ALM Properties, Inc.
Page printed from: Corporate Counsel
Select 'Print' in your browser menu to print this document.
Collaboration is Key to Defending Cyberattacks
Law Technology News
Collaboration appeared to be the best defense to cyberattacks on private enterprises at the Chief Information Security Officer and Chief Legal Officer (CISO/CLO) Summit on Monday, entitled "Defending the Enterprise." The CISO/CLO Summit, held at Rosen Shingle Creek, Orlando, Fla., coincided with the Computer and Enterprise Investigations Conference (CEIC) and featured a number of sessions aimed at developing strategies to defend enterprises from cyberattacks and data breaches.
Attendees of the summit, sponsored by Guidance Software Inc. and FireEye Inc., got the opportunity to engage retired four-star General Michael Hayden, former director of the National Security Agency and Central Intelligence Agency, in a question-and-answer session prior to his CEIC keynote address on emerging global cyberattack hotspots. Hayden, now principal at the Chertoff Group, responded to a number of questions on strategies to thwart cyberattacks that focused on collaboration and private enterprise.
When confronted with the premise that bad-guy hackers were collaborating "everywhere" on strategies to attack governments and enterprises and asked when "good guys" would start to collaborate to repel and mitigate cyberattacks, Hayden admitted that government cybersecurity groups were currently in lock step with the government when they should be collaborating and supporting the private sector in securing critical infrastructure, which includes financial centers, power grids, and enterprise networks with intellectual property, corporate secrets, and confidential client data. CISOs and CLOs were in agreement, but the question remained: When?
After Hayden, Bryan Sartin, director of Investigative Response at Verizon Business, presented "Key Findings and Lessons Learned from the Verizon 2013 Data Breach Investigation Report." Sartin brought home the value of collaboration in light of the facts that nation "state-affiliated espionage is the story this year" and five of six attacks by state-sponsored organizations attacked critical infrastructure. According to Sartin, simply sharing the IP address of attackers was a successful strategy to identify cyberattacks. Among other findings in the Verizon report, social-engineered attacks are up four times from last year it's time to review your employees' Facebook and social network pages.
On a lighter note, Rick Holland, senior analyst at Forrester Research Inc., provided attendees with seven highly effective habits to form in data breach incident response teams. Because incident response is the first opportunity to effectively mitigate a data breach from a cyberattack and restore the public's confidence in an organization.
Holland led off with the fact that incident response teams should know the capabilities of their team and their ability to respond to a data breach. Other habits included:
Holland included his view that "Information Response is built on staff, augmented by technology, and enabled by process and oversight." And similar to Hayden's and Sartin's messages, Holland directed that IR teams mush collaborate inside and outside of the organization as well as actively engage executives to accomplish their missions.
This article originally appeared in Law Technology News.