Self-Defence In A Connected World

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp 

As we race to embrace technology, we make ourselves increasingly vulnerable to cyber attacks. This is a calculated risk we all take. But recently, the threat has evolved in ways both startling and inventive.

Whereas a few years ago hackers had focused on crashing websites or harvesting data, a new type of attack, an “integrity” attack, quietly compromises the internal workings of companies or organizations, allowing criminals to pilfer exorbitant sums of money with minimal fuss. As these methods become more popular, our desperate need for trained cybersecurity professionals to combat them becomes more acute.

Motherboard spoke with Matthew Rosenquist, a cybersecurity strategist at Intel with over 20 years of experience, about the evolving methods of attackers and what we can do to defend ourselves in this digitally intertwined world.

Motherboard: Hi Matthew. What should we expect from cybersecurity in 2016?

Matthew Rosenquist: In the past several years, we’re seen nation-states become tremendously aggressive in the investments they've been pouring into offensive and defensive cybersecurity. Many governments around the world have been buying technologies and recruiting as many talented people as they could. Several years ago, they started scouting out DEFCON, BlackHat, and other hacker conferences in search of talent. DARPA created a fast-track program, which allowed using, let’s say, personnel that wouldn’t normally pass a security background check. The program ran its course for several years to bring in new ideas and tools. Any time defense agencies invest in capabilities, they want some kind of payoff. We’re seeing those investments come to fruition.

Cybersecurity has rapidly become the “fifth domain” of warfare, joining assets on the ground, air, sea, and in space. Cyber programs have really taken hold, with mature plans, operational competencies, and organizing structures within governments to foster and leverage those new capabilities. So we're going to see more activity, both offensive and defensive, as governments take advantage of all resources to protect their citizens and promote policies. Cyber tools extend what is possible and give political leaders new avenues, abilities, and options. Cyber is now another tool to move mountains from a political perspective.

MB: Do we have enough trained cybersecurity professionals to meet this demand?

MR: Right now we're probably short at least 1 million cybersecurity professionals around the world. Estimates are ranging between 1.5 and 2 million people within a couple of years. And it is painful. All of the security professionals have basically been snatched up. It’s a tremendously competitive market. As one of my colleagues recently said, it's basically a zero unemployment field at this point.

We’re really looking towards higher education to solve this problem, by increasing the supply of talent. Actually, Intel has taken an active role in helping to create a formally accepted cyber sciences degree within the US, and that will probably go worldwide. The pilot should be rolling out in several universities in 2018. That will help with educational content standards and overall consistency, so that the professionals coming out of higher education institutions are better prepared and there's a common expectation of their skills and capabilities.

We’re also promoting a huge amount of diversity. Sadly, there's a lack of women and underrepresented minorities in cybersecurity. It really limits the industry from a creativity perspective. If you’ve have all the same kind of people sitting around a room, they tend to think in the same ways which creates artificial limitations. The attackers don’t suffer from the same constraints; they are very diverse. If you don’t have that kind of creativity you’re being hobbled.

MB: Which nations are at the vanguard of this kind of technology?

MR: There are a few nations that have invested quite a significant amount of resources, time and money, and it would be the nations you would expect. I’m not going to go into specific names, but these are the ones that tend to maintain very large militaries or are active on the world stage. And they’re using cyber capabilities as an extension of those organizations.

The use of cyber is not limited to large countries. In fact, there are some small countries out there, which are very tech sophisticated, which have developed advanced capabilities to conduct cyber warfare and enhance their digital defenses.. There are a slew of countries that are simply buying off-the-shelf private software for surveillance or hacking purposes.

Cybersecurity holds a certain lure. It is an equalizer. Like back in the Wild West a handgun was the equalizer—everybody can hold one, everybody can shoot, and it didn’t require much skill. You were a threat. So we're seeing smaller countries, ones who want to have that political chip on the table, be able to invest in cybersecurity. And they don’t have to invest a lot. In fact, they don’t even have to have dedicated teams; they can outsource it to hacker communities.

MB: Is ransomware a new thing or are attackers just using it more effectively?

MR: Ransomware isn’t actually new. It’s been around for a while, but wasn’t very successful. A lot of the initial ransomware programs were technologically weak and weren’t encrypting files very well. Or it would just be a web page you could close. It wasn’t until much better written variants like CryptoWall, CryptoLocker, and some others came out, that were able to identify files and encrypt them with stronger keys. Properly coded encryption is real tough to undermine, for good guys or bad guys. And nowadays, they are writing it well.

MB: So what can we do to protect ourselves?

MR: Technology is a beautiful and wonderful thing that enriches the lives of people all across the world, making us happier and more productive. But the pace that we embrace technology far outstrips our capability to secure it.

In the cybersecurity world, it isn’t all about technology. You have technology and you have behaviors, the human element; it’s like two sides of a coin. In reality, you can install a stack of firewalls on your network, but that’s not going to stop an authorized user clicking stuff on the web and downloading and installing things. It’s just not. Even the most robust technology can be undermined by the actions of users.

Organizations must understand both the technology and behavior aspects. Security plans have to address both. And because the adoption of technology is now so widespread and complex, you can’t immediately protect everything. So you must prioritize. And that really the next evolution we’re seeing in the industry.

Motherboard: http://bit.ly/1pp9DbW

« MoD Email Blunder Leaks Secret NATO Report
On the Brink of Cyber War… »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.

Vulnify

Vulnify

At Vulnify, we’re revolutionizing the way businesses identify and manage security vulnerabilities.