, or even to deny access onto the network entirely, or place the device into a safe quarantine guest VLAN in the cases of gaming consoles.

With the ability to first see and then control IoT devices through the use of IoT fingerprinting, organizations can close the loop on this zero trust security model gap.

 

Q: How can businesses close IoT security gaps and unknown entry points?

A: Businesses can close IoT security gaps by implementing comprehensive IoT security protocols that include IoT fingerprinting, as well as access and authorization policies based on IoT profiles across their entire environment. On top of that, it’s imperative to keep firmware up to date, turn off unused services, rely on firewalls to manage accepted traffic, and stay on top of general environmental drift due to inevitable human interference with IoT. Just like the rest of the security threat landscape, IoT threats and best practices to prevent cyberattacks and network exploits will continue to evolve so businesses need to be ready to scale their security practices to keep pace.

 

 

 

How Current Macroeconomic Challenges Will Impact Cybersecurity in 2023

Guest Post by By Leonid Belkind, CTO and Co-Founder of Torq

 

As we’ve all seen, virtually every economic authority, including the US Federal Reserve, European Central Bank, The Swiss Government, and Morgan Stanley, is predicting a macroeconomic slowdown across 2023. While there is debate about whether it will be a bump in the road or a recession, everyone agrees that in general, spending will be curbed, and that organizations will, at minimum, be looking to do more with their existing resources.

 

So, what does this mean for the cybersecurity industry? It will have to acknowledge what its customers and prospects are dealing with and be sympathetic to their situations. However, it is also not without its opportunities. The fact is, IT and security professionals will be looking for ways to drive more value from their existing security stack, rather than adding more point solutions to it.

 

Cyberthreats Don’t Pause During a Downturn

Another critical point is that there is uniform agreement that evolving cyberattacks will continue relentlessly. Threat actors will evolve to become more cunning, with novel new approaches for deploying threats, and manipulating users. Therefore, the cybersecurity attack surface is certain to expand, not contract. No-one in the cybersecurity ecosystem can stand on their laurels during an economic downturn. Cyberattacks have the potential to create monumental, well-documented economic damage that can exacerbate economic challenges in an already difficult financial environment.

 

Cybersecurity companies need to emphasize their proactive capabilities over the historic reactive element in these economic circumstances. If they position themselves as a critical, protective layer, it will go a long way to cementing the essential nature of their offerings. Simply talking about how they handle crises once they’ve begun is no longer good enough. Optimally, cybersecurity firms should emphasize how their offerings harness early threat intelligence signals and build defenses against them into their workflows and processes.

 

Democratizing Security Contributes to Cost Efficiencies

Another consideration for cybersecurity companies is the potential to increase democratization of security responsibility across customer and prospect organizations. Part of maximizing value involves security processes that focus on shared responsibilities, in which employees, R&D, DevOps, and IT are true partners and collaborators in protecting their organizations. An example of this is how security automation is now moving towards validating end users’ identities, and enabling them to have temporary security clearances to engage in system updates, credential retrieval, and remote access with dramatically minimized risk. This is enabled through integration across communications and project management tools, anchored by workflows that ensure accurate verification and access controls.

 

Cybersecurity companies also need to look at the security ecosystem as one that is interconnected, instead of being a siloed collection of point tools. Organizations are now demanding that previously-disparate security systems talk to each other. Platforms, applications, and tools must become interoperable and interconnected, for comprehensive management, monitoring, and measurement.

 

Vendors that listen to what organizations are looking for and calibrate their offerings to map to a holistic ecosystem view are the ones that are likely to have the most success in 2023 and beyond.

 

Geopolitical Strife is Another Key Factor

Another important contextual element that pairs with the macroeconomic situation is the geopolitical climate. The two are connected across multiple junctions. Cybersecurity companies must continue to push the envelope of their offerings to address the needs of organizations that exist within geopolitical difficulties. They need to make their offerings essential even during times of deep uncertainty and instability.

 

Without engaging in any vulture-like tactics, vendors must consider how customer priorities intersect at the nation-state level with companies operating in conflict zones. There are business opportunities available–ones that fundamentally positively contribute to resilience of both business and country. However, vendors need to carefully navigate through complexity and ensure their offerings and messages are accurately in tune with the difficulties the organizations are facing.

