Ready the troops: Global cyber warfare

Share this article:
Ready the troops: Global cyber warfare
Ready the troops: Global cyber warfare

Global cyber warfare is upon us. We CISOs and CSOs are the generals in the global cyber war. If you haven't thought about your role in these terms, then you are ripe for ambush.

When I ran information security for the city of New York, I constantly reminded my team that they are soldiers on the front line of a global cyber war with real-world consequences. To say that nyc.gov and the critical infrastructure of Gotham have ‘target' written all over them is certainly not an overstatement. This was my daily reality for 14 years.

The threat is coming from all directions. Foreign militaries, terrorists, organized criminals and industrial thieves target us on a daily basis. Some may know our IT footprint better than we do. Others have analyzed and understood our weaknesses better than we have. Does that scare you? It should.

The United States and other governments are putting Big Data to work for them and are analyzing our communication patterns in real time. If the U.S. can do it today, can China, Russia, India and perhaps Al-Qaeda be far behind? Perhaps your enemies know better than you where your assets are and which assets communicate. They will use that information to do damage to your business, your customers or your nation.

The cloud, once the answer to data center expansion, just makes it easier for thieves and disrupters to get at your data without your knowledge. It is 10 p.m. Do you know where your data is? 

Are your troops ready? How's your basic training? Make sure that your security awareness training for IT staff covers how to handle high-profile incidents. Evidence preservation and intelligence gathering must be in balance with the need to restore service, or you'll soon repeat the exercise without having gained any insight into the cause.

A good general has the respect and cooperation of the troops. You can earn this by getting out of your office and going down to the trenches and asking them if they consider themselves ready.

Don't do this at a formal meeting where there might be an inclination to paint a rosy picture. 

Get to know the best network engineers, sys admins and DBAs in your organization. They know things that won't turn up in your risk reports, audits or vulnerability management reports. They know where the weak underbelly of your organization is and probably have some good ideas on how to firm things up.

Make sure they know what to do within the first five minutes of the “big event.” It is coming soon to your enterprise.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Features

Case study: Big LAN on campus

Case study: Big LAN on campus

A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.

2014 Women in IT Security: Stacey Halota

2014 Women in IT Security: Stacey Halota

When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve out new territory because her ...

What's sex got to do with it?

What's sex got to do with it?

Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, reports Teri Robinson.