Cyberattacks the greatest threat to nations, say global execs

Business brass and IT pros around the world believe cyber attacks are a greater threat to their countries than a physical attack, a survey released Tuesday by Cyber Ark reveals.

Some 80 percent of more than 900 executives and IT pros from around the world polled for Cyber Ark's Global Advanced Threat Landscape survey felt their nations were at greater risk from cyberattacks than physical attacks.

"Businesses are realizing how important these threats are," Cyber Ark CMO John Worrall told CSO. "Their concern reflects the government's concern about the threats."

In recent months, publicity about cyberattacks connected with China, reports about the potential for cyberattacks on the nation's critical infrastructure and speeches by prominent military and government officials about cyber threats have raised the visibility of network attacks in the public eye -- and apparently the corporate mind, as well.

"At a security conference in February, one security officer told me he'd been sent there by his CEO because the President had mentioned cybersecurity in the State of the Union address," Richard Stiennon, chief research analyst with IT-Harvest, said in an interview.

"That shows a growing awareness among executives," he said, "although many organizations still aren't close to understanding the magnitude of the threat."

Public reports and pronouncements may not be alone in fueling awareness in boardrooms. With cyberattacks increasing at alarming rates, awareness in many organizations is born from pain.

" DDoS attacks have increased 600 percent over the last year," former Navy Rear Admiral and head of the cyber security practice at Venable James Barnett told CSO.

The notion that many businesses have first hand knowledge of the risks of cyberattacks is reflected in the Cyber Ark study, too. It found that more than half of those participating in the survey (51 percent) believe a cyberattacker is currently residing or has resided on their systems during the past year.

What people believe and what would actually be found through forensic examination could vary. "That number sounds high to me, but it doesn't sound grossly inflated," said Sam Curry, chief technology officer for identity and data protection for EMC's security division, RSA.

Perceptions expressed in the survey could be influenced by fevered media coverage of the subject, but the risks are nonetheless real. "If you remove all the hyperbole," Curry said, "the real, imminent risk of a cyberattack is greater than a physical attack --- although a physical attack poses greater risk of damage to your body."

"While a lot of damage can be done online," he continued, "I don't want to stand next to a nuclear bomb, and I'm actually OK standing next to a computer with Trojan in it."

Nevertheless, as Chris Petersen, founder and CTO of LogRhythm, points out, corporate executives have good reason to worry about cyberattacks.

[Also see: Preemptive cyberattack disclosure a warning to ChinaÃ'Â | Opinion varies on actions against Chinese attacks | Lesson learned in cyberattack on The New York Times]

"The path to disruption and destruction when it comes to cyber warfare and terrorism is through U.S. corporations that support critical infrastructure," Petersen said in an email. "Cyber provides a weapon that can touch hundreds of US corporations without ever having to put feet on the ground."

"For me, this is a classic race condition," he said. "Will a terrorist organization or desperate nation state achieve a 'nuclear' level cyber capability and strike a known vulnerable United States? Or, as a nation, will we shore up our cyber defenses with enough capability to defend against such attacks."

"Unless we start to really address this issue as a nation, we stand a real chance of losing this race," Petersen said.

Survey researchers also found that 61 percent of their respondents felt the government could protect a nation's critical infrastructure from advanced cyber threats.

Although the survey didn't get into specific government actions to protect the infrastructure, Venable's Barnett advocated programs that provided incentives to businesses to bolster their security.

"The fight against cyberattackers is in private hands in United States," Barnett said. "Businesses need tax credits and liability protections to encourage them to make themselves more secure."

Despite the mantra that's been chanted by the security industry for the last decade, that perimeter defenses should be part of a layered cyberdefense strategy, the Cyber Ark researchers found that more than half the survey's participants (57 percent) said their organizations put too much faith in perimeter security.

"There is no barrier that you can erect that will keep out a determined and intelligent opponent," RSA's Curry said.

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Tags: cyberattacks, Data Protection | Malware, applications, legal, CyberArk, software, data protection, cybercrime

Akamai admits its OpenSSL patch was faulty, reissues keys

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-420

In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.