CyberSecurity's Killer App

(Republished Chainkit Blog)

Time is Money, Career & GDP

The iconic 5 part NIST Cybersecurity framework is missing a step. In between ‘Detect’ and ‘Respond’ should be ‘Contain’. Damage from cyber attacks is always material to the victim organization (globally totalling a staggering $600 billion or 1% of global GDP in 2018). It’s sadly also career-limiting for upto a third of the teams involved. In a mature cybersecurity ‘assume breached’ strategy, the goal is therefore to minimize and contain this debilitating attack damage, before the inevitable response and incident recovery processes kick in. All of which is triggered by accelerated threat detection time - the killer app for Chains of Custody!

No alt text provided for this image

Minutes vs Months

Two respected cybersecurity vendors lead the way with key data. CrowdStrike’s latest Global Threat Report includes the revealing ‘Breakout time’ metric, which highlighted a time to cyber attack damage as low as 20 minutes when Russian nation-state bad actors are involved.

No alt text provided for this image

That disturbing metric is in stark contrast with related recent results from FireEye’s M-Trends investigations. While Ransomware naturally skews recorded Dwell times (number of days an attacker is present on a victim network, from first evidence of compromise to detection) the 2018 figures reported by FireEye still range 2-4 months. Orders of magnitude between these respective damage and detection times proves there is ample opportunity for innovation in cybersecurity. Enter Chains of Custody.

Source: FireEye 2019 M-Trends

Detecting Stealth

Logically, the primary reason cyber attacks take so long to detect is that they’ve evolved the ability to hide very, very well. Correspondingly, Defense Evasion is the longest column of attacker tactics in the definitive Mitre ATT&CK matrix. Within that column, Indicator Removals are the most effective set of adversarial techniques used to evade threat hunters and forensic analysts alike. Splunk first identified this as an issue 4 years ago and more recently began homogeneously applying blockchain to address it. As ubiquitous privilege escalation vulnerabilities empower attackers to abuse centralized Admin authority / root credentials and certificates, that power is maliciously applied to bypass encryption & PKI to reconfigure and tamper with installed cybersecurity solutions. This vicious cycle is the core tactical problem not yet addressed by the cybersecurity industry.

No alt text provided for this image

From Vicious to Virtuous

Chains of Custody as a Service break that vicious cycle. Compromised centralized identities and certificates are no match for the irrefutable integrity of decentralized roots of trust. Tampering with hundreds to thousands of independent, globally distributed nodes on well-governed blockchains flips the script, and raises the cost of a cyber attack by orders of magnitude. Now we have a virtuous circle of tamper evidence and attestation of unprecedented integrity, rather than the vicious cycle of long dwell times where cyber attackers operate with impunity.

No alt text provided for this image

Getting started with Chains of Custody is easy, so why respond and recover when you can now detect and contain cyber attack damage faster than ever before?

Max Shapiro

Super Connector | helping startups get funding and build great teams with A Players

2 年

Val, thanks for sharing!

回复
James Croyle

Web3 Builder | C Suite | Strategic Partnerships | Explosive Growth Leader | ex Microsoft, Check Point, IBM

5 年

Great article Val, you've done a fantastic job at articulating what's not being addressed in the cybersecurity landscape right now - tamper detection and containment.?? Sharing to my audience.

Jurgen van der Vlugt

Improving all your organisational stuff and especially risk management and security | Wine enthousiast, plus Architecture. Plus ... lots.

5 年

Strange; no reference to Winn Schwartau's decades-old Time-Based Security ...?

要查看或添加评论,请登录

Val Bercovici的更多文章

  • Kubernetes Powers AI

    Kubernetes Powers AI

    OpenAI's GPT3 and GPT4 models were trained on tens of thousands of NVidia GPUs. So were Meta/Facebook's…

    1 条评论
  • Cloud Storage Standards for Big Data, AI Data

    Cloud Storage Standards for Big Data, AI Data

    Amazon's S3 is so ubiquitous today, that regular app users have also heard of it, not just app developers. But it…

  • Data Centric Architecture - Windows

    Data Centric Architecture - Windows

    How much is a Gateway 386 PC worth? What about a copy of Lotus 1-2-3? Aside from the vintage collector community, the…

    2 条评论
  • Mainstream crypto band-aid just got ripped off fast

    Mainstream crypto band-aid just got ripped off fast

    The mainstream crypto band-aid just got ripped off fast by last week's #FTXscandal. It will be under new industry…

    4 条评论
  • Enterprise NFT - Oxymoron or Signal?

    Enterprise NFT - Oxymoron or Signal?

    Admit it - “Some idiot just paid $69 million for a JPEG” is what most of you were thinking Friday morning March 12th…

    8 条评论
  • Hafnium cyber marketing abuse

    Hafnium cyber marketing abuse

    What’s worse than ambulance-chasing? Selling a dangerously false sense of cyber security! Channeling my inner Chris…

    8 条评论
  • COVID-19 Echo Effects for Cyber Security, Risk and Compliance

    COVID-19 Echo Effects for Cyber Security, Risk and Compliance

    (Reposted from PencilDATA/chainkit Blog) Golden Age Golden Age for Hackers is what noted Shark Tank investor and cyber…

    2 条评论
  • Cyber Stealth

    Cyber Stealth

    UPDATE: The New York Times published an article a few days after this post - featuring updated Cyber Stealth tactics…

    2 条评论
  • Facebook Libra - opportunity you didn't read about at launch

    Facebook Libra - opportunity you didn't read about at launch

    (This post is syndicated from the original blog on Chainkit.com) Prologue - I am a public Facebook skeptic due to their…

  • Red Pill

    Red Pill

    If you have a knee-jerk reaction to this phrase involving Lawrence Fishburne and Keanu Reeves — kudos, but brace…

社区洞察

其他会员也浏览了