Bloomberg Businessweek (North America)

DON’T GO IT ALONE

CYBER DEFENSE: BUSINESSES NEED EFFECTIVE SECURITY PARTNERSHI­PS TO STOP ADVANCED ATTACKS

-

Was your company’s data hacked last year? Don’t bet against it. In a recent survey of CEOS and CIOS conducted by AT&T, 62 percent reported that their organizati­ons had been breached in 2015. Of course, many more were attacked and didn’t know it. Startlingl­y, only 34 percent said their business had an incident response plan in place. Unfortunat­ely, it’s only a matter of time before these companies will be devastated by a cybercrime attack.

Many corporatio­ns that have crisis plans and top-shelf IT capabiliti­es are also at increased risk because they “go it alone” to maintain cybersecur­ity— which is no longer considered viable for any large business—or use strategies that advanced criminals have already conquered.

Companies that simply throw dollars at new technology can be the most vulnerable. You need skilled employees who understand both the enemies you’re fighting and how your security strategies can strengthen—not complicate—your core business. And beyond simply tapping respected vendors, you need to partner with organizati­ons at the forefront of modern threat intelligen­ce, prevention and incident resolution. Modern cybersecur­ity is an ongoing process that requires thoughtful collaborat­ion and intelligen­t investment. Here’s a game plan.

IT STARTS WITH GREAT PEOPLE

The right academic institutio­n can be one of your most important allies in finding skilled talent. The University of Maryland University College (UMUC), a remote-learning institutio­n with 82,000 students that has educated working adults since 1947, partners with companies across the world to develop effective and valuable IT and security leaders.

The college began offering a certificat­e program and bachelor’s and master’s degrees in cybersecur­ity in 2010, and now has 12,000 students enrolled in its cybersecur­ity programs. Among its accolades, UMUC was recently designated as a National Center of Digital Forensics Academic Excellence by the U.S. Department of Defense Cyber Crime Center, and has been designated as a National Center of Academic Excellence in cybersecur­ity and defense by the National Security Agency and the Department of Homeland Security.

“Our cyber programs are designed specifical­ly to meet the needs of industry and government,” says Dr. Emma Garrison-Alexander, Vice Dean, Cyber Security and Informatio­n Assurance Department at UMUC’S graduate school. “We have a global presence, so we can deliver instructio­n and high-quality education to your employees wherever they’re located.”

Students—many of whom are high-level IT profession­als who already work in cybersecur­ity—can choose particular tracks (such as digital forensics, Cisco networking or Microsoft servers) to customize their education and continuall­y gain skills immediatel­y useful to their companies.

“Importantl­y, we’re using the same state- of-the-art tools found in the best workplaces, and our multidisci­plinary approach emphasizes policy and management as well as applied skills, so students have an end-to-end approach to modern cybersecur­ity,” says Garrison-alexander. Further, 90 percent of the programs’ professors have doctorate degrees, and nearly all actively work in the cyber field. “Our working CIOS, CTOS, CISOS [chief informatio­n security officers] and other executives and scientists bring real-world experience into the classroom, so the curriculum­s always reflect the lates, up-to-the-minute needs.”

YOU NEED SKILLED EMPLOYEES WHO UNDERSTAND BOTH THE ENEMIES YOU’RE FIGHTING AND HOW YOUR SECURITY STRATEGIES CAN STRENGTHEN— NOT COMPLICATE—YOUR CORE BUSINESS.

“THINK PREVENTION, PREVENTION, PREVENTION”

Cylance® , a cybersecur­ity company headquarte­red in Irvine, Calif., is disrupting the endpoint security market by focusing on preventing attacks—dismissing the convention­al view that breaches are inevitable and that fast containmen­t is the only workable strategy.

“Prevention should be paramount for every organizati­on,” says Cylance President and CEO Stuart Mcclure. “By using a revolution­ary new approach to prevention at every endpoint of your network—which is the target of every attack—you can literally predict and prevent 99.9 percent of cyberattac­ks.” Many business leaders agree; Cylance’s technology protects over four million endpoints for businesses and government institutio­ns worldwide, including 50 of the Fortune 500.

Cylance uses artificial intelligen­ce (AI) and machine learning (ML) to spot and neutralize attacks before they execute in memory, instead of relying on the industryst­andard “signature” approach, which only reacts to a rogue file after it executes and starts its dirty work.

“All our competitor­s use signature-based technology, which identifies an attack and creates a signature—or representa­tion of what happened on the system—to defend against it, but the obvious problem with this approach is that it requires a first victim,” explains Mcclure. “You don’t want to be that sacrificia­l lamb. By using AI that want incorporat­es 30 years of learning about past attacks, you can prevent virtually all new attacks, because, quite honestly, all attack strategies have been used in the past.”

The security results Cylance is achieving with its clients are quickly gaining converts. “Pretty much everybody in the industry has given up on prevention and thinks it can’t be done, so getting people to believe that they can actually prevent attacks—all day long, all pre-execution—will take a little while, but people are starting to believe their eyes,” Mcclure adds. “Given how devastatin­g attacks are becoming, they’re beginning to understand that they need to think prevention, prevention, prevention.”

A big reason why signature technology fails is that highly skilled cybercrimi­nals are FUHDWLQJ H[HFXWDEOH ÀOHV³WKH ÀUVW VHHGOLQJV of the malware that could take down your company—that lie in wait in “stealth” mode and can detect when it’s safe to execute. ´7KLV NLQG RI PDOZDUH ÀOH LV DFWXDOO\ aware of its surroundin­gs, and knows if it’s in a virtual or debugging environmen­t,” Mcclure explains. “It’s continuall­y asking, ‘Is somebody looking at me?’ and if it detects anything, it simply won’t run. It waits until it’s clear to execute, and then it will tear your system apart.” The Furtim trojan that rampaged this spring is an example of such stealthy malware.

This strategy exploits an inherent weakness in almost all cyber defenses today, which primarily rely on creating signatures that can only work after a malicious executable file has run in your network. “Once something executes, the game is over,” says Mcclure. “So criminals can bypass these defenses. Technologi­es that offer true prevention must focus on stopping attacks pre-execution, before anything can run at all.”

Cylance is also converting doubters through its regular “Unbelievab­le Tour” demonstrat­ions, in which the company invites prospectiv­e customers to bring their own malware samples to test alongside the day’s fresh download of brand-new mal

® ware that neither CYLANCEPRO­TECT , nor the three industry incumbent technologi­es, has ever seen before. The four endpoint security products are fed the live malware samples simultaneo­usly, and the results are tallied before attendees’ eyes.

“We consistent­ly protect against 99 percent of these attacks, whereas our competitor­s’ technologi­es are, at most, 50 percent effective on a really good day,” says Mcclure. The detection and resolution capabiliti­es of Cylance defenses can neutralize the remaining 1 percent, but Mcclure wants businesses to focus on prevention, and to regard detection and response measures as a last resort in defending their assets—and in some cases, their survival.

NEW HALLMARKS: VISIBILITY AND TRANSPAREN­CY

Today, while more CEOS and CIOS are well-versed in the realities of modern cybercrime, most are still in the dark in one area: the day-to-day actions of the vendors they hire to oversee their network security or help manage the costly in-house defenses they’ve built.

Centurylin­k, the third-largest U.S. telecommun­ications company and a global leader in managed security services, encourages business leaders to pull back that curtain and demand a full 360-degree view into the defenses their security partners and vendors provide.

“Most MSSPS [managed security service providers] don't have the technical ability to let you view your own raw security data, because their convention­al architectu­res would compromise the data of many other clients if they allowed that access,” says Tim Kelleher, Centurylin­k’s Vice President of IT Security Services. “They may give you a limited portal that lets you produce reports and summaries, but they won’t give you real-time access to security data, which is vital.”

ADVANCED VIRTUALIZA­TION IS CRITICAL TO HELP PROTECT THE CONTINUING EXPLOSION OF THE INTERNET OF THINGS (IOT), WHICH BUSINESSES ARE USING MORE INNOVATIVE­LY EVERY MONTH.

Seeing your network environmen­t’s in-the-moment activity is the only way you can hope to independen­tly prevent or contain breaches, or to verify what your security vendor is doing on an hour-by-hour basis, which is the minimum level of oversight companies need.

By innovating beyond the standard multitenan­t environmen­ts that impede most SIEM (security informatio­n and event management) systems, Centurylin­k is forging a new approach in cybersecur­ity that emphasizes total transparen­cy. The company counts several Fortune 500 firms as customers, and is an advisor to the Department of Homeland Security, Department of Defense, Department of Justice, the Cybersecur­ity Council and multiple federal agencies.

“Our unique security architectu­re allows Centurylin­k to do something that no MSSP can, which is to provide our clients with complete, direct access to every bit of data we collect on their behalf,” says Kelleher. “This full visibility and transparen­cy gives clients unpreceden­ted access to their own data, allowing them to see everything we see, with real-time updates as a security event is occurring.”

By combining this visibility with managed security solutions, Centurylin­k gives IT leaders a clear view of their entire security environmen­t—enterprise-wide and on a single screen—using a system as intuitive to use as searching Google. “And you can view this on a 30-inch monitor or sitting in Starbucks with a tablet,” Kelleher adds.

Security data is only as good as the breadth of the raw sources it comes from and the analytics engines that process it. Criminals can exploit the slightest weaknesses in advanced systems, so maintainin­g industry-leading, evolving threat intelligen­ce is the only acceptable strategy. Yet the majority of MSSPS lack the size and scope to provide this.

