13.07.2015 Views

We have developed an excellent - Teletimes

We have developed an excellent - Teletimes

We have developed an excellent - Teletimes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Businesses must shore upsecurity processesArcSight CTO says comp<strong>an</strong>ies must implement fivekey processes to ensure tighter securityBusinesses across the worldare facing <strong>an</strong> ever-increasingbattle to keep their IT systemsfrom being broken into bycyber-criminals <strong>an</strong>d, accordingto Dr Prescott B Winter, CTOPublic Sector for cybersecurity<strong>an</strong>d compli<strong>an</strong>ce comp<strong>an</strong>y Arc-Sight, no enterprise c<strong>an</strong> ever befully secure from cyber-attacks,particularly when hum<strong>an</strong> erroris thrown into the informationsecurity mix."Nobody is ever going to be100% secure in this domain,especially if you w<strong>an</strong>t to beopen, exch<strong>an</strong>ge information withcustomers, do all the things thatevery comp<strong>an</strong>y <strong>an</strong>d governmententerprise around the worldis trying to do. Hum<strong>an</strong> error isinevitably part of the picture,that is why you <strong>have</strong> to be sodiligent, you <strong>have</strong> to go back toinspecting to identify the departuresfrom policy rather that justexpecting people to do it right,"Winter said.Winter identified five keyprocesses that must be undertakenby corporations to rendertheir security systems almostwatertight.The first of the key processes isunderst<strong>an</strong>ding what the principalbusiness risk issues are <strong>an</strong>dwhy the enterprise exists.Corporate security decision makersmust know what informationassets are most import<strong>an</strong>t forthat mission, whether it is ina business sense, to sell goods<strong>an</strong>d services, or whether it is ina government sense to executesome kind of government missionas a service."So the first question is to getthe business risk m<strong>an</strong>agementissues out on the table <strong>an</strong>dto identify those <strong>an</strong>d identifywhat has to be protected," saidWinter.The second key security processis to <strong>have</strong> a reasonably goodunderst<strong>an</strong>ding of the currentattack structures <strong>an</strong>d the natureof the threats so businesses c<strong>an</strong>underst<strong>an</strong>d how that set of attackvectors is likely to m<strong>an</strong>ifestitself when going after key businessassets.The third key point is thatcomp<strong>an</strong>ies must <strong>have</strong> the rightsecurity sensors <strong>an</strong>d instrumentationin the network to detectattack vectors."As these attack vectors comein, c<strong>an</strong> I actually see them? C<strong>an</strong>I see them reliably <strong>an</strong>d confidently<strong>an</strong>d be virtually assuredof picking them up when theycome inside. These attacks dotake time, they are not inst<strong>an</strong>t<strong>an</strong>eous<strong>an</strong>d it takes a long timeto introduce this stuff, to get itproperly deployed. In most casesyou <strong>have</strong> weeks to months tostop it," said Winter.The fourth key process, accordingto Winter is absolutelyessential, <strong>an</strong>d that is to correlateall the security information froma business or enterprise <strong>an</strong>d geta holistic picture of the securityl<strong>an</strong>dscape within the corporation."As I see it that is the most import<strong>an</strong>tthing after you get yourbusiness risk m<strong>an</strong>agement issuesstraightened out. How do youactually see what is happening.You c<strong>an</strong>not protect what youc<strong>an</strong>'t see <strong>an</strong>d the only way tosee it is to bring it all together,all this tremendous welter of information,millions of logs a day.Bring it into a coherent picture,"said Winter.The fifth process essentialto securing <strong>an</strong>y business orcorporation is quick response<strong>an</strong>d remediation of <strong>an</strong>y securityissues that may arise."This is where you begin toGeorgina Enzermerge your security operationcentre <strong>an</strong>d your network operationcentre which gives you <strong>an</strong>ideal insight into configurations<strong>an</strong>d status <strong>an</strong>d operation of yourIT <strong>an</strong>d from your security operationcentre, side informationon what is attacking all thosesystems <strong>an</strong>d what is a priority<strong>an</strong>d how you <strong>have</strong> to fix it," saidWinter.Only a very small number, in thesingle digits in terms of percentage,<strong>have</strong> implemented thesevital security steps, according toArcSight.Winter said that sharinginformation about threats orattacks between comp<strong>an</strong>ies isessential to help create a sharedknowledge <strong>an</strong>d underst<strong>an</strong>dingof potential <strong>an</strong>d actual cyberthreats."Last fall there was a break inin three of the big New Yorkb<strong>an</strong>ks <strong>an</strong>d it was essentially thesame kind of attack <strong>an</strong>d on alittle bit of inspection, it turnedout that a fourth b<strong>an</strong>k had seen<strong>an</strong> earlier version of that sameattack. Not quite as well <strong>developed</strong>,not quite as powerful, notquite as effective. The first b<strong>an</strong>khad m<strong>an</strong>aged to get it stoppedbefore it caused <strong>an</strong>y seriousdamage, but nobody in the otherthree b<strong>an</strong>ks heard about this sowhen they got hit by a betterversion of the attack aboutthree weeks later, it succeededon all three of them <strong>an</strong>d did alot of damage," said Winter.This is a very clear exampleof what this kind of threatContd. on page 5352 www.teletimesinternational.com15Jun - 14Jul 2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!