Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/25/2020
10:00 AM
Jessica Smith
Jessica Smith
Commentary
100%
0%

Cybersecurity Industry: It's Time to Stop the Victim Blame Game

There are far more ways to be helpful than adding to the noise of what a company probably did wrong.

It's natural to become angry and indignant when we see a major breach story in the news. Many of these potentially affect us and those we know, and often some concern about a potential vulnerability remains left unaddressed by the company in question.

However, as cybersecurity professionals, we also understand (but sometimes lose sight of) a few key facts that the general populace may not know.

We know, for example, that it is virtually impossible to plug every gap, address every vulnerability, and enforce every security procedure. We know that companies must determine the right amount of cyber spending against their other business priorities. While cybersecurity may be our primary focus, core business functions consume the majority of an organization's resources.

We also understand that organizations that deploy strategic security programs do so by willingly assuming an agreed-on level of risk. The goal, of course, is to only accept lower-level risks to the business while mitigating higher-level, core-business-impacting cyber-risks.

Yet even this equation is getting harder to achieve — and we get that. The enterprise attack surface is skyrocketing alongside exponentially growing IT complexity. Organizations are struggling with an ever-expanding security perimeter — it is now every employee with a device — as well as hybrid and multicloud environments, legacy assets, migration initiatives, third-party risk, a patchwork regulatory environment, and IT complexity brought by rapid expansion and M&As. The cloud security challenge alone is compounded by an increasingly complex shared-responsibility model. And the human factor will always be a frailty in the enterprise armor that can never be fully mitigated.

Finally, we realize that despite IDC's prediction that $133.7 billion will be spent on cybersecurity in 2022, up 45% since 2018, threat actors will continue to find a way in. Forrester predicts this year will see "more attackers with more sophisticated tools aimed at a larger attack surface," and that those attackers will leverage ransomware, artificial intelligence, machine learning, and deep fakes to make enterprises pay (in addition to other common methodologies we see in our business every day). Indeed, ransomware actors take advantage of the very fact that companies must prioritize their core business functions over security — because that is the heart of this malicious tactic.

Look at how much we know. Then, why is it that so many of us continue blaming organizations when they fall victim to a breach? It's time for us to stop and more boldly advocate against pointing fingers at cyber victims.

Certainly, every breach means some doorway may have been left open. But in many breaches, it can be difficult to understand the root cause. We can ask whether the victim was properly protecting the data, spending enough on cybersecurity, properly emphasizing the importance of protecting data, ensuring proper configurations, and deploying the right technologies, processes, and policies. Even if they can't answer "yes" to each of these questions, we must still wonder whether it had an impact on the breach in question. More problematic, still, the reality is that even if they can answer "yes" to each of these questions, the company is still not immune to a data breach. Now, who do we blame?

I propose we shift the narrative and our approach. Rather than adding to the noise of what a company probably did wrong, we can offer helpful suggestions for what others can do today. We can assume the role as educators — offering best-practice advice through published content and partnerships, as well as helping organizations sort through the alarmist FUD factor (fear, uncertainty, and doubt) and get to the practical nuts and bolts. We can help companies determine where to prioritize their dollars to reduce the chances of more significant attacks (or reduce response times should one occur), acknowledging they aren't going to purchase every tool or service available.

We once had a client who said his company's approach had been to pay virtually any amount of money on security to help improve its security posture. If there was a new tool that looked useful, the company would buy it, even if it had a similar tool already deployed. However, rather than helping its security posture, this approach made it extremely difficult to sort out actual anomalies in the environment from false alarms. Likely, many companies would be willing to continue to sell him every tool in their arsenal — cybersecurity companies have revenue targets, too. A better approach we can all take is being a strategic partner, helping to reduce complexity, and building a base of longer-term trust.

We also need to ensure organizations are realistic about what their security investments can and cannot achieve and ensure they are planning for the worst-case scenario. They should plan for a data breach and know what should happen and how. Testing incident response and recovery plans can minimize the impact of a significant event and help increase the likelihood of a speedy respond and recovery.

Yes, organizations make mistakes, and breaches occur. But the balancing act that company leaders face isn't easy. Security professionals can assume a more helpful, understanding, and empathetic role, rather than pointing fingers — particularly since we know the complexity of the challenge better than anyone.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec"

 

Jessica Smith is a veteran practitioner of digital forensics with an extensive record of involvement in complex civil and criminal cases. She brings her experience and know-how to The Crypsis Group's client engagements, as well as helping direct the daily operations of the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4719
PUBLISHED: 2020-09-24
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.
CVE-2020-15604
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-24560
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-25596
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
CVE-2020-25597
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...