While some organizations have spent decades fine-tuning their ability to respond to and manage cyber risks, far too many are still playing games with their security strategy.

From a cybersecurity perspective, 2017 will go down as a record year for data breaches. The Identity Theft Resource Center (ITRC) reported 1,579 breaches, up 45 percent from 2016. By itself, 2017 accounted for over 22 percent of all the data breaches tracked by the ITRC between 2005 and 2017. Over 50 percent of those breaches exposed Social Security numbers, and nearly 20 percent leaked credit and debit card numbers. Hacking accounted for 940 breaches, or 60 percent of successful compromises. While the ITRC only tracked five industry categories, over 55 percent of breaches targeted the business sector, followed by the medical/healthcare industry at over 23 percent.

So is there any glimmer of hope for security teams? The Ponemon Institute’s “2017 Cost of Data Breach” study found that the global average cost per breached record went down from $158 in 2016 to $141 in 2017. Similarly, the global average cost per incident now stands at $3.62 million, down from $4 million in 2016. Companies that experienced a data breach reported that the biggest fallout is lost business (42 percent), which includes “abnormal turnover of customers, increased customer acquisition activities, reputation losses and diminished goodwill.” That was followed by the cost of dealing with detection and escalation (27 percent), response costs (26 percent) and notification costs (5 percent).

Managing Cyber Risks Is Not All Fun and Games

Despite these costs, many organizations have been slow to improve their cybersecurity preparedness. A recent CyberArk survey found that 46 percent of organizations are unable to stop attackers from breaking into internal networks. The same percentage of companies “rarely make substantial changes to security strategy,” even in the wake of a cyberattack.

So just what kind of games are organizations playing, and what should they do instead?

Playing Pinball to Deflect Risk Management Responsibility

One of the most perilous ways in which organizations commonly manage cyber risks is by playing the equivalent of pinball with those risks. Much like the ball bounces around the glass-covered machine, many organizations bounce cyber risks from department to department, all the while hoping that the ball doesn’t fall through the drain. Business leaders try to keep cyber risks in play while bouncing them around the organization, hitting various bumpers, switches and gates along the way. But no matter how long the ball is in the air, it will eventually fall into the drain.

The same goes for an organization’s chance to properly handle its cyber risks. Instead of bouncing the responsibility of risk management from department to department, the C-suite and board directors should establish clear ownership before threats emerge. For companies that point to the chief information security officer (CISO) or chief information officer (CIO) in these situations, decision-makers should chat with legal counsel before playing another round of pinball.

A Blind Game of Dodgeball

If pinball isn’t your game, perhaps dodgeball is more your speed. While this is normally a court-based game with just two opposing teams, in cyberspace, organizations find themselves dodging many adversaries.

Players on a dodgeball court can see what’s being thrown at them, but security professionals might miss clues indicating that an attacker is preparing to make a move. These security teams often end up focusing on indicators of compromise (IoCs) instead of honing their ability to detect indicators of attack (IoAs) and improving their reflexes.

While IoCs have their place, they are akin to realizing that one of your teammates has been hit and will need to be benched. IoAs give players a heads-up that a threat is coming their way so they can be more alert and react appropriately.

Bowling Over Business Functions

Like a bowler rolling a strike, a well-placed threat can knock down multiple business functions at once, especially for organizations with immature or untested incident response or fledgling cyber resilience capabilities.

Without the muscle memory of regular practice tests and lessons from after-action reports (AARs), the organization’s response to a breach can trigger a domino effect, taking out a big chunk of the profits or, worse, a large portion of the business itself. Critical infrastructure comes to mind: There are documented example of cascading failures that amplified small incidents into full-scale disasters.

As organizations have shifted their mindset about cyberattacks from a matter of if to a matter of when, it is critical to ensure that the response to an incident doesn’t cause further damage. Don’t let your adversaries take you down with a single strike.

Gamifying Incident Response

Of course, not all games are bad in cybersecurity. In fact, game-like activities can help organizations improve their cybersecurity posture and their ability to handle cyber risks.

Finding Waldo in a Sea of Threat Data

The classic game of “Where’s Waldo?” applies to cybersecurity in two ways. In the first scenario, Waldo is a piece of sensitive data hidden in a vast sea of information. Does the organization know where it keeps its crown jewels? If not, how can the security team be sure that it’s protecting the right things?

The other approach is to consider Waldo as a potential attacker or threat. Can the security team spot this malicious Waldo in the large volume of data flowing in and out of the organization’s servers and networks?

Tabletop Games

Security teams can also hone their incident response skills by playing tabletop games. While the first few rounds might be canned and simplistic, organizations can make future iterations of the game more complex and thus more valuable by assigning a gamification engineer. The output of each round should include a chance to debrief the participants, including business leaders, and document the lessons in AARs. These reports should then be used to review incident response playbooks to ensure that they are useful in times of crisis.

Practice Makes Perfect

Games can be both fun and productive, but it’s important to remember that improving your cybersecurity posture and incident response strategy is not a one-shot activity. The more you practice, the better you become — as long as the practice includes appropriate feedback to help you figure out what worked and what didn’t. While organizations today engage in many security activities and projects, some of those initiatives may be less fruitful than initially believed.

Accenture’s “2017 Cost of Cyber Crime Study” ranked nine security technologies by their value in relation to their cost and found that “many organizations may be spending too much on the wrong technologies.” The three technologies that had a positive value gap — i.e., brought more security improvements for the money spent — were security intelligence systems, automation, orchestration and machine learning, and the extensive use of cyber analytics and user behavior analytics (UBA).

Organizations should regularly test their security controls and responses and review their security investments with an eye toward mitigating today’s threats and minimizing the impact of a breach. The Ponemon “2017 Cost of Data Breach” study asserted that the best way to reduce the cost of a data breach is to establish an incident response team, use encryption extensively and train employees to follow security best practices.

Before the year is up, organizations should focus on improving their game. That means figuring out which activities yield the most positive results — or best help reduce negative outcomes. With the cybercrime landscape evolving at breakneck speed, security teams had best bring their A-game to compete with ever-more sophisticated threat actors in 2018.

Download the IBM research report: Using gamification to enhance security skills

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today