Sign In

Cyber threat assessment: in conversation with Fortinet’s Tyson Macaulay

An increas­ing cyber threat requires organ­i­sa­tions are more vig­i­lant than ever across all their IT assets. Fortinet’s Cyber Threat Assess­ment Pro­gram (CTAP) has been designed to look deep into an organisation’s net­work traf­fic for indi­ca­tors of com­pro­mise (IoC). By analysing this CTAP data from hun­dreds of users, Fortinet can gain insight into the actu­al threats that are emerg­ing across the attack ecosys­tem.

INDUSTRY STANDARD

So, with the top threat types includ­ing mal­ware, bot­nets and appli­ca­tion exploits, how can the secu­ri­ty-savvy enter­prise mit­i­gate against the risk they rep­re­sent?

Tyson Macaulay Chief security strategist and vice president of security services Fortinet

Tyson Macaulay Chief secu­ri­ty strate­gist and vice pres­i­dent of secu­ri­ty ser­vices Fortinet

“These threats attack both large enter­pris­es and small­er busi­ness­es alike from a vari­ety of dif­fer­ent vec­tors, from e‑mail and mal­ware indi­vid­u­al­ly tai­lored for each busi­ness to ‘dri­ve by mal­ware’ pushed to inno­cent users via mali­cious adverts while they are mere­ly brows­ing the inter­net,” says Tyson Macaulay, chief secu­ri­ty strate­gist and vice pres­i­dent of secu­ri­ty ser­vices at Fortinet.

While it is com­mon to think of attack­ers in terms of exter­nal hack­ers and cyber crim­i­nals, the insid­er risk is just as great, as Tyson explains. “Insid­ers con­tin­ue to be a form of threat that the Fortinet CTAP pulls back the cur­tain on,” he says.

“With pro­duc­tiv­i­ty issues, com­pro­mised devices and data exfil­tra­tion all of con­cern, CTAP can expose the delib­er­ate­ly reck­less, the mere­ly care­less and the deceit­ful insid­ers.”

Accord­ing to Tyson, one of the most inter­est­ing ele­ments of Fortinet’s CTAP is the abil­i­ty to make mean­ing­ful com­par­isons across indus­try ver­ti­cals. In oth­er words, what does a par­tic­i­pant or data set look like rel­a­tive to oth­er organ­i­sa­tions in the indus­try? “This gives a whole new mean­ing to indus­try stan­dard,” he says.

COMPROMISE INDICATORS

But what about the fact that many threat actors are increas­ing­ly using what might be best described as ful­ly auto­mat­ed attack sys­tems? The bad guys have access to these mech­a­nisms which are able to probe net­works for exploitable vul­ner­a­bil­i­ties, and which can be built extreme­ly rapid­ly and at rel­a­tive­ly low cost. How can the good guys fight back?

“This form of high­ly tar­get­ed attack, some­times called an advanced per­sis­tent threat, can be dif­fi­cult to defend against using con­ven­tion­al, sig­na­ture-based detec­tion meth­ods because the mal­ware has been cus­tom-made for the vic­tim,” Tyson con­cedes.

This is why much of the bur­den of detec­tion and pre­ven­tion has to in the end fall on to IoCs. “Net­work IoCs include source-des­ti­na­tion rep­u­ta­tion and heuris­tics, or pat­terns if you pre­fer, of mali­cious behav­iours vis­i­ble to the net­work, while end-point IoCs are detect­ed through pay­load con­tent inspec­tion and safe det­o­na­tion in sim­u­lat­ed end-point envi­ron­ments called sand­box­es,” Tyson explains.

CLOUD AS SECURITY ENABLER

It would be remiss not to men­tion the cloud and in par­tic­u­lar whether this brings new chal­lenges to the secu­ri­ty table? Tyson prefers to think of the cloud more as a secu­ri­ty enabler than a threat. “Cloud-enabled secu­ri­ty can allow sophis­ti­cat­ed and pow­er­ful detec­tion tools to be enabled at remote sites or for small­er busi­ness­es that might not be able to jus­ti­fy large, premise-based invest­ments,” he says.

Indeed, it is no acci­dent that cloud sys­tems for clean­ing e‑mail, web-fil­ter­ing and sand­box­ing are now main­stream defence sta­ples. “In the future, as tech­nolo­gies like soft­ware-defined net­work­ing (SDN) and net­work func­tion vir­tu­al­i­sa­tion (NFV) take hold, oth­er cloud-based secu­ri­ty solu­tions will become not only acces­si­ble, but auto­mat­ed and avail­able on demand,” says Tyson.

“This is because the net­work will itself become a form of cloud, host­ing fire­walls, intru­sion pre­ven­tion sys­tems (IPS), appli­ca­tion con­trol and oth­er types of secu­ri­ty con­trol.”

INTERNET OF THINGS

Let’s look at anoth­er buz­zphrase that dom­i­nates the emerg­ing threat-scape debate: the inter­net of things (IoT). What new threats does this real­ly intro­duce to the enter­prise and how can the switched on chief infor­ma­tion offi­cer mit­i­gate the risk?

“There are ways to man­age the risks, but above all they require aware­ness and a sys­temic, well-informed approach start­ing ear­ly in the IoT life cycle,” says Tyson.

So, while in the con­ven­tion­al world of enter­prise IT, adding secu­ri­ty as an after­thought is mere­ly expen­sive, when it comes to the IoT, imple­ment­ing secu­ri­ty as an after­thought has the poten­tial to crip­ple or destroy the ser­vice and even ruin the busi­ness case entire­ly.

“From a secu­ri­ty per­spec­tive, IoT dif­fers from enter­prise IT in a vari­ety of ways,” says Tyson. “For instance, phys­i­cal safe­ty can often be a major fac­tor and design require­ment for IoT in ways very uncom­mon in enter­prise IT.” Sim­i­lar­ly, while much empha­sis is placed on con­fi­den­tial­i­ty in enter­prise IT, avail­abil­i­ty is often the key secu­ri­ty require­ment for many IoT sys­tems, and that includes indus­tri­al con­trol sys­tems.

“We are about to pub­lish a book called RIoT Con­trol: Man­ag­ing Risk and the Inter­net of Things on this very top­ic,” Tyson reveals.

FORTINET SECURITY FABRIC

Briefly then, how can you best con­tain the threat of this ever-expand­ing threat-scape?

“The only way that defend­ing against advanced per­sis­tent threats, cloud inte­gra­tion and IoT can actu­al­ly work as intend­ed is if the net­work and its secu­ri­ty infra­struc­ture are ful­ly inte­grat­ed with each oth­er,” he says.

The Fortinet Secu­ri­ty Fab­ric, Fortinet’s tech­nol­o­gy vision, lays out the blue­print for inte­grat­ing the nec­es­sary tech­nolo­gies need­ed to meet the secu­ri­ty chal­lenges of today and in the future

Impor­tant­ly, spe­cif­ic solu­tions for these and oth­er require­ments need to be seam­less exten­sions of the net­work, not just bolt­ed on. Tyson con­cludes: “The Fortinet Secu­ri­ty Fab­ric, Fortinet’s tech­nol­o­gy vision, lays out the blue­print for inte­grat­ing the nec­es­sary tech­nolo­gies need­ed to meet the secu­ri­ty chal­lenges of today and in the future.”