For some CISOs, hammering together a strategy to protect the organizationโs vital data can be easier than hammering heads at the executive table. Many business leaders still donโt understand what cyber security is or see it as an impediment to the organizationโs objectives.
Hewlett-Packard Enterprises thinks it has a way infosec pros can get their message across: Explain that cybercrime works as a business โ it has ways of making profit, and the CISOโs job is to make it too expensive for criminals to be a target.
Thatโs the rationale behind a white paper HPE issued this week called The Business of Hacking. The 20-page document is aimed at the C-suite to help management understand cyber crime in business terms.
In short, says Chandra Rangan, HPEโs vice-president of marketing for security products, executives and lines of business owners need to understand that like business competitors, criminals have a supply chain, have to manage a talent pool, do their own marketing and make a profit from selling goods (stolen data) on the black market. Anything that disrupts that chain helps.
So management should realize the goal of infosec pros is to use technology to reduce the profit criminals can realize in attacking the organization, either by increasing the cost of business to the attacker or by making what they get harder to sell. Either way, hopefully. the attacker decides to choose an easier target.
The business lesson for management: โThereโs are things you can do to make it tougher and less lucrative for attackers to go after you,โ said Rangan.
CISOs regularly ask the C-suite for more money and/or resources for a tool or process to improve security, or increase the risk of being hacked, โand there has been limited success with that model,โ he argued. โWhat weโre trying to do is reach out to the business leaders and say โThey types of things you do can have a meaningful impact because itโs increasing the cost of the attacker going after you.โ
Rather than trying to convince management IT can plug every hole, Rangan said infosec pros should turn convince management itโs a matter of weighing the risks and rewards of the right technology and process. Some techniques โ adopting internal security controls, limiting access to sensitive data, create honeypots, use analytics โ may help slow an criminal down to the point the attack will be abandoned.
And if there is a breach the technology (for example, encryption or tokenization) will help reduce the value when the attacker wants to sell it.
Itโs an organiationโs โdutyโ to use technology to disrupt the business of hacking on a continuous basis, says the report. โIt is critical that an enterprise determine which technologies will be most effective at disrupting the adversaries targeting their unique business.โ