INTERvIEW WITH PETER WOOdS, CEO, FIRST BASE

Interview with Peter Woods, CEO,
First Base Technologies
BCS Editor-in-Chief, Henry Tucker, recently caught up with security expert Peter Woods, CEO of First Base
Technologies, an ethical hacking firm, to talk about hacking, penetration testing, advanced persistent threats
and possible government transparency regarding the data it holds on everyone.
Explain what you do.
Our firm is an independent testing
organisation. We provide what we call
a simulated criminal attack for clients
and obviously with their permission and,
obviously within the law, but as best we
can, we test their systems, their people,
their premises, to make sure they’re
resistant to attack and, if they’re not, then
we give some guidance as to how that
might be improved before they suffer a
real criminal attack.
Is there an ethical difference between
hacking and penetration?
I think it depends on who you talk to. In
our view, often penetration testing means
running some tests against a check list or
a clear requirement for a specific system
from a client, perhaps somebody who
wants to have their website tested or
perhaps their payroll system, something of
that nature.
Frequently the scope is pretty clear to
both the client and the testing firm and
we would say that is penetration testing.
On the other hand, with ethical hacking
we’re looking, in our view, at a bigger
picture. Maybe the client and we together
do a threat and risk analysis as to who
their attackers might be and what their
motives might be and how well their
resources could cope with a scenario
that tries to simulate an attack as best
we can and produce, of course, the
best value for money, but also the most
accurate, realistic emulation of the sort
of problems they might face.
People are always cited as being the
weakest link in the security chain, what
are your thoughts on this?
Whilst I understand where that comment
comes from, and in many ways I guess
I can’t disagree with it, I think it’s the
wrong side of the coin. I think a modern
organisation challenged with social
networking, bring your own device,
cloud services and heaven knows what
else, really needs to view its personnel
as its strongest weapon and its best
defence, the ‘human fire wall’, if you will.
I think investing in people, treating
them as adults, educating them in a
creative and sort of marketing way,
to understand what the issues are
that face that organisation and how
they can help protect that business
and their jobs would give us a better
result than just a constant spend on
more and more technology and trying
to lock down what people can do.
Do you think security is often seen as a
‘bolt on’ to the rest of the IT infrastructure?
Absolutely, it still is. I think the worst
case really is that the information of
IT is divorced from physical security
frequently; it’s frequently divorced from
the HR elements of peoples’ security. It is
part of IT and frequently, because of that,
may even not have the representation of
the board or executive level it deserves
and maybe doesn’t get the board
awareness it should and therefore doesn’t
get the investment and it’s certainly
not imbedded in business processes
that, personally, I would like to see.
Do you think there should be a push to get
IT security represented at board level?
Unquestionably, if you look at a retail
organisation, someone responsible for loss
prevention for, let’s say, internal audit and
risk will be in a very senior role and that
wouldn’t be a bad model to adopt across
all sectors. We need to see information
security responsibilities probably at board
level. At the moment we are probably
seeing a CIO reporting to a CFO and if
there is a CISO they report to a CIO so
they’re not getting the steer attention they
need and, more importantly, the business
needs to understand the bigger picture
of the threats of doing business in 2013.
EN HA N CE YOUR IT STRATEGY TWENTY:13
Woods intv.indd 81
81
01/03/2013 10:06
SECURITY
What do you think needs to happen to
make this happen?
Well, sadly, I think the organisations that
we’ve dealt with who have not taken
this seriously had serious incidents
and I wouldn’t say I would like that to
be the case, but it does seem to help.
It’s difficult to get the attention of senior
management with respect to information
security because generally they’re not
interested in IT.
It’s difficult to get the attention of senior
management with respect to information
security because generally they’re not
interested in IT and by inference they
assume they not interested in information
security and that’s coupled with the doom
and gloom mind-set that unfortunately, I
have to say, a lot of security people seem
to display and there isn’t frequently that
much political savvy and marketing skill
in information security professionals that
would allow them to interact at the senior
level. Sometimes we’re our own worst
enemy; sometimes the opportunity isn’t
there anyway.
How would you deal with, for example,
with the App situation?
I’m an optimist and I believe there are ways
around this that are really not that hard
to implement, but require a bit of courage.
Let’s look at the whole picture and then
divide it down by asset, understanding
what the value and impact to that asset
would be, then identify the threat agents
rather than who could be attacking that
particular asset. Why, how and then develop
a plan that allows us to explain to the
business with real business examples.
What sort of IT issues have you seen of
late that you are starting to flag?
Well certainly there’s the stuff that is
pushed by the press that’s deemed to be
trendy and big data, for example, at the
moment, and that is pretty ‘bleeding edge’
as far as security threats are concerned,
but that doesn’t make it real. But in the
real world we’re seeing massive adoption
of cloud with little or no security borne in
mind, often driven by a project requirement
or a very specific business requirement and
that means that security sometimes aren’t
involved at all; there’s little or no analysis
done before a contract is signed and then
probably it’s too late to engage in testing or
frequently testing not permitted at all.
Of course ‘bring your own device’ is
perceived as a problem too, and rightly
so. The complexities off the back of
Smartphone and tablet applications, in
particular, are massive. We don’t really yet
understand what the full threat picture
could be with Android devices. With little
or no regulation of IOS devices, there’s a
degree of security from Apple, but not really
to any level that a person would want to
see, so the more we allow people and we
ask people here to bring their own devices
into the corporate networks the more
complex and difficult and complex the
security management will be.
Cloud, plus BYOD, is enough for people to be
going on with and those two issues, coupled
with social networking, present such a
complex picture that people are drowning
in information with little or no way out.
82
Ask – if you implement this cloud solution,
as you are doing, have you considered then
a story line that steps through the whole
process from start to finish making it real,
making it like a case study or a war story
in a way that the business can identify with
and can then be enthusiastically embraced
and invested in.
Right now, what the senior people and
project managers and programme
managers hear is an awful lot of ‘waah’
from the security folk because they’re not
interested in the technology. They can’t tie it
back to the project or business concept that
they’re trying to implement and there’s no
story line to follow, so I would say a proper
methodology, threat and risk analysis tied
to good story-telling, and I don’t mean
inventing things, will solve this problem.
We have to move away from throwing
technology dishes and instead embrace
the business processes, educate them with
real threat models and real story lines and I
believe the money and resources will flow.
It’s shocking today how many
organisations today still don’t understand
the value of IT to their business. How does
this make you feel?
Confused? I have been known, because
I am quite passionate about I do, to be
perhaps a little overly critical of certain
senior officials when people express a
complete disinterest in IT. I don’t believe
companies that behave like that will survive
in the long-term, I really don’t. Some of my
clients, who may be in the main business
line, nothing to do with IT in any shape or
form, who have enthusiastically embraced
IT have seen real growth when everybody
else is suffering.
Those senior decision-makers, who
conclude that IT is just the same as
electricity and just a resource there
that provides the business with an
infrastructure to work from, are too shortsighted. We know that our discipline is
ever expanding and multi-faceted and
we have the option to utilise it to grow
our business, to differentiate ourselves
from our competitors, and security
should, just be a natural part of that,
just making a wrapper that makes a
decision, whether it’s a ‘cake walk’ or
whether it’s an enhanced manufacturing
process, making sure it works efficiently
and works securely and it’s not hard.
What other issues do you see, lurking on
the horizon that you think business should
be paying more attention to?
Well big data is just starting to tickle in my
tongue in terms of flavour of the month. Big
data is an interesting double-sided issue
because, on the one hand, we have the
privacy and the security concerns about
massive amounts of consolidated personal
information and, on the other hand, we have
the facility, the opportunity to use those
data mining technologies and analytical
technologies to effectively and efficiently
process vast amounts of data that can be
generated by our CM systems and so on.
I was party to a very interesting panel
discussion recently and it really opened
my eyes as to what we can do in the
security industry to utilise big data to better
understand threats and to better model
those threats, as well as being concerned
about helping to secure the data that so
many massive organisations are going
to start putting together, both for the
consumer and for the business. Big data is
big news in 2013, I think.
Do you think the future should be more
about transparency of data rather than
about locking it all down?
Oh, that’s a very interesting question. I think
there’s a generational divide here, isn’t
TW E N TY: 1 3 E NH A N C E Y O U R IT S T R A TEGY
Woods intv.indd 82
04/03/2013 12:17
SECURITY
there? The digital natives we are starting to
see now have a different attitude to privacy.
I have to say that in my role and, driven by
the Information Commissioner – not just in
the UK, but throughout Europe of course – I
diligently attempt to help people secure
that personal data. However, I am strongly
sympathetic to the idea of transparency. I
think it is a model that is essential to the
way that systems are going if we’re going
to see everything online and we are. If
we’re going to see everything in a virtual
environment then we have to have new
models to deal with new personal data
and, personally, I agree with you and I think
transparency is the way forward, not just
about data breach disclosure, but issues
like who holds what information being
voluntarily presented to you. The current
generation of people living in university, now
starting work, are very well aware of what
Facebook holds about them. Everybody
knows you can download that story, whether
people really care or not I think is the issue.
This new generation of employees, whilst
they inherently understand what the
arrangement is for the free services –
that their information is sold – I think
those of us who are, and I don’t want to
be dismissive of anybody, but in a more
responsible position right now, would
be much more enpowered were those
businesses to provide us with a more
responsible level of information about
themselves and their employees and I
think we’d have a much more realistic
security profile if they did that.
What are your thoughts on government
transparency regarding the data it holds
about all of us? Do you think they will
become more transparent?
It’s difficult to say in the UK. The UK is not,
in my view, not quite as predictable as some
other governments, I think. With the current
government I think it’s possible. Would it
ever be complete, would it actually be a bit
misleading in terms of how much data they
are prepared to disclose that they hold? I
think it’s possible.
Can you tell us about the significance, in
your eyes, of advanced persistent threats?
Something we’ve seen appear in the press
and that I had a reasonable amount of
exposure to, maybe one to two years ago,
is advanced persistent threats. It seems
to have disappeared off the radar at the
moment, as far as the press and indeed
conference topics are concerned, but in
our view it is a really important topic.
I’ve lost count of how many systems we’ve
tested where we’ve looked at internal systems
and found straight forward ridiculous password
vulnerabilities.
If you look at the analysis RSA published
of their own attack, which I guess was a
couple of years ago now, it was clear that
the various steps involved highlighted
to us, as a penetration testing firm, key
vulnerabilities that we see time and time
again in organisations.
it’s never been re-forged. I think people
forget that businesses are there to allow
people to do business.
Businesses aren’t there to provide an
office for technology to live in. They’re
not there to make money just for thin air,
they’re there for people and certainly, as an
Each of those steps was either about
employer myself for the last 20 odd years,
people or things that people don’t do quite
I have always tried to involve everyone
right. The first stage is, of course, about
in the business, in the business-making
spear fishing and really old fashioned
process, to let them understand what they
techniques, like ‘here’s an email with
can contribute and give them the feeling
an attachment’, which it says is about
of contribution and self-worth within the
next year’s recruitment plans and salary
working environment and as a result, our
reviews, it is very much guaranteed that the staff turnover is nearly nil.
target person would open it.
If large companies were magically able to
Then you see the issues with password
do that, to actually build a trust with their
quality and being able to conduct
employees, then I think it becomes possible
privilege escalation inside a corporate
to use those people as a human fire wall.
network just by password guessing. I’ve
They are much, less likely to open a stupid
lost count of how many systems we’ve
attachment or to plug in a USB stick they
tested where we’ve looked at internal
found in the car park or go to a dubious
systems and found straight forward
website without really thinking about if they
ridiculous password vulnerabilities.
like where they work. If they feel embedded
where they work, they believe their
And we’ve seen published on the inter-webs, employer has their interest at heart. So it
over the last couple of years, tons and tons
might sound touchy, feely, but my one, key
of password files that hacker groups have
advice is, trust and invest in people.
grabbed and exposed and we still see the
same patterns ‘1, 2, 3, 4, 5, 6’ passwords and
we find this still inside organisations at a
depressingly massive rate.
These individual points of failure, if you
like, of which there are four or five in
the RSA example, seem to present a
massive opportunity for nation, state
generated and, of course, competitorgenerated APT attacks; drilling down into
an organisation’s property with little or
no effort. And yet were we to do a proper
threat analysis and understand those
key vulnerability points, we may be only
able to plug half of them, but we’d end
up being resistant to most attacks.
If you could give one piece of security
advice to an organisation what would it be?
Trust and invest in your people. I think
somewhere along the line probably 20 to
30 years ago, the bond of trust between
employer and employee was broken and
EN HA N CE YOUR IT STRATEGY TWENTY:13
Woods intv.indd 83
83
04/03/2013 12:17