• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Log4j lesson: Cybersecurity defense isn’t just about tech

Log4j lesson: Cybersecurity defense isn’t just about tech

January 23, 2022
Donald Trump and the Romance of Regime Change

Why Would John Eastman Want to Overturn an Election for Trump?

May 25, 2022
This is how Florida educators are fighting back against ‘Don’t Say Gay’

This is how Florida educators are fighting back against ‘Don’t Say Gay’

May 25, 2022
What HIV can teach us about how to handle monkeypox

What HIV can teach us about how to handle monkeypox

May 25, 2022
An Evening Spent Contemplating “Literary Service”: Inside the PEN America Literary Gala

An Evening Spent Contemplating “Literary Service”: Inside the PEN America Literary Gala

May 25, 2022
Join Us for Closing the Gap on Climate Inequity, a Times Virtual Event on Climate Change

Join Us for Closing the Gap on Climate Inequity, a Times Virtual Event on Climate Change

May 25, 2022
No Man’s Sky is finally adding what players demand: space whales 

No Man’s Sky is finally adding what players demand: space whales 

May 25, 2022
Mythical Games will make NFL Rivals blockchain football game

Mythical Games will make NFL Rivals blockchain football game

May 25, 2022
NY State is giving out hundreds of robots as companions for the elderly

NY State is giving out hundreds of robots as companions for the elderly

May 25, 2022
Brussels to make skirting sanctions an EU-wide crime

Brussels to make skirting sanctions an EU-wide crime

May 25, 2022
Huge chocolate recall: If you have any of these 18 chocolates, throw them out now

Huge chocolate recall: If you have any of these 18 chocolates, throw them out now

May 25, 2022
Man freed from prison has first birthday cake in 44 years

Man freed from prison has first birthday cake in 44 years

May 25, 2022
Boris Johnson’s staff got drunk, brawled and abused cleaners during Covid lockdowns, damning report finds

Boris Johnson’s staff got drunk, brawled and abused cleaners during Covid lockdowns, damning report finds

May 25, 2022
DNYUZ
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Music
    • Movie
    • Television
    • Theater
    • Gaming
    • Sports
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel
No Result
View All Result
DNYUZ
No Result
View All Result
Home News

Log4j lesson: Cybersecurity defense isn’t just about tech

January 23, 2022
in News, Tech
Log4j lesson: Cybersecurity defense isn’t just about tech
510
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Aside from stolen data and money, perhaps the greatest impact of massive attacks like SolarWinds, Colonial Pipeline, and the current Log4j vulnerability, is that people are beginning to realize that cyber attacks and cyber damages are inevitable. But while breaches have always been as sure as death and taxes, we can reduce the frequency and success of disruptive events, and control the degree to which they cause a negative impact. ­­­­

Despite what most vendors and pundits will tell you, the answer isn’t simply “buy more tools.” Though technology and tooling play a valuable role in protecting an organization, we don’t talk enough about the non-tech tactics businesses can take to improve their security stance. Based on my experience as a CISO and a former incident responder, I want to offer advice on practices I think IT and security teams should consider in order to reclaim control and take a more proactive approach to cybersecurity.

Best practices to consider

1. Build a diverse team

The security industry is largely homogenized. For example, women make up only 20% of the information security workforce. Women and minority groups are wildly under-represented in the field, and that needs to change not only to help relieve the skills shortage but also to create higher performing teams. You don’t want a group of people with similar backgrounds who think the same way. By bringing in a more diverse group of people, you’ll have more perspectives — people who will challenge your assumptions and introduce new ways of thinking. In a fast-moving, always-changing field like cybersecurity, that’s exactly what you need.

This work starts in the hiring process. Aim to foster a talent pipeline that’s diverse across gender, age, experience, education, geography, race, and orientation. And if you’re still clinging to the fear that prioritizing diversity could lead to “missing out” on more qualified candidates, it’s time to let go. There are plenty of incredibly qualified diverse candidates; you just need to put in the effort to find them.

Lastly, consider whether you need to hire security practitioners (those with existing experience or those with relevant degrees), or whether you can hire adaptable critical thinkers and provide the necessary “cyber” training.  Expanding your aperture for what is considered a “qualified” candidate, especially for more junior roles, will yield a far more diverse workforce.

