June 13, 2016 By Craig Heilmann 4 min read

The media is filled with stories of large breaches and omens of cyber catastrophe, and it tends to leave you with a defeatist view. There is a common saying in the industry that “it’s not if you will be breached, but when.” It certainly feels that way sometimes, but I felt it might be a bit refreshing to offer an alternate view.

It’s actually a really exciting time to be in the world of information security. For the first time in 22 years of working in this business, I feel confident in saying we have an opportunity to truly get ahead of security issues.

Finally Feeling Good About Security

My history goes back to the Department of Defense (DoD), during the days when Kevin Mitnick was traversing DARPA systems. I was fortunate enough to play a part in the formation of the U.S. Air Force Computer Emergency Response Teams (AFCERT) and its defensive operations at the time.

From the DoD, I went into commercial industry as a consultant and ethical hacker for one of the big four firms. Since those early days I have crossed many verticals as hacker, defender and consultant to high-tech firms, financial services, the health industry, natural resources, life sciences and national critical infrastructure such as energy and utilities, oil and gas, transportation and manufacturing.

While each organization I’ve worked with has its own unique challenges that cut across many dimensions (i.e., compliance, economic, culture, security maturity and more), there are common themes that are universal. Most of the CIOs, CEOs, CROs and CISOs I speak with share a sentiment along these lines, almost without exception:

I’ve been assessed to death, I’ve invested a ton and I’m getting beat up more now than ever. I feel surrounded by bad guys, including insiders, and they are more organized, better funded and more highly skilled than what I can bring to the fight. How do you effectively fight in this environment?

I’m sorry to say that historically security professionals haven’t had a really good answer to that question. For a very long time, the security industry was fragmented, with vendors specializing in specific protection technologies. Risk-based approaches were limited in their effectiveness because even the best risk program was limited by the timeliness and quality of the information available. We simply did not have a high level of sensor technologies, collaborative approaches, automation and machine intelligence available to us in the past. And that past was only just a few years ago.

A Case Study for the Future

Things are truly different now, which has breathed some new life and excitement into the information security industry. The technological advancements are nothing short of phenomenal, and the mindsets of security professionals are changing as well. That is as important — if not more important — than the technology.

Take something as fundamental as security controls and common industry frameworks. Until now, the security world was flat, meaning we only thought of these things in one dimension. Let’s use access control as an example: With any regulatory or industry security framework, access control will be at the top of the list of must-have measures.

Most organizations take these frameworks and apply them like checklists. In the case of access control, you may implement risk-based access control across the enterprise, two-factor authentication for remote access, digital certificates, biometrics and maybe a variety of other methods. Then you check off the task and move on to the next requirement on the list.

The mindset of prescribing one-dimensional control has not been effective. The industry is now seeing a shift in mindset toward three-dimensional control. We think of things more end-to-end, meaning from each individual control through the monitoring capability focused on that control and ending with the specific, prepared response to take when that control is breached.

A Closer Look at Access Controls

Let’s take this specific example a bit further to round out the point: Credentials and access controls are the most common links in attack chains because most hackers need both credentials and access to achieve their objectives. Changing passwords is one of the top three remediation activities during and after a breach, and it’s often a wise precautionary activity to preclude an attack.

An enterprisewide password change means changing all passwords for all users, all administrators and all service accounts. For many organizations this can be 100,000-plus normal accounts with hundreds or thousands of service accounts. Bad guys love service accounts — ideally they collect several that have domain privileges and are hard-coded into custom critical business applications. The more embedded they are and the more painful for you to expel them, the better.

Remediating an access breach typically occurs during a frantic 36 to 48 hours in an all-hands-on-deck event. Unfortunately, it takes most enterprises four to six months to prepare for, plan and execute this task in crisis mode, which means you may have to uncomfortably coexist with attackers in your environment for months before you can do anything about it.

Unplanned activity like this is time-consuming. Not only do you have to make technical changes and conduct code analysis, but users must also be notified and the impact to business application owners, partners and vendors surveyed. Scheduling downtime, changing passwords and bringing the environment back live are all intensive tasks as well.

Make It Tougher for the Bad Guys

The bad guys are counting on our inability to respond swiftly. It would come as a complete surprise to even the most advanced attackers if a large enterprise could move with this kind of agility. It comes down to being prepared and making sure you have a response plan for each control in your framework.

Things like an enterprisewide password change playbook or a rapid digital certificate revoke-and-replace plan are powerful tools. It takes surprisingly few of these big levers to make all the difference between a single breached control and a full-on organizational breach with data loss and negative brand impact. We need to be more about preparation and less about hero effort in the moment of crisis.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today