There is a well 
known threat that has been talked about with the Board of Directors 
behind closed doors for years. This threat is not new to most 
Operational Risk Management (ORM) professionals and yet executive 
management is still in denial that it could happen to us. Have you or 
someone in your C-Suite ever awakened one morning and wondered how the 
companies new plans for a merger are now in the published press? What 
about that new research and development breakthrough that ends up with 
another company with a similar process being patented a week or a month 
ahead of you?
What
 is the threat? Call it competitive intelligence, economic espionage, 
press leaks, loose lips or advanced persistent threat (APT), it does not
 really matter. The threat remains from all those people, rivals, 
industry peers, countries, states, allies and enemies that are working 
24 x 7 x 365 to copy your valuable information and use it for their own 
advantage. What advantage depends on who obtains the valuable 
information and how they will eventually use it or sell it.
What
 is even more fascinating to most subject matter experts, is the amount 
of information that is still created and allowed to be compromised in 
some way that is false, fake and designed to confuse the adversary. So 
what is it, that much of executive management still does not understand 
about all of this? 
The
 "source" of the vulnerability that is leaking or allowing the secret or
 confidential information to be compromised. They still to this day are 
naive to the potential source. This source is not even inside their own 
company or organization in many cases. It is within the organizations 
data supply chain somewhere, but where is it exactly?
The
 answer is only possible to narrow down, if you absolutely know where 
your data and secret or confidential information is collected, 
transported and stored, in the hands of trusted third parties, outside 
the four walls of your business. That is the remedial first step. 
Creating a definitive map of who has custody of your data through some 
kind of third party agreement. The agreement could be with any number of
 key business partners in your data supply chain:
- Banker
 - Venture Capitalist
 - Accountant
 - Attorney
 - Insurer
 - Internet Service Provider
 - Utility
 - Data Telecom Provider
 - Wireless Telecom Provider
 - Payments Processor
 - Document Custodian or Shredder
 
Even
 more important may be the question of which one of your data supply 
chain business partners, has the least amount of resources, people and 
state-of-the-art detection systems for the APT, Zeus, and other 
mechanisms that are ex-filtrating your data to another country. When was 
the last time you asked any of your business partners to walk you into 
their IT department for a look around with your CIO or CTO?
Believe us when we say that if you get that "Deer in the Headlights" look on your business partners face, you are in trouble. You can bet that the attackers are not attacking you, as much as they are attacking your data supply chain. As an example, if you say in public or on your public filings that you have your primary outside counsel firm as "Red, White and Blue," you can be assured that your adversaries will take notice.
You
 see, just because your organization has spent millions or billions on 
new data centers with the most sophisticated technologies available to 
counter your cyber adversaries, how can you be sure that your business 
data supply chain has done the same? There is only one way to do that 
and it is in person and on site. You may consider this level of due 
diligence before handing over your business for the merger and 
acquisition project or the development of a vital new component for your
 new patented product. A model "Request for Information" (RFI) on the 
business partners controls and capabilities for securing your sensitive,
 confidential and secret information shall be a first step requirement.
The
 second step shall be to get an inventory of what systems your data 
supply chain partner has in place to mitigate the risk of a data breach.
 At the top of that list, should be the management system that governs 
all the other hardware and software systems. So even if your business 
partner says they are using RSA NetWitness or ScoutVision on their corporate networks 
and Good MDM for their mobile devices, that is not going to be enough.  More from Europol:
The
 overarching "Management System" is not about technology. It is not 
about your favorite eDiscovery or computer forensics guru. It is about 
the way your business partner trains and educates it's people. It is 
about how those people use relevant business controls to secure your 
secrets, confidential data and records. Look at their behavior around 
this topic of "Achieving A Defensible Standard of Care" and you will 
soon discover whether you have found the most ideal banker, accountant 
or attorney to entrust to your digital supply chain.A decline of traditional hierarchical criminal groups and networks will be accompanied
by the expansion of a virtual criminal underground made up of individual criminal entrepreneurs, which come together on a project-basis and lend their knowledge, expe- rience and expertise as part of a crime-as-a- service business model.
No comments:
Post a Comment