Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Assessment

7/11/2017
12:30 PM
Ray Le Maistre
Ray Le Maistre
Ray Le Maistre
50%
50%

Cybersecurity: More a People Than a Tech Challenge?

When it comes to cybersecurity strategies, the human angle needs to be brought to the fore, according to BT and KPMG.

With so many high-profile attacks impacting companies, governments and organizations around the world, awareness of cybersecurity threats has never been higher -- but that doesn't mean companies have a suitable security strategy, or even feel they need one at all, according to experts at BT Group plc (NYSE: BT; London: BTA) and consultancy KPMG LLP. (See Petya Ransomware Takes the World by Storm and Unknown Document 732861.)

The two companies have just issued a report, entitled "The cyber security journey -- from denial to opportunity," which aims to highlight some of the key challenges facing all types of enterprises and institutions in the modern era and make suggestions about how to overcome those challenges. (See Unknown Document 734391.)

The report identifies five steps on the cybersecurity maturity journey -- Denial, Worry, False Confidence, Hard Lessons and becoming a True Leader -- and digs into each of those with examples and recommendations. That might sound a bit corny, but the stages are well explained (and will likely resonate with many) and the recommendations are clear and simple without being patronizing. They also highlight that the major cybersecurity challenges are related to people, not technology.

A couple of key messages stand out from the report.

First, that any company, of any size and in any sector, is under threat –- "it won't happen to us" is the cry of the deluded. "A lot of CEOs don't realize that cybersecurity threats are commoditized … Even if your company is not being specifically targeted by cyber criminals, you still need to defend against the commoditized threats" such as the recent extensive ransomware attacks, noted David Ferbrache, technical director at KPMG's cybersecurity practice, during a recent media briefing at BT's cybersecurity facility in Sevenoaks, UK.

Second, for those organizations that identify the need to protect themselves against cybersecurity threats (some, amazingly, still believe they are immune), simply investing in security technology such as firewalls is not enough. "Security technology is not a silver bullet," said the CEO of BT Security, Mark Hughes. (No, not THAT Mark Hughes…)

"Don't start [a cybersecurity strategy] with the technology!" he advised.

In fact, throwing money at the latest security tech can lead to unwelcome attention, including, the two companies noted in their official announcement of the report, from "over-zealous IT salespeople." (Editor's note: That's the first time I have laughed at a press release in 20 years…)

What is needed before any action is taken, according to Hughes and Ferbrache, is a rational assessment of existing security procedures and a decision about what it is that matters most to a company -- what needs to be protected above all else. "It's possible that companies can spend a lot of money and not actually secure what is valuable to them," noted the KPMG man.

All of which requires agreement from all levels within a company or organization, particularly from the top management, that cybersecurity is actually important and strategic. The research conducted for the report suggests this is not currently the case: BT's Hughes noted that 68% of CEOs surveyed don't regard security to be part of their digital transformation processes, "which is surprising," he noted.

A more favorable scenario would involve a senior executive -- a chief information security officer (CISO) if the company is large and well resourced enough -- taking responsibility for a security strategy and, importantly, engaging with the rest of the business or organization and not working in isolation. "Too often I hear chief security officers refer to 'the business' as if they are not part of it… but they are a key part of the business and all the moving parts need to work together," stated Hughes.

And to be truly effective, that security officer needs to not only engage internally and clearly communicate a security strategy (including what to do when security defenses are compromised), but also engage and learn from the broader community, from others that are also implementing a strategy and may have been subject to attacks and breaches. "There are lots of hard lessons to be learned," stated Hughes.

That, of course, applies to Hughes as it does any other head of security: He says he talks with his peers from other major telcos, such as AT&T, Deutsche Telekom, Orange and Verizon, about best practices, current threats and the future. Current conversations include the impact of 5G on security procedures, noted the BT man.

Both BT and KPMG have skin in this game, of course -- KPMG offers security strategy consultancy and BT provides a range of security services built upon its own network security capabilities -- but the two companies have managed to produce a report that is useful without coming across as a sales pitch. The report can be downloaded here. (See Unknown Document 733496 and Unknown Document 723014.)

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, International Group Editor, Light Reading, for Security Now

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...