<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized &#8211; CISO Forum</title>
	<atom:link href="https://www.cisoforum.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cisoforum.com</link>
	<description>An Exclusive Forum For Information Security Leaders</description>
	<lastBuildDate>Mon, 03 Feb 2020 15:28:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.cisoforum.com/wp-content/uploads/2025/04/cropped-apple-icon-152x152-1-32x32.png</url>
	<title>Uncategorized &#8211; CISO Forum</title>
	<link>https://www.cisoforum.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>There Is Life for the CISO After a Breach</title>
		<link>https://www.cisoforum.com/there-is-life-for-the-ciso-after-a-breach/</link>
					<comments>https://www.cisoforum.com/there-is-life-for-the-ciso-after-a-breach/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Mon, 03 Feb 2020 15:28:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=466</guid>

					<description><![CDATA[A survey of CISO attitudes conducted by Symantec and Dr Chris Brauer of Goldsmiths, University of London will surprise few CISOs, but should be required reading for other business leaders. It describes adrenaline junkies that fear burnout and worry about being scapegoats in an impossible position, but remain dedicated to their job. Symantec questioned 3,000 [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>A survey of CISO attitudes conducted by Symantec and Dr Chris Brauer of Goldsmiths, University of London will surprise few CISOs, but should be required reading for other business leaders. It describes adrenaline junkies that fear burnout and worry about being scapegoats in an impossible position, but remain dedicated to their job.</strong></p>



<p>Symantec questioned 3,000 European CISOs from the UK, France and Germany. The results (<a href="http://images.mktgassets.symantec.com/Web/Symantec/%7Bfbd20327-890b-4cdf-ae33-cfc2b432263f%7D_200768_v2_SYM_High_Alert_eBook_Final.pdf" target="_blank" rel="noreferrer noopener">PDF</a>) highlight what many in the security industry will immediately recognize: 82% of CISOs already feel &#8216;burnt out&#8217;; 65% feel that their work and position are set up for failure; 64% consider quitting their job; and 63% have considered leaving the cybersecurity industry altogether.</p>



<p>It is, in short, a highly stressful position. But despite this, 92% are &#8216;thrilled&#8217; by their work; 92% are fully immersed despite the stress; and 90% are motivated by high pressure situations.</p>



<p>But despite the adrenaline junkie thrill of the job, CISOs remain pragmatic about the effect they can have. They are short-staffed, overwhelmed by the volume of security alerts received, and generally believe that the attackers have a higher skill set than the defenders. This leads to the common belief that it is not if, but when, there will be a breach.</p>



<p>The most interesting part of this report analyzes the &#8216;after the breach&#8217; change in CISOs&#8217; attitudes. Although 55% of CISOs fear they will be fired if a breach occurs on their watch, and 40% are afraid they will be held personally liable for that breach, nevertheless the experience of navigating an avoidable breach seems to favorably affect the CISO&#8217;s outlook.</p>



<p>The survey looked at the impact of known stress factors and compared responses between those (26% of the respondents) who had been through a breach with those that had not. The stress factors included increasing regulation, the alert workload, too much data with too many access points, infrastructure complexity, and the skills gap. On average, only 23% of the experienced CISOs felt that these factors increased their stress levels, while 47% of those that hadn&#8217;t experienced a breach felt associated increased stress.</p>



<p>This reduced stress appears elsewhere. &#8220;Only 19% of the &#8216;experienced&#8217; group say they are concerned about [dismissal resulting from a breach] compared to 28% of those who had not been through a breach,&#8221; says the report. &#8220;They also cite less feelings of personal responsibility for incidents that could have been avoided (22% versus 37%) and are less likely to feel like they&#8217;re in a position where they were set up for failure (21% versus 35%).&#8221;</p>



<p>The beneficial psychological effect of experiencing a breach continues into job satisfaction. Twenty-three percent versus 47% feel burnt out; 22% versus 42% feel apathy or indifference toward their work; 20% versus 34% consider quitting; and 20% versus 34% consider leaving the industry.</p>



<p>At the same time, however, some of the adrenaline-based excitement of the work seems to dissipate. Far fewer breach-experienced CISOs remain thrilled in their work, fewer feel fully supported by the business, fewer believe they have the opportunity for creative problem-solving, and fewer believe the work provides an opportunity to make an impact/difference on the world.</p>



<p>&#8220;This data is fascinating,&#8221; comments Darren Thomson, Symantec CTO EMEA, &#8220;but it&#8217;s important to understand the context &#8212; in my experience, those people who have experienced a cyber security breach and come out the other side, become much more sanguine and less emotionally charged in their approach. It doesn&#8217;t mean security leaders become less committed to their responsibilities after a major incident. If anything, more of a &#8216;I&#8217;ve seen it all before&#8217; mindset enables them to think more clearly, with a greater focus on longer-term, strategic priorities.&#8221;</p>



<p>One of the changes between breach-experienced and unexperienced CISOs noted by the survey is an increased willingness to discuss breach/attack experiences with others. Seventeen percent of experienced CISOs don&#8217;t talk to professionals outside of their business, compared to 32% of those who haven&#8217;t experienced a breach. Similarly, 14% versus 18% worry that sharing such information might adversely affect their career.</p>



<p>There is no direct data from the survey to suggest that cross-industry information sharing benefits cyber security, but it is a widely held belief supported by the authors. The report notes, &#8220;The problem is that there isn&#8217;t a substantive culture of sharing insights in the cyber security sector: 54% of respondents don&#8217;t discuss breaches or attacks with peers in the industry. Over a third (36%) of security professionals are also worried that sharing information about a breach during their watch &#8212; with peers, colleagues or prospective employers &#8212; would adversely impact their career.&#8221;</p>



<p>It then quotes Dr Steve Purser, Head of Core Operations at ENISA: &#8220;Security leaders, and the industry more broadly, need a framework for structured information sharing &#8212; whether for ongoing best practice, or as a process for learning from a breach. Enterprises or governments should be set up to handle at least three types of information. The first is strategic information for high level decision making. The second is operational information, used for improving best practices over the longer term. And the third is tactical information, such as indicators of security compromise, used for day to day responses. In each case this information should be shared with the context of a specific goal that&#8217;s being addressed.&#8221;</p>



<p>The implication is that CISOs do not share information, and that they should do so within a formal structure &#8212; that is, despite all other pressures and workloads, they should do something extra. It is possibly the formality of this type of information sharing that is the problem. In practice, CISOs actively seek their peers at conferences and forums, and do talk to each other about problems and solutions &#8212; but informally.</p>



<p>Overall, this survey provides an excellent overview of the pressures and difficulties faced by CISOs on a day to day basis. They don&#8217;t need to be told this, because they live it daily. The big takeaway for the CISO, however, is the less obvious discovery that not only is there life after a breach, it may well be a more contented life.</p>



<p><strong>Related:&nbsp;<a href="https://www.securityweek.com/being-ciso-no-longer-dead-end-job" target="_blank" rel="noreferrer noopener">Being CISO Is No Longer a Dead-End Job&nbsp;</a></strong></p>



<p><strong>Related:&nbsp;<a href="https://www.securityweek.com/how-cisos-can-demonstrate-business-value" target="_blank" rel="noreferrer noopener">How CISOs Can Demonstrate Business Value&nbsp;</a></strong></p>



<p><strong>Related:&nbsp;<a href="https://www.securityweek.com/cisco-publishes-annual-ciso-benchmark-study" target="_blank" rel="noreferrer noopener">Cisco Publishes Annual CISO Benchmark Study&nbsp;</a></strong></p>



<p><strong>Related:&nbsp;<a href="https://www.securityweek.com/ode-cisos-how-real-world-risks-became-cyber-threats" target="_blank" rel="noreferrer noopener">An Ode to CISOs: How Real-World Risks Became Cyber Threats&nbsp;</a></strong></p>

    <div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">

		
        <ul>
			        </ul>
    </div> 
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/there-is-life-for-the-ciso-after-a-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Industry is Not Ready IIoT Attacks That Have Already Begun</title>
		<link>https://www.cisoforum.com/industry-is-not-ready-iiot-attacks-that-have-already-begun/</link>
					<comments>https://www.cisoforum.com/industry-is-not-ready-iiot-attacks-that-have-already-begun/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Thu, 30 May 2019 16:04:49 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[IIoT]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Irdeto]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=432</guid>

					<description><![CDATA[(Kevin Townsend &#8211; SecurityWeek) &#8211; Industrial Internet of Things (IIoT) is an essential part of business transformation and the Industry 4.0 revolution. Its use is burgeoning, with more than 7 billion devices in use worldwide. This is expected to grow to more 20 billion by 2025 &#8212; and does not include phones, tablets or laptops. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>(<strong>Kevin Townsend &#8211; </strong><a href="https://www.securityweek.com/industry-not-prepared-iiot-attacks-have-already-begun" target="_blank" rel="noopener"><strong>SecurityWeek</strong></a>) &#8211; Industrial Internet of Things (IIoT) is an essential part of business transformation and the Industry 4.0 revolution. Its use is burgeoning, with more than 7 billion devices in use worldwide. This is expected to grow to more 20 billion by 2025 &#8212; and does not include phones, tablets or laptops. It is a journey just beginning, and nobody yet knows the destination or route.</p>



<p>Cybersecurity complications are expected, but the most common perception is that so far this has been limited to the rise of massive DDoS botnets able to deliver huge attacks &#8212; like&nbsp;<a href="https://www.securityweek.com/mirai-botnet-infects-devices-164-countries" target="_blank" rel="noopener">Mirai</a>&nbsp;&#8212; from thousands of compromised IoT devices. A new survey now shows that direct cyber-attacks against IIoT have already started, and that DDoS is not a primary concern to security teams.</p>



<p>The&nbsp;<a href="https://resources.irdeto.com/irdeto-global-connected-industries-cybersecurity-survey/irdeto-global-connected-industries-cybersecurity-survey-full-report" target="_blank" rel="noreferrer noopener">survey</a>, conducted by Vanson Bourne for Irdeto, questioned 700 security decision makers across Connected Health, Connected Transport and Connected Manufacturing, and the IT and technology firms that manufacture devices. Data was gathered in March and April 2019 from China, Germany, Japan, the UK and the U.S.</p>



<p>Eighty percent of these organizations experienced a cyber-attack against their IoT over the last 12 months. The highest rate was in the UK at 86% (three other regions had attacks against more than 80% of respondents), with Japan at the relatively low 60%. Within the industry verticals examined, 82% of healthcare organizations, 79% of manufacturing and production organizations, and 77% of connected transport organizations have experienced an attack.</p>



<p>While attacks against IIoT have already started, organizations have little confidence in the immediate future. Globally, 83% of organizations are concerned about their IoT systems suffering a future cyber-attack (with 32% being &#8216;very&#8217; concerned). Concern is highest in the UK (91%), with the U.S. at 87%. Japan and China show the least concern at 76% and 77% respectively.</p>



<p>Coupled with these concerns, there is little confidence in the existing device security. Globally, 33% of user organizations believe that device security could be improved to a great extent. Only 2% felt that security could not be improved. Even among the IoT manufacturers, there is little confidence. Forty-one percent of the IoT device manufacturers feel their own device security could be improved to a great extent. This was highest in Germany (49%) and lowest in Japan (32%).</p>



<p>The degree of concern differs between the verticals. Connected transport is most concerned about compromised customer data (35%) followed by loss of customers and operational downtime (both at 15%). Healthcare is most concerned about compromised customer data (39%) followed by compromised end-user safety (20%). Manufacturing and production is primarily concerned with compromised end-user safety (21%) followed by operational downtime (19%).</p>



<p>None of these figures are surprising given the nature of the verticals &#8212; except, perhaps, that healthcare is more worried about loss of data than end-user safety (presumably patients). This may reflect the success and effect of&nbsp;<a href="https://www.securityweek.com/healthcare-security-wheres-hype-hipaa" target="_blank" rel="noopener">HIPAA</a>.</p>



<p>The average cost of an IoT security incident has been relatively low in cyber breach terms &#8212; just $330,602. It is highest in connected transport, and lowest in manufacturing and production. This surprises Irdeto. &#8220;Itís possible that these organizations may not be taking into account all of the costs associated with a cyberattack, including lost business, costs to correct any vulnerabilities that led to the attack, etc,&#8221; it writes. &#8220;It is also possible that with IoT proliferation in these industries being in its relative infancy, the current cost of cyberattacks on these devices is not as catastrophic as in other parts of the business. However, if this is the case, the costs will surely skyrocket as IoT devices become more abundant and connectivity continues to increase throughout the business.&#8221;</p>



<p>It is fair to say that as IoT becomes more deeply embedded in manufacturing &#8212; especially in the operational side &#8212; the cost of a serious attack could increase dramatically. When a variant of WannaCry&nbsp;<a href="https://www.securityweek.com/chip-giant-tsmc-says-wannacry-behind-production-halt" target="_blank" rel="noopener">got into the OT network</a>&nbsp;of the Taiwanese TSMC chip fabricator in 2018, it resulted in costs of around $170 million.</p>



<p>The Irdeto survey demonstrates that direct cyber-attacks against IIoT have already started, and that industry is not yet well prepared. In fact, Irdeto found only one promising response: 99% of the respondents agree that a security solution should be an enabler of new business models, and not just a cost. It took IT security many years to come to the same position. It demonstrates, says Irdeto, that &#8220;The previous mindset of security as an afterthought is changing, and one of the most promising results of the study found that today&#8217;s organizations are thinking even more strategically about security.&#8221;</p>

    <div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">

		
        <ul>
			        </ul>
    </div> 
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/industry-is-not-ready-iiot-attacks-that-have-already-begun/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>U.S. Federal Agencies Slow in Implementing New Information Technology</title>
		<link>https://www.cisoforum.com/u-s-federal-agencies-slow-in-implementing-new-information-technology/</link>
					<comments>https://www.cisoforum.com/u-s-federal-agencies-slow-in-implementing-new-information-technology/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Mon, 07 Jan 2019 15:20:49 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Accenture]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[IT]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=416</guid>

					<description><![CDATA[(Ionut Arghire &#8211; SecurityWeek) &#8211; U.S. federal agencies are accelerating the modernization of their information technology (IT) systems and infrastructures, but they still have to align their technology priorities with mission objectives, new research from Accenture discovered. In their newly published State of Federal IT 2018 report (PDF), Accenture reveals that only a few agencies [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>(Ionut Arghire &#8211; SecurityWeek) &#8211; U.S. federal agencies are accelerating the modernization of their information technology (IT) systems and infrastructures, but they still have to align their technology priorities with mission objectives, new research from Accenture discovered.</strong></p>
<p>In their newly published <em>State of Federal IT 2018</em> report (<a href="https://www.accenture.com/t20181210T024327Z__w__/us-en/_acnmedia/PDF-90/Accenture-810090-the-state-of-federal-IT-POV-final.pdf" target="_blank" rel="noopener">PDF</a>), Accenture reveals that only a few agencies have fully adopted new approaches like cloud computing, digital platforms and agile software development. This reveals gaps that many agencies are facing in supporting more-agile operations.</p>
<p>According to the survey, IT organizations are making progress in modernizing technology systems and infrastructures, yet 70% of the responding IT decision makers say they’re still playing an enabling role within their agency.</p>
<p>Only 47% of them believe they’re effectively contributing to mission agility (integrating, automating, and digitizing key processes and services), but 67% believe they can protect the agency from insider threats/security breaches. 66% say they can protect it from outsider threats/cyberattacks.</p>
<p>The report, which received responses from 200 federal IT executives, reveals that only 39% of the respondents believe they’re able to transform mission and business requirements into compelling business cases for new IT investment.</p>
<p>The research unveiled a focus on modernizing IT operations rather than on deploying capabilities to directly empower mission and business stakeholders. 54% of respondents consider commercial cloud infrastructure as either very important or essential to accelerating IT impact, and 40% say the same about software-as-a-service applications.</p>
<p>Regardless, commercial cloud adoption among federal agencies remains low. More than half (54%) of the survey respondents admitted to running only 25% or less of their infrastructure in the cloud.</p>
<p>Although federal agencies tend to focus on IT investments, the respondents cited lack of funding (48%), cybersecurity concerns (44%) and a reliance on legacy IT (40%) as challenges to technology adoption. 28% of government executives said digital skills shortage was a barrier.</p>
<p>The report also outlines three key principles that are critical to IT modernization, which should help federal agencies in their journey to implementing new technologies.</p>
<p>These include the fact that IT leaders must use their understanding of technology’s potential to help their agencies improve their capabilities. New partnerships and collaborations are needed, as well as readiness for constant change, given the pace at which technology advances.</p>
<p>“Enterprises recognize as fundamental the need to digitize their operations to become more scalable, efficient, adaptive, innovative, and precise. This is equally true for federal agencies. To thrive in this new era, federal IT leaders must prepare for dramatic changes in how they operate and deliver value,” the report reads.</p>
<p><strong>Related</strong>: <a href="https://www.securityweek.com/many-federal-agencies-fail-meet-dmarc-implementation-deadline" target="_blank" rel="noopener">Many Federal Agencies Fail to Meet DMARC Implementation Deadline</a></p>
<p><strong>Related</strong>: <a href="https://www.securityweek.com/senator-urges-federal-agencies-ditch-adobe-flash" target="_blank" rel="noopener">Senator Urges Federal Agencies to Ditch Adobe Flash</a></p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/u-s-federal-agencies-slow-in-implementing-new-information-technology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why AI Raises Your Risk of Cybercrime &#8211; And What to do About It</title>
		<link>https://www.cisoforum.com/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it/</link>
					<comments>https://www.cisoforum.com/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Thu, 08 Nov 2018 20:51:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Data breach]]></category>
		<category><![CDATA[incident]]></category>
		<category><![CDATA[response]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=413</guid>

					<description><![CDATA[The robots are coming. It has become conventional wisdom that artificial intelligence (AI) and machine learning (ML) will increasingly determine our lives going into the future. By 2020, according to an estimate from Capterra, about 85% of customer-business interactions will take place with AI, without a human involved. 47% of organizations with advanced digital practices [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The robots are coming. It has become conventional wisdom that artificial intelligence (AI) and machine learning (ML) will increasingly determine our lives going into the future. By 2020, according to an estimate from Capterra, about 85% of customer-business interactions will take place with AI, without a human involved. 47% of organizations with advanced digital practices have a defined AI strategy, based on data from Adobe. But for IT and security executives and professionals who must protect against cybercrime, AI poses both a promise and threat.</p>
<p>The industry is looking toward the promise of AI tools to stay a step ahead of the cybercriminals. Experian’s 2018 annual Data Breach Preparedness Study found just 31% of respondents were confident in their organization’s ability to recognize and minimize spear phishing incidents, and just 21% were confident in their organization’s ability to deal with ransomware. Malware and cyberattacks evolve over time. ML uses data from previous cyberattacks, leveraging what it knows and understands about past attacks and menaces to identify and respond to newer, similar risks. The thinking also goes that AI and ML will help save time for overburdened IT departments.</p>
<p>The threat comes from the bad guys also employing AI to create more sophisticated attacks, enhancing traditional hacking techniques like phishing scams or malware attacks. For example, cybercriminals could use AI and ML to make fake e-mails look authentic and deploy them faster than ever before. Criminals could apply AI to develop mutating malware that changes its structure to avoid detection. AI could scrub social media for personal data to use in phishing cons. Data poisoning is another danger, in which attackers find out how an algorithm is set up, then introduce false data that misleads on which content or traffic is legitimate and which is not.</p>
<p>A lesser threat comes from within the industry, as companies rush to market with so-called AI cyber security tools. There is a difference between AI and machine learning. ML algorithms train on large data sets to “learn” what to look for on networks and how to respond to various scenarios. Generally, ML needs new training data to calculate and reach new conclusions, while a true AI system does not.<br />
Some products are based on “supervised learning,” requiring the data sets that algorithms are trained on to be chosen and labeled, by tagging malware code and clean code, for example. Some vendors are using training information that hasn’t been thoroughly scrubbed of erroneous data points, which means the algorithm won’t catch all attacks. Hackers could switch tags so that some malware is designated as clean code, or simply figure out the code the ML is using to flag malware and delete it from their own, so the algorithm doesn’t detect it.</p>
<p>Given the fast-changing landscape, here are some tips to realize the enormous potential of AL and ML and still protect your organization.</p>
<p>Resist the hype. AL and ML are the hot buzzwords and technologies of the moment. But there’s also a great deal of confusion. According to ESG Research, just 30% of cybersecurity professionals feel they are very knowledgeable about AI and ML and their application to cybersecurity analytics. When purchasing an AI or ML tool, try to do your research and understand what you’re buying so that it’s an effective and appropriate solution for your organization.</p>
<p>Keep a human involved in the process. There used to be an old IT truism of bad data in, bad data out. The “intelligence” in AI is based on data inferences and correlations, which need to be checked and monitored so the model is addressing risks appropriately and evolving as you need. ML systems shouldn’t be totally autonomous. They should be set up with a human in the loop, and the ML should know to ask for help with presented with an unfamiliar situation.</p>
<p>Have a strong data breach plan. According to Experian’s Data Breach Preparedness Study, 88% of organizations have a data breach response plan in place, but less than half (49%) think it is effective or highly effective. If you have a plan, it shouldn’t just sit on a shelf. Make sure that it is robust, with buy-in from all the key departments of your company, and drill on it early and often. If you need to get started on a plan or refine it, Experian’s updated <a href="https://www.experian.com/assets/data-breach/white-papers/experian-2018-2019-data-breach-response-guide.pdf" target="_blank" rel="noopener">Data Breach Response Guide</a> can serve as a resource.</p>
<p>AI and ML are the wave of the future. But the cyber threats are real now, and so are the limitations of the technology as a foolproof protection tool. Be aware, both of what’s ahead from the cybercriminals and how you’re applying AI solutions, so you’re not lulled into a false sense of security.</p>
<p>&nbsp;</p>
<p><strong>About the Author</strong>: <img decoding="async" class="alignleft wp-image-414 size-full" src="https://www.cisoforum.com/wp-content/uploads/2018/11/Michael-Bruemmer-2016.jpg" alt="Michael Bruemmer, Experian " width="150" height="188" />Michael Bruemmer is Vice President of <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank" rel="noopener">Experian Data Breach Resolution</a>, which helps businesses mitigate consumer risk following data breach incidents.</p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISO Survey Shows Importance of Threat Hunting in the Finance Sector</title>
		<link>https://www.cisoforum.com/ciso-survey-shows-importance-of-threat-hunting-in-the-finance-sector/</link>
					<comments>https://www.cisoforum.com/ciso-survey-shows-importance-of-threat-hunting-in-the-finance-sector/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Tue, 22 May 2018 13:29:37 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[carbon black]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[survey]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=398</guid>

					<description><![CDATA[Attackers Hide in Plain Sight as Threat Hunting Lags (Kevin Townsend &#8211; SecurityWeek) &#8211; The finance sector has one of the most robust cybersecurity postures in industry. It is heavily regulated, frequently attacked, and well-resourced &#8212; but not immune to cybercriminals. Ninety percent of financial institutions were targeted by ransomware alone in the past 12 [&#8230;]]]></description>
										<content:encoded><![CDATA[<h3 class="page-title" style="text-align: center;">Attackers Hide in Plain Sight as Threat Hunting Lags</h3>
<p>(Kevin Townsend &#8211; SecurityWeek) &#8211; The finance sector has one of the most robust cybersecurity postures in industry. It is heavily regulated, frequently attacked, and well-resourced &#8212; but not immune to cybercriminals. Ninety percent of financial institutions were targeted by ransomware alone in the past 12 months.</p>
<p>Endpoint protection firm Carbon Black <a href="https://www.carbonblack.com/resource/modern-bank-heists-cyberattacks-lateral-movement-in-the-financial-sector?utm_source=security-week" target="_blank" rel="noopener">surveyed</a> the CISOs of 40 major financial institutions during April 2018 to understand how the finance sector is attacked and what concerns its defenders. Two things most stand out: nearly half (44%) of financial institutions are concerned about the security posture of their technology service providers (TSPs &#8212; the supply chain); and despite their resources, only 37% have established threat hunting teams.</p>
<p>Concern over the supply chain is not surprising. Cybercriminals are increasingly attacking third-parties (who may be less well-protected or have their own security issues) to gain access to the primary target. The Federal Deposit Insurance Corporation (FDIC) is also concerned about the supply chain, and has developed an examination process that includes reviewing public information about the TSPs and their software.</p>
<p>One of the areas that concerns the FDIC is consolidation within the service provider industry. &#8220;For example,&#8221; it notes, &#8220;a flawed acquisition strategy may weaken the financial condition of the acquirer, or a poorly planned integration could heighten operational or security risk.&#8221;</p>
<p>Carbon Black recommends that this potential risk be countered by hunt teams and defenders closely assessing their TSP security posture. But, it adds, &#8220;Given that 63% of financial institutions have yet to establish threat hunting teams, there should be concern regarding limited visibility into exposure created by TSPs.&#8221;</p>
<p>But it also considers threat hunting to be important in detecting direct attacks. There are two primary reasons. The first is the increasing tendency for attackers to use fileless attacks that are not easily detected by standard technology; and the second is a growing willingness for attackers to engage in counter-countermeasures; that is, to counter the defender&#8217;s incident response.</p>
<p>Fileless attacks are increasing across all industry sectors. A typical attack might involve a Flash vulnerability. Flash invokes PowerShell, feeding instructions via the command line. PowerShell then connects to a stealth C&amp;C server, from where it downloads a more extensive PowerShell script that performs the attack. All of this is done in memory &#8212; no malware file is downloaded and there is nothing for traditional technology defenses to detect.</p>
<p>&#8220;Active threat hunting,&#8221; says Carbon Black, &#8220;puts defenders &#8216;on the offensive&#8217; rather than simply reacting to the deluge of daily alerts.&#8221; It &#8220;aims to find abnormal activity on servers and endpoints that may be signs of compromise, intrusion or exfiltration of data. Though the concept of threat hunting isn&#8217;t new, for many organizations the very idea of threat hunting is.&#8221;</p>
<p>But the need for threat hunting goes beyond simple detection of intrusion. &#8220;Attackers are able to go off their scripts while defenders are sticking to manual and automated playbooks,&#8221; warns Carbon Black. &#8220;These playbooks are generally based off simple indicators of compromise (IoCs). As a result, security teams are often left thinking they have disrupted the attacker but, with counter incident response, attackers maintain the upper hand.&#8221;</p>
<p>Compounding this, attackers are beginning to incorporate a secondary command and control in case one is discovered or disrupted. Carbon Black notes that this tactic has already been found in 10% of victims, and predicts it is a tactic that will grow in future months. The principal is that an attacker&#8217;s ability to improvise and change directions at speed is best countered by a human defender rather than simply a pre-programmed set of incident response steps.</p>
<p>&#8220;Financial institutions,&#8221; suggests Carbon Black, &#8220;should aim to improve situational awareness and visibility into the more advanced attacker movements post breach. This must be accompanied with a tactical paradigm shift from prevention to detection. The increasing attack surface, coupled with the utilization of advanced tactics, has allowed attackers to become invisible. Decreasing dwell time is the true return on investment for any cybersecurity program.&#8221;</p>
<p>In reality, of course, this does not just apply to the finance sector. The same evolving methodology is being used by attackers across all industry sectors. The need for threat hunting is not limited to finance. &#8220;All sectors should take heed,&#8221; Carbon Black chief cybersecurity officer Tom Kellerman told SecurityWeek. &#8220;Generally speaking, financial services tend to be the most secure as they&#8217;ve come under attack with high-profile attack campaigns in recent years.&#8221; The implication is that if the finance sector is slow to switch to active threat hunting, other sectors will be slower.</p>
<p>In April 2018, Carbon Black filed an S-1 registration statement with the U.S. Securities and Exchange Commission (SEC) for a proposed initial public offering (<a href="https://www.securityweek.com/carbon-black-prepares-100-million-ipo" target="_blank" rel="noopener">IPO</a>) of its common stock. Shares of the company (NASDAQ: CBLK) jumped 26% on its first day of trading on May 4. The company has a market capitalization of nearly $1.6 billion at the time of publishing. The company emerged in its current form after its <a href="https://www.securityweek.com/bit9-raises-38-million-acquires-carbon-black" target="_blank" rel="noopener">purchase by Bit9</a> in February 2014.</p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/ciso-survey-shows-importance-of-threat-hunting-in-the-finance-sector/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>City of Atlanta Ransomware Attack Proves Costly</title>
		<link>https://www.cisoforum.com/city-of-atlanta-ransomware-attack-proves-costly/</link>
					<comments>https://www.cisoforum.com/city-of-atlanta-ransomware-attack-proves-costly/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Mon, 07 May 2018 20:02:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=380</guid>

					<description><![CDATA[City of Atlanta Ransomware Attack Showcases Ethical Problem in Whether to Pay a Ransom or Not (Kevin Townsend &#8211; SecurityWeek) Over the course of the last week, it has become apparent that the City of Atlanta, Georgia, has paid out nearly $3 million dollars in contracts to help its recovery from a ransomware attack on March 22, 2018 [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: center;"><strong>City of Atlanta Ransomware Attack Showcases Ethical Problem in Whether to Pay a Ransom or Not</strong></h2>
<p><strong>(Kevin Townsend &#8211; <a href="https://www.securityweek.com/city-atlanta-ransomware-attack-proves-disastrously-expensive" target="_blank" rel="noopener">SecurityWeek</a>) </strong>Over the course of the last week, it has become apparent that the City of Atlanta, Georgia, has paid out nearly $3 million dollars in contracts to help its <a href="https://www.securityweek.com/ransomware-hits-city-atlanta" target="_blank" rel="noopener">recovery from a ransomware attack</a> on March 22, 2018 &#8212; which (at the time of writing) is still without resolution.</p>
<p>Precise details on the Atlanta contracts are confused and confusing &#8212; but two consistent elements are that SecureWorks is being paid $650,000 for emergency incident response services, and Ernst &amp; Young is being paid $600,000 for advisory services for cyber incident response. The total for all the <a href="http://procurement.atlantaga.gov/awarded-emergency-procurements/" target="_blank" rel="noopener">contracts</a> appears to total roughly $2.7 million. The eventual cost will likely be more, since it doesn&#8217;t include lost staff productivity nor the billings of a law firm reportedly charging Atlanta $485 per hour for partners, and $300 per hour for associates. The ransom demand was for around $51,000.</p>
<p>The ransomware used in the attack was SamSam. In February this year, SecureWorks published a report on SamSam and attributes it to a group it knows as Gold Lowell. Gold Lowell is unusual in its ransomware attacks since it typically compromises its victim networks in advance of encrypting any files.</p>
<p>SecureWorks makes two specific points about Gold Lowell that might be pertinent to the Atlanta incident. Firstly, &#8220;In some cases where the victim paid the initial ransom, GOLD LOWELL revised the demand, significantly increasing the cost to decrypt the organization&#8217;s files in an apparent attempt to capitalize on a victim&#8217;s willingness to pay a ransom.&#8221; Atlanta officials have always declined to comment on whether they paid, or attempted to pay, the ransom</p>
<p>Secondly, &#8220;GOLD LOWELL is motivated by financial gain, and there is no evidence of the threat actors using network access for espionage or data theft.&#8221; Atlanta officials were quick to claim that no personal data was lost in the attack.</p>
<p>Also worth considering is the SamSam <a href="https://www.securityweek.com/samsam-ransomware-attacks-hit-healthcare-firms" target="_blank" rel="noopener">attack on Hancock Health</a> reported in January this year. Hancock chose to pay a ransom of around $55,000, and recovered its systems within a few days. It later admitted that it would not have been able to recover from backups since the attackers &#8212; which sound like the Gold Lowell group &#8212; had previously compromised them.</p>
<p>The extended dwell time by the Gold Lowell group prior to encrypting files and making a ransom demand would explain the extreme difficulty that Atlanta is experiencing in trying to recover from the attack. The Hancock incident suggests that rapid payment might have resulted in file recovery, but SecureWorks also suggests it might have led to a further demand.</p>
<p>There are also indications that Gold Lowell&#8217;s dwell time could have been extensive and effective. According to WSB-TV, Atlanta officials had been warned months in advance that at least one server was infected with malware, and that in February it contacted a blacklisted IP address associated with known ransomware attacks. Whether the incidents are directly connected will only come out with forensic analysis.</p>
<p>However, the few facts that are known raises a very complex ethical issue. Atlanta seems to have chosen to pay nearly $3 million of taxpayer money rather than just $51,000, possibly on a point of principle. That principle is supported by law enforcement agencies around the world who advise that ransoms should not be paid. In this case, the sheer disparity between the cost of the ransom and the ransomware restitution (more than 50-to-1 and growing), all of which must be paid with someone else&#8217;s money, makes it reasonable to question the decision.</p>
<p>There is no simple answer. Atlanta does, however, get almost unequivocal support from the CISO of another U.S. city, who spoke to <em>SecurityWeek</em> requesting anonymity. &#8220;Unless paying the ransom provided details of how they were breached, what would it really get them?&#8221; he asked. &#8220;Firstly, they don&#8217;t know if they would actually get the decrypt keys; secondly, they don&#8217;t know if they would simply get hit again; and thirdly, it would only encourage more of the same kind of action.</p>
<p>&#8220;By bringing in emergency support,&#8221; he continued, &#8220;they probably now have a much better picture of their security posture, most likely have cleaned up a number of issues, and are now on track to pay more attention to this business risk.&#8221; His only criticism is that the money should have been spent to prevent ransomware rather than to recover from it. &#8220;The real lesson,&#8221; he said, &#8220;is for probably 10-20% of the cost of the emergency support they could have brought in the same people to help with the same issues prior to the incident. Would that guarantee it would not happen? No &#8212; but it would improve the odds greatly, would limit the damage done, and improve recovery efforts if it happened.&#8221;</p>
<p>Ilia Kolochenko, CEO of web security company High-Tech Bridge, has a different view. &#8220;The ethical dilemma whether to pay or not to pay a ransom becomes very complicated today. This incident is a very colorful, albeit sad, example that refusing to pay a ransom may be economically impractical and detrimental for the victims.&#8221;</p>
<p>He agrees that Atlanta should have been better prepared. &#8220;Taking into consideration the scope and the disastrous consequences of this incident, one may reasonably suggest that Atlanta has a lot of space for improvement in cybersecurity and incident response. Spending 50 times more money to remediate the consequences of the attack, instead of investing the same money into prevention of further incidents, is at least questionable.&#8221;</p>
<p>But he disagrees with one of the primary arguments of those who advocate not paying. &#8220;Refusing to pay a ransom is unlikely to demotivate cybercriminals from conducting further attacks, as they will always find someone else to pay.&#8221;</p>
<p>In the final analysis, he believes that each case needs to be decided on its own merits, but adds, &#8220;In some cases, paying a ransom is the best scenario for a company and its economic interests. Otherwise, you risk spending a lot of valuable resources with no substantial outcome.&#8221;</p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/city-of-atlanta-ransomware-attack-proves-costly/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Awareness Training a Top Priority for CISOs: FS-ISAC Report</title>
		<link>https://www.cisoforum.com/security-awareness-training-top-priority-cisos-fs-isac-report/</link>
					<comments>https://www.cisoforum.com/security-awareness-training-top-priority-cisos-fs-isac-report/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Wed, 14 Feb 2018 15:00:52 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[FS-ISAC]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://www.cisoforum.com/?p=378</guid>

