Are we really still in the Dark Ages of cyber security?

In his keynote speech at the RSA Conference 2015, Amit Yoran, RSA Security’s president, aired his opinion that information security needs to “escape the dark ages” – but is he right?

There’s no doubt that many of his comments will ring true with computer and network security professionals. Certainly, following the staggering number of security breaches in 2014, most of the sector is ready for a new approach to cyber security.

Current strategies are a result of an evolutionary process permanently building existing mindsets and technologies without ever reassessing the ever-changing threats posed in cyber warfare.

Yoran’s comparison with the past continued with his criticism of companies simply “building taller castle walls and digging deeper moats” which he said is “not solving the problem”.

Evolution instead of revolution

Now considered ‘The Year of the Breach’, 2014 saw an estimated four out ten companies fall foul of a security attack and, with rising levels of sophisticated campaigns by digital terrorists, Yoran is urging the industry to pursue an ‘Age of Enlightenment’ of its own.

His vision for RSA’s development of robust cyber security is centred around five key points:

1) The sector must acknowledge that even the most advanced protection systems do not work. Security professionals must accept the reality; if someone wants to break into an IT environment then, with the right resources, dedication and creativity, they will do so.

2) The sector needs to improve visibility across its entire environment if it is to detect, identify and combat the threats to networks. Many organisations are seemingly blind to the risks of known techniques, and it is imperative to adopt a more pervasive approach to risk detection.

3) The sector needs to focus on attacks from web applications where credentials are stolen and used maliciously and fraudulently. Isolating this risk, and safeguarding users’ own actions, is an essential defence against breaches of security.

4) The sector needs to continue to adopt and develop external threat intelligence. Incorporated into a security programme, threat intelligence needs to be an automated process and adapted to each individual company’s own risk policy.

5) Companies must categorise the risks to enable resources to be deployed on only the important aspects of an organisation’s data security. Being selective with what you need to protect is an essential element of damage limitation.

Whilst Yoran doesn’t claim to have all the answers, it’s clear that the industry is starting to ask the right questions. Perhaps 2015 will be remembered as the beginning of a new era in cyber security.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy