Sie sind auf Seite 1von 17

DIGITAL TRENCHES:

ON THE FRONT LINES


OF THE CYBER WAR

TIM HADAR | EDITOR IN CHIEF | OIL & GAS IQ | 2016


FOREWORD
On June 15th 2016, researchers at Fox-IT presented the results of an extensive study into the
internet spy ring Mofang. The results are collated in the white paper Mofang: A politically-
motivated information stealing adversary.
Mofang is a threat actor that almost certainly operates out of China and is probably
government-aliated. It is highly likely that Mofangs targets are selected based on
involvement with investments or technological advances that could be perceived as a threat
to the Chinese sphere of inuence and projection of power.
This approach is clearly outlined in the report in the guise of a campaign focused on the
government and critical infrastructure of Myanmar. Chances are that Mofang is a relevant
threat actor to any organisation that invests in Myanmar, or is otherwise politically involved
in this Southeast Asian nation.
In addition to the campaign in Myanmar, Mofang has been observed to attack targets across
multiple sectors - government, military, critical infrastructure and the automotive and
weapon industries - in multiple countries.
The Mofang case study underlines Fox-ITs view that cyber attacks are being used by
governments to gain control and valuable insights into a countrys infrastructure, a region, or
regime. Governments that actively make use of cyber attacks are willing to spend millions of
dollars, employing hundreds of technical savvy specialist to develop and build cyber tools
that stay undiscovered for all long as possible and to have maximum eect.
With that in mind, I nd it shocking that, even today, I meet groups of people at conferences
the world over that are still in denial when it comes to the dangers of cyber attacks. More
often than not, it seems that organisations need to be confronted with a major cyber
incident before they are convinced that any company can become a target needs to be
prepared as such.
But how can you prepare? Can you really defend against the might of a nation state with, virtually
unlimited budgets and resources? The answer is yes, but only through a holistic approach
carried out on a continuous basis, grounded in intelligence and government regulations.
A 360 approach based on protection, detection and response solutions and/or services are
key in the ght against cyber attacks. Aside from embracing the technological aspect,
government regulation will help to gain more insight into the volume and make-up of
attacks and assist in building a global defense net to guard against cyber attack actors. This
needs to be a net that not only defends against cyber-attacks but also oers legal
frameworks to start prosecuting organisations or nation states.
Fox-IT aims to make the digital world a safer place. We are recognised by major analysts
across the globe as a cyber security leader: recent publications like our Mofang report and
our Ponmocup report attest to this.
For the third year in a row, we are delighted to be working with Oil &Gas IQ to monitor the
state of cyber security in critical infrastructure realm. As always, this presents a great
opportunity for us to react to your ideas and engineer solutions within a proven and holistic
security approach.

Be prepared!

Ronald Prins
CTO & Co-founder Fox-IT

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


PROLOGUE
"And you will hear of wars and rumours of wars,
but see to it that you are not alarmed.....

On the 28th June 1914, the assassination of Arch Duke Franz Ferdinand of the
Austro-Hungarian Empire set in motion a chain of events that would result in the
outbreak of The Great War.
Originating in the heart of the European continent, the web of alliances cultivated
during the 19th century to maintain the balance of power between neighbouring
states would end up drawing the whole Western world into an abyssal of slaughter.
By the end of the conict in 1918, the total number of military and civilian casualties
would surpass 38 million, more than two per cent of the population of Planet Earth
at the time. The world would never be the same again.
In 2016, the weapons of mass destruction that stock the arsenals of the world
powers make the machinery that killed so many millions during World War I look
tame. Yet weapons of physical destruction are not the only ones that menace peace
in our times.
The 21st century has witnessed the exponential development of cyber warfare as an
existential threat to the modern civilisation. And the parallels between the actions of
the First World War a century ago and the Cyber War in 2016 are glaring.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


A BRIEF AND CRUDE HISTORY OF WARFARE
IN 16 PARAGRAPHS (10,000 BC TO 1916 AD)
Up until the latter half of the 19th century, warfare was conducted between two on more opposing forces using a
variety of close-combat and ranged weapons supplemented by battle-trained animals from horses to elephants. A
major engagement would usually be fought to a conclusion within a matter of hours. Seldom did a confrontation run
into a second day of pitched combat. Sieges, however, could last for years.
By the time of the Napoleonic Wars (1803-15), gunpowder arms, which had started to supplant the dierent forms of
bow as the main ranged weapon of choice from the 16th century onwards, had gradually reached an accuracy and
range that would make them the primary armament for troops. With a bayonet axed to the muzzle, the musket, and
then rie, would serve as both a ballistics and stabbing implement for the worlds modern armies for centuries.
Then, in the 1860s, the pace of change began to accelerate.

THE AMERICAN CIVIL WAR (1861-65)


When 11 states seceded from the Union and formed the Confederate States of America in 1861, the formerly
United States found themselves on the cusp of civil war, a mere 85 years after the Declaration of Independence.
In the course of the 1,458 days that the conict raged, the technology of warfare would advance at an
unprecedented rate. The American Civil War would see the rst military uses of:

Iron-hulled warships Dirigibles Submarines

Torpedoes (land and naval mines) Repeating ries Gatling guns the precursors
to the modern machine gun

As well as advances in weaponry, the War Between the States also saw
the employment of several relatively new societal advancements in a
battleeld context, such as photography, telegraphy and the railroad.
Despite all of these leaps forward, it was the increase in the range,
rapidity and accuracy of ballistics that would fundamentally change the
character of warfare.
In 1861, a trained soldier armed with a muzzle-loaded ried musket with
a 500 metre range, was expected to re three rounds a minute. Armies
arrayed themselves opposite each other in rank and le to pound each
other with shot until one side gave way under the strain of lead.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


The cavalry charge, so often the ultimate shock tactic that would
force a wavering army into rout, would become useless in the
face of superior re power. Injuries and deaths caused by
bayonet wounds accounted for less than one per cent of the total
casualties of the war. By 1865, there was only one thing a soldier
could do to avoid the killing power of the ever-advancing
machines of war: hide.
Trench warfare was born on the battleelds of the Old Dominion
and digging in would become and integral part of the makeup
of modern combat the world over. Battles went from lasting
hours to lasting days. An ineluctable shift had taken place.

SUMMER 1916, FRANCE


If the American Civil War was the dress rehearsal for modern warfare, World War I was the oeuvre itself. A conict that
both sides thought would be over in a few months now dragged on into its second bloody year.
In Northern France, the forces of three empires were dug in around the town of Verdun and on both sides of the upper
reaches of the River Somme. These two battlegrounds would become the focal points of the conicts Western Front,
with 6.1 million troops engaged.
Conservative estimates of the casualties from both battles number 1,681,000 or 28 per cent of all troops engaged, with
a liberal estimate inating that to 2,196,000 or 36 per cent. The world was horried at the unprecedented rate and
degree of the slaughter in a type of warfare that had become all murder.

The machine gun, which had been extant in Primary source accounts tell of German In a conict that saw the emergence of
one form or another for the past half a gunners that stopped ring because they the tank and the aeroplane, cavalry units
century claimed as many as one quarter of were sickened by the eortlessness of were still making frontal assaults on
all of the casualties on the battleelds of the butchery. enemy positions. The technology of
World War I. On the rst day of the Somme warfare was outstripping the tactics of
Oensive, British troops walked with warfare at an alarming rate.
bayonets xed headlong into withering
machine gun re that would claim more
than 50,000 of the 60,000 casualties in one
of the costliest single actions in the history
of warfare.

A century on from the darkest days of World War I, we nd a disturbing


parallel for where we stand in a world where the threat of cyber warfare
poses a similar menace to that of standing armies: in the digital trenches.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


THE STATE OF PLAY
OUR ANALYSIS
After the success of our wide-ranging survey and analysis Cyber 9/11: Is The Oil & Gas Industry
Sleepwalking Into A Nightmare? we conducted a follow-up sounding into the state of the industry,
with an even broader remit. What follows is our dissection of the results.

ELEMENT 1

A recently-published cyber
security report shows that there
are four categories of assault:
Confident - 9%

hacktivism, cyberwarfare, cyber


Somewhat confident - 48%

espionage and cybercrime. How


Not confident - 39%

condent are you that your


Do not know - 4%

current defence mechanisms can


handle/detect these threats? -2%
2015 results
3% vs. 2014
-1% Percentage
Change
-2%

It is a simple fact that in most areas of endeavour, people In the space of twelve months, absent some vast
tend to overestimate their own capability until they have technological breakthrough, these numbers should
hit a snag. This overrating will often lead to complacency not be showing any marked movement in the positive
with regards to the elements of the game that they think sense.
they are playing in a satisfactory or more than satisfactory
Given the intrinsic tendency towards an optimistic
manner.
estimation of ones abilities, those who are somewhat
The space of one year has not provided for a drastic condent and condent, whilst still making up more
change in the perception of companies towards the way than half of the respondents in this survey, are probably
they feel about being able to deal with these Four less justied in their assuredness than the 39 per cent
Horsemen threats, which is actually something to be that are not condent about their defensive capabilities.
lauded.

"...in most areas of endeavour, people tend to overestimate


their own capability until they have hit a snag.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 2

How condent are you that your


defense mechanisms can handle/
detect state actors/APTs?
Confident - 5% -3
2015 results

(APT=Advanced Persistent Threat)


Somewhat confident - 30% 25% vs. 2014
Not confident - 65% 38% Percentage
Change
Do not know - 0% 0

We tend to associate the capability of state actors In APT, the P is the most telling part of the
and APTs with the mostly highly advanced hacking acronym: these threat actors may not be using the
techniques and cyber weapons around. However, most sophisticated tools, but hit a wall with a
there is a blurriness in the denition of what hammer enough times and it will come down. The
constitutes an APT. Attacker groups may well act as problem with APTs is precisely the fact that
APTs, using very common inltration techniques, consistent failure will not cause them to desist. In
but could they also fall into the state actor category fact, their assiduousness may cause them to up the
if they are all centrally regionally-based? Or could ante, to use a bigger hammer or to try and locate a
APTs act as an umbrella term to refer to lone-wolf specic part of the wall that has structural faults
of more generic hacking groups? and concentrate blows in that region - whatever it
takes to accomplish what they have at hand.
State actors and APTs distinguish themselves
because they are highly-motivated to attain their For that reason, the 65 per cent that are not
goals, and can sometimes draw on a central source condent should probably be higher, because
of funding and pool of talent to achieve their behind that wall there could be entire dedicated
mission. The two thirds of respondents who are teams of people working on a cyber warfare
not condent with their abilities to handle these initiative planned in ongoing structured campaigns.
attackers are justied in their disquiet and the
lucidity of their weakness is a positive trait.

"...these threat actors may not be using the most


sophisticated tools, but hit a wall with a hammer enough
times and it will come down.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 3

What controls do you have in place to prevent malicious commands or data being sent to the OT from
your IT infrastructure?

Strong authentication of employees


48% 26% permitted to do this.
Only permitted from dedicated selected
workstations not used for other purposes.

56% 22% Only permitted from selected physically


secured zones of the office environment.
The Four-Eyes principle.

While it is good that you see that there are precautions Whilst assigning dedicated workstations is a sensible
in place to try and avert any kind of contamination move, in the aftermath of recognising a breach has
owing from OT to a companys IT network, the happened, many companies have discovered
percentages are worryingly low. Only one of the four connections owing to and from both networks.
options came in at more than 50 per cent and two Although the security teams may have initially set up
barely touched one quarter of respondents. computers in isolation, in order to facilitate easier
working conditions, these systems may have been
Flipping the stats to appreciate the disregard of
linked together.
organisations for some of these control mechanisms,
in the cases of only permitted from selected physically Combined with the fact that these systems often have
secured zones and the Four Eyes Principle, 74 and older, unpatched versions of operating systems and
78 per cent respectively of companies do not employ applications that render them more susceptible to
these techniques. exploitation, authentication is not the best way sure up
your defences.
More worryingly, the two methods of control favoured
by our respondents are probably the two which are Physical security is denitely the preferable option,
easiest circumvented by keen and able attackers. In and the stats pointing to companies not engaging in
the case of strong authentication, an attacker may multiple, simultaneous control methods puts into
have already obtained the adequate credentials to perspective their lack of condence in dealing with
inltrate a network by foul play, or might have found APTs.
another route to acquire the information or do the
damage they want.

...the two methods of control favoured by our


respondents are probably the two which are easiest
circumvented by keen and able attackers.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 4

9% Is your organisation using digital


forensics to interpret digital traces?

17% Yes, we have in-house digital


forensic capabilities

61% Yes, we outsource digital


forensics research

No, we do not

Not sure of benefits


13%

Digital forensics is the branch of forensic science organisations do not conduct the appropriate
which covers the retrospective recovery and exercises to be able to answer crucial questions
investigation of material found in digital devices in that stakeholders and regulators would want to
relation to cyber incidents. know the answer to is mind-boggling.
Whilst we see that 61 per cent of organisations do A cyber security strategy should comprise the
not run in-house or external digital forensics quadral of prevention, detection, monitoring and
investigations, the 13 per cent that are unsure of response. A possible factor underlying an opt-out
the benets of such methodologies are equally of digital forensics might be the fact that
unlikely to be using them. Therefore, we can, with companies are concentrating their attention and
some certainty, deduce that almost three quarters funds on the rst two facets of the security trinity,
of respondents do not run digital forensic rather than doing the legwork into what exactly
enquiries. happened. Rather than seeing a value in the details
of the crime, they see the value in making sure that
The question is: why? If a crime has been
it is either stopped or at least noticed.
committed, you would certainly want the
authorities to try and piece together what exactly
happened, who did it and how. To think that

A cyber security strategy should comprise the quadral


of prevention, detection, monitoring and response.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 5

Yes, we have
Are you monitoring Dont network IDS 2015 results
your network?
vs. 2014
52%
know (IDS = Intrusion Percentage
22% Detection System) Change
-6%
23% 2%
Yes, 17% No 0%
we have -6%
host IDS
42% 2% 4%
15%
Yes, we use honeypots,
Yes, we use a SIEM (a honeypot is a trap set to detect, deflect, or,
(SIEM = Security Information in some manner, counteract attempts at
and Event Management) unauthorised use of information systems)

The rst thing that comes to attention here is the information and not specically to actively detect
sobering fact that almost one in ve oil and gas any signs of incidents or intrusion.
companies still do not have an network IDS, even
The key is to be able to deal with the amount of
after all of the serious incidents, from Stuxnet to
information that these systems generate. The false
Shamoon, that have attacked industrial
positive rate or the number of events that are
infrastructure. It is no surprise that the energy
generated is so high that it requires the daily
sector has been continually signalled out as one of
operation of skilled sta to do the system justice. It
the most vulnerable in world business. Add to that
is debatable whether that 52 per cent can leverage
the fact almost a quarter of those surveyed were
the technology to the extent where it can help to
unaware of whether they were monitoring their
mitigate or at least contain incidents from growing
network or not, and this is a serious cause for
after initial detection.
concern.
The statistics we see here would lend to the trend
More than half of companies are employing an IDS,
emerging in companies concentrating and
which is a large increase on the gures recorded a
spending more on prevention and less on the
year ago, and is somewhat encouraging. Within
detection and response aspect of the security
that, there is the concern that technologies are only
quadral.
being used for the collection and aggregation of

...one in five oil and gas companies still do not have an


network IDS, even after all of the serious incidents, from
Stuxnet to Shamoon...

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 6

16% How visible is what is going on your


8% network to your organisation?

18% I'm unsure

I barely have visibility

Our system engineers have this as an


44% additional task

We are using monitoring tools

14% We have a fully operational SOC


(SOC = Security Operations Center)

Straight o the bat, it is evident that almost one The implementation of a SOC is not only a nod to
quarter of respondents do not have any real visibility having monitoring tools in place, but also that those
into what is happening in their networks, a quite monitoring tools are being interpreted by a group of
frightening number. The positive spin on the results trained professionals guided by a web of processes
of this question would be that at least three out of to put the information gathered into context.
every four respondents surveyed do have a vision of
Even if monitoring is carried out 24/7, without the
the activity that is owing through their business.
team and analytical framework around that to
Of the 44 per cent that are using monitoring tools, crunch the numbers, any output is nigh on useless.
the question is: what are they being used for? In In the example of the 18 per cent of organisations
many cases these tools are used to maintain the that add network monitoring to the job
visibility of systems to ensure business continuity is specication of their systems engineers, the extra
upheld, and not to specically monitor for activities workload and number of false positives will
that are directly attributable to cyber threats. Those become so overwhelming that any meaningful
who have visibility of the threat matrices that could analysis could be lost in the mire.
be developing in their IT infrastructure will represent
Simply plugging in tools without the correct
a much lower percentage.
capacity to derive cogent data from those tools will
An encouraging statistic is the 14 per cent of result in negligible benets for most companies.
respondents that have an operational SOC in place.

Even if monitoring is carried out 24/7, without the team


and analytical framework around that to crunch the
numbers, any output is nigh on useless.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 7

In the last three years, how often have you been confronted with a serious ICT cyber incident?
(ICT = information and communication technology)

Never - 26% 45%


Once - 29% -10% 2015 results vs.
2014 Percentage
Twice - 6% -4% Change
More than Twice - 39% 39%

In cross-industry gures, the number of companies Of the 26 per cent of respondents that say they
that have experienced a serious ICT cyber incident have not been attacked at all in the past three
is around one in three. From the statistics here, years, we have to draw an unfortunate but
that number is more than doubled, at almost three indisputable conclusion: many simply will not have
in four. realised it yet.
Of course, the categorisation of a serious ICT In reality, most companies still discover that they
incident is going to be largely subjective, based on have been compromised between two to six
the size, duration and relative impact of the attack months after the initial breach has taken place. A
on an individual business. The fact that more than majority of those that do nd out will stumble
one third of companies have suered an incident upon the hack by accident or through external
of this type more than twice in the past 36 months notication of abnormalities. By that stage, any
is a testament to the intensication of malicious malicious activity could have been embedded and
worldwide cyber operations. under way for as much as half a year.

Of the 26 per cent of respondents that say they have


not been attacked at all in the past three years, we have
to draw an unfortunate but indisputable conclusion:
many simply will not have realised it yet.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 8

Does your organization have a CERT team or CERT provider?


(CERT = Computer Emergency Response Team)

No - 23%

Yes, we have an in-house CERT team - 41%

Yes, we have an external CERT provider whom


we involve on an ad hoc basis - 15%

Yes, we have an external CERT provider that


we have on retainer agreement - 4%

Dont know - 17%

At a time when most of a companys assets will be they have evaded a cyber breach, simply may not
either digitised or in the process of being digitised, know it yet.
the fact that a combined 40 per cent of
It should become a necessity for the continuity of
respondents do not have, or have no idea if they
business to have a CERT team, be it in-house or
have a CERT or CERT provider, should be a cause
external. A good CERT or CERT provider will help
for consternation.
with prevention as well as response. They will
The 23 per cent of respondents that have no CERT in practise for forensic rigour and make sure that
place corresponds almost exactly to the 26 per cent there are regular drills and scenarios to replicate a
in our previous segment that that believe they have real-world attack and promote readiness.
not suered a cyber attack in the past three years.
Being unprepared for disaster because you have
Without being frightened into action, it seems that not succumbed to disaster is a sure-re way to fail
around one quarter of companies do not see the in the face of disaster. Every organisation should at
need for emergency methods. As discussed least have a CERT capability on retainer and close
previously, many of the 26 per cent that believe at hand should an emergency arise.

Being unprepared for disaster because you have not


succumbed to disaster is a sure-fire way to fail in the
face of disaster.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 9

Does your organisation have an incident response plan


(IRP) in place?

No - 26% -14 2015 results


Yes - 33% -27% vs. 2014
Percentage
Yes and we do dry runs 12% Change
on a regular basis - 12%
I am unsure - 29% 29%

The statistics here reveal a quite startling disconnect dumbfounding that only 12 per cent of data-reliant
between experience and common sense. organisations do not practice for situations where
their data may be compromised. Practice does not
According to the numbers in previous segments, 75
make perfect, but it does make better.
per cent of organisations have suered at least one
cyber attack in the past three years, yet even with Those who are unsure about whether they have
the gures combined, less than half of companies an IRP in place may simply be unaware because
have an IRP in place and do dry-runs to simulate this capability is outsourced to an external
attack scenarios. Taken in isolation, whilst 75 per provider and it is not in their interest to know one
cent of companies have been attacked, only one in way or the other.
eight of those organisations do any kind of
A positive aspect of the results here are that at least
preparatory war-gaming.
those that do not have an IRP in place are down by 14
It must be remarked that it is inconceivable that a per cent from last year. Given that the gures showed
company that has oshore rigs, for example, would that two out of every ve companies last year were
not drill for a worst-case scenario, such as a loss of IRP-less, a trend towards more awareness is
containment or on-board explosion. It is equally favourable but the statistics could still be improved.

Practice does not make perfect, but it does make better.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 10 & 11

Is your organisation using a managed Are you condent that your employees and/or
security service provider (MSSP) to MSSP (if applicable) are up-to-date on the latest
monitor your network? cyber threats and methods?

42%
39% 28% 10%

Yes Do not know

33%
No

48%
Confident Somewhat confident Not confident

Taken in conjunction, less than 40 per cent of oil and Whilst the 48 per cent who are not condent with
gas companies are using an MSSP to safeguard their the competency of their MSSP is dismaying, the
organisation, and of that number, almost half are positive aspect of that group of professionals is
not condent that they are doing a good job of it. that at least they have the lucidity to see the gravity
of the situation at hand. Hopefully, the members of
Obviously, this is a particularly worrying statistic
this tranche will be making the noise and creating
and drives at the heart of a very serious problem: if
the urgency within their respective organisations to
you are employing a team to keep your network
push top management for the buy-in and funding
safe yet do not have any belief in their ability to do
to take them to that top ten per cent.
their job with any kind of benecial eect, why
employ them at all? In playground terms, it is like It is almost more concerning to be part of the 42
picking the fat kid to be the goalkeeper because he per cent that are somewhat condent in the
is the last person and simply has to be picked, no ability of their MSSP. Whether those in this
matter his prowess. segment are quietly condent, quietly disconsolate
or plain ambivalent, they are unlikely to push for
The ten per cent who are condent in their MSSP
major change inside their organisations to move
is probably a fair reection of the truth: being on
up to the next rung of certainty.
top of the evolving threat landscape is an
increasingly taxing task, which only a handful of
companies will be able to manage with any degree
of acuity and consistency.

In playground terms, it is like picking the fat kid to be the


goalkeeper because he is the last person and simply has
to be picked, no matter his prowess.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


ELEMENT 12

25% 10% 31% 23% 11%


Less than Between 100,000 Between 500,000 Between 1,000,000 More than
100,000 and 500,000 and 1,000,000 and 10,000,000 10,000,000

If you had to make an estimate of the costs


involved to recover from a cyber-attack, what
3% -16% 5% 2015 results vs. 2014

estimate would you give?


-8% 9% Percentage Change

The statistics gathered in this section point to a they are unable to bear the type of nancial
year-on-year increase in cyber attacks that have punishment that an encounter with a few small, or
aected companies on both the lowest and highest one large cyber attack could visit upon their
ends of the cost spectrum. This would indicate two organisations. This will, most probably, result in
particular attack patterns: one which uses many insurance companies increasingly providing
small, stabbing attacks and one which relies on something approaching tactical cyber attack cover
large, one-o and well orchestrated bludgeoning as part of their main business oering in the
manoeuvres. coming months and years.
The cost of an attack grows with the size of the We are now living at a time when a cyber attack
organisation: if you have an infrastructure of ten could actually be a company-killing event for many
localised systems that needs to be investigated and global organisations. The fact that this reality has
recovered, it will be a cheaper recuperation than if not been echoed in previous segments with a more
you are a target with thousands of systems dotted stringent and widespread adoption of detection
across several continents. and response controls is, perhaps, one of the most
depressing outcomes of this entire cyber security
One of the up-shots of this trend is the move of
investigation.
small to mid-sized enterprises (SMEs) towards
greater cover from their insurance companies, as

We are now living at a time when a cyber attack


could actually be a company-killing event for many
global organisations.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR


EPILOGUE
In the nal analysis, we can group the ndings of this inquest into the state of cyber security
under several rather unattering nouns that circle in a self-perpetuating feedback loop:

HUBRIS
We can see that in some areas, our respondents have
displayed an overestimation of their ability to counter
the threat posed by the current generation of cyber
attackers. It is this kind of misplaced condence that
can have drastic consequences. We are probably all
familiar with the case of Icarus and the Sun

UNPREPAREDNESS COMPLACENCY
In some of the most fundamental areas of business Linked to hubris but less about overarching condence and
protection, our respondents companies are woefully more about nonchalance, companies are opting for the
under-prepared for the kinds of munitions that cyber easiest xes in terms of security, rather than choosing to go
assailants are ring at them on a regular basis. This extends the full nine yards and instate a more extensive, but
to the realm of war-gaming, drill and scenario planning expensive, holistic protective framework.
which are not given the credence that they deserve. Even after having seen some of the most damaging cyber
Tacked on to this, we can also add that most companies attacks in the histroy of modern commerce befall industry in
do not have the correct sta in place to be able to react the past half-decade, a large percentage of organisations
to, let alone prevent, injurious cyber events. display little or no drive to shore up their defences.

UNAWARENESS
In our survey, the average percentage of those that
answered I dont know/am not sure to the questions in
which that was an option was 16 per cent. Is it acceptable
that four out of every 25 people working in the cyber
security eld is that unaware of some of the most
elemental parts of a their cyber security infrastructure?

These four symptoms, united and entwined, are the underlying causes which continuously impede companies across
the global sphere of business from having the basic cyber security framework to safeguard their livelihoods. These
are the bacilli from which the infection of inadequacy is allowed to spread.
In the Great War, for the rst time in the history of pitched combat, battleeld injuries were the greatest causes of
death to the belligerents involved. In the only pan-European comparator to this conagration, The Napoleonic Wars
of a century earlier, more than 70 per cent of fatalities were inicted away from the battleeld.
Yet from the Somme to Verdun, Passchendaele, Ypres and countless other major and minor battlegrounds across
Europe from 1914-18, one third of all deaths that occurred were not caused by bullets, bayonets or land mines, but by
infectious disease.
It is evident that in we are losing the cyber war to an evermore sophisticated and persistent foe. In the digital
trenches, perhaps the rst measures taken should be to prevent, detect, monitor and respond to the disease lurking
latent in the shadows before the bullets even begin to y

...Such things must happen, but the end is still to come.

DIGITAL TRENCHES: ON THE FRONT LINES OF THE CYBER WAR

Das könnte Ihnen auch gefallen