{"id":11833,"date":"2016-01-13T12:30:00","date_gmt":"2016-01-13T20:30:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11833"},"modified":"2016-01-13T13:30:35","modified_gmt":"2016-01-13T21:30:35","slug":"cio-advice-for-weathering-the-cybersecurity-product-and-services-market-downpour","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/01\/cio-advice-for-weathering-the-cybersecurity-product-and-services-market-downpour\/","title":{"rendered":"CIO Advice for Weathering the Cybersecurity Product and Services Market Downpour"},"content":{"rendered":"<p><em>The following is a guest post from Yisroel Hecht, former Chief Information Security Officer for the City of New York, and Associate Commissioner of IT Security at the NYC Department of Information Technology and Telecommunications.<\/em><\/p>\n<p>As cyberattacks continue to proliferate, so\u00a0do\u00a0the number of security products being developed to detect and mitigate these attacks. Corporate executives are in a\u00a0panic\u00a0to maintain their company brand and are, thereby, compelled to\u00a0invest extensively\u00a0in new products to enhance their cybersecurity posture. Unfortunately, many organizations lack the expertise in understanding how to countermeasure the\u00a0ever-emerging, dynamic and evolving cyberthreats, so they continue to layer their environment with additional security products. This approach creates more complexity in securing their digital assets and,\u00a0consequently,\u00a0renders new opportunities for adversaries to compromise their business.<\/p>\n<p><!--more--><\/p>\n<p>Vendors are keeping a watchful eye out for victims of cyberattacks to whom they can sell their products.\u00a0No assurances are provided to their clients that they will be able to further diminish the probability of a successful cyberattack.<\/p>\n<p>To highlight this point, I would like to share the following anecdote:<\/p>\n<p>After a tiring day of harvesting his crop, Ivan, a 13th century peasant, returned home to put his day\u2019s earnings into storage. Dark clouds rolled in and the wind began to howl as Ivan worked feverishly to pack his loaded wagon into the silo before he lost his crop to the approaching storm.<\/p>\n<p>A passing peddler\u00a0noticed the peasant whipping his oxen as he struggled to pull the oversized load through the small opening of the silo. Observing this, the shrewd peddler called out to Ivan, \"Why are you hitting the oxen? Can\u2019t you see the crop is too large for the small entrance? Here, take a look through this magnifying glass, and you will see the silo opening enlarge! Why don\u2019t you purchase this magnifying glass, and you will solve your problem by expanding the silo's entranceway.\"<\/p>\n<p>The simple peasant bought the magnifying glass for a hefty price, and the peddler went on his way. Ivan took a look through the magnifying glass and, to his delight, saw the entrance enlarge. He then whipped the oxen in an attempt to enter the silo; but, to his disappointment, the wagon wouldn't budge. Bewildered and angry he ran after the peddler, \"This tool doesn\u2019t work! I want my money back!\" The peddler chuckled and responded, \"Pay me another 20 percent and I will show you the most effective way to use this device.\" The naive peasant agreed and paid.<\/p>\n<p>The peddler explained, \"The problem is, when you look at the silo's entrance through the magnifying glass, the doors expand; but when you look at the wagon through the same side of the glass, the crop expands as well. The solution is simple: look at the silo opening using this side of the glass to see it expand. Next, turn the glass around and look at the load through the other side, and watch the crop shrink. If you follow these steps, you should have no problem getting your harvest into the silo.\"<\/p>\n<p>This time the peddler hurried on his way\u2026<\/p>\n<h3>Critical thinking and sound decisions<\/h3>\n<p>Before procuring new security solutions, it is important to have a clear understanding of the key gaps in your InfoSec capabilities.\u00a0It is equally important\u00a0to make sure the intended product will meet the business objectives. Security is achieved through a blend of people, process and technology. Many times the solution that is obtained has numerous dependencies\u00a0in order\u00a0to be effective. The security solution\u00a0may require a specialized skill set or significant integration work before there is noticeable value derived from the purchase.<\/p>\n<p>The following\u00a0are some of the most recent trending products in the information security market: <a href=\"http:\/\/goo.gl\/OQ6T6a\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Threat Intelligence (CTI) and Threat Intelligence Platforms (TIP)<\/a>.<\/p>\n<p>Benefits of CTI include:<\/p>\n<ul>\n<li>Actionable information<\/li>\n<li>Cyber adversary Tactics, Techniques, and Procedures (TTPs)<\/li>\n<li>Attribution<\/li>\n<li>Awareness of trending threats<\/li>\n<li>Predictive security<\/li>\n<\/ul>\n<p>Benefits of TIPs:<\/p>\n<ul>\n<li>Correlated threat data<\/li>\n<li>Automated mitigation<\/li>\n<li>Information sharing<\/li>\n<li>Tactical decision-making<\/li>\n<li>Enhanced executive reporting<\/li>\n<\/ul>\n<p>The above is a\u00a0crucial segment of the information security market that has significant value to establishments with mature security programs and dedicated advanced tactical teams to reduce the likelihood of a successful intrusion.\u00a0However, these products can be a distraction and counterproductive for organizations that still require manual intervention for common opportunistic malware, or those with minimum visibility into the users and applications traversing their environment.<\/p>\n<h3>A time for introspection<\/h3>\n<p>Opportunistic malware campaigns are still the most prevalent challenges that organizations face\u00a0today. Before you make your next information security investment, do a basic self-assessment on your current set of policies and controls.<\/p>\n<p>Here are some initial steps that will help enhance your cybersecurity program and assist with making informed decisions about your next investment:<\/p>\n<ul>\n<li>Create clear and concise organizational security policies<\/li>\n<li>Provide company personnel with a list of approved applications and services<\/li>\n<li>Turn off all system protocols and services that are not in use<\/li>\n<li>Enforce least privilege controls<\/li>\n<li>Institute an aggressive patch management solution<\/li>\n<li>Enable the appropriate levels of system, application and security logging<\/li>\n<li>Log all events to a centralized correlation engine<\/li>\n<li>Store all events based on your retention policy<\/li>\n<li>Enable strong authentication, authorization and accounting procedures<\/li>\n<li>Consolidate security products to platforms that are network, application and content aware with integrated threat intelligence feeds<\/li>\n<li>Implement a cybersecurity awareness and training program<\/li>\n<li>Evaluate which security services should remain in-house and which should be outsourced<\/li>\n<li>Establish key performance indicators to evaluate the effectiveness of the security program<\/li>\n<li>Categorize security investments, and measure the TCO and ROI against product performance<\/li>\n<li>Define a proven methodology to address cyberthreats<\/li>\n<li>Create a breach response guide and an executive communication playbook<\/li>\n<\/ul>\n<h3>Acquire control with measurable outcomes<\/h3>\n<p>In many ways firewalls\u00a0currently remain\u00a0the first line of defense. If you are still holding on to your traditional port-based firewall, now is the time to change it. Legacy\u00a0stateful\u00a0firewalls are no match for\u00a0today's\u00a0complex attacks;\u00a0these firewalls should be replaced with next-generation firewalls (NGFWs). NGFWs provide full visibility and control of the user, application and content so\u00a0that\u00a0you can\u00a0securely enable your business.<\/p>\n<h3>Selecting the right NGFW<\/h3>\n<p>Palo Alto Networks is\u00a0a\u00a0<a href=\"http:\/\/goo.gl\/LP8hZU\" rel=\"nofollow,noopener\"  target=\"_blank\">proven market leader<\/a> and forward thinking-company that has taken the obscurity\u00a0and complexity out of cyber defense.\u00a0They provide a single interface to get all the information you need to detect and defeat threat, whether physical or virtual, on premise or in the cloud.<\/p>\n<p>What I like most about Palo Alto Networks is their continued commitment to threat prevention. Many vendors and organizations have changed their strategy from threat prevention to threat detection and response.\u00a0Their method is accompanied\u00a0by a heavy reliance on human support to analyze the information and provide remediation. This approach is not scalable,\u00a0since\u00a0computers need to fight computers, and cyberthreats need to be compartmentalized so\u00a0they\u00a0become\u00a0manageable.\u00a0It is only possible to achieve an effective detection and response strategy\u00a0if there is\u00a0a committed focus on prevention.<\/p>\n<p>Palo Alto Networks NGFW stands out for its <a href=\"https:\/\/goo.gl\/QD7Lew\" rel=\"nofollow,noopener\"  target=\"_blank\">App-ID<\/a> technology, which provides granular control over network traffic streams, and for its fully integrated <a href=\"https:\/\/goo.gl\/2xZ7qJ\" rel=\"nofollow,noopener\"  target=\"_blank\">threat intelligence\u00a0capabilities<\/a>. The threat intelligence integration provides pertinent, relevant and actionable information, giving customers the ability to analyze, predict and, ultimately, prevent new and emerging threats. These features and capabilities are now extended to SaaS applications in the cloud and\u00a0are a\u00a0part of the unified <a href=\"https:\/\/goo.gl\/luWklk\" rel=\"nofollow,noopener\"  target=\"_blank\">next-gen prevention solution<\/a>.<\/p>\n<h3>Conclusion<\/h3>\n<p>The information security market has numerous, new and innovative products to tackle ever-evolving cyberthreats. However, many of these products are still point solutions that require the customer\u00a0to\u00a0further integrate the new product into their existing set of tools. This creates a lot of overhead and complexity, which\u00a0may\u00a0significantly\u00a0diminish\u00a0the effectiveness of the products.<\/p>\n<p>Vendors like Palo Alto Networks continue to build, simplify and natively integrate cutting-edge cyberthreat detection and prevention into their products, so customers can get the maximum value out of their security initiatives. They also <a href=\"http:\/\/goo.gl\/ferSh7\" rel=\"nofollow,noopener\"  target=\"_blank\">collaborate with other leading vendors<\/a> to share threat information. This strategy greatly improves defenses against cyber adversaries and decreases the potential of successful cyberattacks, including zero days and advanced persistent threats.<\/p>\n<p>Organizations need to tackle this cyber challenge holistically within their establishments through a bottom-up approach with executive leadership support.<\/p>\n<p><em>Yisroel Hecht is the former Chief Information Security Officer for the City of New York, and Associate Commissioner of IT Security at the NYC Department of Information Technology and Telecommunications. Yisroel oversaw the city\u2019s cybersecurity program, as well as the 911 public safety answering center II. He worked closely with over sixty agency CIOs to securely enable city services and strengthen public trust in local government.\u00a0Prior to this position, he served as Associate Commissioner of Network and Telecommunications where he was responsible for the city\u2019s voice and data communications infrastructure, which included the 311 call center. Yisroel has been with the City of New York for over eleven years, where he greatly enhanced the resiliency and efficiency of the city\u2019s infrastructure services and significantly reduced operational costs. He has also initiated innovative technologies that greatly contributed to the Sandy storm recovery efforts in 2012. Yisroel founded and co-chaired the Cyber Interagency Working Group, which consists of over 50 organizations from the public and private sector, law enforcement and critical infrastructure, to promote cybersecurity awareness and information sharing.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post from Yisroel Hecht, former Chief Information Security Officer for the City of New York, and Associate Commissioner of IT Security at the NYC Department of Information &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1461],"tags":[1688,145],"coauthors":[1687],"class_list":["post-11833","post","type-post","status-publish","format-standard","hentry","category-guest-post","tag-cyber-threat-intelligence","tag-next-generation-firewall"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11833"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11833\/revisions"}],"predecessor-version":[{"id":11839,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11833\/revisions\/11839"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11833"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}