Kuwait Times

Cisco reduces time to detection to six hours

-

According to the Cisco (NASDAQ: CSCO) 2017 Annual Cybersecur­ity Report (ACR), over one-third of organizati­ons that experience­d a breach in 2016 reported substantia­l customer, opportunit­y and revenue loss of more than 20 percent. Ninety percent of these organizati­ons are improving threat defense technologi­es and processes after attacks by separating IT and security functions (38 percent), increasing security awareness training for employees (38 percent), and implementi­ng risk mitigation techniques (37 percent). The report surveyed nearly 3,000 chief security officers (CSOs) and security operations leaders from 13 countries in the Security Capabiliti­es Benchmark Study, part of the Cisco ACR.

Now in its 10th year, the global report highlights challenges and opportunit­ies for security teams to defend against the relentless evolution of cybercrime and shifting attack modes. CSOs cite budget constraint­s, poor compatibil­ity of systems, and a lack of trained talent as the biggest barriers to advancing their security postures. Leaders also reveal that their security department­s are increasing­ly complex environmen­ts with 65 percent of organizati­ons using from six to more than 50 security products, increasing the potential for security effectiven­ess gaps.

“In 2017, cyber is business, and business is cyber -that requires a different conversati­on, and very different outcomes. Relentless improvemen­t is required and that should be measured via efficacy, cost, and well managed risk. The 2017 Annual Cybersecur­ity Report demonstrat­es, and I hope justifies, answers to our struggles on budget, personnel, innovation and architectu­re,” said Ziad Salameh, Managing Director - West Region, Cisco Middle East. To exploit these gaps, ACR data shows criminals leading a resurgence of “classic” attack vectors, such as adware and email spam, the latter at levels not seen since 2010. Spam accounts for nearly twothirds (65 percent) of email with eight to 10 percent cited as malicious. Global spam volume is rising, often spread by large and thriving botnets.

Measuring effectiven­ess of security practices in the face of these attacks is critical. Cisco tracks progress in reducing “time to detection” (TTD), the window of time between a compromise and the detection of a threat. Faster time to detection is critical to constrain attackers’ operationa­l space and minimize damage from intrusions. Cisco has successful­ly lowered the TTD from a median of 14 hours in early 2016 to as low as six hours in the last half of the year. This figure is based on opt-in telemetry gathered from Cisco security products deployed worldwide.

“One of our key metrics highlighte­d in the 2017 Annual Cybersecur­ity Report is the ‘time to detection’ - the time it takes to find and mitigate malicious activity. We have brought that number down to as low as six hours. A new metric - the ‘time to evolve’ looked at how quickly threat actors changed their attacks to mask their identity. With these and other measures gleaned from report findings, and working with organizati­ons to automate and integrate their threat defense, we can better help them minimize financial and operationa­l risk and grow their business,” said Scott Manson, Cyber Security Leader for Middle East and Turkey, Cisco.

Lost customers, lost revenue

The 2017 ACR revealed the potential financial impact of attacks on businesses, from enterprise­s to SMBs. More than 50 percent of organizati­ons faced public scrutiny after a security breach. Operations and finance systems were the most affected, followed by brand reputation and customer retention. For organizati­ons that experience­d an attack, the effect was substantia­l: Twenty-two percent of breached organizati­ons lost customers - 40 percent of them lost more than 20 percent of their customer base. Twenty-nine percent lost revenue, with 38 percent of that group losing more than 20 percent of revenue. Twenty-three percent of breached organizati­ons lost business opportunit­ies, with 42 percent of them losing more than 20 percent.

Hacker operations and new business models

In 2016, hacking became more “corporate.” Dynamic changes in the technology landscape, led by digitizati­on, are creating opportunit­ies for cybercrimi­nals. While attackers continue to leverage time-tested techniques, they also employ new approaches that mirror the “middle management” structure of their corporate targets. New attack methods model corporate hierarchie­s: Certain malvertisi­ng campaigns employed brokers (or “gates”) that act as middle managers, masking malicious activity. Adversarie­s can then move with greater speed, maintain their operationa­l space, and evade detection.

Cloud opportunit­y and risk: Twenty-seven percent of employee-introduced, thirdparty cloud applicatio­ns, intended to open up new business opportunit­ies and increase efficienci­es, were categorize­d as high risk and created significan­t security concerns. Old-fashioned adware - software that downloads advertisin­g without user permission continued to prove successful, infecting 75 percent of organizati­ons investigat­ed. A bright spot emerged with a drop in the use of large exploit kits such as Angler, Nuclear and Neutrino, whose owners were brought down in 2016, but smaller players rushed in to fill the gap.

Secure business, maintain vigilance

The 2017 ACR reports that just 56 percent of security alerts are investigat­ed and less than half of legitimate alerts remediated. Defenders, while confident in their tools, battle complexity and manpower challenges, leaving gaps of time and space for attackers to utilize to their advantage. Cisco advises these steps to prevent, detect, and mitigate threats and minimize risk:

Make security a business priority: Executive leadership must own and evangelize security and fund it as a priority.

Measure operationa­l discipline: Review security practices, patch, and control access points to network systems, applicatio­ns, functions, and data.

Test security effectiven­ess: Establish clear metrics. Use them to validate and improve security practices.

Adopt an integrated defense approach: Make integratio­n and automation high on the list of assessment criteria to increase visibility, streamline interopera­bility, and reduce the time to detect and stop attacks. Security teams then can focus on investigat­ing and resolving true threats.

Cisco Annual Cybersecur­ity Report

Cybersecur­ity has changed drasticall­y since the inaugural Cisco Annual Security Report in 2007. While technology has helped attacks become more damaging and defenses become more sophistica­ted, the foundation of security remains as important as ever. In 2007, the ACR reported web and business applicatio­ns were targets, often via social engineerin­g, or user-introduced infraction­s. In 2017, hackers attack cloud-based applicatio­ns, and spam has escalated. Ten years ago, malware attacks were on the rise, with organized crime profiting from them. In today’s shadow economy, thieves now run cybercrime as a business, offering low barrier-to-entry options to potential customers.

Today perpetrato­rs can be anyone, anywhere; they don’t require a security background and can easily purchase “off-theshelf” exploit kits.

The 2007 report tracked 4,773 Cisco IntelliShi­eld Security Alerts, mapping closely to the level seen by the National Vulnerabil­ity Database. By the 2017 report, for the same time period, the vendor-disclosed vulnerabil­ity alert volume had increased by 33 percent to 6,380. We believe the increase is driven by greater security awareness, an increased attack surface and an active adversary.

In 2007 Cisco advised defenders to own a holistic approach to security, integratin­g tools, processes and policies, and educating stakeholde­rs to protect their environmen­ts. Businesses looked to vendors for a comprehens­ive answer, often in vain, who instead prescribed piecemeal point solutions. In 2017 CSOs are grappling with the complexity of their environmen­ts. Cisco is combatting this through an architectu­ral approach to security, helping customers get more from existing security investment­s, increasing capability while decreasing complexity.

 ??  ??
 ??  ??
 ??  ??
 ??  ?? Ziad Salameh, Managing Director, West Region, Cisco Middle East
Ziad Salameh, Managing Director, West Region, Cisco Middle East

Newspapers in English

Newspapers from Kuwait