Defeating cybersecurity's emerging threats with threat intelligence
Loading...
If the average hacker made their way into your network on January 1st, you wouldn't be aware they were inside until well into July.
While traditional defensive cybersecurity is important, the fact that hackers can linger for an average of 229 days means companies need to think more directly about surveying the threat landscape, argued Stephen Coty, chief security evangelist for AlertLogic, at a Passcode event on the sidelines of South by Southwest on Monday.
"We talk about always being on the defensive," Mr. Coty said. "I'm a big believer of being on the offensive," of taking a proactive posture against cyber threats.
How to do that? Threat intelligence.
"Threat intelligence is really the key to finding out what's out there. How do we enlist black hat hackers, gray hat hackers, to come on our side," Coty said.
Once inside communities of nefarious actors, Coty said that cyber defenders can "start going out there and finding out what are the new vulnerabilities, infiltrating these hacking groups, finding out what's the next target.
"What's at stake?
By stealing your research and your development, your competitors can leapfrog years ahead and get to market before the originator of good ideas can even make a move, Coty explained. And closer to home, the impacts of data breaches could also have major impacts on children. When a child's identity is stolen online, "what's going to happen? Nobody is going to find out that a kid's credit is affected until they apply for a credit card at 18. And that's when you find out you're $10,000 in debt because of credit card bills because people have gotten that information [illegally online]," Coty said. "That is a huge concern.
"Even with good threat intelligence, however, companies still need technological investment. A preponderance of devices -- from point-of-sale terminals at major American retailers to airport Transportation Safety Administration scanners to the systems governing America's power networks and other major infrastructure -- are still running out-moded and insecure software, Coty pointed out.
Watch the video of Coty's full remarks at the top of this post and follow him on Twitter at @StephenCoty. You can follow AlertLogic @AlertLogic.
Stephen Coty is the Director of Threat Research at Alert Logic in Houston TX and a member of ISSA, Infragard and the HTCIA. Before coming to Alert Logic, he was the Manager of Cyber Security for Rackspace Hosting. Prior to Rackspace, he has worked at several companies including Wells Fargo Bank, Applied Materials, Stanford Medical Center and The Netigy Corporation. He has been in the Information Technology field since 1992 with a Focus on Security as of 1999 where he started as a penetration tester and auditor. Research has been his primary focus since 2007.