The Future of Cyber Security: IoT Creates Entirely New Set of Risks and Organizations Embrace “Active Defense”

As Damage from Cyber Attacks Spreads, Booz Allen Shares Trends that Will Shape Incident Response, Recovery

RSA Conference USA 2015

MCLEAN, Va.--()--If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are responding to the cyber threat. Increasingly, companies are exploring a more “active defense” approach to cyber security, while preparing for an entirely new set of threats to medical data, connected vehicles, mobile payments, and Internet of Things as well as emerging technologies like “wearables.” Traditional incident response – the rapid deployment of a team to remediate breaches to a network, identify additional threats and restore functionality – is necessary, but no longer sufficient. The connectedness of our cyber network demands intelligence-driven tools and processes that equip leaders with an anticipatory edge. Those are among the trends identified by Booz Allen Hamilton (NYSE:BAH) as the company offers lessons in incident response and examines trends that will shape how organizations prepare for and respond to cyber attacks.

“When it comes to data security, the fundamentals have changed,” said Bill Stewart, executive vice president at Booz Allen and leader of the firm’s commercial cyber business. “News of a large-scale data breach is nearly an everyday occurrence, while the scope and long-term damage associated with cyber incidents are escalating.” U.S. data breaches hit a record high of 783 in 2014 according to the Identity Theft Resource Center, a 27.5 percent year-over-year increase.

As data security becomes a top priority for organizations of all sizes, Booz Allen’s team of cyber experts sifted through the noise to determine what trends might shape the next 12 months. “The companies we speak with are tired of chasing the problem: they want to do better than fight the next battle with the last war’s plan,” said Bill Stewart. “Looking ahead, we see both new, daunting risks and a shift in how companies tackle the cyber security challenge.”

   

Emerging Trends: Big Changes in Cyber Risk, Detection, Improved Incident Response

 

1.

 

Internet of things expands cyber “attack surface” – For enterprise IT managers, cyber threats have existed in largely two dimensions – behind the firewall and beyond. But with the “Internet of Things,” cyber risk now stretches across a third dimension. Employees may come to work with a compromised wearable device, or pull their hacked connected vehicle into the company parking lot. This creates a new type of cyber risk for organizations – with significantly increased complexity and exposure. As the Internet of Things increases the cyber “attack surface,” companies must broaden defenses to include the plethora of embedded devices that now make up their ecosystem.

 

2.

“Proactive defense” becomes best practice – Recent corporate victims of cyber attacks have one thing in common: they all thought they were prepared. Tired of being a step behind, companies will gravitate to a more active, anticipatory approach to preparedness and defense, one that looks over the horizon at emerging criminal patterns and active threat actors. We will see more organizations take an “intel to operations” model that enables companies to use real-time intelligence and threat assessment data to shape decision making, fine tune defenses and pre-empt emerging threats. “It’s a shift similar to what took place in natural disaster response, where use of predictive weather data enables communities to take preventive measures before the storm hits,” added Stewart.

 

3.

“Incident response” hype meets reality – The cyber market is crowded with companies that market an “incident response” capability in the event of a data breach. Yet is there enough experienced cyber talent to staff up all of these companies? Do these offerings include the right balance of multidisciplinary expertise necessary to be successful (e.g., Crisis Communications, Legal, Policy, Business and Technical)? Expect CISOs and other corporate leaders to take a more discerning look at the latest incident response offers; the people behind them, and their step-by-step methodology. Their goal should be to position their firms to successfully navigate an incident and prevent negative repercussions.

 

4.

Preparedness moves beyond dollars, compliance – Companies are devoting significant resources to building up their cyber defenses – and often quantifying those steps in dollars spent and compliance achieved. Yet as data breaches multiply and their reach broadens, scrutiny of preparedness will shift away from the “how much” to the “how” and “who.” How many people are engaged? What are their backgrounds? What software tools are being used? Cyber security will continue to evolve from a compliance issue to a strategic, business-critical priority. This will trigger a greater interest in “what’s under the hood.”

 

5.

Embedded Security is now an undeniable requirement – It is a new necessity that presents a competitive opportunity. As Internet connectivity touches everything from light bulbs to vehicles and electric turbines, cyber security and risk management increasingly must be accounted for when designing and producing products. And with end users increasingly concerned about privacy and data security, strong embedded security becomes a market enabler, differentiating a company and its products in a competitive market.

 

6.

The c-suite rethinks cyber response – To date, the CIO or CISO has taken the reigns (and, too often, the blame) when a cyber crisis hits. Yet as companies understand the inevitable business impact of a cyber event there is movement to a new model. For example: adding a business leader within the c-suite with the explicit role of driving data breach response activities across all facets of the organization. A move a way from the current approach of assigning this job to a technology executive. Fueling interest in a different approach: workforce changes, new, emerging threats, and constantly evolving “best practice” response tactics.

 

“We are entering an entirely new phase in the fight against cyber threats,” said Christopher Ling, executive vice president and leader of Booz Allen’s cybersecurity business. With every widely reported breach, cyber security is moving from the ‘to do’ list to a CEO and Board level priority. We expect to see a fundamental shift in how companies prepare, which will only grow more urgent as new threats emerge.”

At the 2015 RSA Conference, senior leaders from Booz Allen will discuss the growing cyber security challenges facing organizations and new solutions that will shape best practice preparedness and response in the months ahead. For the complete line-up of the firm’s participation in RSA 2015, visit: http://www.boozallen.com/lp/rsa-usa-2015 and follow us on Twitter (@BoozAllen) and #RSAC.

ABOUT BOOZ ALLEN HAMILTON

Booz Allen Hamilton is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major corporations and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs more than 22,000 people, and had revenue of $5.48 billion for the 12 months ended March 31, 2014. In 2014, Booz Allen celebrated its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE:BAH).

BAHPR-CO

Contacts

Booz Allen Hamilton
Kimberly West, 703-377-1403
West_kimberly@bah.com

Release Summary

Today at RSA Conference 2015, Booz Allen Hamilton issued the report, "The Future of Cyber Security: IoT Creates Entirely New Set of Risks and Organizations Embrace 'Active Defense.'"

Contacts

Booz Allen Hamilton
Kimberly West, 703-377-1403
West_kimberly@bah.com