September 6, 2019 By George Platsis 4 min read

The Greek philosopher Heraclitus of Ephesus once said, “πάντα χωρεῖ καὶ οὐδὲν μένει.” If you’re getting the blue screen feeling, it’s probably because that’s Greek to you. Here’s the translation: “Everything changes and nothing stands still.”

While that quote was said 2,500 years ago, you wouldn’t be faulted for feeling it describes today’s state of cybersecurity. Most security professionals know they live in a constant state of flux. Some new tactic or piece of threat intelligence can change an entire protective strategy, meaning that if your cyber resilience planning isn’t keeping up with the latest trends, you may find yourself, post-incident, looking up some Plato, who said, “Good people do not need law to tell them to act responsibly, while bad people will find a way around the laws.”

Plans Are Useful, But Planning Is Indispensable

If this article is beginning to feel like a greatest hits of wisdom, look for the common trend: Upon reflection, the lessons of these quotes are obvious. Believe it or not, as hard as cybersecurity is, cyber risk management, upon reflection, is also quite obvious:

  • Define the risks that impact you;
  • Determine the amount of risk you are willing to accept; and
  • Develop a plan to mitigate the risk you have accepted.

There you have it: the three Ds of cyber risk management. Some of the best cyber resilience planning in 2019 comes from simplicity, beginning with the National Institute of Standards and Technology (NIST)’s Cybersecurity Framework (CSF). The clearly defined functions — Identify, Protect, Detect, Respond and Recover — help you make heads or tails of what you’re dealing with. No matter if you are a small or large organization, the NIST CSF really needs to be your foundation, because, at worst, it will give you a starting point to assess your security posture.

The good news is that, slowly and surely, the NIST CSF is catching on. In 2015, Gartner research estimated 30 percent of U.S. organizations were using the framework, anticipating a 50 percent adoption rate by 2020. If the NIST CSF is not part of your cyber resilience planning, you have some work to do.

You Don’t Have a Plan Unless You Test Your Plan

Compliance documents and reports may look pretty come audit time, but a stack of paper is going to do little to stop that advanced persistant threat (APT). Testing your plans and networks has generally been a laborious, expensive and time-consuming task. But with more entrants in the cybersecurity space fueling competition, and more innovations and economics of scale in technological developments, vulnerability assessments and penetration tests are no longer reserved for the large enterprise.

In fact, there is some commoditization happening in these areas, with service providers offering these services for flat fees. For organizations that have been shying away from conducting these assessments and tests, commoditization should be welcoming news.

Perhaps the tricky part here is deciding how often to conduct these services. Your decision will almost certainly be based on your risk tolerance, but it’s not unreasonable to assume that annual assessments and tests will become a type of recurring “cyber checkup,” akin to a doctor’s visit. The short version is this: If you’re not conducting some sort of evaluation on your systems, at least annually, you’re quickly chipping away at your cyber resilience.

Remember what Heraclitus said about everything changing. What you thought was “good” in 2018 may be far off from what “good” is in 2019. If your cyber risk management is not dynamic — and the only way to be dynamic is to know what your current state is so you can adjust accordingly — you may be exposing yourself to a digital knockout punch that will leave you sending emails the same way ancient Greeks did.

Give a Person a Phish…

Whether it is having the acumen to spot a phish-y email or staying on top of system configurations, if your people are not receiving some sort of regular training or updating of skills, sound the alarm. Security technologies, such as endpoint protection solutions or security information and event management (SIEM) tools, are great — and necessary — but they will always be one piece of the puzzle.

The other piece of the puzzle will always be the human, whether they are a technologically illiterate end user or an off-the-charts proficient IT administrator. While we consistently hear about the malicious link that unleashes ransomware, or the successful business email compromise (BEC) case, remember that even the most highly skilled employees require ongoing training.

Therefore, if your staff is not receiving regular training and is not being regularly tested, your cyber resilience strategy has a gaping hole in it. You’re just taking on risk that you can’t afford, but can also be easily wiped off your ledger with some elbow grease.

Work Smarter

While implementing some sort of artificial intelligence (AI) to help out with your staff burnout may be one reason to adopt the technology, another is that threat actors have weaponized AI to unleash a new breed of cyberattacks. Understandably, the use of AI or machine learning (ML) can be cost prohibitive — unlike vulnerability assessments and penetration tests, AI and ML have not reached the commoditization stage yet — and some still have concerns about what AI and ML will actually do on their network.

These are legitimate concerns, but widespread AI and ML implementation is on the way, so your cyber resilience planning should find a place for them, if not today, in the very near future.

If You Can’t Measure It, You Can’t Manage It

Or is it that the important stuff can’t be measured? It’s sometimes tough to tell, but before we decide which, let’s recap what we’ve already touched on:

  • Risk management
  • Industry frameworks
  • Planning and plan testing
  • Vulnerability assessments
  • Penetration testing
  • Security awareness training
  • Artificial intelligence and machine learning

All of this seems so straightforward, doesn’t it? Well, if it’s all straightforward and not particularly novel, why are breaches still happening? It’s likely because we have not implemented all these basics yet, and that should be the greatest takeaway of all. Cyber resilience in 2019 needs to include all of the things mentioned above and, candidly, not all of us are. These are your cyber risk management baselines, your basic “must dos” if you want to protect yourself today.

If you haven’t begun to institute all of the measures mentioned above, you should. And make sure you can measure your success along the way. Identify your gaps, track your progress and come up with metrics that can improve your information security posture. All of this is doable, manageable and measurable. After all, a breach is an important thing, and the cost of it, sometimes, can’t be measured.

More from Risk Management

Working in the security clearance world: How security clearances impact jobs

2 min read - We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense.But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines.This brief explainer discusses the duration of security clearances, the recurring processes involved in maintaining them and possibilities for expansion, as well as the economic benefits of these credentialed positions.Duration of security…

Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709

4 min read - On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE-2024-1708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code.While ConnectWise initially reported that the vulnerabilities had proof-of-concept but hadn’t been spotted in the wild, reports from customers quickly made it clear that hackers were actively exploring both flaws. As a result, the company created patches for…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today