Charles Leaver – We Are Entering The Third Phase Of Cyber Security And It Is People Focussed

Written By Kyle Flaherty And Presented By Charles Leaver Ziften CEO

Cyber attack effect on companies is often straightforward to determine, and the vendors of tech services are constantly displaying different stats to show that you need to acquire their most current software (including Ziften). However one fact is extremely shocking:

In The Previous Year Cyber Crime Cost Businesses $445 Billion And Cost 350,000 People Their Employment.

The monetary losses are easy to take on board although the quantity is large. However the second part is worrying for all connected with cyber security. Individuals are losing their employment because of what is happening with cyber security. The circumstances surrounding the job losses for all of these individuals is unidentified, and some could have deserved it if they were negligent. However the most interesting feature of this is that it is well known that there is a lack of gifted individuals who have the capability to fight these cyber attacks.

While individuals are losing their positions there is also a demand that more talented individuals are found to prevent the ever increasing hazard of cyber attacks. There is no argument that more people are required, and they need to be more talented, to win this war. But it is not going to take place today, tomorrow or perhaps this year. And while it would be wonderful if a truce could be negotiated with the cyber hackers until these resources are offered, the reality is that the battle should go on. So how do you fight?

Utilize Technology To Enable, Not Disable

For years now vendors of security tech have been offering technology to “prevent and block” cyber attacks. Then the suppliers would return later on to offer the “next generation” solution for preventing and stopping cyber attacks. And after that a couple of years later they were back once again to offer the latest technology which concentrated on “security analytics”, “risk intelligence” and “operational insight”.

In every circumstance businesses purchased the current technology and then they had to add expert services and even a FTE to run the technology. Of course each time it took a significant amount of time to become up to speed with the brand-new technology; a team that was experiencing high turnover because of the competitive nature of the cyber market. And while all of this was going on the attacks were becoming more consistent, more advanced, and more regular.

It has to do with Individuals Using Technology, Not The Other Way Around

The problem is that all of the CISO’s were focussed on the technology initially. These companies followed the classic design of seeing an issue and creating technology that might plug that hole. If you think about a firewall, it literally builds a wall within technology, utilizing technology. Even the SIEM technology these organizations had installed was focused primarily on all the various connectors from their system into other systems and collecting all that info into one place. However what they had rather was one place since the technology centric minds had forgotten an important component; individuals involved.

Humans are constantly good at innovating when confronted with threat. It’s a biological thing. In cyber security today we are seeing the 3rd phase of innovation, and it is focused on individuals:

Phase 1 Prevent by developing walls
Phase 2 Detect by building walls and moats
Phase 3 View, examine, and react by analyzing user habits

The reason that this needs to be centered on people is not just about skill lacks, but due to the fact that people are actually the problem. People are the cyber hackers as well as the ones putting your organization at risk at the endpoint. The technologies that are going to win this fight, or at least enable survival, are the ones that were developed to not just enhance the capabilities of the person on the other side of that keyboard, however likewise focus on the habits of the users themselves, and not just the technologies themselves.

 

Leave a Reply

Your email address will not be published. Required fields are marked *