www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7663
Public Scan
Submitted URL: http://www.darkreading.com/careers-and-people/a-not-so-secret-secret-about-cybercrime-/a/d-id/1324322
Effective URL: https://www.darkreading.com/careers-and-people/a-not-so-secret-secret-about-cybercrime
Submission Tags: falconsandbox
Submission: On March 20 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/careers-and-people/a-not-so-secret-secret-about-cybercrime
Submission Tags: falconsandbox
Submission: On March 20 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There Mar 29, 2022 * Rethinking Asset Management to Improve Enterprise Security Apr 06, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There Mar 29, 2022 * Rethinking Asset Management to Improve Enterprise Security Apr 06, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There Mar 29, 2022 * Rethinking Asset Management to Improve Enterprise Security Apr 06, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event Protecting Industrial Control Systems from Modern Threats | April 13 Webinar | <REGISTER NOW> Event Rethinking Asset Management to Improve Enterprise Security | April 6 Webinar | <REGISTER NOW> Event How To Get Ahead Of The Security Data Curve -- And Stay There | March 29 Webinar | <REGISTER NOW> PreviousNext Careers & People 6 min read article A NOT-SO-SECRET SECRET ABOUT CYBERCRIME Cybersecurity is an issue business leaders fret a lot about in public, but they rarely treat the problem as a real and immediate threat. Jason Polancich CEO, Musubu February 16, 2016 PDF The last quarter of 2015 was a busy and interesting time to be a cybersecurity threat intelligence solutions provider. During the last part of the year, I witnessed some upticks in activity I have not seen much of over the last few years. For instance, for the first time, I saw more than a few customers in unexpected industry sectors adding budget items to their security spending to include new approaches like cyber threat intelligence. I also saw customers looking for real ways to bring an understanding and ownership of cyber threat and risk management closer to the business side of their operations. I even met a few customers wanting to learn how to start analyzing their risks and their matching cyber threats just as they would, say, their HR, logistics, or sales. Let’s just say it was a pleasant surprise. Overwhelmingly, though, the least surprising aspect of last year was the continuation of what has perennially remained the same: for most of corporate America, cybercrime is not a threat. At least, it isn’t being treated like one. Let me clarify. Tone deaf senior management For most of the senior leadership and executive management of corporate America, cybercrime is not treated as a real and immediate business threat. I’m convinced from nearly two-and-a-half decades of working in and around cybersecurity, this is indeed a true statement about today’s world. What’s worse, this pervasive attitude is a big part of what’s keeping us from making quicker, sweeping strides in becoming safer from cyber mayhem. Here are a few shockingly real examples from the last year: * A major Northeast credit union began appearing in our data collection and analysis streams as potentially having an exploited ATM card reader with card numbers and full customer data sets being actively traded on the Dark Web. Despite hard evidence of an active breach that could lead to litigation, company leadership directed concerned, albeit lower-level, security and risk professionals to ignore the issue and immediately discontinue any further monitoring. “That’s up to the customers to take care of,” they told them. * A large energy and power company contacted me after being attacked by a hacktivist group. Worried about customer litigation and reputation damage, their security professionals were urgently exploring ways to keep track of related hacktivist-targeting. Despite understanding the value of recommended threat intel from security leaders, senior executives said no company monies should be expended on “hit or miss” hackers who will get bored and move on [because] “the threat will pass.” * Security professionals from a financial subsidiary of a major oil company wanted to explore how they could find active threats to their financial customers. Security team members were shocked by the sheer volume of actionable cyber threats to their company and customers -- everything from hacked accounts and data being sold to highly-vulnerable software in customer-facing systems. After recommending a threat intelligence approach, leaders shut it down. The reason: “Those are non-factor” vulnerabilities. Now that sounds ridiculous. In reality, though, it’s the status quo for most corporate leaders and strategists. I’ve personally experienced it with alarming regularity, month in and month out. Despite undeniable evidence that every business is beset on all sides by cybercrime virtually every hour of every day, it seems that the cyber threat isn’t regarded as a real business risk in the same way, for instance, as weather might be for a shipping company, spoilage might be for a produce company, or malpractice might be for a healthcare company. As illogical as this seems, most corporations only pay lip service to cybersecurity. They view it as a secondary or tertiary concern that’s more of a technical box to check than a business driver. Practicing cybersecurity is the kind of thing you have to openly support and admit to being worried about in public. But privately, many business leaders fail to adequately prioritize it until push comes to shove. Review the details of the dozens of big breaches over the last few years and you’ll see it’s no accident each business appeared much less prepared than they should’ve been. In truth, each result was more an active policy of unpreparedness than any sort of coincidence. Conventional business wisdom - and traditional training - says management should really only address (i.e. spend and strategize) cyber threats (or any threat, really) when those threats are on your proverbial front doorstep, having burst into flames. A generational shift Why is this phenomena happening? In my opinion, the answer to this question lies partly in the answer to a totally unrelated question: Why doesn’t my father have a smartphone? (Hint: he wouldn’t know what to do with it anyway if I bought him one.) Corporate America is in the beginning phases of a business management generational shift, the impact of which is illustrated nowhere more clearly than in how companies are (or are not) keeping up with the quickening pace of technology and its unwanted by-products like cybercrime. Many of these companies are led by the generation that came from an un-wired world, a generation of business leaders who navigated the bulk of their careers without the steeping influence of technology. This is the not-so-secret secret of cybercrime, and it is why companies don’t prioritize the risks represented by cybercrime and cyber insecurity. It’s because technology has advanced so rapidly and we’ve connected everything in our world so quickly that the knowledge gap across the last couple of generations is wider than it has ever been -- and it’s getting wider each year. This gap has led to the single biggest cybersecurity challenge we face - a lack of understanding of “just what the hell is going on with all this technology and cyber stuff.” It’s something my dad (and my customers) tell me almost every week. More On This Topic * 5 Big Incident Response Mistakes * Here’s How To Protect Against A Ransomware Attack * Perceptions Of IT Risk Changing In Business Ranks Find out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200. Vulnerabilities/ThreatsOperationsAttacks/Breaches Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There * Rethinking Asset Management to Improve Enterprise Security More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports Editors' Choice 8 More Women in Security You May Not Know but Should Ericka Chickowski, Contributing Writer Over 40% of Log4j Downloads Are Vulnerable Versions of the Software Jai Vijayan, Contributing Writer Security Teams Prep Too Slowly for Cyberattacks Robert Lemos, Contributing Writer Why You Should Be Using CISA's Catalog of Exploited Vulns Wade Baker, Partner, Cyentia Institute Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There * Rethinking Asset Management to Improve Enterprise Security * Network Security Approaches for a Multi-Cloud, Hybrid IT World * Ransomware and BEC in the Cyber Threat Landscape: Past vs. Present, Perception vs. Reality * Cybersecurity Tech: Where It's Going and How To Get There More Webinars White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity * Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization * Build a Case for a Password Manager * 2021 Gartner Market Guide for Managed Detection and Response Report More White Papers Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * How To Get Ahead Of The Security Data Curve -- And Stay There * Rethinking Asset Management to Improve Enterprise Security More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept