A Leadership Perspectives White Paper Securing Company Assets for Better Business Recommended next steps for business leaders Number 3 in a series Executive Summary Information security needs are changing fast. Businesses are facing a large-scale and wellresourced criminal network intent on defrauding them and their customers. On top of this, there is a growing threat of cyber attacks and cyber espionage, and business faces the need to meet ever more stringent customer data protection, privacy and compliance obligations. At the same time, organisations are becoming inherently more vulnerable through greater use of automated collaborative processes, increased online customer self-service, and more flexible, remote and mobile working. The adoption of so-called cloud IT and business services is another emerging aspect of this new organisational model. All of this calls for a new approach to data security – one that is based on protecting company assets, rather than trying to defending the organisation’s increasingly virtual perimeter. Produced by du enterprise marketing in association with Ovum, a preferred knowledge partner Business case overview Among the many changes in the business environment, compliance, the protection of intellectual property, cost reduction, and defence against online fraud and cyber espionage have been identified as the most pressing needs. Although the ‘big bang’ of compliance initiatives that followed scandals such as Enron are now in place, businesses are facing refinement and extension of their governance frameworks. These have to be in line with global information compliance obligations like PCI in retail, Basel II in banking, and Solvency II regulations in the insurance sector, as well as prevailing data-protection legislation and local UAE initiatives such as healthcare insurance reforms with Thiqa, or screening programmes like Weqaya. Online fraud is an arms race against an adversary with an increasing capability and determination. Frauddetection technologies are advancing and are provisioned both within the data centre and with the end user customer. Banks, for example, are using various privacy, identity and authorisation products to improve the online security of their customers. Many are distributing hardware to provide two-factor authentication when users log in to the online account, or are providing free anti-malware and anti-spyware products, and software products to enable the user to check that they are really conversing with the bank’s site rather than a hacker site masquerading as the legitimate site. Once distributed, these software products are not limited to protecting the banks, but can be used by the customer to secure other online transactions. On another front, cyber espionage, whether committed by business competitors, states, or criminals, is now being recognised as a major problem. Some computer security specialists have speculated that malware such as the headline-making Stuxnet virus was devised specifically to target specific computer servers – such as those comprising part of the Iranian nuclear infrastructure. There are no complete solutions to any of these problems, but technology is providing products and service offerings to mitigate the threats and to allow business to function within an acceptable risk envelope. These will increasingly call on online services that collect threat intelligence on a global scale, with enterprise information security often delivered as a managed service. Quantifying the business risk of inadequate security Information security risk is an unknown quantity because no organisation can predict the timing or the nature of a future data security threat or breach incident. It might be when spyware is planted on a server by cyber-thieves which can be used to siphon off sales accounts data. It might be the result of a lost and unencrypted disk which is holding confidential customer records data. Or it might be the downtime that results from a computing device that has become infected by a virus and needs to be treated by IT. The cost and consequential business loss is hard to measure. It is one thing to temporarily lose productivity after being hit by a virus or other malware-induced outage, but a business that has a data security mishap by failing to protect sensitive customer information or safeguard the privacy of the virtual workspace, is a business with a tarnished and lasting reputation – leading to potential loss of customers, productivity downtime and loss of revenue, or both. The cost of a data breach can destabilise organisations of any size. The Ponemon Institute, a specialist in the area of business impact measures of security threats, evaluated the cost of published data breaches in the US, UK, France, Germany and Australia. It found that the most expensive incident in the US was estimated as costing $31 million. The Ponemon Institute calculated the direct costs of notifying victims and remediating the incident, along with the costs resulting from abnormal customer retention, replacement, and churn. It did not include intangibles such as damage to corporate Produced by du enterprise marketing in association with Ovum, a preferred knowledge partner The business benefit of a security technology will generally be much greater if the measures are preventative and offer protection, rather than simply reduce the consequence of a successful attack, incident or breach through detection and recovery mechanisms. reputation, although accepts that it results in customer churn. Actually, a large part of the costs recorded by Ponemon were due to the abnormal