Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Information Security Must Take 5 Steps to Emerge From Dark Ages: RSA Conference

RSA Conference 2015 — Stumbling around in the dark is not the metaphor a CISO probably wants to use to describe his or her organization’s approach to security.

But according to Amit Yoran, like or not, defending a digital infrastructure today can be exactly like that.

RSA Conference 2015 — Stumbling around in the dark is not the metaphor a CISO probably wants to use to describe his or her organization’s approach to security.

But according to Amit Yoran, like or not, defending a digital infrastructure today can be exactly like that.

In his keynote at the RSA Conference, Yoran, president of EMC’s RSA security division, said information security is mired in its own dark ages as the threat landscape continues to evolve.

“My stumbling around here in the dark is a pretty good metaphor for anyone trying to protect and defend a digital infrastructure today,” he said. “Every alert that pops up is like a bump in the night, and often we don’t have enough context to know which ones really matter, and which ones we can ignore.”

“The terrain has changed, but we’re still clinging to our old maps,” he said. “It’s time to realize things are different.”

For security to escape its dark ages and enter into its own stage of enlightenment, there are five things that need to happen to help organizations better navigate this new terrain, he said. First, organizations need to stop viewing advanced protections as a panacea. While they work, they will also fail. The mega breaches that make the news as well as the ones that go unreported all demonstrate that a focused, well-resourced attacker will break into an environment no matter how high the walls around it, he said.

“You’ll see many promises made this week,” he said. “Expect to see more big data solutions, solutions to IoT [the Internet of Things]…and all sorts of other buzzwords. But challenge yourself. Challenge us vendors. Does this really help? Or is this another castle wall that inevitable will be breached?”

Second, he said, organizations need to improve visibility throughout their entire environment, from the endpoint to the network to the cloud.

Advertisement. Scroll to continue reading.

“We need pervasive and true visibility into our enterprise environments,” said Yoran. “In reality, I’m describing now what SIEM was meant to be – or what SIEM ought to be. You simply can’t do security today without the visibility of both continuous full packet capture and endpoint compromise assessment visibility. “

“Within our digital environments,” he continued, “we need to know exactly which systems are communicating with which – why, how, any related communications, their length, frequency, volume, and ultimately the content itself to determine what exactly is happening. These aren’t nice-to-haves; they are foundational, core requirements for any modern security program. If you don’t have that level of visibility and agility, you’re only pretending to be secure.”

The third involves focusing on identity. While malware is often used in attacks, many hacks rely on vulnerable web applications and stolen credentials, Yoran noted.

“Strong authentication and analyzing who is accessing what can identify attack campaigns earlier in the kill chain and make the difference between successful response and unmitigated disaster,” he said. “Don’t make the mistake of actually trusting the actions of the trusted; those are the very accounts most targeted and the ones we should be most suspicious of.”

The fourth and fifth steps are strong external threat intelligence and understanding what is truly mission-critical so that security technologies can be deployed accordingly, he concluded.

“What I’m describing,” Yoran said, “is not a technology problem. We have the technology today to provide true visibility. Strong authentication and identity management solutions are readily available. We have great threat intelligence and insight into even sophisticated adversaries. And we have systems which help us map and manage our digital and business risks. This is not a technology problem. This is a mindset problem. The world has changed – and trust me, it’s not the terrain that’s wrong.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.