Page 36 - Cyber Defense Magazine RSA Edition for 2021
P. 36

any legacy/near-end-of-life products which may no longer be receiving the expected vulnerability testing
            efforts.”

            Sometimes  M&A  activity  can  have  security  implications  on  a  scale  well  beyond  the  product  level.
            Consider the scenario hospitality giant Marriott International faced after acquiring the Starwood Hotel
            chain. What Marriott didn’t know was that Starwood’s IT systems had been compromised by hackers
            before the acquisition took place. In this case the hackers laid low, choosing to passively monitor their
            victim for many months and so the breach went undetected. After the two organizations were integrated,
            however, the hackers began siphoning off data, resulting one of the largest breaches of consumer data
            to date.


            While customers might expect to be informed of major changes to the products and services they use, it
            doesn’t always happen, and so the responsibility is ultimately on the enterprise to take ownership of their
            own security, even if that means assuming that any component, software, or application that it does not
            have complete control over is likely already compromised. From there, the organization must exercise
            diligent, continuous testing of all systems in order to ensure changes in status are detected, security gaps
            are identified, and proper action is taken to close those gaps quickly.

            It can be easy to think that, because a vendor or service provider markets their offerings on security, you
            don’t have to worry about it. But as the lessons of cybertheory tell us, organizations can’t rely on others
            to  address  their  data  security  needs.  Trust  not  in  third-parties.  Do  your  due  diligence  when  making
            purchasing decisions, and keep the conversation going. Pay attention to changes and, if one of your
            partners or vendors is involved in any market deals—directly or indirectly—find out what the implications
            are for your organization.


            Vendors and service providers should regard their customers and subscriber relationships as more than
            merely transactional. But just because you’ve invested your trust in them doesn’t mean they will continue
            to earn that trust. No organization is perfect; adversaries are counting on it.




            About the Author
            Gregory  Hoffer  is  CEO  of  Coviant  Software,  maker  of  the  secure,
            managed file transfer platform Diplomat MFT. Greg’s career spans two
            decades  of  successful  organizational  leadership  and  award-winning
            product  development.  He  was  instrumental  in  establishing  ground-
            breaking  technology  partnerships  that  helped  accomplish  Federal
            Information  Processing  Standards  (FIPS),  the  DMZ  Gateway,
            OpenPGP, and other features essential for protecting large files and
            data in transit.
            For more information visit Coviant Software online, or follow Coviant
            Software on Twitter.









                                                                                                              36
   31   32   33   34   35   36   37   38   39   40   41