How Firms Can Prepare for Massive NSA Breach Consequences
Recently, the U.S. National Security Agency was disastrously compromised, flooding the dark web with its own cyberweapons that are now available to…
December 04, 2017 at 04:10 PM
9 minute read
The original version of this story was published on Law.com
Recently, the U.S. National Security Agency was disastrously compromised, flooding the dark web with its own cyberweapons that are now available to the highest bidder. This raises critical questions for firms, which now find themselves in the crosshairs of the very weapons meant to protect them. Now, it is every firm for itself in this new “Wild West” of global cyberwarfare.
So how can businesses survive this dangerous new environment? The short answer is community intelligence–one of the key problems for large organizations is the uneven distribution of knowledge. Data networks often are sprawling constructions, haphazardly thrown together as business functions and scope change over time. And, this can lead to a situation in which the CSO or CIO doesn't know where the most sensitive data is located or who has access to it.
Kurt Long, CEO of data protection firm FairWarning, sat down with Inside Counsel to discuss how businesses can prepare for the NSA breach consequences. He shared an analysis of the newest strategies business institutions are taking to protect their data, and to deter and catch the most sophisticated adversaries.
According to Long, the NSA breach should raise several questions for firms regarding the security of their data. While organizations may not have top secret cyber-weapons data like the NSA, they have data that is business-critical to their organization and is essential to protect. So, the first question should be, “What is my most sensitive data and where is it?” In order to secure the most valuable data, they have to know where it lies. The next question should be, “Who has access to this data?”
“No longer can organizations and government institutions rely solely on security that thwarts outside attackers. The greatest threats to an organization often lie inside their four walls and in their business network,” he explained. “Due to the interconnectivity of technologies, third party vendors, contractors, employees and affiliates oftentimes have access to sensitive information. It's essential to monitor all user activity in order to sanction and train malicious or careless users.”
These days, cybercriminals have scaled their attacks and crime, just like a legitimate business, would scale their own operations. From soliciting insiders on the dark web at a scale never imaginable before, to DDoS attacks, malware, ransomware and phishing–the scope of the attacks have become unmanageable. Our own intelligence agencies and government institutions, the NSA and the Department of Homeland Security, have not been successful in securing their organizations' critical data. So firms must to create a multilayer strategy where every layer of security is addressed to prevent such attacks. In fact, according to an IBM report, 60 percent of all cybersecurity attacks are caused by employees inside an organization, with 44.5 percent being malicious insiders and 15.5 percent being inadvertent actors.
There's a common misconception that the larger your business, the more vulnerable to attacks you are. According to Long, yes, large businesses often have a larger web of interconnected business networks and employees, creating opportunity for a vulnerability or attack. However, SMBs are being targeted by cybercriminals even more than larger organizations, with 60 percent of SMBs shutting down within six months of a breach, according to the U.S. National Cyber Security Alliance. SMBs often-times feel impervious to cyberattacks due to the idea that they don't possess valuable data for hackers and takers to extract, but the reality is that through third party vendors and the interconnectivity of business, SMBs offer a doorway into their data and the larger organizations they are connected to.
“Surviving in the current threat landscape means taking a proactive, multilayered approach to security where your workforce is your most powerful asset,” said Long. “To get started, organizations should: conduct a risk a to assessment where their data and organization is most vulnerable; implement user behavioral analytics and auditing to ensure safety and mission-critical applications and systems; maintain proper perimeter security, firewalls and patches; prepare an incident response plan for the worst-case scenario; and educate and train employees to empower them to become your best line of defense.”
Today, machine learning and community intelligence can be used hand in hand as a powerful tool to bolster security. Machine learning uses technology to analyze and record employees' past behavior in order to predict future behavior. In doing so, false positives can be filtered out and recorded as normal business operations. So why does this matter? Long said, “Security and privacy professionals can take time back in their day and focus on security incidents that demand their attention and pose true threat to the organization.”
Amanda G. Ciccatelli is a Freelance Journalist for Corporate Counsel and InsideCounsel, where she covers intellectual property, legal technology, patent litigation, cybersecurity, innovation, and more.