customer churn experienced after such events. It could be argued that the figures underestimated the total damage, even though the numbers are extremely large. The ‘internal threat’ – which usually refers to incidents and losses due to both deliberate and accidental causes by employees, contractors, and some business partners – is a major concern. Contrary to what many commentators say, it is less of a threat than the external one. A Verizon Business study, which focused on larger incidents, found that two-thirds of internal breaches were deliberate, but this was not borne out across the wider field of surveys. Verizon Business found that 74% of attacks were external to the organisation, compared with 20% coming from malicious insiders. Business partners were implicated in 32% of attacks, down from 39% in the previous year. In contrast, Deloitte’s cyber-crime survey attributed the greatest level of concern (26%) to hackers, compared with just 19% to current employees. Organised crime was the leading concern among 6% of respondents. Metrics to support the business case for security expenditure are far less sophisticated than those that have been developed for investment appraisals in corporate functions such as finance, human resources, or logistics. Perhaps the most useful measures are those which show how much a security problem would cost a business in terms of liabilities, lost business, or reputational damage. Rather than examining return-oninvestment, experts in the field have introduced a concept known as return-on-prevention. THREAT FREQUENCY of risk event Probable number of events in a year SEVERITY of risk event Experts recommend using more than one countermeasure against expected threats: a security engineering principle known as defence-in-depth. One cost-effective way of achieving this is in the use of fixedprice managed services which provide multiple protection mechanisms like firewalls, two-factor or double-strength authentication, virtual private networking, anti-virus software and encryption. By reducing and containing threats they deliver real business benefit and drive a positive return-on-prevention. According to independent experts at the Internet Security Alliance, the most common risk measure technique used among information security professionals is to combine the probability of loss with the expectation of loss summing the product of both to get the annual loss expectancy. The ISA has suggested that today the field has matured, and the notion of expected loss and techniques to measure it have also improved. In its exhaustive report The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask, the Financial Cyber Risk working group convened by ISA and the ANSI presented a recommended formula shown below which can be used by organisations to quantify the net financial risk of enterprise cyber threats. VULNERABILITY CONSEQUENCE x Stopping a virus attack, blocking spam traffic or plugging a data leakage hole is the best way of countering the risk of a threat, incident or breach. x Probable loss from an individual event LIKELIHOOD or % of damage – RISK TRANSFERRED = Given the risk mitigation actions taken GROSS FINANCIAL RISK (Annualised expected loss) Produced by du enterprise marketing in association with Ovum, a preferred knowledge partner NET FINANCIAL RISK Plotting the best course of defence There are several recommended steps that will help executives steer their organisations along the best course of action against the current trends in the information security threat landscape. 1. 2. 3. 4. Monitor the business environment. Scrutinise the technology portfolio. Select solutions and services. Manage deployment and outcomes. The table below outlines the various trends to watch in the context of enterprise level security. Monitor the business environment 1. The bulk of security threats emanate from the criminal fraternity, much of which operate on an international scale. Fraudsters are opportunists who make money where they can. They are not wedded to one particular form of crime, and will adjust their activities to the conditions in the (black) market. While past activity has focused on stealing banking and credit card credentials, the market for these appears to have become saturated and prices are falling. Consequently fraudsters are turning to industrial secrets and IP theft, and offering more bespoke ‘steal to order’ services. 2. Compliance demands are increasing both because of new regulations and because current regulations are being strengthened or more vigorously enforced. 3. The extension of the enterprise to include external partners requires an extension in the reach of security policies and implementation. Business needs to monitor security in partner organisations and understand how this impacts on the internal risk posture. Scrutinise the technology portfolio 1. The extension of the enterprise IT environment beyond its physical boundaries requires security to be applied to assets and services wherever they are located. It emphasises the importance of an integrated identity-management and access-control system across the infrastructure. It also requires some degree of integration of security event information management and reporting across the environment. 