The IT-security divide is limiting full cyber attack chain analysis, expert warns

Despite years of technological progress, many companies are deploying security defences with an eye to blocking malware and command-and-control (C&C) traffic but fail to build internal relationships that ensure regular cyber attack chain gap analysis becomes an ongoing part of business as usual, an operational-security expert has warned.

This operational gap had emerged as many businesses implement appliance-based security without “a commitment to making prevention part of the architecture,” Tim Treat, cyber operation and defence expert with Palo Alto Networks, told CSO Australia.

“We often find a vacuum between the IT and security communities,” he said. “They need to understand that what theyre doing impacts the organisation, and we work to build more cohesion between the IT and security professionals so they understand what it means to operate, maintain and defend this environment.”

Gartner's cyber attack chain model outlines six key stages of an attack including delivery, exploit/install, C&C, privileged operations, resource access, and exfiltration.

Blocking any element of this chain can defend networks by hindering attackers or blocking them completely – but IT-security partnerships were essential for cyber attack chain gap analysis and the relative immaturity of those internal business relationships often made such an analysis difficult.

“The cyber attack chain allows us to look at the way the attacker is going to attack us,” Treat explained. “With IT and security professionals working together, we can align all of our projects and ensure that we're delivering, deploying, integrating and installing technology – and capabilities – that directly counter the attackers' techniques.”

This level of scrutiny had become harder to provide in environments where organisational or historical separation had seen IT and security functions administered separately; this had often engendered a point-security mentality that saw security acquisitions focused on point tools for dealing with a few parts of the cyber attack chain .

“In the past, because of best-of-breed strategies, even in what we would consider a mature organisation, the predominant focus was on the delivery and C&C areas,” Treat said, noting that many customers believe the point solutions are enough to build their defences without realising the opportunity to address the entire cyber attack chain.

“They are not always focused on the back end, and we are often able to show them how to cover the latter part of the attack chain,” he explained. “People by and large want to get better and IT and security professionals want to work better together.”

“CISOs and CIOs cannot defend their enterprise in a vacuum,” he added, “and gap analysis isn't a one-time deal; it's a commitment we make with them, and every quarter we go in with IT architects and security architects to assess how fully the technologies are deployed. It comes down to knowing your environment: you have to know what's happening in the environment at all times.”

Take this 5 minute survey on The State of Cloud Storage & Collaboration 2016 and go in the draw to win a $500 Visa credit card.Start Survey NOW

Join the CSO newsletter!

Error: Please check your email address.

Tags palo alto networksIT-securitycyber attackCISOCSO Australia

More about CSOGartnerPalo Alto NetworksVisa

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place