Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Black Hat

DerbyCon: SMB Security Challenges, Army Cyber Brigade Makes Recruitment Effort

“Ma and Pop sleep with door unlocked”

LOUISVILLE – DerbyCon – Saturday afternoon, SecurityWeek sat down with Ryan Sevey, an information security consultant for a utility company, who gave a talk at DerbyCon on security solutions for Small and Mid-Size Businesses (SMBs), with a focus on “Mom and Pop” operations.

“Ma and Pop sleep with door unlocked”

LOUISVILLE – DerbyCon – Saturday afternoon, SecurityWeek sat down with Ryan Sevey, an information security consultant for a utility company, who gave a talk at DerbyCon on security solutions for Small and Mid-Size Businesses (SMBs), with a focus on “Mom and Pop” operations.

According to the U.S. Census, there are 27 million SMBs in the U.S., and security has shown to be a challenge to them for a number of common reasons. When Sevey worked as a consultant, he constantly came upon SMBs with lacking or completely missing security programs, and would hear the same logic time and tim again as to why this was the case.

DerbyConSome organizations would say that cost is the reason, as in security is just too expensive. Others would comment on how they didn’t need security because they have nothing of interest for the criminal element online. The “it won’t happen to me” mindset is seriously common in the SMB space, and yet they are often the most common target, and the lack of security makes them the easiest.

Sevey mentioned several things that SMBs can do to increase their level of security, which can also save the small business owner money in the long term. The first item on the list is a risk assessment. The assessment doesn’t have to be perfect, and there are plenty of resources online to help the business get started. An assessment should also include an information classification process, that allows the organization to determine the types of information that are important, where this data is on the network, and who or what has access to it. From there, an Accessible Use Policy (AUP) should be written, as well as policy related to business continuity and disaster recovery.

Often the SMB can’t afford their own IT staff, but they should get in the habit of checking on their vendors, and remember that different jobs require different consultants or firms. Because consultants are expensive, and money is always an issue with in an SMB, it isn’t uncommon for the same consultancy to do all technical projects, when sometimes that just isn’t conducive to a well-rounded security program.

The other major point he stressed in his talk is that security shouldn’t be something that comes after the fact, or something that is only there so that a box can be checked on a compliance form. Compliance doesn’t equal security, but unfortunately that is how some SMBs view it.

Lastly, Sevey mentioned pfSense, a great open source tool that SMBs can use to help with several security needs. The utility offers several valuable tools from VPN and routing, to firewall abilities. A full feature list and download can be seen here

The vendor area at DerbyCon is mostly a casual spot, where there isn’t a hard sell and the booth teams are attendees themselves for the most part. Admittedly, seeing vendors such as Rapid7 and Symantec came as no surprise, but a booth manned by the US Army’s Intelligence and Security Command (INSCOM) Cyber Brigade was a bit unusual.

Advertisement. Scroll to continue reading.

However, the idea that the government’s recruitment efforts, which have been somewhat successful during Black Hat and not so successful during DEF CON, would reach to the smaller, regional events isn’t shocking by any stretch. According to representatives on site at DerbyCon, there are also plans to attend OWASP in Austin, Texas and Hacker Halted next month in Miami.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Black Hat

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...