I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. This is part one: History’s lessons.Stability is an illusionIn security, such is the universe, change is constant. If we were able to watch the Earth change, adapt in fast-forward over the last several billion years, we would quickly come to the conclusion that stability is an illusion.Continents come and go and oceans rise and fall. Some species are extant while others become extinct. Our written history is only about 6,000 years old and an individual might live around a century. Simply put, we have a very narrow and somewhat static perspective on things. In just the last two decades that I’ve been involved in information security we’ve seen security change from being a hobby, to a good idea, to a regulatory mandate and most recently a strategic, business imperative.We must constantly evaluate how we are approaching security. Are our existing controls still providing value; can it be measured?Do we have the right level of tools, talent and techniques?Are we being proactive or just reactive by waiting to be attacked?Are our incident response programs able to scale in the face of IoT, mobile, cloud and other IT trends?Do our security controls have context and intelligence that make them aware of the constantly changing threat landscape outside our environment?Shifts in advantageThere are some events in history where one side is simply “outgunned.” The following may seem pretty obvious to us now, but the advantages were likely more opaque when happening.The Greeks ruled the ancient world with iron spears and used a close-order infantry formation called a Phalanx to fight as a single unit that while historically effective, especially on flat terrain moving in one direction, required the enemy to attack them, and for the Phalanx to react.The Romans leveraged a steel Gladius sword allowing them to fight not only with stronger weapons but be on the offensive, more agile and more effective on diverse terrains. This Roman advantage culminated in Rome defeating Greece in 146 BC.While this is an extreme over simplification of the factors that lead to the fall of Greece, the technology (metal) and the process (battlefield hand-to-hand combat) played a significant role. Some would argue that the inability for the Greeks to identify the Roman advantages defeated the Greeks before any battle began.How similar is this to information security? Do we continue to throw the same types of security products and processes at the problem because they worked historically even though we know the enemy has changed tactics? We have to do something. We can’t simply give up. The fact is there are a lot of great security products. There are integration points such as APIs between many of these products, or platform-based solutions that are more inclusive. But they still fail, and that failure is largely predicated on two definable gaps.First, our industry has trained security administrators. These administrators understand how to configure a firewall, set up IPS signatures, deploy anti-virus and manage a wealth of other products. They may even have an incident response program in place. But we don’t have enough training and focus on security analysis – partly because it isn’t tied to any one product and much of the training today is based on vendor training.While security administration and vendor training has value, if that’s where one’s security capabilities ends, it means the people looking for nefarious activity might actually have the right tools at their disposal, but they lack the techniques to be effective and efficient. Second, security products might be operating in a silo; this is an antiquated methodology. If you are going to connect something in your environment, it better have hooks into other parts of your environment to increase the ROI of your existing controls. If not, give it a couple years before it becomes shelved. Beyond integration across devices and between controls addressing the areas of prevention, detection and response, there needs to be a greater level of awareness and context.Some of this context needs to be derived from the inside. For example, you would want to know about critical assets, their OS, their applications, their subnets, what users have access and their data at rest, in motion and in use.Some of this context needs to be derived from the outside. For example, if you see an IP address hitting your network you may want to knowIs it a known bad source; if so, how bad and for how longWhat country it’s coming fromIs it associated with something like malware, botnets, anonymous proxies or other risky variablesAdmitting that the current approaches are failing doesn’t mean we’ve failed. We need to adapt. We need to make better use of our existing security controls. We need to enrich those controls. We need to make better use of our security administrators. We need to help turn security administrators into security analysts.History has taught us that change is constant. We must first recognize that so we are aware and proactive. Then we must evaluate to determine where the failures are and with whom the advantage resides. Finally we must adapt to mitigate those failures and shift advantage back. Then it all starts again – change is after all constant and unforgiving. Related content opinion Congrats - you’re the new CISO…now what You need foundational visibility into your security posture regarding what’s working and what’s not. By Brian Contos Mar 06, 2017 5 mins Technology Industry IT Strategy Cybercrime opinion Before you buy another cybersecurity buzzword Get value from what you’ve got before buying something new. Get rid of solutions that no longer add value and acquire new ones that are really needed with confidence. By Brian Contos Feb 21, 2017 2 mins RSA Conference IT Skills Network Security opinion What some cybersecurity vendors don’t want you to know When evaluating security products, you might be doing it wrong if you’re not incorporating assurance testing. By Brian Contos Feb 08, 2017 4 mins Technology Industry IT Skills Security opinion What football teaches us about cybersecurity You wouldn’t expect a football team that never practices to win the Super Bowl; but we expect wins every day from our cybersecurity professionals. By Brian Contos Feb 01, 2017 6 mins Technology Industry IT Jobs IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe