4 Ways To Identify The Real Threats To Your Organization
Companies looking for better ways of prioritizing their defensive efforts need to look beyond vulnerabilities. How to find the real threats to your business before they find you
By Robert Lemos, Contributing Writer
Dark Reading - The basic equation for risk is simple: If an adversary or threat can exploit a vulnerability to harm an asset, then you have risk.
Yet far too many companies focus on the two components of risk that are typically internal to their networks: assets and most of all, vulnerabilities. With a slew of media articles coming out on vulnerabilities every week, it's easy to get sidetracked, says Eric W. Cowperthwaite, chief information security officer for Providence Health & Services.
"We tend to run around screaming how the sky is falling about stuff that is not a big deal," says Cowperthwaite. "I don't see how you can credibly inform your defense or your leadership about the threats if you don't know what your threats are."
Increasingly, security professionals advise companies to do their homework and gauge what threats may be targeting their networks and data. At last month's SOURCE Boston security conference, for example, one consultant pointed out that most defenders wait behind their firewalls for the attackers -- effectively giving up the initiative. Companies instead need to model the threats to their network and gather intelligence on possible adversaries.
To that end, a good start is for companies to make a short list of the threats they face to their business, says Cowperthwaite. Not just cybercriminals and online adversaries but other events that could cripple the company. Most companies will find that advanced persistent threats and hacktivists are likely not among their major worries.
"If you don't have that list, then I think that you have a problem," Cowperthwaite says. "Earthquakes, volcanoes, cybercriminals, accidental insiders -- there are six, seven things that are significant threats for me. And then I have to look at how they pair up with vulnerabilities to create risk, and I'm not going to tell you that [the risk is] the Chinese government."
Here are four steps that companies should be taking to better understand the threats to their business.
1. Watch for the attackers.
"There are the actual pings you are getting every day, which can now, for an average target, be in the millions every day," says Tom Patterson, lead partner for the security consulting group at Computer Sciences Corp. "There is no way to look at that. You cannot capture it in a log and read it out and find some patterns there."
Good automation is key to separating the attacks from the noise. A number of security information and event management products can help. But many times, finding low frequency attacks is difficult.
2. Pump your vendors for threat data.
By combining a view across its customer base, security providers can help detect attacks that may otherwise go unnoticed, says Hardik Modi, senior product manager at Fidelis Security Systems.
"The way we like to think of it is that people gain situational awareness," Modi says. "They can gain information about campaigns that are being waged against them."
3. Meet with your competitors.
However, for industries that are not considered critical infrastructure -- or for companies that are not well served by an ISAC -- creating their own private information sharing group is a possibility, says Providence's Cowperthwaite.
"One of the things that people forget or don't think about is that verticals have private associations of security leaders that don't get advertised to the outside world," he says. "Often a lot of good threat information gets exchanged in these groups."
4. Find a threat analyst, even part-time.
"Either identify someone you already have or identify somebody you can add," he says. "You don't want a security engineer. You want somebody who has a different mindset."
Original appearance at darkreading.com
We combine deep industry, implementation, development, and project management expertise, practical tools, and innovative thinking to catalyze the achievement of your business objectives Read more...