Charles Leaver – People Rather Than Technology Are The Third Phase Of Cyber Security

Written By Kyle Flaherty And Presented By Charles Leaver Ziften CEO

Cyber attack impact on companies is often straightforward to measure, and the suppliers of tech services are constantly showing off various stats to reveal that you need to obtain their newest software (also Ziften). But one statistic is extremely shocking:

In The Previous Year Cyber Criminal Activity Cost Organizations $445 Billion And Cost 350,000 People Their Jobs.

The monetary losses are simple to take on board despite the fact that the amount is large. However the second part is worrying for all involved with cyber security. People are losing their employment because of what is happening with cyber security. The circumstances surrounding the job losses for all of these people is unidentified, and some might have deserved it if they were negligent. But the most fascinating thing about this is that it is well known that there is a shortage of talented individuals who have the capability to combat these cyber attacks.

While people are losing their positions there is likewise a demand that more gifted people are found to prevent the ever increasing hazard of cyber attacks. There is no argument that more individuals are needed, and they need to be more gifted, to win this war. However it is not going to take place today, this week and even this year. And while it would be fantastic if a truce could be negotiated with the cyber hackers until these resources are available, the reality is that the fight should go on. So how do you combat this?

Utilize Technology To Enable, Not Disable

For several years now suppliers of security tech have been offering technology to “prevent and block” cyber attacks. Then the vendors would return later on to offer the “next generation” service for preventing and stopping cyber attacks. And then a couple of years later on they were back once again to offer the latest technology which focussed on “security analytics”, “danger intelligence” and “operational insight”.

In every circumstance companies purchased the latest technology then they needed to add on professional services or even a FTE to operate the technology. Naturally each time it took a substantial quantity of time to get up to speed with the brand-new technology; a team that was struggling with high turnover because of the competitive nature of the cyber market. And while all of this was going on the attacks were becoming more consistent, more advanced, and more regular.

It’s About People Using Technology, Not The Other Way Around

The issue is that all of the CISO’s were focussed on the technology initially. These organizations followed the classic model of seeing an issue and producing technology that might plug that hole. If you think of a firewall program, it literally constructs a wall within technology, utilizing technology. Even the SIEM technology these companies had implemented was focused mainly on all the different connectors from their system into other systems and collecting all that info into one place. However what they had rather was one place because the technology centric minds had forgotten a critical aspect; individuals involved.

People are always good at innovating when confronted with danger. It’s a biological thing. In cyber security today we are seeing the third phase of development, and it is centered on individuals:

Phase 1 Prevent by developing walls
Phase 2 Detect by constructing walls and moats
Phase 3 View, inspect, and respond by evaluating user habits

The reason that this needs to be centered on people is not just about talent scarcities, but since individuals are really the problem. Individuals are the cyber hackers and also the ones putting your company at risk at the endpoint. The technologies that are going to win this battle, or at least allow for survival, are the ones that were constructed to not just enhance the capabilities of the person on the other side of that keyboard, but likewise concentrate on the behaviors of the users themselves, and not just the technologies themselves.