August 18, 2014 By David Cygan 3 min read

The ‘Sgt. Pepper’s’ Guide to Black Hat and Security Intelligence

“Found my coat and grabbed my hat / Made the bus in seconds flat,” from “A Day in the Life” on The Beatles’ “Sgt. Pepper’s Lonely Hearts Club Band,” perfectly describes my harried journey to my first Black Hat conference to talk to customers about security intelligence and information security.

Just as Paul McCartney huffs out of breath in the song, so was I — I didn’t want to be late for the conference on my first day, but the monorail was closed, so I had to rush to take a bus to the Mandalay. When I arrived, I quickly picked up my credentials and made my way to the exhibition hall.

The hall was a sight to behold and reminded me of the cast of characters featured on the cover of “Sgt. Pepper’s Lonely Hearts Club Band.” Though some vendors were dressed in suits, uniforms and casual clothes, there were also plenty of people in costumes. Aliens, women with pink hair and vikings filled the hall, hawking their wares as if they were at a medicine show. Different vendors had point solutions, addressed fraud and had several solutions for different aspects of security.

3 Things to Look for When Deciding What Security Company to Partner With

That’s when it hit me. The chaos of Black Hat was just like the chaos of the information security industry. With all that noise, how does a customer decide which security company to partner with?

In making “Sgt. Pepper’s,” The Beatles took some time off, cleared their minds of the noise around them and then dedicated themselves to writing the album. Customers should do the same and consider the following when choosing a security intelligence partner:

1. Look for Leaders

First, customers should look for a vendor that is a leader in analysts’ reports, and not just in one or two areas. This vendor should lead or be a visionary in most areas of the reports. Attackers are highly sophisticated, so customers need a company that is on top of its game to protect their company’s assets. Because The Beatles were visionaries, “Sgt. Pepper’s” was a groundbreaking album that forever changed the music industry. Customers should look for that same kind of innovation and thought leadership when considering their security needs.

2. Make Sure the Framework Is Meticulous

These companies should also have a well thought-out security architecture or framework in place. Fraudsters are relentless and are attacking systems from all directions. There are plenty of opportunities for vulnerabilities, from users to the network and applications that could be infected by malware. Having this stable architecture allows customers to take a cohesive approach to thwarting these attackers. It took The Beatles 34 hours to complete “A Day in the Life,” when one of their earliest songs took only 10 hours to create. Writing this song combined the work of many artists and instruments and required McCartney and John Lennon to collaborate — no small task!

3. Integration Is Key for Security Intelligence

The company’s architecture should also be integrated. When integrating security, companies are basically casting a large, protective net over their assets.

Consider, for instance, IBM’s security architecture. Each of the main areas of people, data, applications, fraud protection and infrastructure are integrated and work together to form a protective barrier. For example, the “people” pillar works in conjunction with the “data” pillar; thus, privileged access to the customer’s data is tracked and monitored. When anomalous activity is detected, the security intelligence event monitor discovers it and shuts it down. If this was dishonest activity — not just an accident — the data is stored to do complete incident forensics.

Imagine what would happen if there wasn’t this level of integration in “A Day in the Life”? The world would not have been graced with this work of art.

Read the IT Executive Guide: Transitioning to Total Security Intelligence

The Final Chord

The final, iconic chord in “A Day in the Life” is brilliant, with all the artists striking one note to draw listeners to a singular point. So many parts of the song worked together to weave a cohesive story, and everything came together with that unified last chord.

With all the noise out there today, it can be difficult to decide who to partner with for information security needs. But if companies choose a partner that is highly rated by analysts and has a well-defined and integrated architecture, they will be able to rest easy that everything has ultimately come together to keep them protected.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today