itc-logoitc-logoitc-logoitc-logo
  • What We Do
    • Computing Alliance
      • SPARK
    • Tech2Market
    • Capital Connect
    • Public Policy
  • About Us
    • The People
    • Contact Us
    • Volunteer
  • Membership
    • Member Benefits
    • Become a Member
  • Innovation Matters
  • News
    • Blogs
    • Local News
    • Newsroom
  • Events
    • Calendar
    • Conferences
  • Reports
    • Knowledge Report
    • Deal Flow Reports
    • Joint Survey
Business Spotlight: Learn More About Strategic Tax Solutions!
March 16, 2020
St. Luke’s Partners With Local Distillery To Create Hand Sanitizer for Medical Facilities
March 24, 2020

Avoid The Nightmare of Cyber Attacks CYBER SECURITY Against a Skilled Adversary!

Published by Fehoko Lui at March 18, 2020
Categories
  • Industry News
  • Uncategorized
Tags

Shadowscape, Inc. & James McCarter

February 20th, at the Idaho Technology Council's SPARK series, James McCarter explained the challenge of having companies play whack-a-mole against malicious hackers, and the importance of knowing your enemy. James treated us to an action packed dive into cyber threats and how to position your company to have the best possible defense against cyber threats.  

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

                                       -The Art of War by Sun Tzu

Factoring in security is a constantly changing world, with national threats and international groups gaining traction, now is the time to focus on defense using adversary focused frameworks,such as MITRE ATTACKTM, top-down threat based defenses, and focusing on stopping “the hack” first to determine how best to posture an organization's defenses. Building cyber hygiene through academic approaches and checking odd boxes is not enough. “We need to be focusing on stopping the attack”. 

How skilled does an adversary have to be to execute these kinds of attacks and why do they do it?

It’s important to approach the cyber adversary with a similar scrutiny as any other criminal. Understanding their motives and assessing their opportunities. 

  • Motive: The reasons and targets a suspect would want to exploit. 
  • Opportunity: Determining opportunities we have left on the table for the adversary to compromise. 
  • Visibility: How visible to the outside world are you? Do you look like a juicy target? How broad is your “attack surface”.

When we get into the attack motives, adversaries start with assessing a company and looking for initial access, most commonly through a form of social engineering. Once they are in, they will execute their attack that is either financially driven, politically motivated or simply exploitation of targets of opportunity.

cyber security

Assessing Risk

Understanding your company's weaknesses is critical to be able to know how the latest threats and trends apply to your gaps in coverage. One of the main issues in cyber security preparedness is going through and mitigating risks. When posing one example, Drive by Compromise, McCarter talked about assessing gaps in coverage. “Consider with your team, are we doing any application isolation and sandboxing? Are we updating our software, patch management, vulnerability management? Rate them." says McCarter. Document capabilities, evaluate credential access, what your anti-virus solution is capable of catching. Do you track passwords of current and former employees, how many admins do you have on your networks? Ask your team, are you logging into a site using your admin access, when what you’re doing does not require admin access? Have two different accounts, only use admin when absolutely necessary. James suggests companies identify the most pervasive threats, undertones, common tactics, and methods of the adversary. Then tailor your defense to focus on your weak points and easily solvable gaps and finally matching them to the adversary’s strong points. Understand your own network, and structure your networks’ environment to widen the OODA loop of your adversary. 

"The adversary is human” James explains. "Human's will take the path of least resistance—they will take the low hanging fruit. If we keep that in mind when we are playing defense, we will start with the upper hand.” 

"Use intelligence to inform how to posture your network defenses. A hack is a campaign. It’s not that we see in the movies, *click*click*click*, I'm in.” It doesn’t work that way. It is a process. They have to get initial access. They have to move laterally, execute privileges. Clean up the tracks, etc. There’s a lot of opportunity to find the adversary within their campaign. The average adversary lives not the network for an average of 200 days before anyone finds them,” according to McCarter.

How do we accomplish this?

cyber security-2

Risks must be catalogued! When dealing with adversary threats, the defenders of a company need a common conduit to communicate and defend against adversary tactics and methodology. If your customer database could be compromised, what would you do to protect it? How much would a breach cost your company? Assessing these costs and making changes could make it easy to justify an investment into cyber security. “Map it out.” says McCarter. 

As you go through and make improvements to asset management, we see our risk profile improve across the board. The likelihood of an attack is lowered with every risk assessment you take on. A threat intelligence team can report on areas we need to be searching for, assessing high target, high risk areas. Make these configuration changes and cross-functional teams now have a common project.

Things we can keep in mind, when informing C-level executives to help Executives decide where to put dollars into cyberspace

McCarter suggests to send executives a message that there is a level of risk to the entire organization. Over time you can show the risk profile ‘went from here to there’ in a way that executives can see that you are making progress. You can show over time that you are making improvements. ”As you are making improvements, the threat environment changes. With a risk profile, we can show how impactful the new tactics are as the threat landscape changes and gets more scary. Impact analysis, and risk assessments give us a way to prioritize and triage the important information," says McCarter. 

For More Information:

To Contact James McCarter: info@shadowscape.io

To Contact The Idaho Technology Council for membership inquiries: jfuhrman@idahotechcouncil.org

Other Materials

White Paper on above Subject:
Shadowscape Training in Boise Idaho
Share

Related posts

October 30, 2020

CyberStart America


Read more
September 23, 2020

Cradlepoint joins Ericsson


Read more
July 8, 2020

Tonaquint Acquires Fiberpipe


Read more

Join the ITC Today!

ITC membership provides a valuable link to a premier industry voice that promotes
the use, growth and development of technology in Idaho.

Join The ITC

Menu

  • Home
  • News
  • Conferences
  • Contact Us

About

The mission of the Idaho Technology Council is to help companies in Idaho start, grow, and thrive. ITC’s member-driven organization includes partners ranging from growing companies, mid-size companies, and large corporations, all committed to the success of Idaho’s technology ecosystem.

Contact

Idaho Tech Council
101 S Capitol Blvd
Boise, ID 83702
(208) 917-5700

Copyright © 2019 Idaho Technology Council - All rights reserved