UPDATED 14:24 EDT / MARCH 29 2013

NEWS

HP Security Services on the Anatomy of a Breach

Part 1
While many CIOs and CISOs think they’re taking the right steps to protect their organizations from cyber-attacks, the reality is that the number of successful attacks in the U.S. continues to climb, along with the cost per breach.

According to a survey conducted by HP and the Ponemon Institute, the average number of successful attacks increased 40 percent between 2011 and 2012, and the average annual cost of overall cybercrime increased 6 percent. HP’s annual Cyber Security Risk Report shows that mobility is a green field for cybercrime, with vulnerabilities rising in 2012 to 68 percent over 2011 numbers. Worse yet, 48 percent of mobile apps tested in 2012 gave unauthorized access.

What are the most critical steps CIOs should take to prepare for cyber-attacks? It begins with identifying which areas of the organization are most vulnerable to breaches, strengthening susceptible areas and establishing a response plan.

In a briefing with HP’s Andrzej Kawalec, Chief Technology Officer, Enterprise Security Services, we discussed the anatomy of a breach and what is going on in the industry today. The discussion couldn’t be any more timely given the discussion around South Korea being attacked and the growing cyber threats that emerge daily onto the scene. South Korea is a significant operational and financial hub for not only corporations based there, but also international corporations. This highlights one of the difficulties in operating in geo-physical disparate sites, across boundaries, and across the world as there is a balance to be obtained on the nuance of risk, security, and the understanding of threat levels those situations present. The international aspect of this puzzle is one of the most intriguing elements and it brings a whole world of complications along with it.

The best posture is to have planning and coordination around these situations. A current focus centers on additional controls, unauthorized access, expected activities, and expected behavior when it comes to data integrity. Some of the things to watch out for are such variables as:

• Remote location
• Out of an expected time zone
• Strange times
• Nature of data accessed

And that is just the beginning, but the key here is to index anomalous behavior for different users. This means understanding context, geo-political aspects, type of usage per user and so on. The next generation of security must follow this type of contextualization in order to disrupt the traditional security model in today’s digital security environment. The big question is how to disrupt that kill chain (infiltration, discovery, capturing company assets) while a breach is occurring, across the world, in different areas. There needs to be less focus on who is attacking a corporation and from where and more focus on proper breach response.

In our next part to come on Monday, we will look into what happens after a breach, with particular focus on core capabilities, breach mitigation and post-breach actions.


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.