IT security is national security -- but you're not alone

Managing the danger of cyberattacks has to involve all parts of an enterprise, speakers tell a Kaspersky conference

National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.

That was one of the messages from a conference earlier this week where threat experts from Kaspersky Lab shared the stage with corporate security chiefs and the former U.S. secretary of homeland security. There were also a few tips for facing up to the problem.

"If the private sector goes down, and critical infrastructure, [then] more often than not ... you have national security at risk as well," said Tom Ridge, who led the new Department of Homeland Security in the wake of the Sept. 11, 2001, terror attacks. Because government relies so much on critical infrastructure such as power grids, communications networks and transportation, and because of the way malware spreads, the line between attacks against states and attacks against companies is blurry.

Companies and governments face a broad range of active threats, some of which are probably being perpetrated by hackers with nation-states behind them, according to Kaspersky, which researches cybercrime and sells technology to counter it.

Large enterprises need to step up their game in dealing with cyberattacks, which are no longer preventable but are manageable, said Ridge, who now runs a consultancy. For their part, governments should share more information with the private sector, he said.

"Everybody has a role to play, particularly the private sector. And I'm not sure, today, that the focus from private enterprise is as clear and as direct as it is within our military and within our war planners," Ridge said.

Companies have to become resilient rather than just rolling out security tools, Ridge said. That involves internal governance, training, and awareness as well as technology, Ridge said.

Ellen Richey, Visa International's chief enterprise risk officer, agreed.

"If you don't have the support of the CEO, or the board, or the owners ... you will never get anything done. Period. It's amazing," Richey said.

No technology alone can make up for attention to security at all levels of the organization, she said.

"It's equally a business process problem," Richey said. "You have to be on it seven days a week, 24 hours a day," handling mundane tasks such as access controls, patches and passwords.

Then there are those employees who just tend to lose things. "Some people shouldn't really be asked to protect anything," Richey said. If you're one of them, you should deliberately keep as little sensitive data as possible around you, she said.

Companies trying to get a grip on security can turn to industry standards that have been forged and proven in previous incidents, said Steve Adegbite, who oversees security strategy at Wells Fargo. Those can be the baseline for a system tailored to their needs. He also recommends sharing information with peers. In the U.S., this can be done through Information Sharing and Analysis Centers for finance, health care, telecommunications, supply chain and other industries.

"Cybersecurity is a team sport. It takes everybody on the field playing," Adegbite said.

Having friends in the right places can also make a difference, according to Chris Rezek, an expert consultant at McKinsey.

"For smaller institutions, make sure you know your local FBI contact [and] which third-party service you're going to call when something happens, so they're not a stranger when you pick up the phone," Rezek said.

Stephen Lawson covers mobile, storage and networking technologies for The IDG News Service. Follow Stephen on Twitter at @sdlawsonmedia. Stephen's e-mail address is stephen_lawson@idg.com

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags risk managementsecurityvisaWells FargoIT managementbusiness managementkaspersky lab

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Stephen Lawson

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?