How Cyber Visibility Protects Against the Abnormal & the Immoral

Another day, another breach. For many Bostonians, the “privacy incident” recently disclosed by Massachusetts General Hospital (MGH)—which reportedly involved the personal information of 4,300 dental patients stored by a software vendor—hit close to home in many ways, as most of us have at one time or another been to MGH for ourselves or a loved one. It’s an institution in these parts. That’s why the thought of a data breach is troubling indeed.

For those of us who are focused on stopping these types of incidents, it’s even more troubling, as we are seeing them more often. So far in 2016 there have been over 500 breaches, resulting in the exposure of more than 12.8 million records, according to the Identity Theft Resource Center. The increase in the number of breaches has hit an alarming rate, which, if it continues, could lead to all medical records being compromised in just a few years’ time.

The problem comes down to a widening gap between the capabilities of existing cybersecurity solutions and the advanced threats they are expected to stop. In many cases, companies are not aware that a breach even occurred until they are notified by law enforcement. Industry data suggest that it takes 200 days for most breaches to be discovered, giving the bad guys plenty of time to do damage.

The oft-exploited characteristic of existing cyber solutions is that they follow a set of rules based on the types of attacks that have occurred previously. The attackers know this, and adapt their approaches to defeat these rigid rule sets. This forces the organization to chase the attacks with new rules—which are put in place after the fact and may just be “too little, too late.” Simply put, the threats are continually evolving, and the solutions are not keeping up.

Clearly, a new approach is needed.

We believe that the next generation of solutions that can adapt and discern new threat behaviors are far better suited to identify and stop these threats based on their ability to “learn” what normal behavior looks like for an organization’s users, applications, and devices on the network. By understanding what normal looks like, identifying the abnormal behaviors becomes much more straightforward.

Understanding Risk

While no single solution represents the Holy Grail of network security, there are a number of things that organizations can do proactively to bolster their defenses. The single most important thing an organization can do is to get a sense of its own specific areas of risk so that it can better understand where the chinks in the armor might be. Security solutions that also provide a measure of an organization’s cyber risk profile are long overdue. This involves gaining true visibility into how users, applications, and devices are interacting and what behaviors are risky in terms of cybersecurity or policy violations. Fortunately, such solutions are now available, allowing an organization to compare its own profile against pre-determined “risk indexes” based on industry benchmarks. This finally provides the answer to the question: How safe are we?

In order to protect the organization from losing the data—and trust—as a result of a breach like the one involving MGH, business leaders and security professionals need cybersecurity solutions that keep pace with the advanced threats they will continue to face and protect themselves at an acceptable level of risk against both the abnormal and the immoral.

Author: Gary Southwell

Gary Southwell is co-founder and chief strategy officer for Seceon, a threat detection and management company that aims to visualize, detect, and eliminate cyber threats in real-time. Gary is an industry leader with more than 25 years of strategic business and security product planning experience. Gary has continuously worked on the forefront of delivering new product concepts and industrial innovations and is responsible for driving Seceon’s pending patents in regards to advances in threat modeling with applied behavioral analytics. Gary’s vision took acquired technologies from NetScreen security and created solutions requirements and led the team on execution to drive significant revenue growth for security product line by making its part of partners’ multi-media and SP mobility solutions. Gary served as CTO at BTI systems and was responsible for defining new technologies and pioneering big data concepts for intelligent secured content delivery architecture. As an original founder of the Metro Ethernet Forum, Gary wrote the original contributions that defined the requirements for Carrier Ethernet services. Gary defined the product requirements behind the Ciena Flex Select Architecture, which has contributed over $1 billion for Ciena. At Juniper, Gary was GM for the solutions architecture team. Gary works closely with customers, partners and internal team on behavioral models for users and systems in content of applications and workflow.