 

Taking a broader portfolio view focused on addressing critical customer challenges is key. Instead of looking inwards, cybersecurity companies must look outward and approach their markets with a view that’s sympathetic to what organizations are experiencing and adjust their strategies accordingly. So, indeed, while the macroeconomic climate is stormy, it is possible to chart a clear path forward beneficial to vendors and customers alike.

 

About the Author

Leonid Belkind is a co-founder and Chief Technology Officer at Torq, a no-code security automation platform. Prior to Torq, Leonid co-founded, and was CTO of Luminate Security, a pioneer in Zero Trust Network Access and Secure Access Services Edge, where he guided this enterprise-grade service from inception, to Fortune 500 adoption, to acquisition by Symantec. Before Luminate, Leonid managed engineering organizations at Check Point Software Technologies that delivered network, endpoint and data security products to the world’s largest organizations.

 

Cyber Venture Capital: A VC’s Perspective

Is the cybersecurity venture capital surge coming to an end? Overall, the VC world is experiencing a pullback, with S&P Global Market Intelligence revealing that the number of investment rounds was down 32.1% year over year from 2021 to 2022. At the same time, the value of VC rounds fell 65% in the same period. No one knows for sure what will happen to venture funding for security startups, but at least one thought leader is maintaining a positive outlook.

Dr. Lindsey Polley

Dr. Lindsey Polley is Director of Cyber & Space Intelligence at VentureScope’s MACH37 startup accelerator. The 90-day accelerator program’s goal is to facilitate the development of the next generation of cyber product companies. After earning her PhD from the RAND Corporation, where she served as a defense and policy researcher for technology projects spanning the DoD, DHS, and the US intelligence community (IC), Dr. Polley now works as a futurist who specializes in the emergent landscape around cyber and “cyber-adjacent” technologies.

I spoke with Dr. Polley in November of 2022.

Q:           What do you think is happening right now in the world of cybersecurity venture capital?

A:            From 2019 through 2021, we saw dips in venture funding for cybersecurity startups. If you take a closer look, though, it’s not that investor demand was not there. The issue was, and still is, that there are so many similar ventures in the category—everyone’s claiming to be just a bit different, but essentially, a lot of startups are offering the same thing—we’re seeing a consolidation, the acquisition of smaller companies into larger companies, or ventures combining to join a partnership or a larger entity. As a result, there wasn’t as much need for venture capital funding rounds, but that is changing. I think that venture capital appetite still there. Indeed, from our perspective, cybersecurity is less risky to investors than it was just a year or two ago. I think we’re going to see a resurgence of injection of capital into companies operating this realm.

 

Q:           Do you think that there’s a particular category of security venture is going to do well now?

A:            I’m like a parent. I love all my children equally. Seriously, though, if I had to choose areas to focus on, I would say cyber attack surface management (CAASM) tools are looking very strong right now. These tools help you make sure that you have adequate visibility across vulnerability challenges—aggregating data for those vulnerabilities so that you can see in real time what’s going on in your network and endpoints, along with everything that’s connected, it’s a very multi-dimensional view of an enterprise’s threat posture. I think CAASM is going to be hot with VCs in the coming year.

Plus, supply chain. We have a unique confluence of events where we have the developers and researchers working on this, the technical professionals who are now in line with the investors, investors are doubling down on wanting to fund these new capabilities to help make this happen. We like ventures that are developing new tools to secure or prevent against counterfeit components or tampering. That translates into cybersecurity for software in particular, with tools that better protect the entire software stack and the development pipeline.

Quantum security is getting attention, as it should. There’s been some confusion about this, but quantum risk is an area of cybersecurity where we are probably going to see a convergence of civilian and military attack surfaces. It’s like what we see with commercial satellites, where an attack on a corporate asset might be construed as an act of war. Quantum is similar, like if a defense contractor’s data is decrypted through quantum computing, that’s a national security issue even if it’s corporate data. Ventures that help address this risk are going to do well, in my view.

And let’s not forget semiconductors. Chips don’t always make it onto the cybersecurity VC radar screen, but they really should, if you ask me. Security needs to start in the silicon. The recently announced US Japan Joint Research Center is part of this story.

 

Q:           Are the venture capital players in cybersecurity changing, or is the same crowd as always?

A:            Yes, the investors are potentially changing. We have the big traditional investment firms, of course. They are not going anywhere, for the most part, even if some of them pare back their investments in cybersecurity. But, we also have the introduction of like non-traditional investors, like actors and TV personalities, along with platforms that allow crowdsourcing from regular people to put up $2,000 to potentially be betting on a huge unicorn payout. Startups that may not have been able to get funding through the traditional route are finding more opportunities now, given these other non-traditional avenues for funding that have started to open up in the last couple of years.

 

 

 

IDC: Two Thirds of Organizations Lack Confidence in Vulnerability Identification

International Data Corporation (IDC), the market intelligence firm, just released a new InfoBrief that reveals a startling insight into the state of cybersecurity: almost two-thirds of organizations do not have high confidence in identifying their greatest vulnerabilities. Wow. Considering the scale of risk in this day and age, that’s not a reassuring number. It feels honest, however. Despite the best efforts of a lot of smart people, and a great deal of investment in cybersecurity, security managers remain unclear on just how well they’re protecting their most important digital assets.

The report, Studying the Effects of a Virtuous Cycle in Cybersecurity, sponsored by Darktrace, also found that 81% of organizations felt that artificial intelligence (AI) insights would help them to automate their security postures. These two findings go together. Security managers lack confidence in identifying vulnerabilities because there are simply too many threats in too many places for human beings to track effectively.

Today’s geopolitical and macroeconomic environment is part of the problem, according to Amber Rudd, former UK Home Secretary. She said, “Cyber security risks are one of the most pressing but least well understood risks organizations face today. As the geopolitical landscape becomes more fractious and the world continues on a path of rapid digital transformation, businesses are facing a greater, more complex set of cyber security challenges than ever before – and these are constantly evolving.”

As Chris Kissel, Research Director at the IDC, put it, “As organizations contend with an increasingly complex set of cyber security challenges, a reactive approach does not go far enough. CISOs are starting to look at cyber security just like any other operational risk and are turning to a more proactive approach that pre-empts cyber-attacks before they happen, rather than waiting to be breached. It is clear that organizations must adopt a preventative approach and will be increasingly reliant on AI to do so.”

For Nicole Eagan, Chief Strategy Officer at Darktrace, the underlying problem has to do with risk prioritization. “Most companies have siloed IT,” she said. “With systems operating in separate spheres, or in ‘shadow IT’ environments that few know about, it’s extremely difficult to know which risks carry the most disruptive potential.”

The challenge is to identify the most serious areas of vulnerability and establish a practical priority for risk mitigation. Amber Rudd spoke this need, saying, “Being proactive requires organizations to understand what their weaknesses are and proactively address these before attackers take advantage.” Without risk prioritization, it’s easy to waste time and money on activities like penetration testing (pentesting) on non-critical system. This is a lot easier said than done, but AI offers a way forward.

Darktrace’s new PREVENT solution is taking on this challenge. It offers a predictive and preventative approach for tackling cyber-threats and business risk by using AI to “think like an attacker.” The solution finds pathways to an organization’s most critical assets from inside and outside. It works at the levels of attack surface management (ASM), attack path modelling, pentesting and breach emulation.

“This technology is making the job of the attacker much harder,” said Poppy Gustafsson OBE, CEO at Darktrace. “It arms security teams with unprecedented, AI-powered tools, which can pre-empt even the most complex cyber-attacks. It represents a fundamental shift in cyber-security, putting security teams on the front foot as they seek to protect their organizations and build cyber resilience.”

Ultimately, solutions like PREVENT exist to augment the human mind, minds that are increasingly affected by the stress of the job. “Burnout is very real,” Eagan said. “One of the main purposes of PREVENT is to provide facts that can bring people together so they can work more harmoniously in their cyber defense roles.” Indeed, as Eagan pointed out, the PREVENT AI can emerge as a virtual team member in the cybersecurity organization. “It’s like having a supersmart colleague who can see around corners, but never takes a day off.”

