Recent attacks suggest that we are at the crossroad between a broad cyber security strategy and devastating cyber attacks While driving home last night, I happened to catch the NPR radio show, “On Point,” and a lively discussion on hacks, cyber attacks, and cyberwar. Worth a listen, here’s the link (http://onpoint.wbur.org/2011/06/01/hacks-and-cyber-attacks).This isn’t the first time I’ve heard the mainstream media approach the cybersecurity topic but it is certainly happening more frequently these days. Why? Unfortunately, cybersecurity, cyber attacks, and cyberwarfare have become very topical over the last few months because of:1. A recent string of visible hacks at organizations like RSA Security, Sony Playstation Network, Lockheed-Martin, and Google (again).2. News that China is setting up a cyber warfare unit (this is actually old news but it surfaced this week), and that North Korea is investing heavily in cyber warfare capabilities.3. A new fake AV scam that targets the Macintosh.4. President Obama and UK Prime Minister David Cameron issued a joint statement about cooperative efforts to, “better confront tomorrow’s threats.”5. The recent statement from the Pentagon that cyber attacks will be considered an act of war and that the U.S. may respond with traditional kinetic means (i.e. guns and bombs).Now I live in this world so my judgement is certainly influenced by my knowledge on these topics but it seems to me that we are rapidly approaching a crossroad. We are now experiencing the cyber equivalent of the London blitz of 1940 where we are under constant attack. At present the central targets are our money and our intellectual property. It is also pretty safe to assume that we face two very skilled adversaries, cyber criminals primarily in Eastern Europe, and organized cyber espionage primarily in China. Are we vulnerable? Big time! In a recent ESG Research survey, 77% of U.S. critical infrastructure organizations admitted to one or more security breach over the next 24 months (Note: This report is available for free download at: http://www.enterprisestrategygroup.com/2010/11/cyber-supply-chain-security-research-report/. When I say “critical infrastructure organizations,” think banks, health care facilities, water, electricity, food, fuel, etc. So what happens next? My guess is that it won’t be pretty. We are likely to see an unprecedented cybersecurity breach that scares the living daylights out of those who haven’t been paying attention. This will lead to a lot of finger pointing and likely some rash, poorly thought out legislation across the globe. This also could lead to some seriously increasing International tension. Remember that the Pentagon is already talking about guns and bombs.I am all for doing something but the time to act is now, not when the proverbial S#*t hits the fan. We need rational public/private dialogue and International cooperation, not a bunch of cyber and real Cowboys facing off against each other armed to the teeth. I may sound like Chicken Little here but I truly believe that I have reason to do so. Don’t take my word for it — listen to the “On Point” discussion or ask RSA, Sony, Lockheed-Martin, or Google and judge for yourself. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe