Cybersecurity defenses need to evolve, experts say

High-profile breaches prove traditional IT network defenses not enough

Now that the scope of malicious cyberattacks has been proven, the traditional model of defending against them needs to evolve, according to two security experts who spoke at the FOSE conference in Washington July 20.

A rash of recent high-profile breaches confirm that conventional defenses against cyber threats aren't working — including breaches that have cost Citigroup upwards of $2.7 million, RSA an estimated $100 million and untold money from the numerous attacks on Sony, Jimmy Sorrells, senior vice president, INTEGRITY Global Security, told the conference.

“It’s going to be painful, but we’ve got to change the mindset of security…from the traditional model of perimeter defense to a modern, contemporary security," Sorrells said. "We have to move to a new philosophy of security.”

Sorrells said a big part of the problem is IT systems that were built too fast to meet demands, but without proper security considerations.

“People didn’t think about, ‘This is going to be the backbone of my business for the next 50 to 60 years,' " he said.

Today’s security requirements go beyond perimeter defenses such as firewalls and virtual private networks, what Paul Williams, executive director of security services at White Badger Security, called a “castle-like mentality.”

Williams said Stuxnet's penetrations were enabled by a number of mistakes, including ineffective anti-virus software, no zero-day exploit protection, unblocked peer-to-peer machine connections and undetected malware covert communications and critical application changes.

According to Sorrells, the recipe for security is built on five key tenets:

  • Making a comprehensive inventory of assets that includes all data.
  • Categorizing assets based on confidentiality, integrity and availability.
  • Compartmentalizing and segmenting infrastructure.
  • Mapping assets into compartments, such a zones or enclaves.
  • Using common criteria as a scorecard for critical IT components.

Even with critical IT network defense components in place, nothing works better than the human eye, Williams said.

“There’s no product on the market that can match manual analysis,” he said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.