Recently, the U.S. National Security Agency was disastrously compromised, flooding the dark web with its own cyberweapons that are now available to the highest bidder. This raises critical questions for firms, which now find themselves in the crosshairs of the very weapons meant to protect them. Now, it is every firm for itself in this new “Wild West” of global cyberwarfare.
So how can businesses survive this dangerous new environment? The short answer is community intelligence–one of the key problems for large organizations is the uneven distribution of knowledge. Data networks often are sprawling constructions, haphazardly thrown together as business functions and scope change over time. And, this can lead to a situation in which the CSO or CIO doesn't know where the most sensitive data is located or who has access to it.
Kurt Long, CEO of data protection firm FairWarning, sat down with Inside Counsel to discuss how businesses can prepare for the NSA breach consequences. He shared an analysis of the newest strategies business institutions are taking to protect their data, and to deter and catch the most sophisticated adversaries.
According to Long, the NSA breach should raise several questions for firms regarding the security of their data. While organizations may not have top secret cyber-weapons data like the NSA, they have data that is business-critical to their organization and is essential to protect. So, the first question should be, “What is my most sensitive data and where is it?” In order to secure the most valuable data, they have to know where it lies. The next question should be, “Who has access to this data?”
“No longer can organizations and government institutions rely solely on security that thwarts outside attackers. The greatest threats to an organization often lie inside their four walls and in their business network,” he explained. “Due to the interconnectivity of technologies, third party vendors, contractors, employees and affiliates oftentimes have access to sensitive information. It's essential to monitor all user activity in order to sanction and train malicious or careless users.”
These days, cybercriminals have scaled their attacks and crime, just like a legitimate business, would scale their own operations. From soliciting insiders on the dark web at a scale never imaginable before, to DDoS attacks, malware, ransomware and phishing–the scope of the attacks have become unmanageable. Our own intelligence agencies and government institutions, the NSA and the Department of Homeland Security, have not been successful in securing their organizations' critical data. So firms must to create a multilayer strategy where every layer of security is addressed to prevent such attacks. In fact, according to an IBM report, 60 percent of all cybersecurity attacks are caused by employees inside an organization, with 44.5 percent being malicious insiders and 15.5 percent being inadvertent actors.
There's a common misconception that the larger your business, the more vulnerable to attacks you are. According to Long, yes, large businesses often have a larger web of interconnected business networks and employees, creating opportunity for a vulnerability or attack. However, SMBs are being targeted by cybercriminals even more than larger organizations, with 60 percent of SMBs shutting down within six months of a breach, according to the U.S. National Cyber Security Alliance. SMBs often-times feel impervious to cyberattacks due to the idea that they don't possess valuable data for hackers and takers to extract, but the reality is that through third party vendors and the interconnectivity of business, SMBs offer a doorway into their data and the larger organizations they are connected to.
“Surviving in the current threat landscape means taking a proactive, multilayered approach to security where your workforce is your most powerful asset,” said Long. “To get started, organizations should: conduct a risk a to assessment where their data and organization is most vulnerable; implement user behavioral analytics and auditing to ensure safety and mission-critical applications and systems; maintain proper perimeter security, firewalls and patches; prepare an incident response plan for the worst-case scenario; and educate and train employees to empower them to become your best line of defense.”
Today, machine learning and community intelligence can be used hand in hand as a powerful tool to bolster security. Machine learning uses technology to analyze and record employees' past behavior in order to predict future behavior. In doing so, false positives can be filtered out and recorded as normal business operations. So why does this matter? Long said, “Security and privacy professionals can take time back in their day and focus on security incidents that demand their attention and pose true threat to the organization.”
Amanda G. Ciccatelli is a Freelance Journalist for Corporate Counsel and InsideCounsel, where she covers intellectual property, legal technology, patent litigation, cybersecurity, innovation, and more.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLegal Departments’ Lack of Third-Party Oversight Leaving Small, Midsized Banks Exposed
4 minute readTen Best Practices to Protect Your Organization Against Cyber Threats
7 minute readSEC Fines 4 Companies $7M for Downplaying Breaches Tied to Massive SolarWinds Hack
Trending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250