Page 41 - Realcomm13-Final-LR
P. 41

Talent Shortage: Nearly every security team lacks enough   authentication (without a second factor) are numbered.
        personnel to adequately defend their networks. Tools can only   Talent shortage: organizations will work to combine efforts
        fill so much of the gap; well-trained, well-equipped individuals   to gain economies of scale and work to overcome the talent
        are required to successfully defend the networks. A recent   shortage. Many attackers use similar TTPs (Tactics, Techniques,
        analysis of Bureau of Labor Statistics data showed that over   and Procedures) and target similar organizations (similar indus-
        209,000 cybersecurity positions are currently unfilled. Analysts   try verticals). If you are facing the same adversary as others in
        expect the demand for security professionals to increase by   your industry, why not combine your efforts to improve your
        53% through 2018.                                                                     collective defense?
                                      “A recent analysis of Bureau of Labor Statistics        Organizations can work
        Emerging Trends                data showed that over 209,000 cybersecurity            together to better
        Now let’s turn and look at some   positions are currently unfilled. Analysts expect the   thwart these adversaries.
        of the emerging trends, or                                                            We saw the financial
        things I believe are going to gain   demand for security professionals to increase by   services sector do this
        traction during the remainder of             53% through 2018.”                       many years ago with the
        2017 and into 2018.                                                                   stand-up of the Financial
          HUNT operations are continuing to gain in popularity.   Services Information Sharing and Analysis Center (FS-ISAC),
        Organizations are realizing that they cannot sit back and wait   focused on sharing threat information; and we saw the retail
        for their automated, passive network security systems to alert   sector follow suit in 2014, when they stood up the Retail Cyber
        them to attacks or breaches. It is too late once those systems   Intelligence Sharing Center (R-CISC) that includes an ISAC, as well
        detect the problem—the attacker has probably already accom-  as training and other cybersecurity resources for its members. We
        plished their objective. Organizations will begin to engage more   are going to see more industries stand up their own cybersecu-
        proactively, seeking the attackers in their network to thwart them   rity collaborative organizations. Even more so, I believe you may
        before they accomplish their goals. This process is evolutionary   see some combine their security operations centers (SOC) into a
        and takes some time to mature, but a recent survey shows that   collaborative SOC that defends multiple organizations simultane-
        those organizations that have implemented HUNT approaches   ously, especially in light of the talent shortage.
        have seen their time to detection improve by 61%.        The theme you see in these trends is one of innovation and
          Newer defensive tools will continue to move away from the   collaboration. The attackers have had the advantage for years—
        signature-based approach to more model-driven and behav-  they are innovative and keep coming up with new ways to
        ior-driven approaches to identify attacks. Frequently, there are   breach our networks, whether through technical means or social
        activities or behaviors that are ‘abnormal’ that by themselves do   engineering. For years, we in the IT or cybersecurity community
        not raise the red flag, but provided the right context and analysis,   have deployed ‘next-generation’ devices that are really next-gen-
        should raise the alarms. This applies to user activity as well as ma-  eration in name-only—just another passive solution designed
        chine/software activity. To do this at scale will leverage machine   to be ‘faster’. Given enough time, the attacker figures out how
        learning techniques, as that technology continues to evolve and   to circumvent these passive, purely-automated approaches.
        improve.                                               Organizational security teams are beginning to realize they have
          Two-factor authentication, and alternative forms of authentica-  to be proactive, they have to stop blaming the users; they need
        tion (for example, behavior-based) will replace password-based   to be innovative like the attackers. This requires a fundamental
        authentication. Two-factor authentication will become the norm,   change in the approach to cybersecurity—the realization that
        first for the more standard IT systems, but eventually making its   the attacker will get in; a breach will happen. By first accepting
        way into IoT and BMS devices. The principal should also apply   that fact, you can now innovate new methods to detect and
        to physical security within commercial building management   catch the adversaries. You have to actually HUNT, you have to
        solutions: is the equipment room protected with ‘swipe access’?   collaborate with your counterparts in other organizations to
        If so, is it swipe-only, or swipe+PIN? In the swipe-only case, yes,   leverage new machine learning capabilities, new analysis tech-
        it’s more convenient for the user, but you’ve increased your risk   niques, and other innovative technologies to identify anomalies
        to a lost or stolen access card. Note that the slowest to adopt   and prevent the attackers’ objectives. Now you’re being proactive.
        multi-factor authentication will be consumer grade devices,
        which are driven to lowest price and are designed to ‘just work    Eric Stride, a fourteen-year veteran leader in information
        out-of-the-box’ but rarely were designed with much (if any) secu-  security, including twelve years in the U.S. Air Force and five
        rity in mind. This movement will also be driven by customer-de-    years at the NSA, serves as Senior Vice President in charge of
        mand. If you are managing several commercial buildings, and        research and development at root9B. Mr. Stride possesses
        you are evaluating commercial IoT solutions to put into place,     significant technical and command experience throughout the
        then assessing the security of those solutions is necessary; and if   cyber security domain. He holds a B.S. in Computer Science
        inadequate, go back to the manufacturer and demand that they   from the University of  Washington and a M.S. in IT Management from Colorado
        do better. The days of only supporting username and password   Technical University, in addition to multiple certifications.

                                                                                                      Realcomm     39
   36   37   38   39   40   41   42   43   44   45   46