					<description><![CDATA[(SecurityWeek &#8211; Kevin Townsend) &#8211; Thirty-five percent of CISOs in the financial sector consider staff training to be the top priority for cyber defense. Twenty-five percent prioritize infrastructure upgrades and network defense. The Financial Services Information Sharing and Analysis Center (FS-ISAC) polled more than 100 of its 7,000 global members to produce the first of its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>(<a href="https://www.securityweek.com/security-awareness-training-top-priority-cisos-report" target="_blank" rel="noopener">SecurityWeek &#8211; Kevin Townsend</a>) &#8211; <strong>Thirty-five percent of CISOs in the financial sector consider staff training to be the top priority for cyber defense. Twenty-five percent prioritize infrastructure upgrades and network defense.</strong></p>
<p>The Financial Services Information Sharing and Analysis Center (FS-ISAC) polled more than 100 of its 7,000 global members to produce the first of its planned annual CISO Cybersecurity Trends Study. ISACs are non-profit organizations, usually relevant to individual critical infrastructure sectors, designed to share threat information among their members and with relevant government agencies. They were born from Bill Clinton&#8217;s 1998 Presidential Decision Directive <a href="https://fas.org/irp/offdocs/pdd-63.htm" target="_blank" rel="noopener">PDD 63</a>.</p>
<p>The FS-ISAC&#8217;s 2018 Cybersecurity Trends Report (<a href="https://www.fsisac.com/sites/default/files/27377_FS-ISAC_TrendGraphic_bms1-r2.pdf" target="_blank" rel="noopener">PDF</a>) notes a distinction in priorities based on the individual organization&#8217;s reporting structure. Where CISOs report into a technical structure, such as the CIO, the priority is for infrastructure upgrades, network defense and breach prevention. Where they report into a non-technical function, such as the COO or Legal, the priority is for staff training.</p>
<p>This could be as simple as CISOs prioritizing areas for which they are most likely to get funding. However, that staff training is considered the overall priority does not surprise Dr. Bret Fund, founder and CEO at SecureSet.</p>
<p style="text-align: right;"><strong><a href="https://www.cisoforum.com/" target="_blank" rel="noopener">Request an invite to SecurityWeek&#8217;s CISO Forum</a></strong></p>
<p>&#8220;I think that speaks to CISOs seeing first-hand how their largest risks of breach rest in the people component vs. the product or process components,&#8221; he suggests. &#8220;Executives and Boards cannot underestimate the need for a robust security culture inside their organizations; and the way that you achieve that is through proper education and training.&#8221;</p>
<p>Dan Lohrmann, chief security officer at Security Mentor, agrees. &#8220;The mission-essential business aspects that end user security awareness training is now playing in global financial organizations must be front and center surrounding around all data handling and incident response.&#8221; He recommends metrics-based training so that progress can be monitored.</p>
<p>The report finds no common reporting structure within financial organizations. Only 8% of CISOs report directly to the CEO. Sixty-six percent report to the CIO (39%), the CRO (14%) or the COO (13%). Despite these differences, there appears to be no impact on the frequency of reporting to the board of directors on cybersecurity.</p>
<p>Reporting most frequently occurs every three months (54% of CISOs). Eighteen percent report every six months, and 16% report annually. Only 6% report monthly.</p>
<p>There is no indication within the report on structural trends, which could provide an insight into the evolving role of the CISO. Greg Reber, CEO at AsTech, thinks this is an omission. &#8220;At AsTech, we see moves away from CISOs reporting to CIOs, as the incentives can be at odds,&#8221; he explains. &#8220;CIOs may need to get things done quickly to realize financial goals &#8212; moving processing to the cloud environments for example &#8212; while CISOs are chiefly concerned with risk management.&#8221;</p>
<p>He also notes a failure to comment on cyber risk insurance. &#8220;This falls into an &#8216;event response&#8217; category, which we see as a top priority. However, it didn&#8217;t appear in the top three responses in this survey.&#8221; Reber equates &#8216;cyber defense&#8217; with a Maginot Line philosophy, and believes resources should be balanced between defense and response.</p>
<p>&#8220;This report from FS-ISAC highlights the continued need for cyber awareness and vigilance from staff,&#8221; comments Stephen Burke, founder and CEO at Cyber Risk Aware. &#8220;Hackers are great at exploiting human nature, using social engineering tactics to gain their victims&#8217; trust. Once they can get through defense and onto a user&#8217;s machine they may use sophisticated methods to stealthily move laterally across a network stealing data or credentials.&#8221;</p>
<p>FS-ISAC&#8217;s recommendations to its members based on its survey findings is that staff training should be prioritized regardless of the reporting structure. &#8220;People can be the solution to these growing online risks, or they can be contributors to the growing level of security problems,&#8221; says Lohrmann. &#8220;Effective security awareness training will enable the enterprise to successfully stop cyberattacks.&#8221;</p>
<p><strong>Venture and M&amp;A</strong></p>
<p>Security awareness firms have been the subject of significant funding and M&amp;A transactions in recent months.</p>
<p>Earlier this month, security awareness training firm Wombat Security agreed to be acquired by <a title="Wombat acquired" href="https://www.securityweek.com/proofpoint-acquire-security-awareness-training-firm-wombat-security-225-million" target="_blank" rel="noopener">Proofpoint for $225 million</a> in cash. In August 2017, Webroot <a href="https://www.securityweek.com/webroot-acquires-security-awareness-training-firm-securecast" target="_blank" rel="noopener">acquired Securecast</a>, an Oregon-based company that specializes in security awareness training. In October 2017, security awareness training and simulated phishing firm <a href="https://www.securityweek.com/simulated-phishing-firm-knowbe4-raises-30-million" target="_blank" rel="noopener">KnowBe4 secured $30 million</a> in Series B financing, which brought the total amounbt raised by KnowBe4 to $44 million. Security awareness training firm PhishMe has raised nearly $58 million in funding, including a <a title="PhishMe Funding" href="https://www.securityweek.com/phishme-raises-425-million-series-c-funding" target="_blank" rel="noopener">$42.5 million series C</a> funding round in July 2016.</p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/security-awareness-training-top-priority-cisos-fs-isac-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Five Secrets for Higher Performing CISOs</title>
		<link>https://www.cisoforum.com/five-secrets-for-higher-performing-cisos/</link>
					<comments>https://www.cisoforum.com/five-secrets-for-higher-performing-cisos/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Fri, 10 Feb 2017 17:31:06 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://frixel.com/ciso/?p=219</guid>

					<description><![CDATA[(SecurityWeek) &#8211; IANS Research has developed a model designed to help chief information security officers to maintain their inherent promise: that is, &#8220;to safeguard critical assets across space and time.&#8221;  This model, which it calls CISO Impact, rests on two fundamental capabilities: technical excellence and organizational engagement. The former involves eight domains from access control [&#8230;]]]></description>
										<content:encoded><![CDATA[<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0.0">(<a href="http://www.securityweek.com/research-unearths-5-secrets-higher-performing-cisos" target="_blank" rel="noopener noreferrer" data-content="http://www.securityweek.com/research-unearths-5-secrets-higher-performing-cisos" data-type="external" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0.0.1.0">SecurityWeek</a>) &#8211; IANS Research has developed a model designed to help chief information security officers to maintain their inherent promise: that is, &#8220;to safeguard critical assets across space and time.&#8221;</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.1"> <span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.2.0">This model, which it calls CISO Impact, rests on two fundamental capabilities: technical excellence and organizational engagement. The former involves eight domains from access control to incident response; while the later includes seven factors from running infosec like a business to getting Business to own the risk.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.4"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.4.0">From this model, combined with insights from more than 1,200 high-performing CISOs and information security teams, IANS has developed what it terms &#8216;The 5 Secrets of High-Performing CISOs&#8217;.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.6"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.6.0">&#8220;The connected world is a dangerous place,&#8221; says Stan Dolberg, chief research officer at IANS Research, &#8220;and because of this, CISOs and their teams must lead their organizations to adopt safe business practices. However, the challenge remains that many CISOs are leading from a position of little authority or influence. The CISO Impact diagnostic provides specific ways for CISOs to assert information security leadership skills that are commonly found in organizations one step ahead on the maturity curve. Our goal is to inform, contextualize and prioritize where to invest skills, practices, and technologies. Armed with this strong guidance, CISOs can chart their own paths to leadership.&#8221;</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8.0">Put bluntly, the purpose of this report is to help lower performing CISOs to perform better through using the methods already used by high performing CISOs. The five secrets to achieving career success are: </span></p>
<ul class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9">
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.0">
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.0.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.0.0.0">Lead without authority</span></p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.1">
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.1.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.1.0.0">Embrace the change agent role</span></p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.2">
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.2.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.2.0.0">Don&#8217;t wait to be invited to the party</span></p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.3">
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.3.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.3.0.0">Build a cohesive cyber cadre</span></p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.4">
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.4.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.9.4.0.0">It&#8217;s a 5 to 7-year journey to high impact</span></p>
</li>
</ul>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.a"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.a.0">Each of these &#8216;secrets&#8217; is discussed in the report and supported by statistical research evidence. For example, 100% of high performers lead despite having no authority, using &#8220;persuasion, negotiation, conflict management, communication, education.&#8221; Only 3% of low performers succeed in this.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.0">For the second &#8216;secret&#8217;, the report states, &#8220;High-performing CISOs know the value of engaging to drive change,&#8221; says the report. &#8220;In the CISO Impact data, 3 out of 4 of high performers embrace this approach, compared to 1 in 20 of the low performers. To embrace this role, know the business, know yourself, and get ready to &#8216;make lemonade&#8217;.&#8221;</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.e"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.e.0">The third secret is not so widely adopted by the high performers. &#8220;More than half of high performers in the CISO Impact data set didn&#8217;t wait for executives to have an epiphany that security matters,&#8221; states the report. &#8220;They leveraged the power of simulation to generate the emotional experience of loss or compromise that is fundamental to an engaged executive team.&#8221; Less than 1% of low performers did similar.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.g"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.g.0">In secret 4, &#8220;High performers patiently assemble and train more than a team &#8212; they culture a cyber cadre.&#8221; This approach is adopted by 85% of high performers; but by only 1.4% of low performers.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.i"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.i.0">The fifth secret warns that there is no quick fix. &#8220;Five to seven years is a realistic time frame for building the trust, the program, the team, and the value of information security to the point where information security is baked in.&#8221; </span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.k"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.k.0">These five secrets provide excellent advice for improving company security and enhancing CISO careers. As stand-alone research, however, the report has several problems. The first is the distinction between a high performer and a low performer. The second is that it is easier to be a high performer in some companies than it is in others. </span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.m"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.m.0">Martin Zinaich (CSSLP, CRISC, CISSP, CISA, CISM and more) is information security officer for the City of Tampa, comments: &#8220;&#8216;You must lead without authority&#8217; &#8212; that is so very true! You have to do that both technically and from an organic business integration standpoint. Yet,&#8221; he told SecurityWeek, &#8220;the study shows that 60% of high performing security leaders report into risk and business roles (that have authority) &#8212; and 95% of lower performing CISOs report to the CIO (where they don&#8217;t). Those two stats show the simple reality that it is very difficult to lead without authority. Almost every non-technical safe corporate wide business practice I have seen where the CISO is lacking authority has come via post breach, regulations or working with the Audit department.&#8221;</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.o"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.o.0">The danger for research statistics is that some of the low performers could be high performers in a different company with more resources and/or a more receptive C-Suite. </span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.q"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.q.0">A similar issue occurs in the fifth secret; that is, &#8216;it&#8217;s a 5 to 7-year journey to high impact&#8217;. The reality is that few CISOs will remain in one position for that long &#8212; in fact, it is probably only the high performing CISOs already occupying a high-flying position with a security-aware company that will do so.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.s"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.s.0">Such concerns, however, only impact the statistical difference between high and low performing security officers. The basic arguments contained within the five secrets remains quality advice for any CISO who wants to better secure his organization and improve his career potential.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.u"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.u.0">The IANS Research report, &#8220;The 5 Secrets of High-Performing CISOs&#8221; will be presented at the RSA Conference next week.</span></p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/five-secrets-for-higher-performing-cisos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Cyber-Defense Strategies for Healthcare Security</title>
		<link>https://www.cisoforum.com/new-cyber-defense-strategies-for-healthcare-security/</link>
					<comments>https://www.cisoforum.com/new-cyber-defense-strategies-for-healthcare-security/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Tue, 10 Jan 2017 17:32:04 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://frixel.com/ciso/?p=221</guid>

					<description><![CDATA[In the healthcare industry, cyber-defense systems must continually evolve to keep pace with the ever-changing threats posed by computer hackers and malicious software attacks. This ongoing game of cat-and-mouse makes it hard for us CISOs to keep our defense postures up to date, or even to stay knowledgeable about the newest security products on the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0.0">In the healthcare industry, cyber-defense systems must continually evolve to keep pace with the ever-changing threats posed by computer hackers and malicious software attacks. This ongoing game of cat-and-mouse makes it hard for us CISOs to keep our defense postures up to date, or even to stay knowledgeable about the newest security products on the market.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.2"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.2.0">To address this challenge, I recently invited several of my industry peers to meet with some of the most cutting-edge security startups in Silicon Valley in search of some new solutions. This unique CISO-VC Briefing Program was organized by our technology partner Trace3, which has built up strong relationships with many of the Valley’s most prominent venture capital firms and their portfolio startups.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.4"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.4.0">I was joined by my IT security colleagues from Scripps Health, Millennium Health, NuVasive, Ringcentral and Bank of the Internet. Many of us are members of the San Diego CISO Roundtable, a tight knit community of local security executives, while a few participants presented a unique Northern California/Southern California CISO networking opportunity. We all grapple with the same challenges, yet we don’t view information security as a competitive advantage. In fact, we try to help each other by sharing updates about the latest types of attacks and the newest security strategies.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.6"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.6.0">Visiting with Security Startup Leaders in Silicon Valley</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8.0">Even with the rapid pace of cybersecurity innovations today, the bad actors continue to evolve their threats too. Many of us CISOs still rely on legacy security tools that have been leapfrogged by new types of attacks in recent years, so we need to continually adapt our people, processes and technologies.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.a"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.a.0">Older defense systems such as network firewalls and intrusion detection systems remain important, but they are more easily circumvented today. For instance, firewalls only block certain network entry points, but attackers simply use sanctioned ports in firewalls to deliver their malicious software.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.0">Many of the latest security products take a different approach rather than trying to build a moat around the network, which is no longer effective in this world of cloud computing and mobile computing. Some next-generation technologies incorporate machine learning systems that become smarter over time.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.e"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.e.0">One clever approach is known as user <a href="http://www.securityweek.com/increasing-importance-security-analytics" target="_blank" rel="noopener noreferrer" data-content="http://www.securityweek.com/increasing-importance-security-analytics" data-type="external" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.e.0.1.0">behavior analytics</a> (UBA). This type of software sets up profiles for the expected normal online behaviors of each user. By monitoring all users, the system can detect anomalous behaviors which may be the result of stolen password credentials. Or perhaps such unusual patterns are due to a disgruntled employee who is downloading proprietary company data. Employees with sensitive data access may be detected reaching beyond their authorization and into files they don’t have a legitimate reason to see.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.g"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.g.0">My team at Sharp Healthcare is very interested in adopting UBA to detect such intrusions, and we are planning to purchase a solution in the New Year. </span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.i"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.i.0">Staying One Step Ahead of the Bad Guys</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.k"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.k.0">Another cool new security technique shown at our briefing involved network anomaly detection, which is used to track network traffic for abnormal patterns. For example, when terabytes of financial information start getting downloaded at 3 AM, that event triggers an alert to mitigate a potential breach.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.m"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.m.0">New tools for identity and access management allow IT managers to give employees the mobile reach they need to access data from any device, while still protecting the company’s interests with cloud-based security. In addition, data packet inspection solutions examine the reputations of email senders to thwart any possible phishing attacks.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.o"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.o.0">As a result of the briefing, I also set up meetings with <a href="http://www.securityweek.com/db-networks-unveils-layer-7-database-security-oems" target="_blank" rel="noopener noreferrer" data-content="http://www.securityweek.com/db-networks-unveils-layer-7-database-security-oems" data-type="external" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.o.0.1.0">DB Networks</a> and Imperva, makers of database monitoring systems, along with Immuta, a firm that specializes in data security while providing an integrated experimentation platform for data scientists.</span></p>
<p class="font_8" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.q"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.q.0">Many CISOs and CIOs shy away from buying cutting-edge technologies. Some prefer to instead stick with the big incumbent vendors. However, it’s critical to develop a familiarity and trust for the technologies that today’s leading startups are developing.  From a security perspective, this is the only way to stay one step ahead of the next potential data breach.</span></p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/new-cyber-defense-strategies-for-healthcare-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISOs: Five Ways to Ramp Up Your Security Strategy</title>
		<link>https://www.cisoforum.com/cisos-five-ways-to-ramp-up-your-security-strategy/</link>
					<comments>https://www.cisoforum.com/cisos-five-ways-to-ramp-up-your-security-strategy/#respond</comments>
		
		<dc:creator><![CDATA[CISO Forum]]></dc:creator>
		<pubDate>Mon, 21 Dec 2015 17:32:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://frixel.com/ciso/?p=223</guid>

					<description><![CDATA[Every day, and usually without people realizing it, networks are breached. With confidential information exposed to the wrong eyes, secrets can become commodities capable of ruining corporate and personal reputations. We live in a world where network incidents are so common that no one can deny their existence. As attacks proliferate, problems mount. With the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.0">Every day, and usually without people realizing it, networks are breached. With confidential information exposed to the wrong eyes, secrets can become commodities capable of ruining corporate and personal reputations. We live in a world where network incidents are so common that no one can deny their existence. As attacks proliferate, problems mount. With the attack surface continually growing, new devices plugging into networks, and data in motion growing in volume, the challenges for corporate leaders are more complex than ever. Fortunately, most enterprise companies are taking steps to increase their defense in depth, but the security strategy does not become more effective by merely adding another layer of software to the stack. We need rethink the entire approach.</p>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.2">As most security professionals will attest, the task of setting up, maintaining and altering an integrated enterprise security system, often containing multiple vendor solutions, is not simple. There is no lack of solutions for security teams to choose from. What is important is knowing what type of solution to implement and why. The first step to combatting this challenge is to examine a number of common variables at work that point towards why cyber security problems seem to be getting worse despite the availability of innovative solutions in the market.</p>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.4">Expanding networks. Agile hackers. Let’s look at the variables.</p>
<ul class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5">
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.0">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.0.0">Networks are getting larger with each user connecting multiple devices into the system.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.1">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.1.0">While not necessarily smarter, attackers are more agile than most organizations and can afford a “low and slow” approach before pulling the trigger.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.2">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.2.0">The explosion of social networking and the subsequent high volume of data and users it has created help hackers get even easier access into corporate networks.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.3">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.3.0">The widespread reach of black markets and rampant utilization of automated systems has created a marketplace primed for maleficence.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.4">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.5.4.0">The proliferation of technology has created a world that is more diverse and disparate than ever. We continue to be pulled in a million directions as information travels quicker.</p>
</li>
</ul>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.6">The above scenarios are just the tip of the ‘cyber-risk iceberg’. In reality, there are hundreds of variables to identify, assess, and use when looking for the right solution. In this brief write-up, we will do our best to turn those variables into tangible steps in search for a more comprehensive security strategy.</p>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8"><span data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.8.0">Understand. Articulate. Act.</span></p>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.a">Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.</p>
<ol class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c">
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.0">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.0.0">Stop guessing. Assume your enterprise has already been breached. This is where detection technology is critical. Implementing a signature-based system is helpful but it is not sufficient. What is needed is a system that detects behavior anomalies by correlating seemingly disparate events. Think of a night watchman on patrol, noticing potentially unrelated incidents that he can then tie together. He sees a security light has gone dark; this is not necessarily cause for alarm, but it could be if there is broken glass where the bulb was broken, not burnt out. Thus, it is the pinning together of isolated events that could shine light on abnormal behavior that leads to the discovery of a malicious intruder.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.1">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.1.0">Assess the most critical assets and potential compromises within your network.For example, are your end users reliant on mobile devices? Are your employees constantly working remote or on-the-go? The 2015 Cyberthreat Defense Report shows that 59% of respondents experienced an increase in mobile threats over the past year. If you have a mobile-heavy workforce, make sure you’re monitoring all apps and mobile traffic. Also, know the storage location of the most critical assets of your organization, such as corporate IP, client info, project plans, etc., and have consistent management of access permission settings.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.2">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.2.0">Understand your risks and core infrastructure. You must be aware of the most vulnerable risks posed to your organization in the event of a breach. What assets pose the greatest danger to your stability if they fall into the wrong hands? What is the level of security as defined by your existing cyber security stack? How much of your resources have been deployed to your perimeter versus network core?</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.3">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.3.0">Articulate. Learn the way in which your organization’s board communicates and receives information best. They typically do not have time to review hundreds of metrics; therefore you must be able to organize your findings in a succinct, action-oriented manner that makes it easier for them to make decisions that help your organization. They certainly have the means to move resources. Make them your advocates.</p>
</li>
<li data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.4">
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.c.4.0">Act. Once a plan is in place, execution is vital. Make sure you put the necessary time and effort into building a resilient and secure system prepared to fight off invaders both inside and outside the firewall. In the end, it will save your organization valuable time and money while protecting your reputation.</p>
</li>
</ol>
<p class="font_9" data-reactid=".0.$SITE_ROOT.$desktop_siteRoot.$PAGES_CONTAINER.1.1.$SITE_PAGES.$c246h_DESKTOP.1.$i4xhzq67_0.0.0.$child.$0.1.$1.$5.$0.0.d">Securing your network from the inside out via detection is crucial. Since we know that more than 90% of networks already have intruders present, we must take steps to detect their presence, identify how they got in, and make a plan to protect the network from future intrusion.</p>
<div class="xs_social_share_widget xs_share_url after_content 		main_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content">
<ul>
			        </ul>
</p></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cisoforum.com/cisos-five-ways-to-ramp-up-your-security-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
