Thursday, October 9, 2014

Information Security:  What’s Old Is New Again

Cyber-attacks with accompanying data breaches have become headline news with increasing frequency.  These reports have resulted in a pervasive state of panic among corporations, especially those whose business is financial services, as well as across the general public.  The attacks are occurring more frequently and becoming more costly in dollars and reputation for the targeted companies.  Indications are that the situation will only worsen over time.

Why, one might ask, have the attackers been so successful of late?  Have the attackers developed some advanced methods requiring combatant capabilities that have yet to be discovered?  Are we doomed to have our valuable information pillaged and plundered by criminals?  I have read about “Heartbleed” and the Target breach, as well as the JP Morgan and Home Depot breaches, and discovered that no new security tools or methods would have been required to prevent them.  The methods to prevent and defend against cyber attacks are known and the tools are available and in many cases already installed.  So, what is the problem?  Jaime Diamond of JP Morgan Chase hit the nail on the head when he said “JP Morgan plans to spend $250 million on digital security annually, but had been losing many of its security staff to other banks over the last year, with others expected to leave soon” (quoted from the New York Times Deal Book, October 2, 2014).  Although his statement pertains to JP Morgan in particular, it is actually indicative of the problem of companies providing information security in general.  Information Security within corporations has typically been understaffed and underfunded. 

Historically it has been extremely difficult for Information Security departments to demonstrate the need and urgency of allocating funds and hiring sufficient staff to fully support the function.  It’s been a bit like convincing someone to buy an insurance policy to protect against some potential event that may never occur.  Businesses will opt to put their money toward the things they know they can accomplish, rather than on things that are doubtful.  So, when it’s time to tighten the belt, the Information Security budget is a prime target, and when it’s deemed time to down-size or right-size, Information Security staff are likely the first to go.

Two events have occurred in recent years that are beginning to affect this corporate stance.  First there is the fact that regulations now require corporations to notify customers when they’ve experienced a data breach.  The second is that the volume and frequency of successful attacks is on the rise.  The result of the two events is that corporations have been forced into the un-wanted limelight, clouding their reputation, costing them customers and inviting the scrutiny of government regulators.  I believe this situation will drive a change in perspective toward the need and urgency of information security.

We have come to an unfortunate state of affairs, but it may be the beginning of a new day for information security; one in which adequate staff and funding are provided to enable development of repeatable processes and controls, as well as effective use of tools to build the strong defenses needed to combat the cyber attackers.

No comments:

Post a Comment