Establishing A Digital Immune System

In the rapidly changing reality of cybersecurity, one of the few things which seems to remain an absolute constant is the fact that threat actors are consistently becoming more sophisticated, and the risks to a business’s digital estate consequently more severe.

Faced with this relentless pressure, it can be easy for business leaders and cybersecurity decision-makers to fall into a mindset of always seeking to improve and strengthen the defences they have. Cybersecurity strategy, however, is not just about finding better answers: it’s also about making sure that you are answering the right question.

What does that mean in practice? Not too long ago, it would have been fair to describe the typical approach to cybersecurity as being like defending a castle. It was about shoring up the organisation’s walls, finding new ways to repel attackers, scanning the perimeter for potential weaknesses, and knowing how to drop the drawbridge quickly if - and only if - the person trying to get in is trustworthy.

Leaving The Castle

That all made sense when enterprise IT had a clear, well-defined core to defend. As businesses have increasingly relied on cloud computing, SaaS, and remote access in their IT infrastructure, however, the shape of the digital estate has become much more diffuse, and will only become more so as emerging trends like edge computing come into full force.

Now that there’s no definite perimeter to defend, it’s little wonder that new metaphors and big-picture ideas are everywhere in cybersecurity right now. One of the most interesting and fundamental is the trend towards thinking in terms of establishing a digital immune system, or DIS. Named as one of Gartner’s top ten strategic technology trends for 2023, a DIS shifts away from the front-line prevention focus of traditional cybersecurity strategies and instead thinks in terms of responding to and recovering from breaches, bugs and failures as quickly, effectively, and painlessly as possible.

Like a human immune system, DIS assumes that any barriers between the inside and outside of a system will be breached, and aims to notice and react to those events as necessary. Mimicking a human immune system, DIS aims to be highly flexible and agnostic to the cause or source of damage, as what really matters is the recovery. And, as with its human equivalent, the ultimate goal of DIS isn’t to tackle problems for their own sake, but to keep the body’s systems functioning for as long and well as possible - meaning that an awareness of proportional response and overall business impact is built into its thinking.

In other words, DIS is useful in part because it creates resilience regardless of the shape that a business’s IT infrastructure takes on.

At the same time, one thing that makes it a really interesting proposition today is the way it also targets the growing consequences of security breaches, alongside bugs and other flaws. The specialist technology insurer Parametrix recently found, in a survey of corporate decision-makers, that the median respondent said that IT downtime would cost them around £10,000 per minute. In that context, the value of designing to recover from, and not just prevent, downtime is glaringly obvious.

Building Immunity

Like other big ideas in cybersecurity, DIS does not signify any single technology, tool, or idea; rather, it is a collection of interventions, some new to the field and some very well-established, which are united by a common organising principle.

From my perspective, businesses looking to implement DIS should start by introducing advanced, field-tested methodologies to their human workforce. Chaos engineering, for instance, simulates random or unpredictable failures in infrastructure to vet how quickly systems and the teams responsible for them can achieve recovery, while site reliability engineering brings software-like flexibility to hardware-based operations. 

Taking this a step further, businesses can look to explore AI-powered testing and remediation tools, which automate the discovery of potential issues on the one hand, and the repair of active failures on the other. Through focused investment in groundbreaking technologies such as this, we can take steps towards creating organisations that are not only resilient, but can pinpoint and rectify IT incidents before they cause disruption. This is the future we’re ultimately striving towards: the self-healing enterprise.

The essential element that underpins all of this is monitoring and observability. The immune system analogy holds once again: the body has many ways of solving damage and infection, which operate according to various timescales and levels of severity, but they all start with noticing the problem and triggering a response as swiftly and accurately as possible.

Once information about technology performance - which might range from hard disk read times to user dwell times - is integrated into a unified, granular, and holistic platform, businesses will be in a position to start truly targeting recovery and resilience, rather than just investing endlessly in tools to forestall the inevitable failure.

The DIS won’t replace front-line defences entirely - but it will make the damage that breaches do to users, reputation, and revenue less severe.

Matt Tuson is General Manager,EMEA at LogicMonitor                                   Image: John Barpikle

You Might Also Read: 

Protecting Your Company’s Data Against Insider Threats:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« LockBit Hacked British Military Data 
The Unique TTPs Attackers Use To Target APIs »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se