CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics

CIOs are begining to use tools that use anomaly-detecting analytics and machine learning algorithms to protect their companies’ data.

Companies are investing more money in emerging technologies that can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats, both of which are weighing heavily on the minds of corporate board members. 

“Our level of investments is increasing because of the increasing capabilities of the threat actors,” says Bob Worrall, CIO of Juniper Networks, who spent 12 percent more on cybersecurity tools in 2016 that he spent in 2015. His budget will increase more in 2017 as he purchases tools to shield Juniper’s corporate data and intellectual property. “As the bad guys get smarter we have to as well.”

Cybersecurity spending has seen a significant uptick since the watershed 2013 breach at US retailer Target and has continued throughout massive breaches at Home Depot, Anthem and Sony Pictures. The latest high-profile corporate victim is Yahoo, which reported in September that hackers had pilfered account information of more than 500 million customers and revealed last week that hackers made off with information on 1 billion users in 2013. The distinct hacks leveraged flaws in Yahoo's defenses, including a cryptography standard many experts deemed insufficient.

The omnipresent threats, in which perpetrators sometimes burrow into networks and quietly steal information for several months or years, are why Gartner says cybersecurity spending will top $82 billion in 2016, an 8 percent hike from 2015. Concerned CIOs are imploring corporate boards to let them invest in cutting-edge technology that protect and thwart attacks.

Proactive protection is the key

Worrall says he currently uses three predictive analytics tools that detect anomalous network access, such as when someone using an employee’s valid Juniper credentials accesses information they don't normally access for work.

Such digital forensics can also determine whether the malicious actor was pinging the network from another country, as well as other details that help "stitch together various events and detect anomalous behavior humans couldn’t detect," Worrall says. Each of Juniper’s behavioral analytics tools fills a gap in network protection, says Worrall, who declined to name the tools because he did not to invite hackers to probe his security defenses.

Using artificial intelligence and machine learning technologies will help companies take a more proactive approach to corporate defense, says Mike Kail, chief innovation officer at startup Cybric, which focuses on integrating security as software is created.

But Kail, who was Yahoo's CIO when the first hack purportedly tool place, says that companies must integrate such tools with technologies and business processes for validating user authentication and authorization. He says that such a solution could leverage blockchain, the digital ledger software that ensures trust between parties exchanging cryptocurrencies such as Bitcoin, will emerge in 2017.

Boards free up budget but expect proof of protection

It’s no secret that boards are loosening the purse strings for cybersecurity but CIOs will continue to struggle to balance their cyber investments against managing risks to their businesses. Put another way: The choice between what to buy, implement and tune first, the shiny new behavioral analytics platform or the latest and greatest business email compromise stopper, poses prioritisation challenges many CIOs aren't accustomed to in this age of cyber warfare.

Worrall says that even if their boards allocate more funds for cybersecurity, CIOs need to beware of budget abuse. Those who take the “sky is falling” approach become chicken little, he says. One advantage Worrall has working for a networking technology company is that his tech savvy board grasps the intricacies of cyber defense.

"I can have a conversation about risks at a technical level many of my CIOs peers can’t at other organisations," Worrall says. He says he is fortunate that he can discuss business risks with his board that focus on mitigating risks to the point of immateriality rather than the cost of cyber tools.

Evidence that boards have become more attuned to cyber risk has materialized in executive recruitment, where companies are looking for savvy leaders who can articulate security risks in a way that business leaders can easily grasp.

Gerry McNamara, global managing director of the information officers practice at executive recruiter Korn/Ferry International, says that his corporate boards are interested in finding CIO and CISOs candidates who can help accelerate their businesses’ cyber profiles relative to their peers.

“The boards are really engaged in digital and cyber right now, asking: Where are we on cyber? Are we protected? Are we keeping our information private? How do you know that it is? Prove to me that it is,” McNamara says. “We have a lot of work going on in cyber mapping of talent.”

Unfortunately, even the best talent and the latest technologies aren’t enough in an era when politicians such as John Podesta and the other folks at DNC as well as top executives can be duped to click on a malicious email whose origin and content appear innocuous, or a user puts the wrong USB into their PC.

“What we’ve all learned unfortunately is that humans are the weakest link in security,” Worrall says. “You can put up the biggest castle wall but as soon as one person connects an infected laptop to the network, it’s game over.”

CIO.com     Behavior Analytics Tools For Cyber-Security:   The Science of Threat Intelligence:  

Company Boards Need To Get A Grip:

 


 

« Driverless Future Won't Start With Self-driving Cars
Shades of Watergate – The Fake Russian Hacking »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.