If there is one thing that most ITEXPO (News - Alert) attendees have in common this year, it’s the feeling of being completely overwhelmed by the volume and sophistication of today’s cyberthreats. So for the day’s second keynote address, cybersecurity specialist Nick Bilogorskiy of Juniper tackled the subject by providing a comprehensive rundown of the ABCs of cybersecurity: Artificial intelligence, blockchain and cybercrime.
As he explained, attacks are significant and growing by the day, with the average business now facing about 12,000 threats per week. Unfortunately, most business only have time the time to analyze about 500. So there is a definite bandwidth issue at play.
In the words of Bilogorskiy, who has been in the industry for 17 years, cybersecurity has never been as bad at is today. Costs are piling up, too, with the average breach costing businesses about $7 million.
So, what are businesses doing wrong? Why are so many breaches taking place?
The traditional approach to cybersecurity, Bilogorskiy explained, is no longer working because it relies heavily on making snap decisions. You don’t want to wait for an infected message to sneak into your inbox. Prevention has to occur in just milliseconds, so that threats can be detected and eliminated before they cascade across the network.
The trick, he explained, is to try and automate incident response to do more with fewer people.
“Everyone is trying to hire cybersecurity engineers but there are just not enough people to fill all of the open positions,” he said. “We have to rely on software and automation to take that load. That is where our behavioral analytics come in.”
By using automation and intelligence, businesses can detect and prevent threats early on. This is challenging, due to the cybersecurity skills gap. Right now, there are at least a million unfilled cybersecurity positions. This will grow to at least 3 million in the next few years. At the same time, attacks are growing in sophistication. Malware is constantly changing, and becoming more complex.
Understand that today, cybercriminals are focusing on exploiting the cybersecurity “kill chain.” A targeted attack, in other words, has different stages. It typically starts with early reconnaissance work, as attackers gather information like specific employee names and email addresses. They collect data, and then craft targeted attacks which are deployed using traditional spearphshing tactics. So when performing incident response and prevention, it’s vital for businesses to focus on all levels of the kill chain.
In the words of Bilogorskiy, we need to rely on computers— not send humans to do jobs that machines can handle. Let computers handle the tedious, boring processes of sifting through data and allow them to help incident responders make informed choices. This will save money, and make life easier for security professionals tasked with keeping enterprise networks safe.
So as you walk around the showroom floor at ITEXPO this week, and you network with security professionals from around the industry, stop and ask yourself the following question:
What can I do to reduce the burden on my IT team — and my budget — while making my enterprise more secure?
The week is just getting started, and if you are in South Florida you don’t want to miss out on the wealth of information that is available here at ITEXPO. To register, click here.
Edited by Mandi Nowitz