High Wire: The Cybersecurity Balancing Act
Cybersecurity leaders are walking on a wire. The mass of sensitive data that Technology, Risk and Big Data professionals have to navigate every day has turned the function into a careful balancing act, and the stakes continue to rise. A growing awareness of data as a business-enabler has been shadowed by an increase in the number and complexity of cyber attacks. Each step forwards is a risky manoeuvre. One frayed cable, one breach – and you’ve gone from Cirque du Soleil to six months in a cast.
There isn’t a cure-all for cybersecurity yet. But the better functions share some common elements. Without these as a safety net, that high wire starts to look a whole lot shakier.
The Gravity of the Situation
According to Symantec’s annual Internet Security Threat Report, 2015 saw 430 million new unique pieces of email malware, nine major breaches with over 10 million identities exposed, and a huge increase in mobile attacks following the platform’s ascendancy and the growth of omni-channel. The report also showed that cyber criminals are discriminating far less between large and small companies, with attacks like the ‘Tech Support’ scam becoming increasingly popular.
In the wake of a spate of notable and disastrous leaks in recent months, these trends are no surprise. Banks, film companies and consumer websites have all come under fire. Executive teams in every sector have had a rude awakening as to what can go wrong when cybersecurity isn’t prioritised.
Fear of Falling
A growing concern in an environment like this, however, is that companies keep their hard-won data under lockdown, limiting its application as a business-enabler. A source of ours in a top pharmaceuticals company described the situation as being like having a bank vault when you actually need a wallet: somewhere that data can be readily accessed in a way that’s both mobile and secure. But the problem here is that thieves won’t need a safecracker to get your information now – they can just mug you.
This is the recurring conflict in the cybersecurity space: security and compliance versus access and business-enablement. Companies looking to integrate and upgrade multiple legacy systems are wary of exposing themselves. Structural uncertainty as the function evolves can stifle data-driven innovation while leaders figure out how best to use information. Function restructure activity is particularly buoyant at the moment in fact, with the optimum set-up being a fully-secure unit that isn't insulated from the wider business’ needs (and vice versa).
But where hazards exist, opportunity persists. From a talent perspective, many of the cybersecurity professionals we spoke with were excited by the prospect of leading restructuring-efforts in functions that weren't yet fit for purpose. The opportunity to rebuild a function has become an enticing proposition in a field that’s both starved for talent and yet bloated by increasing regulatory pressure.
Building the Safety Net:
Alignment & Structure
With the stakes so high, tumbles are inevitable. It’s the position of the net and the strength of the weave that’ll break your fall. But the question of how and where cybersecurity should sit gives rise to a number of related concerns. Which business unit does it sit under? How much autonomy should the function have? Who's in charge?
We’ve tended to find that a fully autonomous function works well in sectors that handle a vast amount of sensitive consumer data, like Retail. In these organisations the security, risk and privacy functions are generally well established - with large teams who understand their specific responsibilities. But while this is considered a ‘mature’ cybersecurity model to many, issues crop up where the function is a solely Technology-oriented one. Although the systems knowledge here will be exceptional, understanding of wider business needs can suffer. We’re increasingly seeing the cybersecurity platform shift towards a Risk or Business Development capacity in pursuit of a balance between business needs and systems expertise.
As for autonomy, there are two distinct ends to the spectrum. At one end, organisations will occasionally give the security function absolute autonomy. In such scenarios, the function head often reports into the COO or CFO, has their own budget, and is distinct from other departments. But for businesses that don't handle consumer data, there’s a tendency to be less risk-averse. Cybersecurity leaders here are often given a wider remit of responsibility along with smaller teams, and a heavier reliance on partnering with the wider business. In these instances the function’s autonomy is lessened, but knowledge of operating and information systems should still be firmly integrated among the team.
Autonomy is also closely tied into how centralised the function is. A top investment bank we investigated, for example, splits the function entirely among its business units, choosing a fully-decentralised model with figureheads sitting at the Group level. By contrast, others centralise the theme completely, opting for a fully-automated system across all business lines. This also raises the question of whether to structure the function along these lines or do so by geographic remit instead.
Again, it depends on your needs. A top American bank has constructed an interesting hybrid model that’s somewhere between the two; US operations are managed by a number of small specialised teams that report into a Group-level Information Security officer, whilst outside the States, regional heads oversee security across EMEA.