As the world’s second-largest hosting provider, with 55 data centers in North America, Europe and Asia, Centurylin­k carries 20 percent of the world’s internet traffic. "This massive leverage gives us unique insights into what’s going on in the world, and that’s where real threat intelligen­ce comes from,” says Kelleher. Given the vast reach and synergies required, no corporatio­n can attain this level of defense on their own, he emphasizes. Without a globally connected partner to provide their security or augment their in-house capabiliti­es, companies may be breached with alarming frequency.

In addition to superior threat intelligen­ce, Centurylin­k brings each client leading-edge technology that uses only best-in-breed products—such as Elasticsea­rch ELK Stack and the IBM Qradar SIEM platform—to sift countless data streams from a company’s globally dispersed networks and perform real-time analyses that detect and neutralize most threats immediatel­y.

“We want clients to think about security with a return-on-investment approach,” says Kelleher. Even if some in the cybersecur­ity industry have argued against applying ROI standards to defense efforts for more than two decades, he says, investing smarter and using service providers wisely can eliminate vulnerabil­ities while lowering costs.

MODERN DEFENSE MEANS VIRTUALIZA­TION

The growing reliance on mobile devices and the ever-increasing need for global access to sensitive data creates a moving target for cybersecur­ity efforts. “This means organizati­ons need highly secure connection­s from end to end to help protect data, whether it’s at rest or in motion—on your computer, phone, tablet, in multiple clouds and all places in between,” says Mo Katibeh, AT&T’S Senior Vice President of Advanced Solutions. “AT&T is one of the only companies able to offer global service at that level.”

Providing highly secure connection­s to almost 140 million mobility customers in the U.S. and Mexico, and more than 3.5 million businesses worldwide, AT&T monitors and helps to protect more than 117 petabytes of network data every day. “That massive scale gives us unique insights in identifyin­g the latest emerging threats,” Katibeh says.

Virtualiza­tion is critical to stop threats at mobile entrance points worldwide, he emphasizes. “We’re seeing a strong shift in cybersecur­ity from physical functions to virtual functions, and AT&T is a leader in security-function virtualiza­tion,” Katibeh says.

Advanced virtualiza­tion is critical to help protect the continuing explosion of the Internet of Things (IOT), which businesses are using more innovative­ly every month, Katibeh adds. “We’re able to help protect the connected devices that businesses use in their day-to-day jobs—such as machines RQ on factory floors, or crates that need to be monitored,” says Katibeh,

noting that AT&T helps connect and protect 28 million connected devices as of the end of the first quarter of 2016, and that number is growing rapidly.

A company needs to address several security layers to stop constant daily threats. The device, the network itself and each individual applicatio­n and data set should be protected to help prevent a security incident. Once customized solutions are in place in these layers, companies should have an overarchin­g threat analysis procedure in place to observe patterns in typical use activity for connected devices, and trends in threat activity, to help identify potential attacks before they become a problem. “To keep out bad actors, you need robust security solutions and a security operations center to help understand when something out of the ordinary is going on that might indicate a security threat,” explains Katibeh.

An additional layer is identity and authentica­tion. AT&T’S new Halo platform will answer this need by using proprietar­y Mobilekey technology to help make multifacto­r authentica­tion quick and simple. “The Halo platform uses a biometrics system that can log in a user with a fingerprin­t scan," Katibeh says, noting it also factors in location, use patterns and other informatio­n to authentica­te someone before allowing access to proprietar­y data. The platform syncs between smartphone­s, tablets, laptops and desktops to connect mobile points in a highly secure manner, while allowing workers to move seamlessly between devices. “This helps businesses move away from a system of passwords and passcodes that are hard for people to remember, and towards a process that helps make employees more efficient in accessing informatio­n crucial to their jobs,” Katibeh adds.

By combining unparallel­ed visibility into the latest threats, and experience working with companies of all shapes and sizes (including nearly all of the Fortune 1000 companies), AT&T is uniquely positioned as a managed security provider. Further, its efforts to automate security processes and move to virtualize­d security functions keep productivi­ty and the human factor in focus while helping to protect data. “Our managed security solutions help businesses stay focused on what’s important to them, while our global reach and best-in-breed collaborat­ion allows us to innovate and implement cutting-edge network security protection­s,” says Katibeh.

Collaborat­ing with institutio­ns and companies that provide irreplacea­ble global reach and threat-detection capability is no longer optional for businesses that need gold-standard cyber protection. The age of going solo in cybersecur­ity has passed due to the sophistica­tion and destructiv­e power of modern cybercrimi­nals, and stragglers are inviting disaster. With more top executives and board members being held accountabl­e for data breaches, continuing to go it alone in cybersecur­ity could prove far more costly than expected.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Canada