 

 

 

Survey Reveals Problems for Cyber Insurance Carriers

Buying a cyber insurance policy is considered an effective way to manage residual cyber risk. Insurance carriers have jumped into the category. While still small by insurance industry standards, cyber insurance is now a $9 billion business, projected to reach $38 billion by 2030. However, there may be some bumps on the road to accompany this 15% compound annual growth rate (CAGR).

 

A recent report from Delinea, maker of privileged access management (PAM) solutions, reveals that 80% of companies have used their cyber insurance policies. The report is based on a survey of 300 US-based IT decision makers. Eighty percent is a high number. Indeed, cyber insurance carriers are starting to require policy holders to establish and verify that they have more security controls, with the goal of reducing how many policy holders are turning to their cyber insurance when they suffer an attack.

 

According to Joseph Carson, chief security scientist and advisory CISO at Delinea, insurers are now putting hard limits on payouts for incidents like ransomware attacks. He said, “The shock from this latest research is how so many organizations who have obtained cyber insurance have need to use it and again half of those multiple times.” He added. “It is almost like continuously crashing your car and not learning from the first one on how you are going to change prioritizing prevention.”

 

Avishai Avivi, CISO at SafeBreach, which offers attack simulation and “red team” solutions, offered insights into the report and its findings. He said, “Cyber insurance helps cybersecurity professionals manage risk by transferring the cost of a data breach. However, if 80% of companies with cyber insurance are actually using it, insurance providers will soon have to start adjusting their calculations.”

 

Avivi offered also offered an automotive comparison: “Think of it this way: if a car insurance company knew that there is an 80% chance that the driver they’re insuring will be in a serious accident, or an 80% chance that the car will be stolen, would it still make sense to offer the coverage?”

 

He elaborated, sharing, “To continue the metaphor, while seatbelts, airbags, and even car alarms might be required before a premium is granted, who knows if the drivers are really using their seatbelts, or turning on the alarm?” As Avivi sees it, cyber insurance providers need to start advancing beyond simple checklists for security controls. They should require their customers to validate that their security controls work as designed and expected. They need their customers to simulate their adversaries to ensure that when they are attacked, the attack will not result in a breach.

 

Further to these points, Avivi remarked, “In fact, we’re already starting to see government regulations and guidance that includes adversary simulation as part of their proactive response to threats.” He added, “As this trend continues, we foresee that cyber insurance companies will mandate or incentivize companies seeking coverage to implement security validation and adversary simulation as part of their ongoing security program. This will be especially true for customers in regulated industries or with very high-risk digital assets, such as personal data records.”

 

How Can CISOS Solve the Cybersecurity Talent Shortfall?

By Shalom Bublil, Chief Product Officer at Kovrr

As cybersecurity threats grow larger, organizations struggle to hire enough staff to stay secure. Not only do companies often lack talent with the skills to meet existing risks, but they also need to add and train staff with the ability to handle new threats in areas like cloud security.

“Because there are so many specialty areas in cybersecurity, and because the field is evolving so quickly, basic cybersecurity know-how no longer cuts it,” notes The University of Tulsa.

Yet finding this talent is easier said than done, leaving many organizations short-staffed. A survey by Cobalt finds that 94% of security teams face talent shortages. Plus, existing talent are often unsatisfied, with 54% in the Cobalt survey saying that challenges like it being “harder to monitor for vulnerabilities” make them want to leave their jobs. That could lead to more turnover and exacerbate the shortage.

But all hope is not lost. In this series on “what keeps a CISO up at night,” we’re examining some of the top issues that CISOs and other IT leaders face. Here, we’ll take a closer look at how to solve the cybersecurity talent shortfall.

Reframe Cybersecurity

To start closing the cybersecurity talent gap, CISOs can push to reframe how cybersecurity is viewed within their organizations.

Rather than making cybersecurity seem overly technical and operational, CISOs can reposition cybersecurity as being more strategic, creative and business-oriented. That can help attract employees. It can also get other leaders on board so you have the budget and overall organizational support to ramp up hiring.

“In today’s environment, cyber is not a cost center, it is a strategic component of enterprise risk management and a business enabler. When it is positioned as such to employees, they will understand that the company values cyber and see a career ladder to scale,” says Deloitte.

Similarly, CISOs can work with HR teams to reframe job descriptions and search for soft skills too, rather than strictly looking for IT skills.

“These characteristics might include curiosity, commitment for problem-solving, and strong work ethic — all of which can help shape future professionals with the right corporate guidance and training,” notes the Computing Technology Industry Association (CompTIA).

Broaden Talent Pools

Another important aspect of closing the cybersecurity talent gap is broadening the talent pools you search in. If your existing searches aren’t yielding enough candidates — such as if you’re mainly sourcing talent from the alma maters of current employees — perhaps you’re not reaching a diverse enough audience.

Recruiting more women, BIPOC individuals, neurodivergent candidates and others who might be underrepresented in your organization can be a great way to add cybersecurity talent while tapping into the power of diversity.

“A growing body of research shows organizations that embrace diversity and establish an inclusive industry and workplace culture perform at higher levels, which means a safer and more secure cyber world.,” says (ISC)², a nonprofit association for information security leaders.

To find more diverse candidates, CISOs can take steps like working with HR teams to find partners like educational institutions and nonprofits that get you outside of your existing talent pools.

You also might find that you’re overlooking your internal talent pool. Upskilling and reskilling existing employees to move into cyber roles, especially when staff come from other positions that might typically be easier to fill, can help you reduce cybersecurity staff shortages.

Leverage Technology Where Possible

As important as it is to change how organizations position cybersecurity and how they source employees, that doesn’t mean that the cybersecurity talent shortfall can immediately be solved. Organizations will likely have to deal with some gaps in the near term, but they can turn to technology to ease shortages.

For example, technology that automates areas like threat detection might help short-staffed cybersecurity teams stay ahead of attacks. Other types of cybersecurity technology like Kovrr’s Quantum cyber risk quantification platform can help CISOs get the most out of existing cybersecurity resources.

By modeling the financial impact of potential cyber events, you can understand where the largest risks exist and direct employees to focus on those areas.

Suppose you want to roll out a company-wide cyber awareness program, as well as improve data recovery capabilities. If you’re short-staffed, you might not have the bandwidth to do both at the same time. But by leveraging Kovrr’s financial quantification capabilities, you can determine the financial impact that these two activities would have on your business. From there, you can prioritize the one that would provide the most financial risk reduction.

Overall, the cybersecurity talent shortfall isn’t necessarily a quick or easy fix, but CISOs can rest easier at night by following these steps. Repositioning how your organization and candidates think about cybersecurity, expanding your talent pools, and maximizing your existing staff by leveraging technology can go a long way toward building a more secure organization.

About the Author: Shalom is chief product officer at Kovrr and a cyber data science expert. Throughout his career, Shalom has acquired unique expertise in cyber intelligence, threat modeling, risk modeling, machine learning and artificial intelligence. Shalom joined an elite Israeli intelligence unit and served for four years specializing in cyber. Following his military service, he joined Lacoon Mobile Security where he led the threat intelligence and threat modeling initiatives. In his last position before founding Kovrr, he led cyber threat intelligence and modeling efforts at Deep Instinct, developing a commercial detection engine product from scratch based on advanced artificial intelligence technology. Shalom holds a B.A. from the Open University of Israel.

 

Book Review: Russian Information Warfare: Assault on Democracies in the Cyber Wild West

Russian Information Warfare: Assault on Democracies in the Cyber Wild West, by Dr. Bilyana Lilly, is the latest title from the Naval Institute Press to take on the serious and important topic of foreign cyber threats to the United States. Dr. Lilly, a cybersecurity expert and adjunct researcher at the RAND Corporation, brings significant expertise to the work. She also comes at the topic with very welcome thoroughness regarding the nature and background of the problem, as well the analysis of the issue.

Dr. Lilly starts the book by establishing a couple of truths about what’s happening in the US and the broader world of political democracies—truths that should not be hard to identify, but are, for a variety of reasons I will discuss in a moment. First, Russia is waging an information war against the US, Germany, the UK and other democracies it perceives as threats. This information war is part of a broader strategy of fighting wars without actually fighting wars (though with the invasion of Ukraine, this doctrine is now falling apart.)

