Cyber Tactics / Cyber Security News / Columns

Stopping Cybersecurity Breaches Means Rethinking Consequences

Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?

The President's Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” describes the government’s approach to information sharing:  “It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats.”   

Consider for a moment whether our strategy is flawed. Will we continue to spend exorbitant resources only to find that no matter how improved our cybersecurity becomes, it will remain inadequate to safeguard our critical infrastructure and vital business interests? Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?


Vulnerability Mitigation Works, Up to a Point

Regardless of how vigorously the industry applies risk management principles and how diligently the government shares information, there is no chance the private sector can consistently withstand intrusion attempts from foreign military units and intelligence services or even, for that matter, from transnational organized crime. Even federal agencies routinely fall victim to major cybersecurity incidents (they suffered from more than 8,000 malicious code installations/executions in 2012 alone), and they are better resourced than most of corporate America. 

Perhaps then we have been over-spending on efforts to eliminate data and network vulnerabilities when, instead, we should be focusing on more quickly detecting intrusions and mitigating harm while in parallel – and this is the significant part – identifying, locating and penalizing bad actors so as to deter the majority of attacks.  Doing so would align our cybersecurity efforts with the security strategies we successfully use every day in the physical world.  Throughout the physical security spectrum, whether describing the safety of nations, businesses or individuals, safety is most often achieved because potential aggressors are deterred out of fear they will be brought to justice, and actual aggressors most often are brought to justice. Our physical safety is not primarily reliant upon missile defense shields, fortresses and body armor. 

In the physical world, vulnerability mitigation efforts certainly have their place. We take reasonable precautions to lock our doors and windows, which would be of varying strength and expense. Still, we do not spend an endless amount of resources seeking to cut off every possible point of entry against those who might dig holes underground or parachute onto the roof.  Instead, to counter determined adversaries, we ultimately concede they can gain unlawful entry. So, we shift our focus.  

We might hire armed security officers. More often, we get security systems that have alarms for instant detection and video cameras to assist in attribution. None of these make the facility any stronger or less penetrable. Rather, in the physical world, security officers, alarms and cameras essentially declare to the bad guy, “It’s no longer about us; now it’s about you.” When a monitoring company is alerted that a door was broken into at 3:00 in the morning, it calls the police to respond. It doesn’t call the locksmith. And, as a result, most would-be intruders are deterred from acting in the first place. It is surprising then that, in the world of cyber, when the intrusion detection system goes off our response has been to blame the IT security staff for allowing the intrusion, and to demand that they somehow prevent it from happening again.  


The Laws of Diminishing and Negative Economic Returns

Our trance-like focus on vulnerability mitigation has led to the problem of diminishing and perhaps even negative economic returns. For the former, imagine trying to protect a building by spending millions of dollars on a 20-foot brick wall. Meanwhile, an adversary can go to a hardware store and buy a cheap 30-foot ladder.  The same outcomes are happening every day in cyber, where defenses are expensive and malware is cheap.

Far worse, though, is the concept of negative returns, in which well-intentioned efforts actually make the problem worse. Consider our brick wall again. What if, instead of a buying a ladder to scale the wall, the adversary decided to blow it up? This is not dissimilar from our current defensive cyber strategy, which has had the unintended consequence of proliferating a greater quantity and quality of attack methods, thereby escalating the problem and placing our infrastructure and businesses at greater risk.


Lack of Time

As long as cyber threat actors can breach our networks with little or no fear of consequence, the problem will get worse. Just as in the physical world, victims can only do so much – regardless of how much we blame them, share information with them, regulate or sue them. Instead, greater government attention must be placed on the technologies, policies and partnerships needed to detect, identify, deter and punish cyber intruders. Business leaders and the government must engage in this dialogue and paradigm shift now. Time is not on our side. 


About the Columnist: Steven Chabinsky recently testified before both the U.S. House and Senate on the need for greater cyber threat deterrence. He is General Counsel and Chief Risk Officer for CrowdStrike, a cybersecurity technology firm, and he previously served as Deputy Assistant Director of the FBI’s Cyber Division. You can follow him on Twitter @StevenChabinsky

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.