What Every CISO Needs To Know

Enterprises are under an endless stream of cyberattacks. The sophistication of these attacks is evolving, and the number is not expected to decrease. 

Any emerging technology, be it mobile devices and related BYOD policies, artificial intelligence and machine learning, or IoT, not only brings new opportunities but also widens the field of possible attack.

Nowadays, it’s not enough to just have a general view on the state of cybersecurity. People who are responsible for cybersecurity in an organization must grasp new cybersecurity threats and assess how they affect overall security posture and business in general. Based on these factors, they should prioritize specific areas and focus on protecting the most critical ones.

What Should Be On Your Radar?

In February, Crowd Research Partners released the 2017 Cybersecurity Trends Report. The results of the survey are far from encouraging. With 62% of respondents moderately to not at all confident in their security measures, it comes as no surprise that 54% of them anticipate more cyberattacks to be conducted against their organizations within the next 12 months.

The most concerning threats vary from widely known ones to those that came under the spotlight not so long ago. 

Examples include the Stagefright bug, a mobile-based threat that made its third appearance in 2016 and allowed cyber-criminals to hack Android smartphones, or a bug that affected the mobile management system of a German-based company and was used to wipe data from millions of devices. Sometimes, the danger of a threat tends to be underestimated when it seems more than familiar. Some of the most worrisome trends in cybersecurity are oulined below along with some steps you can take to prioritize dealing with each.

Insider Threats

Insider threats come in many forms. Usually, they are posed by malicious workers or former employees. Being one of the most well-covered topics, insider threats always top lists of corporate cybersecurity risks. According to the 2017 Cybersecurity Trends Report, 33% of respondents worry about this attack vector most, and about half of them consider detecting such an attack to be the most challenging task for their security operations center.

Their anxiety is actually not unfounded, as insider fraud may be costly to an organisation (we explain this in greater detail here). Exacerbating the problem is the fact that unlike the external malefactors, insiders have legitimate access to the network and services. 

What should be on your radar? Without a doubt, our crown jewels, such as ERP systems and various business applications, are the prime targets for insider threats. Being an insider means understanding the business processes of your financial or supply chain applications, which makes it extremely easy to conduct an attack on the applications. The attacker just needs to find a vulnerability or misconfiguration in the system to perform an attack, and there are thousands of them because these applications are insecure by design.

The protection measures that should be used against insider threats include analysis of user activity and different UEBA (user and entity behavior analytics) solutions.

Application Security

Since successful cyber-attacks on applications can lead to lost revenue and loss of reputation, enterprises’ application landscape is business critical. Companies are more and more concerned about the security of their applications.
According to the Crowd Research Partners report, the apps available on the internet are viewed as presenting the highest security risk by half of the respondents, followed by mobile apps (41%), desktop apps (34%) and business software such as ERP (Enterprise Resource Planning) (29%).

As for protection from attacks on applications, I recommend using training for your developers, specifically the OWASP Top 10 (the latest version was published just a few weeks ago). In addition, static and dynamic code analysis tools and WAF solutions are recommended. Gartner MQ's recent update of the top vendors in application security is a great source of information. Once a blind spot for a typical organisation, ERP security is growing into a separate area of cyber-security.
In the last five years, we have witnessed several cyber-attacks against business applications. For example, there was a well-known attack on USIS via a vulnerability in a SAP system managed by a subcontractor that my company reviewed. 

A year later the German Software Company SAP found security as a whole came under heavy scrutiny in the form of the US-CERT alert on a SAP vulnerability, which was released due to potential attacks on an SAP module widely exposed to the internet. And this is just the beginning. According to the Crowd Research Partners report, 89% of security professionals expect more attacks against ERP systems, and 30% anticipate a significant increase in these attacks.
ERP security is a complex topic. The best option I can recommend is to have a holistic view of it by analysing all areas: platform security, customization protection and SoD.

Data Protection

If something is valuable, hackers will try to steal it sooner or later. As for sensitive information, unless you live under a rock, you know that data theft or manipulation is a lucrative business. Sensitive information is literally the lifeblood of any enterprise, and its protection is a headache for any company.

Crowd Research Partners found that the types of data of which integrity security experts worry about most are the following: customer data (72%); employee data (66%); emails (54%); financial corporate data (46%); and contracts, invoices and orders (35%). By the way, as an expert in ERP systems and business applications security, I can say that such systems store and manage all the aforementioned types of data.

The most alarming finding is the fact that most enterprises feel they are unprepared for any kind of attack (including ones against their ERP systems) and anticipate their number to grow. So, it’s time to translate awareness into action. The list of threats an organisation faces are endless, so to reiterate: Prioritization is essential.

Forbes

You Might Also Read:

Directors Report January 2017. Cyber Security Checklist For Management (£):

CISOs Need Teamwork & A Strategic Framework:

 

 

« Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware
Hackers Came, But the French Were Prepared »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Via Resource

Via Resource

Via Resource specialise in Information and Cyber Security recruitment in the UK, Europe and USA.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Redsquid

Redsquid

At Redsquid we are all about making a difference to our customers with the use of technology, as an innovative provider of solutions within IoT, Cyber security, ICT, Data Connectivity & Voice.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.