Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Cyber Tactics

Emerging technology, evolving threats — Part II: The asymmetry effect

By John McClurg
SEC0921-cyber-Feat-slide1_900px.jpg
SEC0921-cyber-slide2_900px.jpg
SEC0921-cyber-Feat-slide1_900px.jpg
SEC0921-cyber-slide2_900px.jpg
September 2, 2021

In the wake of the Colonial Pipeline cyberattack and an ensuing Executive Order, a renewed focus is being given to the strength and resiliency of our infrastructures, punctuating two truths that have haunted our cybersecurity industry.

First, the growing number of infrastructures we deem critical were not designed, built or integrated with cybersecurity as a priority. And second, the software and operating systems supporting those structures were not designed, built or integrated with the prowess necessary to thwart the sophistication and volume of today’s cyberattacks.

Hindsight is always 20/20. Take, for example, the Lye-poisoning cyberattack in Florida. It’s tempting to declare, given what we know today, that as a cybersecurity community, we should have anticipated that adversaries would attempt to poison our drinking water by breaching an industrial control system in order to manipulate the chemical composition of the water (which is precisely what happened in that attack). There is no shortage of other examples, such as the 2016 attack on Ukraine’s power grid and the 2010 Stuxnet attack.

In each of these instances, the defense circumvented was what is commonly referred to as “air gapping.” This means that the physical target and its supporting systems had no connection to the internet. While much progress and no small investment have been made in addressing the possibility of artificial intelligence (AI) and machine learning (ML) supported and quantum-based cyberattacks, defense against cyberattacks targeting physical assets continues to lag. It’s an issue that has plagued the cybercommunity for decades and still does to this day.

 

The Asymmetry Effect

Asymmetric warfare typically refers to instances where one side, generally an advanced nation-state, may have invested heavily in the establishment of sophisticated defensive and offensive capabilities only to discover that an adversary — often a lesser-developed country, criminal enterprise or terrorist organization — can with little or nothing in the way of a similar investment nullify the intended benefits of the gap. In the cyber world, this imbalance has been notably chronicled by David E. Sanger in his book “The Perfect Weapon.”

Building sufficient cyber resilience and security to defend industrial control, supervisory control and data acquisition (SCADA), and Internet of Things (IoT) systems have historically come with a high price tag and introduced levels of inextricable technological complexity. At the same time, the cost and difficulty involved in executing attacks on these systems have diminished as the tools required have grown ever more easy to acquire via conduits on the dark web. This asymmetry undercuts the advantage advanced nations would otherwise command, leveling the battlespace for terrorists, criminals and less advanced nation-states.


 The potential significance of this asymmetry is exacerbated when it comes to critical infrastructures, as many nation-states we’d consider adversarial, e.g., North Korea, have yet to digitize much of their infrastructures, leaving them immune to the cyberattacks that they can advance against their more advanced adversaries. Disconcertingly, the number of entities potentially positioned to enjoy or exploit this asymmetry is growing and has put the cybersecurity community in an extremely precarious position.

Today, a single application may have hundreds of thousands of vulnerabilities. A threat actor needs to find only one to execute a damaging attack. Cybersecurity operators must wrap their defensive arms around an incredibly immense, evermore porous terrain in their efforts to ensure viable security. And if that terrain itself didn’t pose a daunting enough challenge, our adversaries are quick also to exploit that which we can never escape… our humanity. While hardware and software are usually the end targets they are technically pursuing, they do so through what they often perceive as the weakest link in getting there — us.  

This human variable is manifest in the modern instances of heuristics. These cognitive “shortcuts” that our brains take to alleviate the burden of complex decision-making while helping us solve problems more efficiently and learn new things more quickly can lead to cognitive biases, which, in turn, offer potential vulnerabilities that cyberattackers can exploit.  

More than 99% of cyberattacks rely on some form of human interaction at a critical juncture. We are forced to appreciate that cybercriminals are targeting people just as much, if not more, than the systems that underlie an infrastructure. This is why the trusted insider conundrum is exacting renewed attention. In most instances, they represent a cheaper and more accessible conduit to achieve one’s objective.

The fact that we cannot shed our humanity forces us to come to grips with the stark reality that we make mistakes, notwithstanding our best efforts. Making mistakes is a core part of the human experience — it is how we grow and learn. Unfortunately, this fundamental aspect of being a human is often demonized in the world of cybersecurity. On the other hand, our adversaries are keenly aware of this and recognize it as an opportunity. Almost every rogue cybercriminal appreciates they don’t need to defeat our world-class technology — they need only defeat us.

As I have intimated in earlier columns, the solution to this problem does not lie in removing the human. Such a goal should never be championed nor adopted. There are, however, ways we can bolster humans as our historic weakest link: 1) reducing opportunity, 2) integrating AI and other emerging technologies into security advancements and 3) continuing the never-ending task of educating users. Through these efforts, we can cast the human in a different light as partners with technology in the battles ahead.

 

KEYWORDS: critical infrastructure cyber security Internet of Things resiliency risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leader-to-leader

    Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies

    See More
  • SEC0821-cyber-Feat-slide1_900px

    Emerging technology, evolving threats — Part I: Quantum computing

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!