Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Hire a Hacker: A 2013 Security Imperative

Security Online Exclusive

By Ron Woerner
November 13, 2012

A wise person once said that there are two kinds of companies: Those that have been breached and those that don’t know they have been breached.

At least, they don’t know yet. And by the time they do find out they’ve been victimized, it’s probably too late to control the damage.

Fortunately, there is a way to stay ahead of security problems that can compromise your reputation and your bottom line: Seed your security staff with ethical hackers or budget to contract for such services at least once a year.

The role of an ethical hacker is to think like an unethical one, digging deep into the IT environment to find – and address – security holes before the black-hats can take advantage of them. You may want to consider specifying that candidates for an in-house job, or employees from a third-party security firm, are certified ethical hackers. Anyone can call themselves an ethical hacker, after all, but a certification behind that moniker helps validate an individual’s real skills and abilities. Your business is too important to leave vulnerability assessments and penetration testing to grown-up script kiddies who want to do “good” hacking, but who may actually do damage because they don’t understand the tools they’re using. 

The EC-Council (The International Council of E-Commerce Consultants) is the home of the Certified Ethical Hacking and Countermeasures (CEH) security certification, which I’m proud to have been granted in 2006. Earning the certification entails learning how the bad guys actually breach an organization’s defenses, gaining first-hand knowledge of their tools and techniques in order to employ them for good. Certified ethical hackers also must understand that they are to deploy their knowledge for good and will obtain the organization’s explicit consent prior to traipsing across its systems and networks.  

Certified Ethical Hackers At Work

The decision to hire internal ethical hacking experts versus outsourcing the task to a contractor depends largely on the size and scope of a business and the risks to which it is prone. Most large financial firms, for example, have a cadre of ethical hackers on-hand to constantly evaluate potential threats and explore how vulnerabilities can be exploited. Tests might always be ongoing on their most high-risk systems, for instance, to ensure a hole never opens.

Having in-house staff with these skills makes sense when you have a big X painted on your back as being a prime cybercrime target. Hiring full-time certified ethical hackers also is a good idea if changes to networks or systems are pervasive at your organization, whatever industry you’re in, since any alterations can open up new vulnerabilities.

However your business might source ethical hacking talent, one thing is certain: You are only as good as your last penetration tests. These tests are a series of attempts by on-staff or contracted ethical hackers to break into a corporate network and systems to see how they can exploit the holes identified in vulnerability assessments. Their means of entry run the gamut from using the Internet (Google Hacking), to remote access scenarios, to social engineering techniques directed at employees.

Penetration test efforts extend even to having ethical hackers physically enter the premises, disguised perhaps as a repair-person, to find open wired network connections they can plug into, or untended and unsecured PCs where they can install tools to capture passwords and gain network access.

The reason for trying all these doors, so to speak, is simple: The evil-doers need only find one way in, but the protectors need to put up roadblocks in every possible path. Admittedly, penetration testing is risky business, because production systems might break during the efforts. Some certified ethical hackers try to avoid creating problems for the business by conducting their tests during off-hours, or they may even build test systems that replicate real-world environments.

How long penetration testing takes varies depending on whether everything is being tested or just a subset of systems, but three to four weeks is not uncommon for a specific project. At the end of an effort, certified ethical hackers will disclose security problems to management and help them understand the risks each one creates as it relates to business impact.

Be prepared: An organization may well be presented with an intimidating list of dozens of security issues. The good news is that the top five or so identified on that list may represent the main avenues into the corporate environment, and fixing these may greatly reduce the need to address the other issues post-haste.

 When you bring certified ethical hacking into your organization, the opportunity is there to be a third kind of company: The kind that isn’t going to let a breach happen without putting up one heck of a fight.  

KEYWORDS: cyber security hacking penetration testing security breach security ethics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ron Woerner is a noted speaker and writer in the security industry and the Director of the M.S. Cybersecurity program at Bellevue University, an award-winning leader in educating adult learners online and in the classroom. He has 20 years of corporate experience in information technology and security, and he has worked for HDR, TD Ameritrade, ConAgra Foods, Mutual of Omaha, CSG Systems and the State of Nebraska. Ron earned his B.S. in computer science from Michigan State University and his M.S. in information resources management from Syracuse University. He is a Certified Information Security Professional (CISSP) and Certified Ethical Hacker (CEH).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Educating Employees to Build Better Cyber Security

    See More
  • 4 Challenges to Address in Corporate Cyber War

    See More
  • 4 Ways to Improve IT Collaboration

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing