By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: RSA: Cyber security mindset needs to change
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > RSA: Cyber security mindset needs to change
Enterprise

RSA: Cyber security mindset needs to change

Aaron Tan
Last updated: July 23, 2015 at 9:25 AM
Aaron Tan
Published: July 22, 2015
5 Min Read
SHARE
Digital_lock
Source: iStockphoto

IT security professionals can no longer count on “perimeter defences” such as firewalls to guard against hackers who are more capable than ever in breaking down the tightest cyber defences.

“If you believe for one second that perimeter protection can keep sophisticated, focused adversaries out of your environment, then you’re asleep at the wheel,” said Amit Yoran, president of RSA.

Speaking at the RSA Conference Asia Pacific and Japan held at Marina Bay Sands today, Yoran called for companies to change the way they secure their IT infrastructure.

“Changing your mindset is hard, but not changing your mindset is even harder,” he said. “History has shown that when facing a new challenge, the old kind of thinking never ends well”.

Yoran cited SingPost as a good example of an organisation that has reinvented itself amid declining volumes of traditional mail – by diversifying into e-commerce, which now accounts for over 25 per cent of its revenue.

“If you believe for one second that perimeter protection can keep sophisticated, focused adversaries out of your environment, then you’re asleep at the wheel.”

–Amit Yoran, president of RSA

“These are radical transformations happening at international postal services,” Yoran said. “Meanwhile, in the security industry? Still selling stamps.”

Yoran said perimeter defences are no longer effective, simply because they rely what is already known about a piece of malware or software loophole.

“We all know the threats that cause the greatest damage are the ones that we haven’t seen before. Nonetheless, many security professionals still base their security monitoring programmes on these technologies,” he said.

So what’s the mindset change required of IT security professionals and the organisations they work for? Yoran pointed out five areas, the first of which is the recognition that even advanced security measures will fail.

“No matter how high or smart the walls, creative and focused adversaries are going to get into your environment,” he said.

Instead, he said IT security professionals should challenge themselves – and security vendors – about whether certain security products will really keep out cyber criminals. “Or is this yet another wall that’s going to be breached?”

Second, Yoran said security professionals should have deep and pervasive visibility of what’s going on in their IT infrastructure – from user devices to the corporate network and the cloud.

“If you don’t have that level of visibility in place, you’re only pretending to do security,” he said, adding that such visibility is also crucial in understanding and preventing security breaches.

“The single most common and catastrophic mistake made by security teams today is under-scoping an incident and rushing to clean up compromised systems before understanding the broader campaign,” he added.

Third, effective identity management matters more than ever in a cloud and mobile world with no clear perimeters.

This involves governing who should have access to which systems and data over time, beyond the walls of the enterprise – especially since 95 per cent of attackers use stolen credentials to access confidential information.

“Don’t make the mistake of trusting the actions of the trusted. Analysing who is accessing what will help to identify attack campaigns earlier in the kill chain – this makes a difference between a successful response and a disaster,” Yoran said.

Fourth, organisations must leverage external threat intelligence, which should be operationalised into their security programmes and tailored to their interests. This will allow analysts to quickly address the threats that pose the greatest risk, Yoran said.

And finally, Yoran said security programmes must be guided by an understanding of risk.

“You must understand what matters to your business and what is mission critical. You have to defend what’s important and defend it with everything you’ve got.”

No-show for Salesforce at Oracle OpenWorld this year
Q&A: Accenture points to digital commerce for consumer packaged goods companies
Nearly 60 per cent of developers have not built a mobile app
Singapore companies to spend more on IT security
Q&A: Ella, a robot barista, served over 100,000 cups of coffee in Singapore in 2022, say its creators
TAGGED:Amit Yorancyber securityRSARSA Conference

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Dell brings first rugged Windows tablet to Singapore
Next Article Hands on: Xiaomi’s fancy Mi Note makes it to Singapore at S$569
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?