2. Don’t be afraid to outsource

The skills gap in cybersecurity has been discussed for years, but unfortunately, it’s only becoming more acute. Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity jobs by the end of 2021. I know that those in the infosec field are notoriously paranoid and distrustful — those traits are often beneficial in our line of work! — and want to keep as much work in-house as possible. But my advice, especially to smaller organizations, is to strongly consider bringing on a managed service provider to help bolster your team. Organizations can not allow themselves to be short-staffed in IT and security roles, and MSPs offer a quality complement to your existing team. The key is ensuring you’re doing excellent vetting, getting peer references, ensuring your MSP has a proven security practice, and still maintaining enough knowledgeable internal talent to exercise oversight for your outsourced services.

3. Train like you fight

Tooling is important, but nothing is more important than your people on the ground. Based on my experience as a security engineer and investigator earlier in my career and now as a leader, you need to train like you fight and fight like you train. The most critical skills you need to train for are incident response and crisis management. Red team/blue team, capture the flag (CTF), and tabletop exercises are excellent simulations to help you do this. In addition to testing the strength of your organization’s security capabilities, these exercises can tell you a lot about your team. Who is good under pressure? Who emerges as a leader? How does your team adapt and communicate when faced with obstacles? Perhaps most importantly where do you have gaps in your existing plans? From there, you can organize your team in a way that leaves you best prepared if and when a real attack takes place.

Assumptions to (re)consider

The three points above are practices that can help organizations improve their cybersecurity posture. Additionally, I believe it’s necessary to evolve some of our outdated cybersecurity assumptions, including the following tired tropes we need to retire this year.

  • “Security is everyone’s job” — This is true in many respects. Every single employee must be vigilant and play an active role in ensuring a more secure enterprise, but we do very little to help people contextualize their role in security. Most people don’t see themselves as targets because they’re not “important enough,” when in reality they might just be a convenient path to attack the ultimate victim. We also need more people whose sole job is cybersecurity. The skills shortage is an existential threat, and it should be a CEO and board priority to hire, recruit, and retain as many cybersecurity professionals as possible in 2022.
  • “People are the weakest link” — People are attack entry points and do make mistakes (like clicking on phishing emails, which is unfortunately still too common), but this argument overlooks and de-emphasizes the many weaknesses and vulnerabilities in hardware and software. How many security updates has Zoom or Microsoft issued in the last month, for example? Answer: A lot. Employees are still our greatest protectors in many cases, so don’t disempower or shame them. Let’s compassionately provide employee cyber education training, and not turn a blind eye to other weak links in the chain. 

The hypercompetitive cybersecurity industry often devolves into “silver bullet” promises that X or Y solution alone can “save your organization.” Technology is imperative to cybersecurity, and there’s incredible innovation being done by vendors that will help businesses protect their infrastructure, assets, employees, and customers. But remember that technology alone is insufficient. Building a proactive, effective cybersecurity playbook will always boil down to people and practices.

Chris Hallenbeck is Chief Information Security Officer for the Americas at Tanium. He previously worked at the U.S. Department of Homeland Security’s US-CERT, where he designed and built incident response capabilities and restructured the team’s focus toward strategic remediation with a goal of building more resilient organizations. Prior to that, he worked for RSA Security as a security engineer and with AOL/Time Warner on their global incident response team.

The post Log4j lesson: Cybersecurity defense isn’t just about tech appeared first on Venture Beat.

Share204Tweet128Share

Trending Posts

Tim Roth Replaces Ian McShane In Paramount+ Australia Drama ‘Last King Of The Cross’; Star Exits Over “Health Concerns”

Tim Roth Replaces Ian McShane In Paramount+ Australia Drama ‘Last King Of The Cross’; Star Exits Over “Health Concerns”

May 25, 2022
A Chat With Barry Bonds Helped Joc Pederson Sink the Mets

A Chat With Barry Bonds Helped Joc Pederson Sink the Mets

May 25, 2022
Stacey Abrams isn’t the candidate the media hyped her up to be: Erickson

Stacey Abrams isn’t the candidate the media hyped her up to be: Erickson

May 25, 2022
How Contagious Is Monkeypox? R Number vs. COVID

How Contagious Is Monkeypox? R Number vs. COVID

May 25, 2022
Biden Administration, Settling a Long Fight, Plans to Block a Mine in Alaska

Biden Administration, Settling a Long Fight, Plans to Block a Mine in Alaska

May 25, 2022

Copyright © 2022.

Site Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Gaming
    • Music
    • Movie
    • Sports
    • Television
    • Theater
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel

Copyright © 2022.