Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Hacking is Sexy, But Defending is the Grown-up Thing To Do

Defending is an Important Piece of the Security Puzzle Too Often Missing From the Broader Dialogue

Defending is an Important Piece of the Security Puzzle Too Often Missing From the Broader Dialogue

I’m always amazed at how much press hacks, exploits, and vulnerabilities get.  I don’t mean to imply that understanding what makes systems vulnerable and how attackers might exploit those vulnerabilities isn’t extremely important — of course it is.  The work that the research community does in this area is critical within the information security field.  Understanding the gaps and holes our organizations have and how attackers might take advantage of those gaps and holes is an important part of understanding the threat landscape.  In turn, as I and many others have discussed previously, understanding the threat landscape is a critical tool that can and should be used as part of a strategic effort to manage, mitigate, and minimize risk.

I’ve lost count of the number of conferences that exhibit, discuss, and celebrate hacking.  Of course, it is important for security researchers and others to have a forum in which to show their findings.  My point here isn’t to criticize these events or detract from them, but rather, to ask a simple question from a slightly different angle. Where are the conferences that exhibit, discuss, and celebrate the defender?  In other words, where are all the press and lauds for those that toil endlessly and dedicate themselves to protecting their organizations and the information those organizations are entrusted to safeguard and protect?

Hackers vs. DefendersFrom my perspective, defending is an important piece of the security puzzle that is all too often missing from the broader dialogue.  To put it another way, what is the “so what” factor that comes from the hacking piece of the puzzle?  Hacking is great, but the knowledge we gain from those efforts needs to find its way into practical application and operations.  Essentially, we as a security community need to remember the defenders and allow them to apply and leverage knowledge gained through other efforts within the security space.  Hacking is sexy, but defending is the grown-up thing to do.  Even though you’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news.

So what can we as a security community do to help bridge the gap between hackers/researchers and defenders?  Here are a few thoughts:

●  Broaden the forum:  Everyone loves to see a great hack, a new vulnerability, or a clever exploit at a hacking or security conference.  The researchers that help us learn through their findings are certainly doing very important work.  But it seems to me that this is only half of the picture.  What about taking all of that important knowledge and applying it to solve operational problems in an effort to improve an organization’s security posture?  Why not open up the stage to defenders and others that have taken work from the research community and successfully applied its findings to their operational environments?  Unfortunately, I don’t see enough of this in the security world.

● Provide context and understanding:  Security is, in essence, a risk mitigation profession.  When boards, executives, and managers hear of the latest hack or vulnerability, they may press the security team for action.  But what’s often missing from this dialogue (or perhaps monologue) is a true understanding of what risk a new find introduces to the organization.  There is tremendous potential to provide critical context and understanding here.  Mapping the hack to the risk it introduces can help organizations understand, deliberate, and act in a strategic and logical manner.  But all too often, I see organizations make knee-jerk reactions and act in a haphazard and illogical manner.

● Shrink the attack surface:  Many people are interested in what attackers, adversaries, and hackers are busy with.  Understanding this is, not surprisingly, a great way to understand how the threat landscape organizations face is changing and evolving.  But there is another angle that is, unfortunately, seldom taken advantage of.  Knowledge of who and what might be targeting our organization, industry, or geographical region and why can help us identify and prioritize risks to the organization.  In turn, we can use this information to shrink the attack surface we’re trying to defend each and every day.  Less noise and a more defined problem generally mean greater overall visibility and awareness into what is happening within our organization.  The potential here is tremendous, but it requires bridges between the researcher and defender worlds that are few and far between.

● Improve efficiency:  I’m sure we’ve all seen people spend large amounts of time on activities and tasks whose value-add we question.  It’s easy to be a critic, but how can security leaders improve efficiency and focus valuable resources on the most value-added activities and tasks?  While there are many approaches, understanding what attackers are after and how they go about accomplishing their goals can help organizations invest precious and limited resources more wisely towards the goal of mitigating risk.  This, in turn, improves efficiency by reducing time and money wasted on activities and tasks that have little to no value-add when it comes to reducing overall risk to the organization.

Advertisement. Scroll to continue reading.

● Learn and improve:  No organization is perfectly secure or bulletproof.  Understanding how attackers succeed in infiltrating our organizations is a tremendous opportunity to learn, reflect, and of course, take action to close gaps and fill holes.  As defenders, we should be sure to focus on what attackers are doing, as it can help us learn an awful lot about our organizations and improve our security postures. 

Unfortunately, whether we like it or not, the security world is somewhat divided between hackers/researchers and defenders.  Each side is doing extremely important work but may not fully appreciate the work being done on the other side of the divide.  As a security community, if we work to build bridges between researchers and defenders, we can help apply important knowledge to real operational problems.  This, in turn, will greatly aid us as a community in improving the security postures of our organizations.

Written By

Joshua Goldfarb (Twitter: @ananalytical) is currently Global Solutions Architect - Security at F5. Previously, Josh served as VP, CTO - Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.