Yet sources within the bank have spoken of infighting. People are confused as to who holds ultimately responsibility outside the US headquarters. There has also been division between the tech-focused specialists in the States and the more broadly BD-oriented professionals abroad. The lesson? Highly-specialised hybrid models can be tripped up if there aren’t clear lines of reporting and responsibility communicated from the outset. A mishap due to infighting can jeopardise the unity of cybersecurity across the entire business.
Building the Safety Net:
Systems
This theme of unification spans the entire length of the cyber highwire. Your people aren’t communicating? Wobble. You don’t have a defined cybersecurity culture? Wobble. Your systems are incompatible? Audience gasps. Systems present a huge challenge to businesses that want to tap into the growth potential of their data without compromising security in the process.
Take the US Department of Energy, for example, responsible for the mammoth task of coordinating the American power grid. The DoE have worked for years to facilitate both the security and value of their data, developing what they call the ‘Smarter Grid’: a network that can survive a cyber-incident while sustaining critical energy delivery functions countrywide. Key takeaways from their approach to future-proofing cybersecurity include:
- Understanding your network and the threats posed to it
The US grid is in part comprised of decades-old legacy devices with limited communication and processing power. Hackers have tried to capitalise on this by sending malicious commands designed to mimic the actual data these systems transmit, causing malfunctions. From a cybersecurity perspective, modelling the physical results of such commands can help operators to assess risk well in advance and draw up protocols accordingly.
Besides creating attack scenarios, you don’t have to alter the system itself to improve organisational responsiveness. Simply understanding what you’re currently working with can go a long way to being prepared in the event of an attack: document network architecture, identify any systems that are business-critical or contain the most sensitive data, and you’ll have a better chance of understanding the risks facing your digitised infrastructure.
- Have a backup
A key example the DoE give is the GPS system used to synchronise devices that measure electrical pulses across the grid. The department found that these GPS signals can be jammed or ‘spoofed’, resulting in interference or even direct manipulation. They tackled the issue by implementing multiple receivers that cross-check each other as a backup. Don’t rely on one device if it’s handling business-critical information; back up your data and investigate if your system has any kind of failsafe. - Build cyber into the foundation of new innovations.
At times where the business needs are in direct conflict with security objectives, a balanced approach would require that more risk evaluation takes place during solution selection, implementation, and post-deployment. The DoE also points out that cybersecurity starts at the beginning of a system’s implementation journey, in the supply chain itself. Components can be damaged or directly tampered with and common sense dictates that the more critical a device, the more care needs to be taken to ensure its safe delivery. If you’re ordering microprocessors for an Apache helicopter, you want a third-party supply chain specialist to handle the logistics.
The DoE also propose a move towards standards-based vendor acceptance. Make sure that different solutions can function in unison without compromising one another, and ask your vendors if they’re aware of any back doors into their systems. Working closely with suppliers can fortify the integrity of your security infrastructure from the get-go. They should understand your needs and be able to review their software or firmware in response to any issues as they arise.
Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has to hasten to battle will arrive exhausted
Sun Tzu: The Art of War
Acrobats:
People and Cybersecurity
So you’ve built the Big Top, put up your safety net – now what? Train your acrobats. Some of the worst leaks in recent memory have been the result of basic human error – like failing to dual-authenticate social media accounts or leaving laptops on a train. Human error has cost companies and governments millions, not to mention the incalculable damages caused to reputations. Even buying a pizza can be risky!
Yet amazingly, when asked ‘who is most responsible for ensuring strong cybersecurity’ in a report published by Cisco last year, individual employees came out dead last with a vote of only four percent (CEO/Board members were the highest at 39%). Understandably, it’s up to C-Suite to make those critical final decisions on how to implement strategy and resources. But the cybersecurity threat has been proven time and again to pervade every tier of an organisation.
Realising your cybersecurity potential therefore involves the promotion of a culture of training and education, openness, and strong leadership among your employees. With IT so widespread and a huge proportion of the workforce now on smart phones, privacy and security is an individual concern as much as it is a business concern.
