{"id":22862,"date":"2015-10-13T06:00:26","date_gmt":"2015-10-12T19:00:26","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=22862"},"modified":"2015-10-12T11:42:53","modified_gmt":"2015-10-12T00:42:53","slug":"cybersecurity-escaping-future-shock","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/","title":{"rendered":"Cybersecurity: escaping future shock"},"content":{"rendered":"

\"11407107023_b52fa108f7_z\"<\/a><\/p>\n

Mike Burgess, Telstra\u2019s Chief Information Security Officer, claims that attributing blame for cyberattacks is a \u2018distraction\u2019<\/a>. It\u2019s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of the threat of intrusion<\/a> could be mitigated by the implementation of baseline protection measures. Burgess also pointed out that while attributing blame is an important component of preventing attacks, they are too often discussed in amorphous and hyperbolic terms when describing their sophistication.<\/p>\n

Burgess has decades of experience in intelligence and security and unlike many others is well past the future shock of cybersecurity. At present, the capability of actors to penetrate networks is increasing, as is their ability to do damage.<\/a> If you ever want to induce a sense of utter helplessness in your CEO, just show them this raw feed<\/a> of cyberattacks from Norse. The reality is that good intelligence on actors and their capabilities is fairly useless unless a company has a strong understanding of what it\u2019s exposed to<\/a>. Context is everything when it comes to raw data.<\/p>\n

It doesn\u2019t help that many leading cybersecurity researchers fail to discuss these events within their wider context; and many of the top cybersecurity programs<\/a> treat the subject matter as an extension of computer science and engineering. To security studies, cybersecurity is one area, amongst a range of others where threats exist in asymmetric terms. Authors are largely yet to work across these disciplines when discussing such threats. An example of this is found in Sandria\u2019s work on Cyber Threat Metrics<\/a>, which attempts to reinvent the wheel rather than work within the existing context of existing security threats. In Clausewitzian terms, cybersecurity is just security by other means. The literature on security, threat, perception, signaling and a range of other areas is sitting there waiting to be leveraged rather than reinvented.<\/p>\n

There\u2019s a great deal to be gained by discussing cybersecurity as an extension of existing trends. The relative youth of cybersecurity as a subject area means that it hasn\u2019t yet been integrated into the wider literature. While that\u2019s not unexpected it is something that needs to be addressed. In the early days of nuclear weapons, Oppenheimer had to reach for the Bhagavad Gita for an eloquent expression of future shock. Today\u2019s cybersecurity researchers have no need to reach so far back for a meaningful comparison. Science transforming the security environment is nothing new: nuclear weapons were first discussed by the scientists that invented them, then by the military and then finally harnessed by statesmen. A similar thing is naturally occurring in cyberspace.<\/p>\n

In reckoning with present trends, cybersecurity faces an uphill battle where opponents are increasing in capability and responses are uneven. While it is all well and good to proactively deter attack, if a company has a flat network architecture and never updates its software, it probably won\u2019t do very much to limit exposure in the medium to long term. A few years ago US retail giant Target had invested over a million dollars in malware detection tools from FireEye. So despite possessing functioning notification tools, Target did nothing when they detected an attack<\/a>. The breach compromised 40 million debit cards and the personal details of 70 million people<\/a>, and cost the company more than US$146 million<\/a>. Spending money on the right tool is useless if the company isn\u2019t getting the basics right.<\/p>\n

Another area of potential change is the ongoing debate over when to report an attack. Companies are not convinced that it will be to their benefit if they disclose attacks<\/a>, and an increasing number in Australia don\u2019t<\/a>. Companies also fear a loss of confidence by investors<\/a> if they disclose an attack. There\u2019s presently a move in the European Union towards mandatory reporting<\/a>. In 2013, Pricewaterhouse Coopers estimated that in the course of a year some 93% of large British companies<\/a> had suffered a cybersecurity breach. The same report lists the median number of breaches per company at 113 over the same period, with the average cost of a large company\u2019s worst breach coming in at over \u00a3400k.<\/p>\n

