No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Detecting Intrusions Early to Ensure Cybersecurity

by Peter Nguyen
February 21, 2017
in Cybersecurity, Data Privacy, Featured
man in ski mask breaking in

Who’s Inside and Why Most Enterprises are Still in the Dark

Soon, regulatory bodies will start penalizing organizations that have a data breach if they have not taken available precautions to protect the data.  Were they able to find a network intruder or a malicious insider at work? What security assurances did the executives and board request? The ability to attest to an attacker-free network should become a primary metric for security.

It should be upsetting to realize that if an intruder is active in a network, most organizations simply would not know. It’s possible that an outsider gained access to the network and quietly began to explore it and expand their area of control.

In the first few days, the attacker has been able to find and take control of other privileged network credentials using Windows exploits or other tools.  Then, over the next few weeks, the attacker used the credentials and gained access to a domain controller that proved to be a pivot point in reaching and taking control of other network segments and servers.  Finally, over the next few months, the attacker gained access to all the servers in the data center and began looking for files and data that might have value. Getting to the email server turned out to provide a goldmine of material fit for extortion or other purposes. So many companies conduct the core of their business through email. If confidential emails become public or are provided to competitors, investors or other interested parties, the damage could be catastrophic.

In the scenario I’m relating, the attacker has not yet done anything with the assets that might eventually tip off the company or some third party that a network attack has occurred. For now, the attacker is lingering, choosing the right time to capitalize on their position.

The vast majority of enterprises have no effective means of detecting an active attacker on their network. Is someone lurking in your network? Your company likely has no idea.

Most security is geared toward preventing threats in the first place. Some security tries to detect an initial intrusion; other tries to monitor internal traffic, but is ill equipped to find the operational activities of a targeted external attacker or a malicious insider. Some of these systems may actually find some aspect of the attacker at work, but the indication is likely buried under a flood of hundreds or thousands of other alerts that are mainly false positives. The chance of detecting the attacker and then acting on the alert is infinitesimally small.

Obviously one of the most important capabilities enterprise security should take on is the ability to detect an attacker early in the process before theft or damage can occur. A second capability is also extremely valuable: the ability to know whether the network is free from attackers. We think of this as security assurance.

With the fallout and penalties of a data breach growing increasingly more costly, enterprise executives and boards of directors should start demanding that their security heads provide regular reporting attesting that the network is safe from internal or external attackers. The question to ask should be: is there an active attacker currently on our network? The answer should be definitive and based on full visibility that detects attackers and alerts on their activities, namely the internal reconnaissance and lateral movement necessary to carry out an active attack.

Soon, regulatory bodies will start penalizing organizations that have a data breach if they have not taken available precautions to protect the data. The FTC and SEC both have signaled such a direction, and it seems to be inherent in the General Data Protection Regulation (GDPR) that governs the safe keeping of data on EU citizens. Class action and shareholder litigation will likely both examine this issue and use it to support their claims.

Did the organization employ the means to find an active attacker? Did they continually monitor for the presence of an attacker? Were there any alerts from the security products that warned of suspicious or malicious activities? Did executives and the board hold the security team accountable for detecting, investigating and shutting down attacks? No one is going to want to face an SEC inquiry or TV news cameras being asked uncomfortable questions about why they didn’t have a system and procedures for behavioral attack detection and a process for investigating alerts indicative of attacker activity.

The ability to attest to a network being free from attackers should become a primary metric for security. Today, organizations often report on things like the number of end-user computers hit with malware that required help desk support or the number of vulnerabilities found and addressed in network defenses. These are all fine, but a more meaningful metric would be the sign that the network is safe from a hidden intruder.

Customers and partners may start asking for this kind of certification. Large law firms already must go through significant security reviews with their biggest clients. Companies that take credit cards have to go through PCI reviews. Both types of review processes could greatly benefit from an attestation that the network is attacker-free, particularly since the implication is that if there were an attacker, they would know about it and be able to defeat it.  They could set up additional review steps to make sure that all suspicious activity is investigated.

The process of integrating two companies through a merger or acquisition would also benefit from the ability to know that an attacker is not lurking in one of the two networks. In a merger or acquisition, there is considerable IT due diligence, but it does not currently extend to knowing what will happen when two networks are connected. Does a hidden attacker get carte blanche access to everything on the new network?

First, companies need a new level of internal visibility that can precisely detect active attackers. Most enterprises lack this today, largely because they have not even considered it. Many of the tools are quite new, and procedures and strategies have not been developed. It doesn’t mean giving up on preventative security, but it does mean shifting some budget and resources toward network attack detection.  And it also means enabling your short-staffed security teams with the right tools to quickly investigate possible attacks once an alert is triggered.

By modernizing their security and changing the mindset that it is important to investigate and triage alerts, enterprises should gain the ability to defeat internally- and externally-based attackers. At the same time, they should start being able to offer security assurance reporting to those accountable for the health and viability of the enterprise.


Tags: Data BreachGDPR
Previous Post

Developing Engaging Compliance Training

Next Post

Management’s Annual Report on ICFR

Peter Nguyen

Peter Nguyen

Related Posts

eu flag

Preparing Your Company for the Latest GDPR Data Transfer Developments & Upcoming Deadlines

by Kevin L. Coy
November 30, 2022

An EU court decision and legislative moves in the U.S. and UK make compliance with privacy regulations increasingly difficult. Arnall...

minidata_b

Honey, I Shrunk the Data: How to Keep Customer Info on a Need-to-Know Basis

by Parker Poe
November 30, 2022

It may be tempting to hoard the data you have gathered on your customers, but an increasing number of regulations...

checklist

5 Tips to Gain Compliance on Your Compliance Training

by Stu Sjouwerman
October 12, 2022

We know that compliance doesn’t necessarily equal security and that training employees is vital to preventing cyber attacks. But a...

data spillage

Instead of Crying Over Spilled Data, Shore up Your Governance Practices

by Rich Hale
October 12, 2022

The reputational damage and compliance failures that result from a data spillage incident are well-known, and as the volume of...

Next Post
colleagues reviewing financial reports

Management’s Annual Report on ICFR

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT