Page 51 - Cyber Defense eMagazine February 2024
P. 51

Perhaps the most obvious example of the impact of cyber security activities on business operations is
            the  area  of  vulnerability  remediation.  In  typical  organizations,  the  cyber  security  team  identifies
            vulnerabilities and passes that information along to the IT team to patch the vulnerable devices, a process
            that might make sense on paper, but can generate understandable conflict in reality. Those two groups
            (Security and IT)  have markedly different objectives. The cyber security team obviously is responsible
            for protecting the organization from cyber attack, while IT operators are driven by systems availability
            and corporate productivity. And, as anyone in IT knows all too well, patches can break stuff. It goes
            without saying that, although system failures resulting from disruptive patches are much more rare today
            than, say, 20 years ago, IT operators are understandably apprehensive about playing Russian Roulette
            with their networks, and by extension, their careers.

            There  are  countless  other  examples  of  productivity-impacting  security  requirements  that  span  the
            spectrum  from  annoyance  (changing  passwords)  to  policies  with  serious  impacts  on  productivity
            (extensive 3rd party screening that can delay hiring critical vendors for months), and all of them are
            created  with  good  intentions  by security  professionals  with  the best  interest  of  the  organization  -  or
            regulatory compliance - at heart. So how do security teams minimize operational risk and burden while
            still protecting the organization?

            The key to healthy, but not overbearing, cyber security is first a genuine recognition that all security is
            about  managing  risk,  and  that  yet  more  tools  and  policies  are  not  always  a  good  thing.  Security
            practitioners  have  to  cultivate  an  appreciation  for  the  impact  their  policies  have  on  everyone  in  the
            organization, and that security is about managing risk, not a futile effort to reduce it to zero. In the case
            of cyber security, less may just be more.

            That appreciation, and the policies and activities that flow from it should start with a recognition that just
            about all cyber attacks originate from one of three techniques in today’s threat landscape:



               •  Stolen credentials
               •  Phishing
               •  Un-remediated vulnerabilities

            This  reality  should  inform  the  decisions  made  by  the  cyber  security  team.  From  concept  to
            implementation, the question should be asked constantly:  will this policy or product materially reduce the
            organization’s  exposure  to  an  attack  initiated  by  stolen  credentials,  phishing,  or  unpatched
            vulnerabilities? A companion question should add whether or not the new policy/tool will limit the attack’s
            severity if it’s successful. If the answer is not an obvious yes, the security team should reconsider the
            approach, especially if it has any discernible impact on operations.

            Doctors’ offices and government agencies are legendary for developing forms that require obviously
            unnecessary - or redundant - information from patients and citizens, the motivation for which it seems is
            simply because they can, and they’re utterly unconcerned with the experience, time, or frustration of their
            constituents. We’ve all been in organizations in which it seemed the security team’s policies were similarly
            developed  with  a  wanton  disregard  for  the  experience  or  operational  needs  of  the  organization’s







            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          51
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   46   47   48   49   50   51   52   53   54   55   56