Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnCybersecurity News

The Good Old Days of Cyber Security

Advanced Persistent Threats (APTs) are proving traditional cyber attacks (viruses, malware, etc) outdated, according to Larry Clinton, President & CEO of the Internet Security Alliance.

By Diane Ritchey
September 1, 2013

Each minute in 2010 there were 45 new viruses created, 200 new malicious websites established, 180 personal identities stolen, 5,000 new versions of malware created and most importantly, 2 million dollars lost. That is what Larry Clinton, President & CEO of the Internet Security Alliance (ISA) calls the “good old days.”

According to Clinton, the alarming, but traditional attack methods that were causing such damage in 2010 can be considered outdated compared to the newer attacks of today called the “Advanced Persistent Threat,” or the APT.

ISA is a multi-sector trade association with membership from most of the major industry sectors. 

In 2008, ISA published its Cyber Security Social Contract, which articulates a market oriented, incentive based model as an effective sustainable model for improving our nation’s cyber security. The Contract is both first and last source cited in the Executive Summary of President Obama’s Cyber Space Policy Review.  

When the Obama White House issued its executive order on cyber security earlier this year it essentially adopted the ISA’s Social Contract model.

APT is not only well funded, Clinton says, but it’s also well organized, highly sophisticated and it targets vulnerable people more than vulnerable systems.

Clinton adds, “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains or trains loaded with lethal chemicals, contaminate the water supply or shut down the power grid across the country. Attackers could also seek to disable or degrade critical military systems and communication networks. The result could be a cyber Pearl Harbor; that would cause physical destruction and the loss of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.”

These facts, of course, beg the question, if this is such a big problem, why hasn’t it been solved?

According to Clinton, and previous columns by SecurityPublisher Mark McCourt,  one problem has been that policy makers have been thinking of cyber security primarily as a technological problem, when in reality it is an enterprise-wide risk management issue. Technology only tells us how attacks occur; economics tell us why attacks occur. Considering technology without considering economics is as misguided as thinking of economics without technology.

“For example, economists have long known that liability should be assigned to the entity that can manage risk,” Clinton says. “Yet everywhere we look we see online risk allocated poorly…people who connect their machines to risky places do not bear full consequences of their actions. And developers are not compensated for costly efforts to strengthen their code. We find that misplaced incentives are as important as technical design…security failure is caused at least as often by bad incentives as by bad technological design.

“Moreover, there has been a misconception that increased security is good business. That is clearly true to a certain extent However, in the digital business world there are major economic incentives to deploy insecure systems and processes,” Clinton notes. “For example VOIP is basically less secure than traditional telephony, but businesses have deployed it widely for the massive cost savings. The economics driving these unsecure decisions are overwhelming.”  

“Making the business case for security could be a challenge – no one wants to pay their insurance bill until the building burns down,” Clinton says. “And the challenge in cyber security is not that best practices need to be developed, but instead lies in communicating these best practices and demonstrating the value in implementing them and encouraging individuals and organizations to adopt them.”

Even with all these problems there still seems to be some light emerging at the end of the tunnel. To begin, there is growth toward businesses taking an enterprise-wide cyber management approach to cyber security. In 2008, according to Clinton, only 15 percent of companies ISA surveyed had enterprise-wide risk management teams for privacy/cyber. In 2011, 87 percent of companies had cross organizational cyber/privacy teams. Some major firms are now including ISA Financial Risk Management in their enterprise programs, which are also being used as the foundation for the Enterprise Risk Management process that will be part of the voluntary program that the Obama Administration is creating under its Executive Order on Cyber Security.

In addition, there are now numerous books and pamphlets and websites to assist enterprises in their fight to become more cyber secure. One such document has just been published by ISA on how to fight the APT on a smaller budget.  Among the tips provided are Corporate due diligence: enforce the “Need to Know” rule, encrypt everything in transit and at rest (i.e. the iPhone), with foreign travel use throw-away laptops, label all documents and e-mail with the appropriate data classification and upgrade to the latest operating systems. systems.

What is your enterprise doing? Let me know, ritcheyd@bnpmedia.com   

KEYWORDS: advanced persistent threat cyber threats internet security allinace Larry Clinton malware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Good and Bad of Protecting the Goods

    See More
  • Security in 2012: When Better Isn't Good Enough

    See More
  • SEC0620-talk-Feat-slide1_900px

    Good Security News from Essam Choudhary

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing