A Management System for the Cloud – Why Your Organization Should Consider ISO 27018

May 22, 2017 | Leave a Comment

By Alex Hsiung, Senior Associate, Schellman & Co.

Cloud computing technologies have revolutionized the way organizations manage and store their information.  Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based model due to the ease of use and cost-saving benefits promised by the cloud.

But what is a cloud without a little rain?  The benefits of cloud technologies have not come without their costs.

Within the world of cloud computing, there have been three persistent concerns:

  1. Security
  2. Security
  3. Security

A quick search for the pitfalls and concerns organizations face with cloud computing yields a recurring motif.  Every company looking to incorporate a cloud-based service has to weigh the benefits that a cloud environment affords against the risks associated with entrusting an organization with its sensitive data.  This data tends to include personally identifiable information (henceforth referred to as PII), which is generally the most scrutinized category of data and is subject to some of the strictest legal and regulatory requirements.

Customers of cloud service providers want to rest assured that the PII they have entrusted a cloud service provider with is maintained and held to at least the same level of security standards that they would have placed if the data had remained within their control.  For some organizations, the stakes are even higher as this is mandated by certain legal and regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA) for electronic personal health information and the Graham-Leach-Bliley Act (GLBA) for sensitive financial information.

Many cloud service providers maintain that they are ignorant to the data ingested on behalf of their customers.  However, in the event of a security breach involving either personal health information or sensitive financial data, significant fines and reputational damage can be incurred by the cloud service provider if appropriate security and privacy measures are not in place.  This is where an effective information security management system, with specific control considerations tailored to cloud security and privacy surrounding PII, can prove invaluable to a cloud service provider.

You may have questions regarding what an information security management system is.  To define an information security management system, it may be easier to first understand what it is not.  An information security management system is not referring to an actual “system”, “application”, or “tool” that performs information security functions.

A broader definition is as follows: an information security management system represents the organization’s holistic approach to addressing information security concerns.  This includes top management’s buy-in to addressing these risks which can be demonstrated in its actions by performing the following:

  • Fostering a top-down approach to information security that encourages personnel throughout the organization to be aware of information security best practices
  • Performing risk assessments that are tailored to its organization’s unique threats and vulnerabilities
  • Proactively searching for issues and concerns through the use and selection of internal auditors
  • Monitoring and measuring the performance and effectiveness of the information security management system
  • Establishing a commitment to continually improving the information security management system
  • Ensuring that security controls are implemented and applicable to its organization’s goals and purpose

The standard most commonly used to demonstrate an organization’s effective implementation of an information security management system is the ISO 27001 standard.  The ISO 27001 standard serves as a baseline framework which virtually all service providers, cloud-based or otherwise, can work toward implementing.  It is worth noting that ISO 27001 provides a multitude of benefits to organizations that implement an effective information security management system, but two are perhaps the most pertinent and deserve to be mentioned:

  • An effective information security management system demonstrates to prospective and current customers that the service organization means business about protecting the data that it is entrusted with and responsible for.
  • An effective information security management system assists organizations with establishing a forward-thinking, proactive approach to addressing information security concerns as opposed to enabling a backward-looking mindset which is generally fostered by audit culture, which typically focuses on historical information.

The above-mentioned points may be enough for any service organization to consider implementing an information security management system.  The reputational benefit that an organization can enjoy by demonstrating to its customers that it takes its handling of information seriously is difficult to measure.  The cost-savings that an organization can enjoy by implementing effective response procedures in the event of a security incident are also incalculable – just ask United Airlines.  Sure, maybe that was a different kind of incident, but the age-old adage remains: failing to prepare is preparing to fail – this is the essence of ISO.

However, the buck does not stop at ISO 27001, especially for cloud service providers who by virtue of their trade must take information security more seriously.  This is where organizations can implement, in addition to the requirements held forth by the ISO 27001 standard, a slew of measures to increase the security and privacy measures in place when handling sensitive data, such as PII.  This standard is referred to as ISO 27018, which can be achieved in tandem with an effective information security management system in accordance with the ISO 27001 standard.

ISO 27018, otherwise referred to as ISO/IEC 27018:2014, builds upon an organization’s information security management system by establishing a group of privacy-based controls that are dedicated to protecting PII in public clouds that act as PII processors, with an emphasis on protecting PII in the cloud.  ISO 27018 provides a new subset of controls dedicated to the protection of sensitive personal data.

A high-level overview of some of the ISO 27018 requirements are included below:

  • Providing cloud customers with the ability to access, correct, and erase their own PII
  • Ensuring that data is processed according to its intended purpose and not taken out of context
  • Procedures for the deletion of temporary files
  • Implementing defined disclosure procedures
  • Providing open, transparent notice in the event that sub-contractors are utilized
  • Encouraging accountability on behalf of the cloud service provider through the implementation of breach notification procedures
  • More stringent information security requirements on the part of the cloud service provider

Hopefully after considering the above, it is more clear that implementing an information security system aligned with ISO 27001 is tremendous for a service organization, but for cloud service providers hoping to assuage any security and privacy concerns for their customers, aligning these controls with ISO 27018 may be the organization’s best option.

As the technologies around us evolve, so do their underlying threats and vulnerabilities.  An effective information security management system affords an organization a proactive, forward-thinking approach to information security.  This is all the more important given that cloud computing technologies have been plagued with security and privacy concerns since their inception; the risks will only continue to increase.

If you represent a cloud service provider, it may be time to consider how your organization can benefit from the implementation of an information security management system that aligns its 27001 controls with the ISO 27018 objectives.

For more information on ISO 27018, you can view our webinar on-demand: Privacy in the Cloud – an introduction to ISO 27018

Ransomware 101

May 19, 2017 | Leave a Comment

By Jacob Serpa, Product Marketing Manager, Bitglass

Unless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipients to open attachments that make them vulnerable to the attack.

Since Friday, over 150 countries have been affected by WannaCry, with the largest impact being on the NHS in England and Scotland. The attack hit over 16 organizations, crippling hospitals and general practices, forcing them to shut down and turn away patients.

What you need to know about ransomware
Once your system is infected, ransomware will encrypt your files, rendering them useless without a key. The guilty hackers will then demand some form of payment (typically via bitcoins) for the return of the hostage information.

Ransomware’s effects are not limited to the files on a device – they can also affect the device as a whole. Hackers can put locks on user profiles that make it impossible for individuals to log into their devices without paying a ransom. Similarly, they may alter a computer’s startup process so that it cannot finish unless a ransom is paid.

What you need to do to protect against ransomware
Companies must ensure adequate employee training to protect from ransomware. For example, employees must be able to identify phishing attempts and illegitimate emails. Additionally, users must be sure to keep their systems, software, and applications up to date. Finally, regular backups of data are a necessity.

In addition to the above, organizations must embrace technological solutions that can protect against ransomware. While traditional, signature-based solutions can detect previously identified threats, advanced solutions that utilize capabilities like machine learning must be adopted to protect against unknown threats.

As hackers become more sophisticated, companies must use a multi-pronged approach to prevent the spread of ransomware.

CTRL-Z and the Changing Data Landscape

May 18, 2017 | Leave a Comment

By Mark Wojtasiak, Director of Product Marketing, Code42

The massive “WannaCry” ransomware attack that appeared in Europe last week and spread to over 150 countries is a perfect illustration of why enterprise data storage is in a period of flux. Today, organizations can choose to keep their data in the cloud, on-premise, or across both in a hybrid deployment. This variety of choice is great – it caters to pretty much every type of organization and allows IT decision makers to see where sensitive corporate information is at all times—right?

Wrong.

In 2017, 50 percent of all corporate data is actually held locally, at the endpoint, on employee devices. This is according to 800 IT decision makers (ITDMs) and 400 business decision makers (BDMs) surveyed as part of our brand new CTRL-Z Study, a pan-global report looking into the data practices of some of the world’s largest organizations and most senior stakeholders—including the C-suite—across the U.S., U.K., and Germany. The endpoint is also where 78 percent of ransomware attacks begin, and WannaCry has reportedly spread to over 100,000 organizations so far.

When ‘benefits’ outweigh the risks
The serious security implications and risks to productivity that this shift in data repositories represents are well understood at the top of the organization, with 65 percent of CIOs and 63 percent of CEOs stating that losing all the data held at the endpoint would destroy their business. But, in reality, awareness of the risk is doing little to dissuade poor security practices.

Three quarters (75 percent) of CEOs and more than half (52 percent) of business decision makers admit that they use applications/programs that are not approved by their IT department. The vast majority (80 percent) of CEOs and 65 percent of BDMs also say they use these unauthorized solutions to ensure productivity. This is despite 91 percent of CEOs and 83 percent of BDMs acknowledging that their behaviors could be considered a security risk to their organization.

So, to put it bluntly, there’s behavior at the top of numerous enterprises that favors productivity and getting the job done over data security, and CEOs and key BDMs realize this. Therefore, especially in light of coordinated global cyberattacks, the big question is: “Where does the enterprise go from here?”

Recovery is the key to data security
Productivity is undoubtedly the key to business success. At the same time, it is integral to business continuity to protect data and to be able to rapidly recover from a breach or to undo a ransomware infection. Around 50 percent of respondents to the CTRL-Z study admitted that their organization had suffered a data breach in the last 18 months. As evidenced by these numbers, the days of a ‘prevention only’ approach to security is not sufficient. Tried and tested recovery must now be at the core of enterprise data protection strategy—to get employees back up and running quickly should a breach occur. After all, the biggest cost of a ransomware attack isn’t the ransom payment—it’s the lost productivity that can result from not having the right backup and restore solution in place.

When it comes to security, there are three pillars to ensure success. First, organizations must be able to spot risk sooner. Gaining visibility over where data is, how it moves, who accesses it and when could act as an early warning system to alert ITDMs to both insider and external threats. Second, the enterprise as a whole always needs to be able to bounce back. When a data incident occurs, internal teams and the backup solutions in place need to be tested and ready to face the challenge. Finally, if the organization is to remain competitive, it needs to recover quickly. Time is money, and in the modern enterprise, so is data. Whatever goes wrong, whether that be a company-wide breach or an insider leaking a single file, IT professionals need to be able to identify the where, when and who of the situation immediately if they hope to mitigate the risk.

Now is definitely the time for change, and the enterprises that want to remain competitive are starting to act. As many organizations around the world have learned in recent days, it’s not if you will be hit by a cyberattack, but when.

 

Malware: Painting a Picture

May 17, 2017 | Leave a Comment

By Jacob Serpa, Product Marketing Manager, Bitglass

Part One
Now more than ever, companies are flocking to the cloud. Through a variety of software as a service (SaaS) and infrastructure as a service (IaaS), enterprises are able to raise their efficiency, increase their flexibility, and decrease costs. However, pursuing these benefits does come with some risk. In particular, malware and ransomware have transformed from issues on endpoints to systematic threats to organizations’ suites of cloud apps.

While it may be tempting to run from the cloud (and the threats hiding in its billows), the fact remains that it is a staple of modern business – it’s here to stay. So, enterprises must take steps to understand malware and safely capture the benefits of the cloud. This process is similar to composing a painting in that there are many items to consider when trying to complete a picture of the ideal future. Each piece of secure cloud migration corresponds with one aspect of painting – see how in this two-part blog series.

The Saboteur: Types of Malware
Malware can be thought of as a sly saboteur waiting for an opportunity to throw paint at your canvas and ruin your design.

Malware can be divided into a number of smaller classifications. For example, horror stories often revolve around worms, spyware, trojan horses, ransomware, and many other types of Malware. Despite this lengthy list, two overarching categories are of primary importance. When evaluating malware, one must think in terms of known threats and unknown threats. While a known threat is a common piece of malware that has been seen in the past, an unknown threat (or zero-day threat) is malware that is relatively new and has not yet been identified. Zero-day malware is a particular risk because it is harder to detect – there can be months of damage, theft, and infection before it’s noticed. They each present different challenges and must be addressed in unique ways – as will be discussed in Part Two.

Data Loss Threatens M&A Deals

May 11, 2017 | Leave a Comment

By Jeremy Zoss, Managing Editor, Code42

One of the most popular breakout sessions at Evolution17 featured a great merger and acquisition (M&A) scenario: Midway through the deal, critical information leaks, devastating the value of the deal. How can you figure out how much info leaked—by whom and to whom?

Here’s why that storyline was so riveting: 2016 saw more than $3.5 trillion in M&A deals. And the vast majority of those deals revolved around valuations of intellectual property (IP), which today makes up about 80 percent of a typical company’s value. If you’re a buyer organization, consider these questions:

  • Are you aware of all the IP within the target company?
  • Can you be sure all this IP will come with the deal?
  • Can you be certain it won’t leak to a competitor?

Data loss is a growing M&A problem
For most buyers, the answers to the questions above are no, no and no. This lack of visibility and security for the very assets a company is buying is startling, and it’s increasingly impeding the success of M&A deals. A 2016 survey of dealmakers found that about three in four M&A deals end up getting delayed—sometimes indefinitely—by data loss. Those that eventually get back on track often end up hobbled by missing data. Experts say this is a big part of the reason that 80 percent of M&As fail to achieve their potential or expected value.

M&A amps up the insider threat
Data loss is increasingly common in M&A for the same reason it’s increasingly common throughout the business world: More than half of all enterprise data now lives on endpoints, beyond traditional visibility and security tools centered on a network drive or central server. If the target company can’t see what its employees are doing with data on their laptops and desktops, then a potential buyer has near zero visibility. Couple that with the unique circumstances of an M&A deal and you’ve got a much higher risk of insider data theft. Laid-off employees freely take their endpoint data—sometimes for personal gain, other times just to sabotage their former employer. Those that do stick around tend to feel little loyalty toward their new company, lowering their inhibitions toward selling or taking data for personal gain.

There’s a better way to protect IP during M&A deals
IP is what an acquiring company is buying—the info that is critical to the value and competitive advantage gained through a deal. To make the most of an M&A opportunity, buyers need a better way to collect, protect and secure all data living on a target company’s endpoints—before, during and after a deal. Fortunately, with the right tools, a buyer can gain complete visibility of all endpoint data, take control of valuable IP and drive a deal to its most successful outcome.

Don’t let data loss sink an M&A. Read our new white paper, Best Practices for Data Protection During Mergers and Acquisitions.

What You Need to Know About Changes to the STAR Program

May 9, 2017 | Leave a Comment

By Debbie Zaller, CPA, CISSP, PCI QSA, Principal, Schellman & Co., LLC

The CSA recently announced that the STAR Program will now allow a one-time, first-year only, Type 1 STAR Attestation report. What is a Type 1 versus Type 2 examination and what are the benefits for starting with a Type 1 examination?

Type 1 versus Type 2
There are two types of System and Organization Control (SOC) 2 reports, Type 1 and Type 2. Both types of reports examine a service organization’s internal controls relating to one or more of the American Institute of CPAs’ (AICPA) Trust Services Principles and Criteria, as well as the Cloud Security Alliance’s (CSA) Cloud Controls Matrix (CCM). Both reports include an examination on the service organization’s description of its system.

A Type 1 report examines the suitability of the design of the service organization’s controls at a point in time, also referred to as the Review Date. A Type 2 report examines not only the suitability of the design of controls that meet the criteria but also the operating effectiveness of controls over a specific period of time, also referred to as the Review Period.

In Type 2 examination, the auditor is required to perform more detailed testing, request more documentation from the organization, and spend more time performing a Type 2 examination than with a Type 1 examination. The additional documentation and testing requirements can put a greater strain on an organization and require more resources to complete the audit.

A service organization that has not been audited against the criteria in the past may find it easier to complete a Type 1 examination during the first audit as it requires less documentation, less preparation, and the organization can respond quicker to gaps noted during the examination.

The cost for a Type 1 examination is less than for a Type 2 examination because the examination testing efforts are less than what is needed for a Type 2. Additionally, fewer organization resources will be utilized for a Type 1, resulting in additional cost savings.

If the service organization, or specific service line or business unit of the organization, was recently implemented, the organization would have to not only ensure that controls were put in place to meet the criteria, but also ensure the controls have been operating for a certain period of time prior to completing a Type 2 examination. In this situation, there would not be enough history or length of time for a service auditor to perform a Type 2 examination. A Type 1 examination would allow for a quicker report rather than waiting for the review period in a Type 2 examination.

Benefits of a Type 1
There are several benefits to starting with a Type 1 report that include:

  • Quicker report turn-around time and STAR Registry
  • Shorter testing period
  • Cost efficiencies
  • Easier to apply to new environment or new service line

An organization might be trying to win a certain contract or respond to a client’s request for a STAR Attestation in a short period of time. A Type 1 examination does not require controls to be operating for a period of time prior to the examination. Therefore, the examination and resulting report can be provided sooner to the service organization.

Starting with a Type 1 report has many benefits for a first-year STAR Attestation. The organization will find this useful when moving to a Type 2 examination in the following year.

It is important to note, though, that Type 1 shall be considered just as an intermediate and preparatory step prior to achieving a Type 2 STAR Attestation.

Mind the Gap

May 5, 2017 | Leave a Comment

By Matt Piercy, Vice President and General Manager EMEA, Zscaler

The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture under control but they haven’t looked at the wider picture. The number of threats is increasing every day and as new technologies and opportunities emerge, companies need new security infrastructure to cope with the modifications of the threat landscape. Currently, C-level executives struggle to keep up with the necessity to approve budget requirements to bring their enterprise security up to the next level of protection. If companies are not up to date with the latest trends, businesses are being left more vulnerable to data breached as a consequence.

Executives are well advised to check, whether they have the following points considered in their security shield.
  1. More than 50% of all internet traffic is SSL encrypted today. This may sound secure, but has unfortunately an opposite effect as well. It is too easy to hide modern cyber-attacks in SSL-encrypted traffic as a lot of companies are not inspecting that traffic for various reasons. One may be performance issues of their existing security infrastructure, as SSL-scanning needs high bandwidth and powerful engines. Regulatory reasons may be another excuse, as companies have not yet worked out how they can scan the encrypted traffic compliant with their local regulations. As a consequence over 50% of all internet related traffic remains uninspected for modern malware – and attackers are aware of that situation.
  2. Mobile devices are another issue – with users potentially accessing corrupted websites or applications on devices that are not controlled under the company’s security umbrella. As the mobile user is the weakest link in the security shield, there exists a real danger that an infected mobile device is logging on to the corporate network and allows the malware to spread further. The device could be owned by the employer, and if it isn’t secured, sensitive customer and business data could also be easily retrievable. What is surprising is that despite mobile traffic accounting for more than half of all internet traffic, it isn’t yet thought of as an important part to secure. There are modern security technologies available, that are effectively able to monitor traffic on every device at every location the user is visiting. Organisations need to start thinking about implementing these technologies to close more gaps in their security shield.
  3. Office 365, for all of its success stories as a cloud application, also needs to be considered by security executives. Companies struggle to cope with the increased MPLS network traffic and bandwidth requirements going along with O365, so they might be tempted to break out that traffic directly to the internet where it bounces between users, devices and clouds freely. To avoid devastating effects on an organisation, companies are well advised to think about modernising their security infrastructure to take into account that all locations and branch offices need fast and secure access to the cloud to enable a great user experience.
  4. The incoming EU General Data Protection Regulations (GDPR) will require companies to secure Personal Identifiable information (PII) more than ever before, or risk huge fines as well as subsequent reputational damage in case of a data breach. What is important to note is that even UK companies will have to comply with GDPR after the Brexit if they process personal data of European Citizens. Companies will need to get valid consent for using personal data, hire a data protection officer (DPO), notify the local data protection watchdog when they have been hit with a data breach and perhaps most crucially companies could be fined up to €20m or 4% of their annual turnover if they are breached. With so much to do, businesses need to do their homework to ensure they’re compliant by May 2018.

Companies are setting off on their path towards digital transformation. They do well, if they start considering security requirements going along with the needs of a modern world before they set off on that path.

How to Choose a Sandbox

April 24, 2017 | Leave a Comment

Grab a shovel and start digging through the details

By Mathias Wilder, Area Director and General Manager/EMEA Central, Zscaler

Businesses have become painfully aware that conventional approaches — virus signature scanning and URL filtering — are no longer sufficient in the fight against cyberthreats. This is in part because malware is constantly changing, generating new signatures with a frequency that far outpaces the updates of signature detection systems. In addition, malware today tends to be targeted to specific sectors, companies, or even individual members of a management team, and such targeted attacks are difficult to spot. It has become necessary to use state-of-the-art technology based on behavioral analysis, also known as the sandbox. This blog examines how a sandbox can increase security and it looks at what to consider when choosing a sandbox solution.

The sandbox as a playground against malware
Zero-day ransomware and new malware strains are spreading at a frightening pace. Due to the dynamic nature of the attacks, it is no longer possible to develop a signature for each new variant. In addition, signatures tend to be available only after malware has reached a critical mass — in other words, after an outbreak has occurred. As malware changes its face all the time, the code is likely to change before a new signature for any given type of malware can be developed, and the game starts from scratch. How can we protect ourselves against such polymorphous threats?

There is another trend that should influence your decision about the level of protection you need: malware targeted at individuals. It is designed to work covertly, making smart use of social engineering mechanisms that are difficult to identify as fake. It only take a moment for a targeted attack to drop the harmful payload — and the amount of time between system infection and access to information is getting shorter all the time.

What is needed is a quick remedy that does not rely on signatures alone. To detect today’s amorphous, malicious code, complex behavioural analysis is necessary, which in turn requires new security systems. The purpose of a sandbox is to analyse suspicious files in a protected environment before they can reach the user. The sandbox provides a safe space, where the code can be run without doing any harm to the user’s system.

The right choice to improve security
Today’s market appears crowded with providers offering various solutions. Some of them include virtualization technology (where an attack is triggered through what appears to be virtual system) or a simulated hardware solution (where the malware is offered a PC), through to solutions in which the entire network is mapped in the sandbox. However, malware developers have been hard at work, too, and a well-coded package can recognize whether a person is sitting in front of the PC, it can detect if it’s in a virtual environment in which case it can alter its behavior, and it can undermine the sandboxing measures by delaying activation of the malicious code after infection. So, what should companies look for when they want to enhance their security posture through behavioral analysis?

What to look for in a sandbox

  • The solution should cover all users and their devices, regardless of their location. Buyers should check whether mobile users are also covered by a solution.
  • The solution should work inline and not in a TAP mode. This is the only way one can identify threats and block them directly without having to create new rules through third-party devices such as firewalls.
  • First-file sandboxing is crucial to prevent an initial infection without an existing detection pattern.
  • It should include a patient-zero identification capability to detect an infection affecting a single user.
  • Smart malware often hides behind SSL traffic, so a sandbox solution should be able to examine SSL traffic. With this capability, it is also important to look at performance, because SSL scanning drains a system’s resources. With respect to traditional appliances, a multitude of new hardware is often required to enable SSL scanning — up to eight times more hardware, depending on the manufacturer.
  • In the case of a cloud sandbox, it should comply with relevant laws and regulations, such as the Federal Data Protection Act in Germany. It is important to ensure that the sandboxing is done within the EU, ideally in Germany. The strict German data protection regulations also benefit customers from other EU countries.
  • A sandbox is not a universal remedy, so it should, as an intelligent solution, be able to work with other security modules. For example, it is important to be able to stop the outbound traffic to a command-and-control (C&C) centre in the case of an infection. In turn, it should be possible to turn off the infected computer by tracing back the C&C communication.

Putting it all together
All these criteria can be covered by an efficient and highly integrated security platform, rather than individual hardware components (“point” appliances). One advantage of such a model is that you get almost instantly correlated logs from across the security modules on the platform without any manual interaction. If a sandbox is part of the platform, the interplay of various protection technologies through the automated correlation of data ensures faster and significantly higher protection. This is because it is no longer necessary to feed the SIEM system manually with logs from different manufacturers.