In a forensic study of the cyber-environment in the US military, for example, the Harvard Business Review showed how the largest navy in the world puts their people at the epicentre of their cybersecurity efforts. High-reliability organisations like this, HBR writes, ‘possess a deep awareness of their own vulnerabilities, are profoundly committed to proven operational principles and high standards, clearly articulate accountability, and vigilantly probe for sources of failure.’
Underpinning this stringency is a code of ethics that’s inculcated in all personnel from day one, based on the following operating principles:
- Integrity
- Depth of Knowledge
- Procedural compliance
- Forceful Backup and constant oversight
- A questioning attitude
- Formality of communication
In this environment, the training and oversight of the individual informs the resilience of the whole. Even simple things like password controls and attachment awareness can reduce the risk of breaches caused by an individual. HP’s Most Effective Security Technologies & Practices 2016 report suggested that 33% of organisations didn’t enforce strong password policies. Simply making employees aware of the risks and promoting diligence is an effective first-line defence. The ‘more eyes on’ attitude of the US Navy (point four), for example, ensures that slip-ups get caught early. They expect mistakes to be reported immediately before they cause further problems. But importantly, they create an environment where employees feel comfortable doing so.
Ringmasters:
Cyber Leaders as Secure Digitisers
In many ways, the military’s operating model is both the most relevant to the cybersecurity theme and also one of its most appropriate metaphors. The constant barrage of threats directed at these incredibly tactical systems dramatises the cybersecurity problem in its most extreme form. It also plays on the old adage that ‘attack is the best form of defence’, which – while it doesn’t translate directly – does point to an emerging mindset in the current battle for cybersecurity balance. The popularity of monikers like the ‘Cyberdefender’ (HBR) and the ‘Secure Digitiser’ (Cisco) are beginning to suggest a new rhetoric of proactivity within the function.
‘Cyberdefenders’, say HBR, ‘need to create “high-reliability organisations” – by building an exceptional culture of high performance that consistently minimises risk.’ A synergy is beginning to emerge between a defensive technology-based view of cybercrime and the enabling potential of data. Cisco explains that the Secure Digitiser is someone who takes ownership of cybersecurity by choosing projects with a high opportunity-to-risk ratio – and not just a low-risk profile.
Analytics, IoT and Cloud Computing all require a new sensibility. As digital technologies become more integrated into business functions, so-called Secure Digitisers ensure that all digital processes are re-engineered ‘with cybersecurity as the foundation’. Innovation, confidence and responsibility have thus become three core traits of the new cyber ringleaders. These professionals develop a strong individual focus on responsibility for data security and encourage an open and innovative environment. For them, cybersecurity underpins the foundation of their work, and the very best will actively promote this same mentality within the wider business.
Summary:
Walking on a Wire
In the context of increasing attacks, talent scarcity, an explosion of new applications and mounting regulatory pressure, cybersecurity will continue to be a key priority for executive teams worldwide. Through our ongoing discussion with leaders in the field of cybersecurity, as well as our broad approach to researching the problems that face digitised industries today, we’ve summarised the following attributes of the well-balanced cybersecurity function:
Structure:
- Effective communication between stakeholders
- Clearly-defined responsibilities and reporting lines
- Function structured according to business needs and nature of data being handled
- Balanced between technological infrastructure and access to business needs
- Build cybersecurity from the start of new projects
Systems:
- Understand your infrastructure and the threats facing it through documentation and stress-testing
- Implement backups and failsafes
- Work closely with vendors to evaluate the risk of introducing new solutions, and verify their compatibility with existing networks
- Ensure supply-chain security
- Build cybersecurity from the start of new innovations
People:
- Recognise the importance the individual has on the security of the whole business, promote an awareness of this internally
- Develop ‘first-line defence’ mentality based around education and collaboration
- Clearly define your cybersecurity operating principles
- Employ leaders who have a mix of technical skills and business acumen
_____________________________________
Wilbury Stratton is the leading international Executive Intelligence firm. Over a third of the FTSE 100 rely on the information we provide to make informed decisions on the strategic direction of their business. Whether understanding their competitive landscape and the talent that lies within, mitigating leadership risk or benchmarking their own people, we provide relevant and actionable information to organisations that transcends geographies, functions and industries.
For a confidential discussion about your requirement or to read the full cybersecurity white paper, please get in touch on +44 (0) 203 727 3333, visit www.wilburystratton.com, or follow us on Twitter @WilburyStratton