2. The defence against criminal activity of all types is moving into internet services. Defenders have to be able to see a global picture to correlate malicious activity across the criminal networks. Malware is morphing so quickly that the traditional signature-based detection methods have been overwhelmed, and it has become impossible to create and download signature-update files quickly enough. Fraud networks can be disrupted if the network is understood, but individual victims can no longer defend themselves. Businesses need the support of a service provider partner with a global reach and strong local presence, to be able to accurately and constantly monitor the threat landscape and provide preventative protection. 3. People doing business on the internet, including banking transactions, face considerable risk from spoof websites, infected legitimate websites, and man-in-the-middle data interception attacks. Technology is providing tools to authenticate the web site the user has connected to, and once connected can protect against the infected parts of a genuine site. Strong authentication tools are also reducing the risk of a thief impersonating a legitimate user. Select solutions and services 1. Security technology has to be selected to deliver the compliance requirements the organisation has to satisfy. In particular, managed security service providers must be open about submitting their security policies to compliance auditors, a requirement that most fail to meet. They must be able to satisfy requirements for data-protection legislation, including meeting any geographical limitations on where data is held or copied to. du has gained the ISO/IEC 27001:2005 certificate of approval for its Technology Security and Risk Management division. 2. There are wide differences in the approach of anti-malware vendors and fraud-detection service providers. The scale and distribution of their intelligence operations, and their industry focus, should be considered in the selection process. Because they ‘own’ the network, telcos are particularly well placed as a managed security service provider and MSSPs like du provide a line of defence against security attacks before they reach a customer’s premises and can address the full spread of potential vulnerabilities with prevention from the cloud itself (e.g. email security services), remotely (e.g. security event and incident management), monitoring and managing customer’s on-premise environments, recovering lost data, or providing an overall security governance model (with data loss prevention practices). 3. Ease of management and an integrated approach to security deployment are important features in choosing a security infrastructure that will support a business-centric risk-management strategy. An MSSP provides a systematic approach for managing an organisation’s security needs. With the increased sophistication of threats, MSSPs also provide specialist proficiencies at a lower cost of ownership. Manage deployment and outcomes 1. Security is a wide and disparate discipline, even the information security function is kept separate from building access controls and other aspects of business risk. 2. Some security tasks are more aligned to business process management and systems management (such as configuration control) than they are to other security disciplines. 3. This level of synergy is leading to the major IT vendors playing an ever-increasing role in security provision. This trend can be seen in the accelerating consolidation in the industry, such as the acquisition of software security supplier McAfee by chip-maker Intel. Produced by du enterprise marketing in association with Ovum, a preferred knowledge partner The shifting UAE threat landscape Security experts in the Middle East have warned that the growth in the region of on-line banking could create a breeding ground for new forms of computer malware. Egypt and Saudi Arabia are among the top three countries to be hit with a cyberthreat known as a Zeus or Zbot. These Trojan viruses could become one of the most challenging yet, as the malware often goes undetected by the popular desktop anti-virus packages. The code infects PCs, waits for the user to log onto a list of targeted banks and financial institutions, and then steals their credentials which are sent to a remote server in real time. It can also modify, in a user’s browser, the genuine web pages from a bank’s web servers to ask for personal information such as payment card number and PIN, one time passwords. The UAE Telecommunications Regulator (TRA) has flagged phishing e-mail attacks as the most pervasive type of cyber threat currently undermining consumer confidence about online e-security. TRA’s e-security arm known as aeCERT acts as a local cyber security coordination centre and will block access to high risk websites, working in association with du and the global Anti-Phishing Working Group (APWG). There is a clear need for these sorts of initiative with reports that in Abu Dhabi alone, 235 cyber-crimes were registered in 2010 compared with just three such cases reported three years early. It is estimated that a staggering 80 million spam messages are now targeted at UAE businesses and consumers every day. Specialists suggest the best way to prevent infection is to simply be cautious of opening dangerous file attachments in email, and by enabling browser protection. Web filtering is one powerful technique which is also available to enterprises as a managed security service, which helps limit the effectiveness of such attacks by preventing them from spreading. No security technologies are specific to particular verticals, but some are related to business processes such as payment transactions. The financial services, healthcare, and government sectors have traditionally been the leading adopters of security technologies, and their needs have driven innovation but there is a general increased expenditure by other companies with high-value information assets. Laying down a depth of defence These companies understand security can only be Data Defenses Application Defenses Host Defenses Network Defenses Perimeter Defenses Physical Security Policies, Procedures, and Awareness achieved if attempted attacks are blocked along as many channels as possible. No single type of defence is much use in isolation. It is not possible to achieve security just by inserting some magic defensive components in the infrastructure. A depth of defence is called for, which can be supplemented by a service partner capable of gathering and acting upon the extensive threat intelligence. The service provider can offer protection against risks including interception of corporate data, unauthorised access to corporate networks, spyware, misuse of data, spam through various channels, and fraud. Organisations are facing increasing pressures from regulators, shareholders, business associates, customers and employees to improve their information security at the same time as the range of threats grows and budgets are constrained. The increasing level of competition in the security market is causing vendors to deliver their technology in a more flexible way. There are ways to replace capital expenditure with operating expenditure. In addition to more flexible licensing options, the traditional methods of buying either a software product or an appliance preloaded with the security product are now widely supplemented with managed security services and cloud-based services in the Internet. Security, authentication, and compliance management are expensive and specialised tasks that some organisations prefer to outsource to experts. There are some real business benefits to be had in using external specialist service providers for security management. The service provider can be relied on to configure and maintain security infrastructure, monitor assets and security threats, generate alerts based on its and the client organisation’s policy (and compliance requirements), and offer 24x7 remediation services through a group of security specialists. Produced by du enterprise marketing in association with Ovum, a preferred knowledge partner Managing the spread of security threats A managed security service provider like du can take a global view across the Internet to monitor threats and identify malware and the activity of cyber-criminal networks. This intelligence is key to developing the services that mean defences put in place for customer organisations can react quickly enough to prevent and block potential attacks. It is often easier to track unusual traffic patterns than to identify malicious content. The flows may consist of malware coming from an attack centre, or data going to a criminal collection centre. Most attacks involve a combination of attack vectors and are referred to as ‘blended attacks’. For example, a spam email campaign might direct readers to a web site URL from which the real malware is downloaded onto the user’s computer. This malware may turn the user’s computer into a remotely controlled end-point which can then be used in a future malware campaign. Most malware is now distributed from websites, and a high proportion of these sources are legitimate websites that have been corrupted by hackers. Other social network technologies are increasingly being used by criminals, and social-engineering attacks remain popular on all channels. Research has shown that people are much less guarded when entering information into a machine, such as through a phone keypad, than when talking to people. All the technological and procedural solutions available are needed in order to protect against the varied and growing security vulnerabilities found in today’s business environment. Most organisations look to strong authentication as one way to secure user access. Others look to newer technologies to secure other business assets, with software that remotely renders a lost or stolen device inoperable and protects the information stored on it. Conclusions: A mandate for secure business Organisations can help themselves and their customers by adopting good security practices and maintaining an adequate security budget. If they fall victim to an attack, the cost of a single incident can range from a few thousand dollars for an individual to millions for a large corporation. Agenda item 1 – the industry concurs that the total volume of security threats is increasing at up to 50% per annum, and that criminal gangs looking for fraudulent financial gain mostly drive the threat. Conduct a comprehensive security audit at least once a year. Agenda item 2 – The gangs behind cyberthreats are resourceful and flexible in the strategies they are adopting. In particular, they have recently harnessed social networking services and the tactic of delivering ‘scareware’– that is, false anti-virus products. HR must issue a clearly worded Internet usage policy to employees about what is and what is not ‘good behaviour’. Agenda item 3 – For the most part hackers still use tactics based on malware. They often target high-value victims, customising their tools and messages and conducting pre-attack espionage to find the attack avenue with the greatest chance of success. Make sure customers and business partners have the best security tools in place. This is the third in a regular series of Leadership Perspectives White Papers, produced by du enterprise marketing in association with Ovum, a preferred knowledge partner For more information, please email [email protected] or visit www.du.ae
© Copyright 2025 Paperzz