Northwest Arkansas Democrat-Gazette

As hacks soar, cyber security techs come, go

- TIM JOHNSON MCCLATCHY WASHINGTON BUREAU

WASHINGTON — The paycheck is big. The career security is great. But the headlines are a headache.

The job is to guard the key digital secrets of a major organizati­on, perhaps proprietar­y manufactur­ing methods of a company, or health records of a hospital system. Or credit card informatio­n at a major retail chain. Tolerance for failure is nil.

Yet hackers worldwide are on a tear, and breaches occur at a quickening pace. If something goes wrong, the chief informatio­n security officer, or CISO, gets the blame.

“Being a CISO means keeping that resume polished,” said Chase Cunningham, a security and risk analyst at Forrester, a technology research company in Cambridge, Mass.

Equifax, one of the nation’s big three credit bureaus, announced Sept. 7 that it had been hit by a massive breach, and a week later it said its chief informatio­n officer and chief security officer had resigned. That didn’t calm the storm for Equifax, which guards the personal financial history of half of America, and chief executive Richard Smith was forced out Monday.

It is little wonder that some qualified people won’t take jobs as chief informatio­n security officers. Among them is Cunningham, who has a doctorate in informatio­n security, a background at the top-secret National Security Agency and an acute sense of how to fend off the bad guys. Cunningham said the job involves “guaranteed failure.”

“It’s about the only executive-level job I can think of where you are 100 percent accountabl­e for the failures to come even though it’s a guarantee that [they] will happen at some point,” Cunningham said.

“It’s like playing chess with a blindfold on,” added Cunningham. “You cannot win.”

Tech honchos blame those higher up — the bosses who don’t understand the threats, don’t want to spend money in an area that has no apparent return and don’t want to take responsibi­lity when things go awry.

The job of CISO (pronounced see-so) used to be the digital equivalent of stocking the moat around the castle with crocodiles and making sure the drawbridge functioned.

“In the past, it was about defending the perimeter,” said Godfrey R. Sullivan, a former chief executive and current chairman of Splunk, a San Francisco company that produces software to analyze high volumes of machine-generated data.

But Sullivan said conditions have changed. Most likely, hackers have already gotten past the perimeter and reside

in target networks.

“The bad guys are in your building,” Sullivan said. Informatio­n security officers nowadays have to hone their skills at continuous analysis of data entering and leaving the networks, he added.

Indeed, breaches may be inevitable.

“The longtime folks have been saying, it’s not ‘if’ but ‘when,’” said Rich Barger, director of security research at Splunk.

CISOs get in trouble, Sullivan said, when they discover breaches and don’t act quickly. That may have happened at Equifax.

According to security researcher Brian Krebs, one of the vulnerabil­ities of Equifax was at its Argentine operations, when hackers discovered they could access its website by typing in “admin” at login and “admin” at password. Another

vulnerabil­ity involved the failure of Equifax to patch a known security hole in its website applicatio­n software that came to light in March.

“They say that happened in March. Well, what happened between March and now?” Sullivan asked.

For those caught by headline-grabbing breaches, job security may be shaky but a shortage of experts in cybersecur­ity is such that landing another job is nearly assured. “It’s not hard to get another job as there are plenty of them out there, and honestly its ‘good’ if you have been through a breach, but it sure isn’t painless,” Cunningham said.

Adding to the difficulti­es of guarding digital storehouse­s, experts say, is a deluge of threat intelligen­ce reports. Alerts come in all day long of potential vulnerabil­ities in software and types of malicious code.

“There’s a ton of cyber threat intelligen­ce out there,” said Christophe­r Wlaschin, the CISO at the Department of Health and Human Services, noting that some of it is little more than snippets of suspect malicious code.

When a serious breach comes to light, executives want someone to blame.

“Fingers point to the CISO,” said Travis Farral, director of security strategy at Anomali, a Redwood City, Calif., cybersecur­ity company that offers a threat intelligen­ce platform. “Who’s the CISO, you know, and what did they do? Is there evidence of their pounding their fist and saying, ‘Hey, we need to fix this?’”

Farral said informatio­n security officers who manage the techies on their team with appropriat­e caution about the gamut of threats often do better.

“They are responsibl­e for the culture of security within an organizati­on. They have the ability to have a voice with senior leadership,” Farral said. “Those who are effective at doing that stay out of the news.”

Newspapers in English

Newspapers from United States