Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

I Hate this Cliché, but I’m Going There

I really do not want to do this. I really do not want to use this quote, as it has been referenced hundreds of times too many already. But alas, I feel compelled to use it, as it is the best way to make my point…sigh.

I really do not want to do this. I really do not want to use this quote, as it has been referenced hundreds of times too many already. But alas, I feel compelled to use it, as it is the best way to make my point…sigh.

If you know the enemy and know yourself, you need not fear the results of a hundred battles.” – Sun Tzu, The Art of War

In the field of cybersecurity, this quote is now a cliché. When someone mentions it, everyone smiles and nods, and some murmur “of course.” But here is the dirty little secret … NO ONE IS DOING IT. We do not have the tools in place and make the effort to understand our adversaries and we do not have the tools or make time to know ourselves. No wonder we are losing the battle! We need to get back to fundamentals and understand what we are protecting and who we are defending against.

The new 2018 Cost of a Data Breach study by Ponemon Institute finds that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report, with “mega breaches” (breaches of more than 1 million records) costing $40 million and more. It certainly doesn’t appear like we’re winning many battles. That’s because we’re spending all our time and effort buying more point products and building processes to address the latest threats. 

So, let’s get back to basics, starting with the need to know your adversaries. This requires threat intelligence. But this doesn’t necessarily mean you need more threat feeds. Most organizations typically have more threat feeds than they know what to do with from commercial sources, open source, government, industry and existing security vendors. In fact, much of this data is ignored because it’s difficult to discern what’s noise and what’s important. Some intelligence feed vendors provide “global” scores but, in fact, these can contribute to the noise since the score is not within the context of your company’s specific environment. To start to gain a deeper understanding of your adversaries, you need a way to aggregate these millions of global threat data points and translate them into a uniform format to achieve a single source of truth. 

You also need to know yourself. This requires situational understanding, which you begin to build by gathering and analyzing the internal intelligence, context and event data spread across your organization and housed within various systems and tools. Sources like security information and event management (SIEM) systems, log management repositories and case management systems contain events and associated indicators from inside your environment. Unfortunately, these systems aren’t being fully utilized for situational understanding. They can be difficult to access because they are usually “owned” by different security teams that exist in silos – the Security Operations Center, incident response, risk management, vulnerability management, malware, network and more. But the information these systems contain is essential to knowing yourself.

Now bring these two elements together. Through a platform that allows you to correlate all your internal threat and event data with external data on indicators, adversaries and their methods, you gain context to understand the who, what, where, when, why and how of an attack. 

Know your adversaries and yourself are the fundamentals – the first steps of many in the “art of war” with respect to cybersecurity. With an understanding of what you are protecting and what you are protecting it from, you can prepare a winning battle plan. You can change risk scores and prioritize threat intelligence based on parameters you set to filter out what’s noise for you. And when you can focus your resources on what really matters, you can make better decisions that, ultimately, lead to more victories. Sun Tzu’s quote is overused, but its fundamental lessons definitely are not. We’re in a state of war and must get back to basics.

Advertisement. Scroll to continue reading.
Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...