The only difference is that instead of bullets flying downrange, it’s packets. The same techniques used in real-world combat apply in cybersecurity operations. War rooms are designed to bring key decision-makers together and arm them with all the information necessary to make rapid decisions during high-risk situations. In security, like combat, there is no better way to prepare for the next attack or crisis than getting tightly aligned on war-room strategies. After spending the majority of my military career as a network architect and engineer, I approach my cybersecurity work at Viasat with a unique perspective on mitigating high-risk situations. Marine Corps, completing three combat tours. Internally, this not only leads to breaches, potential loss of sensitive data, and millions of dollars’ worth of fines and legal liabilities, but also finger-pointing that exacerbates preexisting cultural silos between teams.įor nearly two decades, I actively served the U.S. Inherently lazy hackers will exploit a lack of cross-team communication to gain access to the network’s most critical resources, often moving under the radar until it’s too late. And worse? Hackers thrive on this kind of chaos. IT and security teams were already battling competing priorities, but now they might need to take extra steps to resolve an issue. Threats are no longer just malicious actors that make their way in today, they include inside actors, misconfigured services, and shadow workloads containing sensitive enterprise data, accelerating the urgency around gaining visibility in the east-west corridor.Īnd that’s not all that’s suffered from the increase in remote cross-team communication. But reports like this one from ExtraHop found this often led to misconfigurations that cyber-attackers were fast to exploit.Īdditionally, although cloud adoption was already on the rise before COVID, many enterprises are now entirely cloud-enabled, making the perimeter increasingly obsolete. There is truth in that, but I argue that, rather than creating new problems, what the pandemic did was expose and exacerbate existing security weaknesses.įor example, in the rapid shift to remote working, many organizations’ most immediate solution was to relax their virtual private network (VPN) and Remote Device Protocol policies to give workers access to applications and data through personal devices and home networks. When COVID-19 hit the United States, there was no shortage of headlines about the new security challenges caused by the shift to remote work.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |