{"id":280,"date":"2017-06-08T16:02:51","date_gmt":"2017-06-08T16:02:51","guid":{"rendered":"http:\/\/securitycurve.com\/?p=280"},"modified":"2017-06-08T16:02:51","modified_gmt":"2017-06-08T16:02:51","slug":"cybersecurity-dead-good-thing-risk-management-isnt","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=280","title":{"rendered":"Cybersecurity dead?  Good thing risk management isn&#8217;t."},"content":{"rendered":"<p><a href=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/06\/the-walking-dead.jpg\"><img decoding=\"async\" class=\"alignright size-medium wp-image-281 lazyload\" data-src=\"https:\/\/securitycurve.com\/wp-content\/uploads\/2017\/06\/the-walking-dead-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/169;\" \/><\/a>There&#8217;s an <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/06\/06\/cybersecurity-is-dead\/#22d8fc1b4012\">article this morning on Forbes\u00a0<\/a>from the CEO of <a href=\"https:\/\/www.upguard.com\/\">UpGuard <\/a>called &#8220;Cybersecurity Is Dead&#8221;. \u00a0The message is one you&#8217;ve heard: that\u00a0looking for specific vendor solutions to plug holes isn&#8217;t super useful, that the future has to be a more holistic integration of security into all areas of the organization, that old models of &#8220;building moats and walls&#8221; don&#8217;t solve today&#8217;s problems in any kind of long term way. \u00a0It&#8217;s all true of course. \u00a0There are also some shots at\u00a0Crowdstrike along the way:<\/p>\n<blockquote><p>Crowdstrike \u00a0[advertising]&#8230; pose[s] a pernicious yet seemingly tidy answer: &#8220;Yesterday\u2019s Antivirus Can\u2019t Stop Today\u2019s Cyber Attacks. Crowdstrike Falcon Can.&#8221; \u00a0 Irresponsible hyperbole? Or is it a pitch made in good faith, albeit one as confident as it is ignorant?<\/p><\/blockquote>\n<p>LOL! \u00a0See what they did there? \u00a0The construction tees it up such that neither of the options (either willfully irresponsible or ignorant and overconfident) are particularly flattering to Crowdstrike.<\/p>\n<p>Now, poking Crowdstrike is of course fun, so don&#8217;t let me get in the way of that&#8230; but marketing is marketing. \u00a0One could paraphrase this claim along the lines of: &#8220;there exists at least one vulnerability that cannot be detected by an unspecified subset of anti-malware products but that can yet be stopped by our product when used in an unspecified configuration, employed in an unspecified context.&#8221;\u00a0\u00a0Hard for that not to be true, right? \u00a0Is it universally or generally true? \u00a0No. \u00a0But do we expect it to be?<\/p>\n<p>Look, is this\u00a0any different than somebody (UpGaurd)\u00a0<a href=\"https:\/\/www.upguard.com\/digital-resilience\">saying <\/a>that their solution, &#8220;&#8230;<em>provides complete visibility into IT assets and makes understanding cyber risk a simple matter for any manager or C-level, whether they&#8217;re technical or not<\/em>&#8220;? \u00a0Complete visibility? \u00a0All risks? \u00a0Meaning, every possible risk across every device\/host\/app\/person in my environment becomes immediately transparent (even to the &#8220;meanest understanding&#8221;) if I just sign the check with UpGuard? \u00a0Of course not. \u00a0So again, factual within a certain context that goes unspecified by the claim&#8230; it arguably differs in degree, but not in kind, from the Crowdstrike claim\u00a0and thereby it seems somehow unfair to me to ding Crowdstrike if you&#8217;re doing the same thing yourself. \u00a0I should tell you in fairness though that the UpGuard site sticks pretty close to avoiding &#8220;spin&#8221; statements. \u00a0I had to work pretty hard to cherry pick the one I found above&#8230; some vendors require\u00a0<a href=\"http:\/\/www.defencebyte.com\/\">less work<\/a>\u00a0by far.)<\/p>\n<p>But whatever. \u00a0I went farther into that than I intended to.<\/p>\n<p>The point\u00a0I was trying to make was that the claim about cybersecurity being dead is something that I think has merit to consider\u00a0but I think highlights a flaw in what we expect security as a discipline to do. \u00a0Meaning, when somebody says &#8220;cybersecurity is dead&#8221;, it&#8217;s usually on the basis of two things:<\/p>\n<ul>\n<li>People still get breached despite security activity *or* there are more breaches in aggregate over a certain time period<\/li>\n<li>This happens despite increased investment, effort, changes in approach, etc. etc.<\/li>\n<\/ul>\n<p>Therefore, the implied expectation is somehow that &#8220;cybersecurity&#8221; means you don&#8217;t get breached. \u00a0And when you do, it implies that somehow security isn&#8217;t working. \u00a0This is a flawed assumption. \u00a0In the physical security world, nobody would expect this to be true for example. \u00a0Does having security at a bank imply that banks never get robbed? \u00a0If so, where&#8217;s the line at which it becomes impossible: is it when I have one guard or when I hire my twentieth? \u00a0Is there some &#8220;critical mass&#8221; of security beyond which\u00a0robbery becomes impossible? \u00a0No. \u00a0So is it dumb to have security? \u00a0Should banks get rid of their guards because there are still bank robberies? \u00a0Also no. \u00a0Instead, it is a risk management decision of which &#8220;being robbed&#8221; is only one possible variable in the equation. \u00a0Yesterday, I <a href=\"https:\/\/securitycurve.com\/the-csf-stephen-fry-says-youre-doing-it-wrong\/\">went on a rant<\/a> about\u00a0people not doing risk management &#8212; and I think assumptions like this one are part of the reason why.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s an article this morning on Forbes\u00a0from the CEO of UpGuard called &#8220;Cybersecurity Is Dead&#8221;. \u00a0The message is one you&#8217;ve heard: that\u00a0looking for specific vendor solutions to plug holes isn&#8217;t super useful, that the future has to be a more holistic integration of security into all areas of the organization, that old models of &#8220;building [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[31,100],"class_list":["post-280","post","type-post","status-publish","format-standard","hentry","category-security","tag-cybersecurity","tag-risk"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=280"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/280\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}