She also explores the political philosophy and strategic outlook driving Russian actions. This is a helpful context, as it answers the question on the minds of many people who study the issue: Why are they doing this? She puts you in the heads of Russian leadership, offering a point of view on how Russia sees the west as a threat.

The book then works through eight case studies, each analyzing the highest impact Russian information war campaigns in the last few years. These include the efforts to disrupt the 2016 US presidential election, hacking the German Bundestag and interfering in the French presidential election of 2017. For each case, Dr. Lilly offers a data-driven analysis, structured by a disciplined methodology, to show how Russian hacking and disinformation processes work.

For each case, Dr. Lilly offers a data-driven analysis, structured by a disciplined methodology, to show how Russian hacking and disinformation processes work.

The book shows data on the interlocking attack vectors of media disinformation, hacking, and data theft/leakage that cuts across political, social and economic spheres of the targeted country. This methodical, deep analysis is very welcome, in my view. So, too, is the fact that Dr. Lilly does not waiver in her attributions.

Difficulty in attribution is one of the two most serious problems the west has in confronting this digital aggression from Russia. The major media stumbles badly in dealing with these attacks because it’s almost impossible, based on journalistic standards, to attribute cyberattacks to a foreign power. News reporting invariably waffles, with frustrating cop outs like, “suspected to be the work of Russian gangs who may have connections to the Kremlin…”

The other problem comes from the intelligence world, which, probably with good reason, is loath to weigh in definitively on where these attacks are coming from. They don’t want to reveal sources and methods, and so forth. Even the bright spots, like the bipartisan Senate report accusing Russia of election interference, lack impact because few people read it. Current senior leadership is similarly reluctant to make too much of the issue, for fear of disrupting the diplomatic process with accusations based on guesswork and vague attributions.

Even the bright spots, like the bipartisan Senate report accusing Russia of election interference, lack impact because few people read it.

Then, there’s the herd of elephants in the room: One of two political parties in the United States has an urgent need to ignore this serious national security threat and pretend it isn’t happening. Russia interfered in the 2016 election to get their preferred candidate elected. That candidate is now the undisputed leader of that political party, with the extent of his reliance on Russian influence (and vulnerability to blackmail) still unknown.

A massive media ecosystem is complicit in hiding his connections to Russian information warfare. If anything, it appears to be repeating Russian disinformation campaigns to further Russian information warfare goals in the US and elsewhere. In this environment, any honest appraisal of the risks faced by the US is nearly impossible.

All of which begs a huge question: how does a country fight an information war it won’t admit it’s in? It’s not fair to lay this at Dr. Lilly’s feet. She has done an admirable job of analyzing the problem and offering the most compelling proof of attacks I’ve ever seen. She does offer some policy recommendations, however. These include expanding information gathering about Russian cyber operations, beefing up cyber defenses and getting media outlets to agree on standards for reporting stories that are suspected to be the work of foreign propogandists.

Given the state of American politics and political media these days, it’s hard to know if any of these ideas will work. But, having a book like this is a good start. It provides a detailed, factual basis for discussing a confrontation the US and other countries are having with a major geopolitical adversary—a confrontation that needs to be addressed out in the open if anything is to be accomplished.

 

 

The Role of the Fractional CISO

I recently sat down to speak with Christopher Prewitt, the CTO of Inversion6, a cybersecurity risk management firm that’s close enough to where I live that we could meet for kosher pizza. The first question I asked had to with the company’s name. Inversion6 had gone by MRK Technology for the previous 37 years, only recently changing its name to Inversion6.

What does Inversion6 represent? According to Prewitt, the new name reflects two ideas embodied by the business. First, inversion: As Prewitt sees things, the current cybersecurity environment amounts to an inverted world. Few things are the way they used to be. The perimeter is gone. People and digital assets are all over the place. Traditional countermeasures are nowhere near as effective as they used to be. If you want to be secure in this upside-down world, you need some fresh ideas.

The “6” in Inversion6 refers to a military term I had never of before, probably because I never served in the military. “Got your 6” means “I’ve got your back.” In the military, twelve-o-clock represents looking forward, straight ahead. Six-o-clock is behind you. Covering someone’s “6” means guarding their back. I’m glad he explained this to me, because I had immediately leapt to the conclusion that “got your 6” meant you were bringing the beer.

