Page 76 - Cyber Defense eMagazine February 2024
P. 76

Going Medieval

            In building our cyber capabilities, we can look to the development of medieval fortifications as a
            compelling analogy. Early defenses were primarily designed to counteract localized raids and
            small-scale  warfare.  These  wooden  fortifications  provided  quick,  cost-effective  protection
            against attackers lacking advanced siege equipment. However as offensive threats evolved, so
            did the must-have features of the fortifications. Stone replaced wood. Wider moats, taller towers,
            and  arrow  slits  were  added  to  resist  more  capable  attackers.  This  continuous  process  of
            innovation, adaptation, and improvement is a blueprint for the iterative approach necessary to
                                            st
            do business securely in the 21  century.



            Embracing Iterative Security

            Think of the hapless feudal lord who pitched building a massive stone structure to their king in
            response to spear-wielding, local bandits.  “Milord, for a mere 50,000 sovereigns, we will be safe
            from these brigands in a mere 10-years’ time!”       Not only did their funding request likely get
            denied, but their town also likely got sacked while getting estimates from the stone masons.

            Iterative  security  is  about  continually  adapting  security  measures  in  response  to  the  current
            landscape  of  threats  and  vulnerabilities  while  evaluating  emerging  threats.    This  approach
            acknowledges that cybersecurity is a journey, not a destination.  It acknowledges the uncertainty
            of  likelihood  and  impact  in  risk  calculations  and  factors  that  into  prevention  and  detection
            strategies.    Not  every  threat  warrants  a  best-in-class  platform  and  top-flight  resources  in
            response.  Sometimes, open-source tools running on the intern’s laptop is good enough.




            Benefits of Iterative Security

               •  Speed: Iterative security allows organizations to respond swiftly to emerging risks.  A
                   complete fortification of wooden walls is far better than a half-finished wall of stone.  In
                   cybersecurity, it’s common that the best response to a new threat is visibility.  This can
                   be  done  quickly  and  easily,  answering  questions  like,  “How  big  is  the  problem?”  and
                   “What is our exposure?”
               •  Focus: This approach allows organizations to prioritize and address the most critical risks
                   first, much like how the most vulnerable parts of a castle were reinforced first.  Lesser
                   threats  can  remain  in  “visibility-only  mode”  until  the  threat  level  warrants  further
                   investment.
               •  Innovative:  Iterative  security  fosters  an  environment  where  innovation  thrives.    New
                   attacks spawn new ideas and new solutions.  Just as medieval castles evolved over time







            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          76
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   71   72   73   74   75   76   77   78   79   80   81