Cybersecurity defenses need to evolve, experts say

High-profile breaches prove traditional IT network defenses not enough

Now that the scope of malicious cyberattacks has been proven, the traditional model of defending against them needs to evolve, according to two security experts who spoke at the FOSE conference in Washington July 20.

A rash of recent high-profile breaches confirm that conventional defenses against cyber threats aren't working — including breaches that have cost Citigroup upwards of $2.7 million, RSA an estimated $100 million and untold money from the numerous attacks on Sony, Jimmy Sorrells, senior vice president, INTEGRITY Global Security, told the conference.

“It’s going to be painful, but we’ve got to change the mindset of security…from the traditional model of perimeter defense to a modern, contemporary security," Sorrells said. "We have to move to a new philosophy of security.”

Sorrells said a big part of the problem is IT systems that were built too fast to meet demands, but without proper security considerations.

“People didn’t think about, ‘This is going to be the backbone of my business for the next 50 to 60 years,' " he said.

Today’s security requirements go beyond perimeter defenses such as firewalls and virtual private networks, what Paul Williams, executive director of security services at White Badger Security, called a “castle-like mentality.”

Williams said Stuxnet's penetrations were enabled by a number of mistakes, including ineffective anti-virus software, no zero-day exploit protection, unblocked peer-to-peer machine connections and undetected malware covert communications and critical application changes.

According to Sorrells, the recipe for security is built on five key tenets:

  • Making a comprehensive inventory of assets that includes all data.
  • Categorizing assets based on confidentiality, integrity and availability.
  • Compartmentalizing and segmenting infrastructure.
  • Mapping assets into compartments, such a zones or enclaves.
  • Using common criteria as a scorecard for critical IT components.

Even with critical IT network defense components in place, nothing works better than the human eye, Williams said.

“There’s no product on the market that can match manual analysis,” he said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Featured

  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.