So we understand, to some degree, the context and scope of the threat. And while it\u2019s a threat that\u2019s increasing, the vast majority of cybersecurity conundrums are manageable at present<\/a>. New methods of attack aren\u2019t a distraction but they are a second order problem and ought to be treated as such. The first step is to recognise the risk and implement the already identified best practice strategies<\/a> to manage the threat. Moving on from there, the second order debates of reporting, classifying threats and auditing systems will take place. Burgess is right<\/a> when he notes that second order problems currently dominate the discussion, but can this be seen as a natural extension of the uneven development of cybersecurity as a field? Many companies, for their part, must work to escape the future shock\u2014cyber threats are real but so are the basic strategies on how to manage the risks they pose.<\/p>\n

Australia\u2019s in a strong position to close the gap between awareness and response. Under Burgess, Telstra has proactively produced<\/a> industry-based reporting on the present situation. Along with this, the Australia Cyber Security Centre<\/a> was launched in November 2014. That same organisation has produced an unclassified threat report that represents a good first step<\/a>. Finally, CERT Australia<\/a> is attempting to develop the space between government and industry where effective collaboration can flourish.<\/p>\n

Each of the organisations mentioned above has constructed the beginnings of a collective response to cybersecurity. Being overwhelmed by risks is an extension of not understanding their context. Australia is on a strong path to cooperatively and proactively respond to cyber threats if those problems are tackled in order and in a collaborative manner.<\/p>\n","protected":false},"excerpt":{"rendered":"

Mike Burgess, Telstra\u2019s Chief Information Security Officer, claims that attributing blame for cyberattacks is a \u2018distraction\u2019. It\u2019s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of …<\/p>\n","protected":false},"author":291,"featured_media":22863,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1060,391,95],"class_list":["post-22862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-cyber-security-centre","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\nCybersecurity: escaping future shock | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: escaping future shock | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Mike Burgess, Telstra\u2019s Chief Information Security Officer, claims that attributing blame for cyberattacks is a \u2018distraction\u2019. It\u2019s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-12T19:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-12T00:42:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Potter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Potter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg\",\"width\":640,\"height\":424},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/\",\"name\":\"Cybersecurity: escaping future shock | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#primaryimage\"},\"datePublished\":\"2015-10-12T19:00:26+00:00\",\"dateModified\":\"2015-10-12T00:42:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3611190c1a27306c92399a52cb95ae5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: escaping future shock\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3611190c1a27306c92399a52cb95ae5\",\"name\":\"Robert Potter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a10690580f28e66eabfe9de6996a56d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a10690580f28e66eabfe9de6996a56d?s=96&d=mm&r=g\",\"caption\":\"Robert Potter\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/robert-potter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: escaping future shock | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: escaping future shock | The Strategist","og_description":"Mike Burgess, Telstra\u2019s Chief Information Security Officer, claims that attributing blame for cyberattacks is a \u2018distraction\u2019. It\u2019s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of ...","og_url":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-10-12T19:00:26+00:00","article_modified_time":"2015-10-12T00:42:53+00:00","og_image":[{"width":640,"height":424,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg","type":"image\/jpeg"}],"author":"Robert Potter","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Robert Potter","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/11407107023_b52fa108f7_z.jpg","width":640,"height":424},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/","url":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/","name":"Cybersecurity: escaping future shock | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#primaryimage"},"datePublished":"2015-10-12T19:00:26+00:00","dateModified":"2015-10-12T00:42:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3611190c1a27306c92399a52cb95ae5"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-escaping-future-shock\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: escaping future shock"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3611190c1a27306c92399a52cb95ae5","name":"Robert Potter","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a10690580f28e66eabfe9de6996a56d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a10690580f28e66eabfe9de6996a56d?s=96&d=mm&r=g","caption":"Robert Potter"},"url":"https:\/\/www.aspistrategist.ru\/author\/robert-potter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22862"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/291"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=22862"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22862\/revisions"}],"predecessor-version":[{"id":22864,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22862\/revisions\/22864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/22863"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=22862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=22862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=22862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}