Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/14/2012
07:06 AM
50%
50%

4 Ways To Identify The Real Threats To Your Organization

Companies looking for better ways of prioritizing their defensive efforts need to look beyond vulnerabilities. How to find the real threats to your business before they find you

The basic equation for risk is simple: If an adversary or threat can exploit a vulnerability to harm an asset, then you have risk.

Yet far too many companies focus on the two components of risk that are typically internal to their networks: assets and most of all, vulnerabilities. With a slew of media articles coming out on vulnerabilities every week, it's easy to get sidetracked, says Eric W. Cowperthwaite, chief information security officer for Providence Health & Services.

"We tend to run around screaming how the sky is falling about stuff that is not a big deal," says Cowperthwaite. "I don't see how you can credibly inform your defense or your leadership about the threats if you don't know what your threats are."

Increasingly, security professionals advise companies to do their homework and gauge what threats may be targeting their networks and data. At last month's SOURCE Boston security conference, for example, one consultant pointed out that most defenders wait behind their firewalls for the attackers -- effectively giving up the initiative. Companies instead need to model the threats to their network and gather intelligence on possible adversaries.

[Companies need to be more aggressive in gathering information on their attackers, by gathering or buying intelligence on adversaries and considering more active counterintelligence operations. See Security Teams Need Better Intel, More Offense.]

To that end, a good start is for companies to make a short list of the threats they face to their business, says Cowperthwaite. Not just cybercriminals and online adversaries but other events that could cripple the company. Most companies will find that advanced persistent threats and hacktivists are likely not among their major worries.

"If you don't have that list, then I think that you have a problem," Cowperthwaite says. "Earthquakes, volcanoes, cybercriminals, accidental insiders -- there are six, seven things that are significant threats for me. And then I have to look at how they pair up with vulnerabilities to create risk, and I'm not going to tell you that [the risk is] the Chinese government."

Here are four steps that companies should be taking to better understand the threats to their business.

1. Watch for the attackers.
For most companies, sifting through log data to identify actual attack patterns can give them a good idea of the types of attacks that they need to worry about. The only problem: Wading through the actual data is time consuming and difficult.

"There are the actual pings you are getting every day, which can now, for an average target, be in the millions every day," says Tom Patterson, lead partner for the security consulting group at Computer Sciences Corp. "There is no way to look at that. You cannot capture it in a log and read it out and find some patterns there."

Good automation is key to separating the attacks from the noise. A number of security information and event management products can help. But many times, finding low frequency attacks is difficult.

2. Pump your vendors for threat data.
A threat community can help detect those low-frequency attacks, especially if the same attacker is targeting several members of the community. Perhaps the most common threat communities are customers of a single security service provider. Providence, for example, gets data from its managed security provider, it consultants, and its vulnerability-management provider.

By combining a view across its customer base, security providers can help detect attacks that may otherwise go unnoticed, says Hardik Modi, senior product manager at Fidelis Security Systems.

"The way we like to think of it is that people gain situational awareness," Modi says. "They can gain information about campaigns that are being waged against them."

3. Meet with your competitors.
Another way to learn about potential threats is to create a threat community, by making contacts with other security professionals in your specific industry. For companies responsible for critical infrastructure, an information sharing and analysis center (ISAC) is a good forum for exchanging threat data. The FBI's Infragard program is another potential candidate.

However, for industries that are not considered critical infrastructure -- or for companies that are not well served by an ISAC -- creating their own private information sharing group is a possibility, says Providence's Cowperthwaite.

"One of the things that people forget or don't think about is that verticals have private associations of security leaders that don't get advertised to the outside world," he says. "Often a lot of good threat information gets exchanged in these groups."

4. Find a threat analyst, even part-time.
Finally, giving someone the responsibility for gathering intelligence on threats can help a company keep its focus on defining who or what could put the business at risk. Strong technologists are not necessarily the best threat analysts, Cowperthwaite says.

"Either identify someone you already have or identify somebody you can add," he says. "You don't want a security engineer. You want somebody who has a different mindset."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...