Platform models do not lose any information as they allow all security tools — such as proxy, URL filters, antivirus, APT protection, and other technologies — to communicate with one another. It eliminates the time-consuming evaluation of alerts, as the platform blocks unwanted data extraction automatically. A cloud-based sandbox together with a security platform is, therefore, an effective solution. It complements an existing security solution by adding behavioral analysis components to detect previously unknown malware and strengthens the overall security posture — without increasing operating costs.

Self-Driving Information Security

April 21, 2017 | Leave a Comment

By Jim Reavis, Co-founder and CEO, Cloud Security Alliance

The prospects of autonomous self-driving vehicles becoming a pervasive presence on our roadways seems more likely everyday. From the big automakers to Tesla to Google to Uber, a wide range of companies are investing a tremendous amount of money to create a world without carbon-based drivers. The motivation for a big payday abounds, but the hope is that this will be a huge boon to vehicle safety, and I believe it ultimately will be. As we have learned at hacker conferences, there are a lot of security concerns about self-driving cars that we need to solve, but that is not what I want to talk about here.

What I would like to do here is steal the term from the automotive industry and apply “Self Driving” to Information Security. What is Self-Driving Information Security? For me, this is an initiative to apply the ever growing power of computing to solve complex and fast changing information security problems dynamically and without human intervention. Do I believe we can eliminate humans from the information security industry? No, I don’t believe that is possible or desirable, and it certainly would make BlackHat a lot less fun. However, I think we need to rapidly take steps to push the envelope on where we can take the person out of the loop, simply because we are not going to have enough humans to go around and insert into every potential security problem space. In a world where we will soon have thousands of Internet connected devices for every person on Earth, it’s highly unlikely we will have enough information security professionals to go around to solve all of the resultant problems.

Automation is a very old idea that is present in every industry. In information technology, we seek to automate every repetitive task we can. But like in other industries, the explosion in compute power is causing us to explore automating ever more sophisticated tasks. It is no longer just assembly line robots, but advances in computing are taking on white collar jobs and in many cases doing a great job. Computers are diagnosing diseases more accurately than doctors. Computers are doing journalism and even taking on the legal profession.

Are you a skeptic in regards to computer encroachment on sophisticated and complex professions? One of the most seminal moments in computing history that impacted me was the chess contest between Garry Kasparov and IBM Deep Blue. Personally, I was rooting for the human until the bitter end. When Deep Blue ultimately defeated the world’s greatest chessmaster, I was in mourning for days. That was 20 years ago.

To be clear, Self-Driving Information Security will not be bereft of humans. Humans are the biggest part of information security today by any measure – clearly by the budgetary metric. I think we will continue to grow the overall number of people employed in the profession for the foreseeable future. The unpredictability of information security and its adversarial, logic-defying nature will require humans. But Self-Driving Information Security will gobble up the jobs we are doing today, and I am not quite sure what jobs we will be doing in the future. What I do know is, if we do not implement Self-Driving Information Security, we are going to drown in information and incidents.

What are some of the building blocks of Self-Driving Information Security? It is actually many things we are working on today, they just need to gain maturity:

DevSecOps. This idea of merging DevOps with Security Operations, enabled by cloud, is gaining in popularity with very diverse security teams. The ability to tear down and instantiate new computing systems, using “serverless” capabilities and applying some imagination is leading to automation of security process that can seem like magic to an old security guy like me.

Autonomics. The ability for computers be self-managing, self-healing, self-optimizing – self-EVERYTHING is important. A big part of how the Internet works today is through some levels of hierarchy and “command and control” systems. Clearly this model is going to break. I think about the apartment of the future with thousands of computers. Then I think about the bad guy that attacks the upstream link or servers. Or perhaps malware is injected into one of the apartment’s devices. In both cases, the nodes must not only be resilient and independent, but may need to collaborate and attack the infected device.

Blockchain. The distributed, immutable ledger technology that underpins Bitcoin is a favorite of VCs and the finance industry. I believe we are going to find a lot of applications for Bitcoin in information security. An authoritative, tamper-proof log of transactions which can be either public or private has fascinating implications. We can record any change in a very granular manner. I think about IT audit and having a record of all security control implementations, it can really change how that job is done.

Analytics. Data Science. The answers are in the data. If the data sets are large enough, if the quality is good enough and if the algorithms are well designed and speedy, we will find the security answers we are looking for. I believe our massive and inexpensive compute infrastructure is going to excel in finding the right answer to a new security problem

Artificial Intelligence. AI is certainly controversial, even trying to define it can cause fights. Many are terrified by AI and its potential threat to mankind. Some security solutions claim to use AI, others say that the current products are really employing machine learning. Closely related to analytics, having access to quality data is going to enable AI to make security decisions and take action before a human can blink.

In addition to all of these areas of focus, it is safe to assume that computing is going to get faster, cheaper and bigger at an ever-increasing pace. Quantum computing may be years away, but there are already serious efforts in government and industry to make a massive leap in computational speed. It’s also safe to assume that the bad guys will want to harness or exploit all of these trends for themselves.

The building blocks above will soon be assembled together into Self-Driving Information Security. It will be quite necessary for this to happen to manage our rapidly increasing compute universe. The jobs we know today will go away. I am convinced new jobs will replace them in greater numbers, but it may be messy. The paradox of automation is that humans will operate in a world with more layers of complex technical abstraction. We aren’t as intimately involved, but when we are needed, it is for more critical reasons.

At Cloud Security Alliance, we think it is important to be considering these trends now to be true to our mantra of “solving tomorrow’s problems today”. That’s why we have research in all of these areas happening in 2017. As always, our research is your research and we encourage you to join us.

 

There May Be a Shark Circling Your Data

April 17, 2017 | Leave a Comment

By Jacob Serpa, Product Marketing Manager, Bitglass

In today’s business environment, cybersecurity remains a topic of great importance. As more companies migrate to the cloud, security concerns continue to evolve. While BYOD (bring your own device) affords employees more flexibility as they work from a multitude of devices, it also exposes data to nefarious parties in new ways. In the face of increasingly sophisticated cyber attacks, companies must learn and adapt or suffer the consequences.

In its latest cybersecurity report, “Threats Below the Surface,” Bitglass discusses the results of its survey of over 3,000 IT professionals. With the help of the CyberEdge Group and the Information Security Community, Bitglass was able to uncover the threats, priorities, and capabilities seen as most relevant by these professionals. The fact that the last year has seen 87% of organizations become victims of cyber attacks (and that a third of those organizations were hacked over five times) lends credence to cybersecurity concerns.

Despite the importance of maintaining visibility into data usage, relatively few firms are doing it well. While over 60% of companies monitor their desktops, laptops, and networks for security threats, the percentage drops to 36% for mobile devices and 24% for SaaS and IaaS applications. As organizations (inevitably) adopt BYOD and public cloud apps for increased productivity, they should proactively monitor for the corresponding security risks. However, when the survey respondents were asked about their firms’ current security postures, they indicated that they were primarily concerned about vulnerability with respect to mobile devices. Other prominent concerns included malware, privacy, and data leakage.

While most companies plan to increase their security budgets for next year, they should already be taking steps to ensure cybersecurity systems that consider contemporary tools like the cloud and BYOD. In particular, firms should be utilizing end-to-end solutions that secure data on devices, in transit, and at-rest in the cloud, while addressing concerns about topics like privacy.

More and more, conscientious companies are turning to CASBs (Cloud Access Security Brokers) and UEBA (user and entity behavior analytics) for modern-day cybersecurity. CASBs allow for discovering shadow IT apps, ensuring regulatory compliance in the cloud, preventing unwanted data disclosures, and more. With UEBA, a core component of CASBs, enterprises can detect account hijacking, data exfiltration, and other threats. CASBs and UEBA give companies a great deal of visibility and control over their data – a huge help in keeping an eye on the threats below the surface.