Covering someone’s “6” means guarding their back.

This explanation reminded me of watching the Gregory Peck classic World War II movie “Twelve-O-Clock High” for my organizational behavior class in business school. The movie told the story of brave airmen in the Eight Air Force, risking their lives to bomb Germany while coming under heavy fire from fighter planes that approached form the front—at twelve-o-clock.

The movie also provided an excellent business case study in leadership, team building and the allocation of scare resources. There’s a scene where Peck’s commanding officer explains that every squadron in the Army Air Corps is demanding more planes. There aren’t enough to go around, so Peck must demonstrate why their squadron deserves to have them. It’s a classic business dilemma. Every business unit wants capital and people, but the company only has so much to invest.

Leadership and the allocation of scarce resources are two critical success factors in cybersecurity. This is true for all businesses, but especially for smaller firms that cannot afford too many dedicated security team members.

Inversion6 addresses these needs through its fractional CISO service. Clients can avail themselves of a Chief Information Security Officer (CISO) who covers their account on a part time basis. They get the value of a CISO, but on a budget they can afford. Plus, they avoid the challenge of finding a CISO and hiring him or her.

“Many business stakeholders do not know that hacking is essentially an industry now, a collection of large, highly organized entities that are in the business of mounting cyber attacks.” – Christopher Prewitt, CTO of Inversion6

Prewitt serves in this role for several of Inversion6’s clients. He is their guide in the inverted world of cybersecurity. One core part of the job is to work with business managers who may not be familiar with cyber risks. For example, as he explained, some C-level executives do not think their companies are targets of cyberattacks. “I run a manufacturing plant. Why would someone want to hack us?” is point of view Prewitt frequently encounters.

“My job is to explain why yes, even a manufacturer is a target today,” Prewitt said. “A couple of issues are at play here. For one thing, many business stakeholders do not know that hacking is essentially an industry now, a collection of large, highly organized entities that are in the business of mounting cyber attacks. They will attack anyone who is vulnerable.” He went onto say that today’s hackers are looking to commit crimes of opportunity, such as ransomware attacks. In those cases, a manufacturer who didn’t think it was a target might find itself paying a ransom to get its operations going again.

This kind of dialogue is part of a bigger picture, however, which involves bringing tech and business stakeholders together to discuss cyber risk in business terms. “People from IT, security and business management often find themselves talking past each other. As a fractional CISO, I can be there to mediate the conversation and get everyone to understand the business impact of a security issue. I can facilitate discussions of business risk to tech people and tech risk to businesspeople.”

Out of this process, hopefully, come decisions about security that will make a difference in the client’s security posture. An effective dialogue on mitigating cyber risk can also help avoid what Prewitt refers to as the procurement trap.

He said, “A lot of corporate leadership teams are presented with a proposal to buy a certain cybersecurity solution. This may or may not be a good idea. Becoming more secure is about more than just buying the right tools. You have to have people and processes in place to implement those tools and turn them into effective countermeasures. A fractional CISO can get people to come together to understand these realities.”

The fractional CISO service is part of a broader outsourcing relationship Inversion6 has with its clients. They can take care of 24/7 security monitoring, for example, a task that most companies cannot staff for. The company also helps tighten processes for tasks like locking accounts or quarantine infected devices. It all adds up to having the client’s “6” when it comes to cybersecurity.

 

Cyberhaven’s Howard Ting: The New Comprehensive Cyber Capabilities Working Group (C3WG)

In this thought leader video, Howard Ting, CEO of Cyberhaven, discusses the new Comprehensive Cyber Capabilities Working Group (C3WG), which launched this past June to explore what cybersecurity capabilities are needed to protect the assets of an organization against today’s threats. As Ting describes, data is one of the most important assets and existing models and frameworks for data security are not well developed. The group will define a complete set of data security capabilities, which will be published in the industry-first Data Security Maturity Model (DSMM). C3WG is working to define for the cybersecurity community a comprehensive list of capabilities needed to secure and defend the full range of cyber assets within an organization. Comprised of security leaders from across industries, the group has deep expertise in the people, process, and technology used to solve security challenges. To learn more visit www.DataSecurity.org.