sb-au logo
Story image

Carbon Black: Is your cyber panic room ready?

05 Oct 2018

by Carbon Black chief cybersecurity officer Tom Kellermann

Genghis Khan was a mastermind: a terrifyingly brilliant military strategist who altered the course of world history. 

He used fear to paralyse his enemies.

History repeats itself. 

This northern summer, the overt colonisation of American cyberspace continued at breathtaking speed. 

China and Russia have escalated their cyber espionage campaigns and cyber criminals have armed themselves with weapons-grade capabilities, which have allowed them to conduct thousands of virtual home invasions unabated.

I fear that this year is ‘the year’ winter comes.

Strategically, geopolitical conflict has served as a harbinger for destructive cyber attacks.

More rogue nations have developed A-teams who are leveraging sophisticated attack campaigns which are destructive in nature.

Cyber intrusions have transformed from burglary to home invasion to arson.

As evidenced in our upcoming quarterly incident response threat report, there has been a three-fold increase in destructive attacks.

A scary 32% of all attacks witnessed by our incident response partners were destructive.

Cyber spies and cyber criminals alike are setting our networks on fire.

After 21 years in cyber security, I am witnessing a dramatic evolution of cyber criminal capabilities, which is terrifying.

The increasing attack surface, coupled with the utilisation of advanced tactics has allowed the adversary to become clairvoyant. 

The cyber criminal is already in our house. 

Given this phenomenon, we should mirror a model of physical security which is used to protect dignitaries and diplomats - the panic room. 

According to Wikipedia, a panic room is a fortified room installed in a private residence or business to provide a safe shelter, or hiding place, for the inhabitants in the event of a home invasion.

Traditional panic rooms contain communications equipment like a phone or radio so that law enforcement authorities can be contacted.

There is also a monitor for CCTV and alarms.  

Creating a panic room around an organisation’s critical assets, users and sub-nets is imperative in 2018. 

As corporations continue to deploy additional services and IoT based devices, the surface area prone to attack is becoming too vast for existing static and sparsely deployed preventative controls.

A major shift in security spending is essential to provide improved situational awareness and visibility into the more advanced attacker movements post-breach.

This spending must be strategic and accompany a tactical paradigm shift from prevention to detection to suppression.

Panic Room 101

  • Create an inventory of the most critical assets and users.
  • Conduct a penetration test – whose objective is to destroy those assets.
  • Deploy application control/iron boxing on those assets. This is your fortified room.
  • Deploy EDR on all endpoints that have access to those assets. This is your CCTV and alarm system.
  • Hire an MDR to monitor threats against the corporate environment.

Cyberspace has become punitive.  

As destructive attacks flourish and counter incident response becomes mainstream we must ensure that we create an inhospitable environment for cyber criminals.

It is time to build your panic room.

Story image
Attivo Networks bolsters Google Cloud’s Managed Service for Microsoft Active Directory
“By detecting unsanctioned access to AD, security teams receive alerts early in the attack lifecycle, and the attacker is less likely to get the critical AD information they were seeking."More
Story image
Online retailers lose millions as 1/3 of customers forget password at checkout
Recently released research has found about one in three of online purchases are abandoned at checkout because people cannot remember their password to access their account and confirm their purchase.More
Story image
Acronis mobilises the home office in the remote working age
One of the biggest changes for Acronis, like many companies, is the transition that allows all employees to work from home.More
Story image
Interview: Ping Identity exec on why security system updates are critical during COVID-19
Techday spoke with Ping Identity country manager for A/NZ and Japan, Ashley Diffey, on how zero-trust is favourable over perimeter-based security, and what the changes in work mean for businesses in a post-COVID-19 world.More
Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Link image
Take advantage of free multi-factor authentication as you work remotely
Cybersecurity is shaping up to be one of the most important areas to consider while working from home. Leverage biometrics and password authentication for free with RSA.More