Today’s CSOs Must Confront Cybersecurity

File this one under “Missed Opportunities.”

In a three-part report that ran November 11-13, the San Jose Mercury News extensively detailed the increasing threat, cost and liability U.S. enterprises face from cybercriminals.

In the second part of his report, titled “How Well Are We Protecting Ourselves?” author Ryan Blitstein recounts a telling anecdote.

When Rick Wesson founder of Support Intelligence, a cybersecurity consulting firm, determined that online criminals were hijacking several Oracle computers into robot networks, or “botnets” and using them used to distribute malicious email to PayPal customers -- most likely “phishing” schemes aimed at fraudulently acquiring account information and passwords -- he notified Oracle’s chief security officer. Her course of action was to direct Wesson to the Oracle’s physical security group that, in Blitstein’s words, “manages the door locks and cameras, and watches the parking lot.” In the end very little was done about the intrusion.

Perhaps Oracle’s CSO thought she was doing the right thing. But the greater lesson here is that a C-level security manager at one of the largest high-tech companies in the country did not understand the significance of the attack nor seemed to be properly prepared to handle it.

At the same time, I think Blitstein was a bit harsh in dismissing the security operation as merely door locks and cameras. Anyone in this industry knows that enterprisewide physical surveillance and security is a sophisticated task. Nonetheless, it’s clear that that’s where the Oracle CSO saw as the boundaries of her job, and that’s where the organizational flaw was.

Cybersecurity and physical security are two sides of the same coin. Just as pertinent to this story is the fact that when Wesson picked up the phone he called Oracle’s CSO, not the CISO or the vice president in charge of Information Technology. CSOs still manage the first line of defense of their enterprises. Wesson, an IT security expert, acknowledges that by his choice of contact.

This presents both an obligation and an opportunity. The obligation is to understand the nature, extent and significance of cyberthreats, even a botnet. A few computers sending out spam may seem harmless to many organizations, Wesson tells Blitstein, but compromised corporate machines could allow thieves to access documents containing trade secrets, insider data in executives’ e-mail, and databases of private employee information.

Moreover, an attack is not a sign of weakness or poor security, and should not be held against a CSO. The CSO must be part of the solution. The challenge of cybercrime is that as fast as vulnerabilities can be countered, new vulnerabilities are discovered an exploited. Symantec estimates 4 percent of malicious Internet activity comes from networks of the nation’s 100 largest companies.

The opportunity for CSOs, already experts in building physical perimeter defenses, is to understand how the growth of cybersecurity threats expands their role in the defense of virtual perimeters -- namely the computers and servers that comprise an enterprise’s gateway to the global information network.

The tools are different, but the same strategies apply. IT managers understand the threat and tools, but don’t always appreciate the strategy. CSOs, on the other hand, grasp the strategy, but sometimes are intimidated by the tools. Suffice it to say: For everything that CSOs do in the physical world -- surveillance, identification and authentication, intrusion detection, response and isolation, there is an analogous function in the IT realm. The learning process requires understanding these tools and functions and how to apply them -- but that’s purely tactical. Dollars to donuts, I would say a CEO is more receptive to a plan that addressed enterprisewide security -- physical and virtual -- than a jargon-heavy document that IT departments often try to substitute for clear thinking.

The real problem at Oracle was that the organization failed to see cybersecurity as part of the CSO’s role. It’s up to the CSO to know that security threats have changed, and that begins by understanding and communicating to an organization and culture that today’s enterprise security takes in more than door locks and cameras.

The San Jose Mercury News’ series on Cybercrime can be found at http://www.siliconvalley.com/ghostsinthebrowser/ci_7408419.

About the Author

Steven Titch is editor of Network-Centric Security magazine.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.