Skip to main content

Cybersecurity Is: Failing… How do we start to Win? – Part 1

Cybersecurity is failing but this shouldn’t be news to you.

Share Article:

This is Part 1 of our "Cybersecurity Is" Series.

Consider the Following:

Gartner reports that “69% of employees have bypassed their cybersecurity guidance in the past 12 months. In the survey, 74% of employees said they would be willing to bypass cybersecurity guidance if it helped them or their team achieve a business objective” i
In the same report, they state that by 2025 nearly half of cybersecurity leaders will change jobs, and 25% will change to different roles.
CSO Online reports in their survey that an average company deploys close to 44 security solutions, yet 88% of those queried have suffered a cybersecurity incident within the past two years.ii
Fortune headlines that the cybersecurity industry is short 3.4 million workers iii
Contrary to popular opinion – stock prices rise after a cyber attack iv

There are a lot of solutions floating around to try to solve these problems – new compliance and regulatory frameworks, strategies, capabilities, concepts – but the one thing I have not seen, and I believe can help make a difference is going back to the fundamentals of leadership – namely establishing Unity of Effort.

Over the course of my federal service, I’ve been extremely fortunate to be in the presence of some of the best leaders in the world – and I have had the opportunity to study leadership at one of the finest institutions in the world to make leaders.  Each leader, through words and deeds, established Unity of Effort.

Unity of Effort is about getting everyone on the same page about an objective. One of the four stars that I worked for told me once that he repeats his message 20x time a day.  He is singular focused on ensuring that everyone understands what we are trying to do, why we are trying to do it, and the risks if we fail.

Cybersecurity has had a difficult time articulating unity of effort.  The reasons are simple, we’ve stopped talking about outcomes and instead focused on efforts. We offload risk – cyber insurance or the bank will take care of it.  20 years ago, we argued that “Open-source software would be more secure, since everyone could review the code” but now we have a software supply chain issue. Bad guys use vulnerabilities; therefore, the developers must not think about security. We are not getting support from the Board of Directors, put a cyber savvy person on the board! Continuously focusing on effects as opposed to outcomes.

Moving from effects to outcomes – establishing Unity of Effort.

First, a couple of things – what are the benefits of establishing unity of effort.

It provides a sense of accomplishment.
It creates a cohesive team.
It provides focus and direction across organizations.

Step 1: Establish Unity of Effort – A leader must articulate a concrete objective- which can be measured. Consider the following two statements:

We are going to protect the data.
We are going to deny and degrade the adversary’s ability to execute their objective.

Which of these two things would your rather do? Protect the data? Or Deny and Degrade the adversary? So, if we are going to establish Unity of Effort across the organization, we need to provide clarity on the objective.

Step 2: Deconstruct the Objective into relatable terms:

The Adversary – who are we trying to stop?  If we are trying to stop everyone, we will not succeed – it’s boiling the ocean.  Focus in on your top threats – the majority of threat actors are sector specific.
Ability – what tools, techniques and procedures does the adversary use to get after their objective. If their objective is extortion, do they use ransomware, are they using watering hole, spear-phishing or some other technique
Objective – what is the adversaries objective – short term gain (ransomware) or long term foothold (supply chain attack)

For an example, let’s break down how ransomware gangs leverage Emotet:

Infiltrate target systems with Emotet malware generally via Phishing emails
Establish persistent access to target systems.
Conduct reconnaissance on target systems.
Deploy Ransomware and additional malware.
Encrypt target systems and demand ransom.
Cover tracks and exit.

Step 3: Deny and Degrade

What sensors and capabilities do we have to Deny (Protect, Detect, and Respond (P/D/R)) to spear-phishing, malicious attachments and persistent access?
What capabilities do we have to degrade second stage actions? Move laterally? Communicate externally?

Step 4: Building the Message

Now that we have an objective, we can start to build unity across the organization, vertically and horizontally.  A messaging campaign that clearly states, who, what, why and what we are going to do, as well as shortfalls should be included.

We are going to deny and degrade Emotet’s ability to execute a ransomware attack against us, by mitigating their spear-phishing campaign, sand-boxing attachments, and monitoring malicious DNS traffic. The following capabilities are fundamental in our ability to carry out this mission: Thing 1, thing 2, etc.

Step 5: Tailor the Message

Discuss with the CIO and Board about the real threat of Emotet, explain what capabilities you have, and gaps in your ability to Deny/Degrade
Inform non-cyber employees about the impact of ransomware, why they are targeting your sector and the real dangers.
Discuss with the IT staff the need for P/D/R capabilities to be stable and functioning.
Empower the SOC to prioritize efforts around the objective

Step 6: Build a Security Culture

Once you have an articulated concrete objective, it’s time to build a culture of security.  The easiest way is to celebrate wins.  If an employee flags an email and says it’s suspicious- Celebrate! Send them Card! Make a bulletin board! Be creative – we all know people like to be rewarded.  If the IT staff pre-coordinates a network change, and wants to know if it’ll impact something import, send a note to their Supervisor thanking them. Do the little things of rewarding.

In the event, the opposite happens, make it a learning experience, not a punitive experience.

In summary: Build Unity of Effort, Build a strong team, let’s get after the bad guys and start winning.

RSA Event San Francisco

Meet the Interpres Security Team at RSAC 2023

RSA Conference 2023

Interpres right-sizes your defensive strategy against the cyber threats that matter most. Our automated, evidence-based platform analyzes the dynamic relationship between your defensive capabilities and adversarial threats, prioritizes recommended actions and optimizes your security ecosystem. We provide an unbiased view of your security posture and continuously measure threat exposure so you can focus resources on the most relevant threats.

Close Menu