How to Improve the Effectiveness of Incident Response

According to the SANS Institute, although 21 percent of respondents to a recent survey were unable to determine whether they had suffered a security incident in the past two years, 61 percent could confirm they had been a victim of a breach, unauthorized access, denial-of-service attack, or malware infection. Efficient incident response is vital when…

A New Appreciation for Continuous Asset Monitoring

Does asset monitoring really have to be continuous? In a recent RSA blog post titled, “Security GRC Fundamentals: Creating and Utilizing a Business Context,” the case was made that without the business context provided by accurate inventory and the prioritization of information systems and data, all the intelligence in the world about threats and vulnerabilities…

The Importance of Effective Oversight for Third-Party Risk

According to Deloitte, there are three main factors that have led to an increased focus on third-party risk in recent years. First, the economic downturn in 2008 caused organizations to look into reducing internal costs by pushing more business activity to third parties. Second, regulatory scrutiny of third-party relationships and management has increased, including the…

The CISO White Elephant Party

The holiday season is the storm before the calm. Available time is occupied with getting ready for end-of-quarter / end-of-year, squeezing in meetings before folks depart, shopping, and of course attending white elephant gift exchange parties. These parties are notorious for exchanging absurd gifts that are burdensome, possibly expensive, and serve little purpose. If you’re…

Cyber Risk Insurance: Preparing To Obtain Coverage With Standards and Frameworks

Cyber attacks are getting bigger, costlier, and more frequent. They are gaining more and more media attention with each strike. The Lloyd’s Risk Index 2013, a global biennial survey of board-level and top-level executives, identified cyber risk as the third-highest risk that faces businesses. However, while a proactive defense against cyber risks is the first…

The Dark Web: Coming to a Retailer Near You

As retailers, financial institutions and payment processors around the globe prepare for the upcoming year, it should come as no surprise that cybercriminals in the Dark Web are doing the same. From the POS terminal to the mobile device, fraudsters are building their arsenal of cyber weapons to strike at every point along the way.…

Looking Behind to Move Forward

In my recent travels around the world, I’ve met with government officials and key critical infrastructure decision-makers. Defining the steps to create a more effective and secure environment is almost always Topic A on their list. This is important to the end users – information, operations, services, responsibilities of many kinds, etc. As it almost…

The Economics of Identity Theft in the Dark Web

If you ever want to find a reason to boycott the Internet, just go work for a security vendor.  The digital universe is a scary place, and the cybercriminals who operate within it never cease to amaze me with the level of sophistication they harness in their Dark Web businesses. The black market, although rife…

The Compromised Affair

If people’s credentials are compromised, that is a bad thing. Everybody knows that. But what if those compromised credentials include people’s biometric data? What value does a stolen fingerprint template or an encrypted voice profile provide to hackers? And what steps can companies take to reduce the risk associated with dealing with such information? Six…

The Risks of Root Causes

I spoke recently at a workshop organized by the Alan Turing Institute in London to identify areas related to cyber security in which major research is needed. Though I focused on security analytics, I also talked about the need to develop more effective models for understanding and managing risk, citing the work that my colleagues…