free counter

How new CISOs should undertake todays growing threatscape

Were you struggling to attend Transform 2022? Have a look at all the summit sessions inside our on-demand library now! Watch here.

So, youre a fresh CISO (or youve just hired a fresh CISO) who gets the opportunity to change a long-standing tech stack. Youd prefer to make that legacy stack more resilient, especially as cyberattacks turn into a bigger distraction each day. Where can you start?

An excellent first step would be to evaluate your brand-new companys current tech stack. See where in fact the weaknesses are and how your teams roadmaps can strengthenthem. As a fresh CISO, it’s likely that youre likely to inherit a legacy tech stack. Among your greatest challenges starting out will probably be securing IT infrastructure in a threatscape that continues to automate faster than defenses are increasingly being created.

Unfortunately, only 40% of enterprises say they’re evolving in response to the changing threatscape, with 60% acknowledging they’re running behind. Its also good to bear in mind that cyberattackers are quicker, more ingenious and faster than ever before in adopting new automation techniques that execute breaches on APIs, deploy ransomware and target software supply chains.

Dont allow splashy news of high-profile attacks distract you from the business enterprise of securing your brand-new company understand that cybersecurity is really a marathon, not just a sprint.


MetaBeat 2022

MetaBeat provides together thought leaders to provide help with how metaverse technology will transform just how all industries communicate and conduct business on October 4 in SAN FRANCISCO BAY AREA, CA.

Register Here

Consolidate security vendors

The initial challenge youll probably face as a fresh CISO is consolidating vendors to accomplish greater efficacy and improved efficiency. A recently available survey by Gartner [subscription required] discovered that 65% of organizations pursuing or likely to pursue consolidation be prepared to enhance their overall risk posture and resilience. Your consolidation plans also needs to include improved real-time system integration with threat intelligence thats contextually accurate.

Roadblocks new CISOs face in achieving consolidation are the many digital transformation, virtual and hybrid workforce projects which were underway before you arrived.

Here are ideas for consolidating security vendors to handle the three key cyberthreat regions of ransomware, automated API attacks and software supply chain vulnerabilities.

Threat 1: Ransomware attacks

Ransomware is among the fastest growing criminal enterprises. CrowdStrikes 2022 Global Threat Report discovered that ransomware incidents jumped 82% in only per year. Ransomware-as-a-service (RaaS), combining ransomware and distributed denial of service (DDoS) attack strategies, can be an exemplory case of how advanced attackers have grown to be. In March, the FBI issued a joint cybersecurity advisory, Indicators of Compromise Connected with AvosLocker Ransomware, explaining how one of the numerous RaaS groups work.

Ransomware attacks are so pervasive that 91.5% of malware arrives over encrypted connections. Furthermore, Ivantis Ransomware Index Report Q1 2022 found a 7.6% jump in the amount of vulnerabilities connected with ransomware when compared to end of 2021. Ivantis analysis also found 22 new vulnerabilities linked with ransomware (bringing the full total to 310). Nineteen of these are linked to Conti, probably the most prolific ransomware gangs of 2022.

Ivantis Ransomware Index Report Q1 2022 illustrates the breakout of vulnerability by type that comprises the full total National Vulnerability Database (NVD). Image source: Ivanti.

Which means this is really a key area for new CISOs to handle, quickly. Did you know cyberattackers delivery approach to choice is cloud enterprise software? Seeking to capitalize on what widely distributed cloud or SaaS-based enterprise applications are, ransomware attackers depend on advanced encryption ways to remain stealthy until theyre prepared to launch an attack. Furthermore, ransomware attackers regularly try to bribe employees of companies they would like to breach.

To start out, its smart to revisit how effectively your brand-new organizations identity access management (IAM) and privileged access management (PAM) systems are secured. Both are targets for cyberattackers who would like usage of those servers to allow them to control identities network-wide.

Next, as a fresh CISO pursuing the purpose of consolidating vendors, its smart to know the people who can assist you to reduce overlap in your tech stack. Fortunately, you can find providers of ransomware solutions which are doubling down on R&D spending to include more value with their platforms. One of these is Absolute, whose Ransomware Response builds on its successful history of delivering self-healing endpoints by counting on Absolutes Resilience platform.

Additionally, CrowdStrikes Falcon platform may be the first in the market to aid AI-based indicators of attack (IOC) and was announced at Black Hat 2022 earlier this month. These AI-powered IOCs depend on cloud-native machine learning models trained using telemetry data from the CrowdStrike Security Cloud and expertise from the companys threat-hunting teams.

FireEye Endpoint Security is another exemplory case of a vendor thats adding value by consolidating more functional areas. FireEye uses multiple protection engines and deployable customer modules to recognize and prevent ransomware and malware attacks at the endpoint.

Sophos Intercept X depends on deep-learning AI techniques coupled with anti-exploit, antiransomware and control technology to predict and identify ransomware attacks. Absolute, Cohesity, Commvault, CrowdStrike, Druva, FireEye, HYCU, Ivanti, McAfee, Rubrik, Sophos among others are doubling their R&D efforts to thwart ransomware attacks that originate at the endpoint while consolidating more features to their platforms.

Threat 2: Automated API attacks

Cyberattackers have become experts at using real-time scan and attack technologies. Malicious API calls rose from the monthly per-customer average of 2.73 million in December 2020 to 21.32 million in December 2021, in accordance with Salts State of API Security Q1 2022 Report. Furthermore, Google Clouds HAWAII of API Economy 2021 report implies that the rapid growth of the net and mobile APIs designed for new apps is fueling a fast-growing threat surface.

Automation techniques have become more commonplace as hackers turn to scale API attacks across as much unsecured APIs as you possibly can. Cyberattackers may also be searching for APIs with little-to-no defined authentication, including the ones that dont have added security for authorizing access requests. Being an incoming CISO, conducting an audit of where API security is in your company is vital. Knowing if and how APIs are increasingly being monitored or scanned is key.

Googles research discovered that employee- and partner-based APIs may also be a substantial risk. Microservices traffic often uses APIs that arent documented or secured. Postmans 2022 State of the API Report reflects how rapidly API architectural styles are changing, further complicating API security. The Postman study discovered that REST dominates the developer community, with 89% of survey respondents saying it had been their preferred architecture, accompanied by Webhooks, GraphQL and gRPC. As a fresh CISO, youll have to drive your team showing how current and planned API security may also adapt or flex for rapidly changing supporting architectures.

VentureBeat asked Sandy Carielli, principal analyst at Forrester, what organizations should search for when evaluating which API security strategy works best for them. You can find an ever-growing amount of API security offerings available traditional security tools like web application firewalls (WAFs) and static application security testing (SAST) which are extending to handle APIs, API gateways, and several specialty API tools, Carielli said. We also see tools like service mesh, application shielding and microsegmentation addressing API security use cases. The marketplace has done a little bit of consolidation, with some WAF vendors acquiring specialist tools, but its still confusing, she said.

Carielli advises new CISOs along the way of reviewing their API technique to use the dev team to comprehend the entire API strategy first. Get API discovery set up. Know how existing app sec tools are or aren’t supporting API use cases. You’ll likely find overlaps and gaps. But its vital that you assess your environment for everything you already have set up before running out to get a lot of new tools.

Threat 3: Software supply chain attacks

Verizons latest report demonstrates third-party supply chain partners have the effect of 62% of system intrusion events. Furthermore, its common knowledge following the recent series of high-profile supply chain attacks that cyberattackers understand how to infect malicious code in trusted open-source components.

Criminals routinely target cloud providers, managed providers, and operations and maintenance companies serving asset-intensive industries. The target is to infect their software supply chains using compromised open-source components with wide distribution, because the Log4j vulnerability did.

VentureBeat asked Janet Worthington, senior analyst at Forrester, whats holding organizations back from improving software supply chain security. She cited too little transparency into what software organizations are buying, acquiring and deploying may be the biggest obstacle in improving the security of the supply chain. The U.S. Executive Order [14028] called focus on our nations insufficient visibility in to the software supply chain and mandated that NTIA, NIST along with other government agencies provide guidance for a far more secure future. Government agencies, and much more and moreprivate sector [organizations], require transparency in to the software they purchase through the procurement process and within a products lifecycle.

Worthington said that, because of current and new security regulations, Organizations will have to provide information not merely on direct suppliers but additionally their suppliers suppliers, tier-2, tier-3 and tier-n suppliers. In the program world, this implies having a listing of one’s direct and indirect dependencies for just about any software you utilize, create, assemble and package.

Because the new CISO in your company, you may make an instant positive impact by requiring security teams to generate software bills of materials (SBOMs) for products, services and components which contain software, firmware or hardware to get the visibility and control they have to keep supply chains secure. Worthington advised an SBOM that delivers a listing of the components for something is the starting place. Dont wait and soon you are asked to provide an SBOM to create one; this is too late.

She continued: Shift left you need to include SBOM generation into your software development lifecycle. Software composition analysis [SCA] tools can generate SBOMs, provide visibility into component licenses, find and remediate vulnerable components and block malicious components from entering the SDLC. SCA tools ought to be run at multiple stages of the lifecycle.

When you have visibility in to the blocks of one’s supply chain, Worthington said, you commence to understand the security posture of the average person components and take the needed action.

A suggested sequence for designing in resilience

Ransomware, malicious API calls and software supply chain attacks reflect how real-time the threatscape is now. You may already know, legacy tech stacks cant continue, and thats especially the case in API and offer chain security. Probably the most urgent tasks you have as a fresh CISO would be to build ransomware, API and offer chain attack playbooks if theyre not already set up.

Of the three threats, unprotected APIs present a substantial threat to software supply chains. Defining an API security strategy that integrates straight into devops workflows and treats the continuous integration and continuous delivery (CI/CD) process as a distinctive threat surface is one priority that you should cope with in the initial 90 days of one’s role.

Finally, as a fresh CISO, API detection and response, remediation policies, risk assessments and API-usage monitoring are crucial tools you will need to re-architect your tech stack.

VentureBeat’s mission is usually to be an electronic town square for technical decision-makers to get understanding of transformative enterprise technology and transact. Discover our Briefings.

Read More

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker