Diamond Member Pelican Press 0 Posted April 23, 2024 Diamond Member Share Posted April 23, 2024 Security Think Tank: Cyber sector, you have ******* this community In the television show This is the hidden content, please Sign In or Sign Up , billionaire ******** Oliver Queen returns to Star City after being trapped on an island only to find it overrun with ****** and ***********. Oliver Queen dons a green hood, grabs a bow and arrow and takes on the ********* elements of Star City as the Green Arrow. When Green Arrow would take down a villain he would shout, “You have ******* this city.” That catchphrase rings true to me today as the debate rages about whether or not governments should implement a ban on paying ransoms to ransomware groups. We are in this situation because the security community has ******* to adequately protect the people we are supposed to protect. Of course, that is not the way it is portrayed. Instead, in the rare instances when we learn how a ransomware ******* happened we get headlines like the victim This is the hidden content, please Sign In or Sign Up or they This is the hidden content, please Sign In or Sign Up or some other ******** on the part of the victim. The truth is, we make it hard to properly secure and maintain a good security posture. We force organisations to jump through hoops to understand their weaknesses and vulnerabilities and we throw so much at them that it is impossible for even the most resourced organisations to keep up with everything they need to do to keep every aspect of securing their increasingly complex networks. Inevitably, this leads to security failures and ransomware attacks. When those attacks happen, we blame the victim, “Oh, why didn’t they put MFA on all the things?” Never mind how hard some vendors make it to enable MFA. Or, “How could they not have patched that system?” Ignoring the fact that the organisations may have 50 “critical” vulnerabilities that need to be “patched immediately.” We even hear choruses of, “How can they still be using vendor X when it has so many vulnerabilities?” Despite the fact that switching out vendors is a long process and there is a good chance that many of the competitors to vendor X have just as many vulnerabilities. Through all of the finger pointing and victim shaming, it is rare that we look at the security industry as a whole and realise what an utter mess it is. How can we expect to properly secure the people we are supposed to be protecting when we can’t get our own act together? So, we’re left with increasingly imperfect solutions that likely will not work, because nothing else we do – at least are willing to do – is working. Enter government-wide bans on payments to ransomware groups. This is the next step in increasingly escalatory measures designed to make up for inadequacies in protection. Is it a good idea? No. Will anyone be happy with how it is implemented? No. Will it stop ransomware? The few test cases we have seen in places This is the hidden content, please Sign In or Sign Up , ransom payment bans have not slowed down the number of attacks. But, ultimately, it may be the least bad option available to us. Not exactly a ringing endorsement, I know. But I don’t think anyone wanted it to come to this. The good news is that we don’t have to go into this ******. As my colleague Sofia Lesmes and I pointed out, we have a history of law banning ransom payments to kidnappers to learn from and we should take those lessons seriously. There have already been a number of recent great debates outlining the reasons that a ban on payments to ransomware groups is necessary, I won’t rehash those reasons. The truth is, as other experts have pointed out, reasons for not implementing the ban fall apart under close scrutiny. Instead, I want to emphasise that public reporting must be included with any ban on ransomware payments. Earlier, I mentioned that we don’t think the payment bans enacted by the states of Florida and North Carolina have been effective. That is based on the number of attacks collected through open source reporting. Neither North Carolina or Florida offers a way to verify the effectiveness of the law by providing information on the number of ransomware attacks on the public entities covered by the law. Without an effective and public reporting regimen we, the taxpayers, can’t gauge the effectiveness of these bans and lawmakers can’t make adjustments to the laws as needed. Some might argue that being forced to report attacks will encourage organisations to try to cover up ransomware attacks. Sure, but organisations do that now and with a law in place there will be consequences if they are caught. This was one of the concerns when the Department of Health and Human Services mandated reporting from healthcare providers in the ******* States. That did not happen, and we now have better, imperfect but better, insight into cyber attacks against the healthcare sector in the ******* States than almost any other sector. Banning ransom payments combined with rigorous reporting requirements by victims of ransomware attacks will allow us to get a better handle on the number of ransomware attacks and help us, collectively, figure out where to devote resources to try to stop attacks. It is a terrible solution that no one wants, but until we can develop security solutions that are effective without being overly cumbersome and complex it may be the only way we can stop failing the people we are supposed to be protecting. Allan Liska is a threat intelligence analyst at This is the hidden content, please Sign In or Sign Up . This is the hidden content, please Sign In or Sign Up #Security #Tank #Cyber #sector #******* #community This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/20735-security-think-tank-cyber-sector-you-have-failed-this-community/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.