This booklet explores different aspects of cybersecurity in 14 short articles. It is mostly aimed at managers of big corporations who need to understand the big picture. But even with this intention, it could go deeper at times. I found many of the articles a bit too shallow.
Article 1: internet insecurity
Security is not possible. Cyber-Hygiene is only effective against automated and amateurish hacks. Sophisticated, patient, well-financed hackers will find a way into their target systems.
The author introduces an approach researched by the IDL, advocating for an apparent return to non-digital times by not using complex digital systems for the most vital parts of a business or system.
Article 2: Security Trends by the Numbers
The authors explore several metrics and look at charts from three major studies to generalize trends for the entire industry.
Article 3: Why Boards aren't dealing with Cyberthreats
Boards are mostly lacking the expertise to deal with Cybersecurity and should seek to spend more time on this topic.
Article 4: The behavioural economics of why executives underinvest in Cybersecurity
Mental models of Cybersecurity might not be accurate. Especially the thought of something that needs a finite amount of investment is dangerous. One way of achieving a new way of thinking about cyber is to target the CEO with an internally initiated attack.
Article 5: Why the entire C-Suite needs to use the same metrics for cyber risk
CEOs should bring together the entire management team to assess cyber risks from different perspectives while still being aware of the other perspectives. A company's culture should encourage employees to talk about risks and vulnerabilities. Attacks should be expected and prepared for.
Article 6: The best Cybersecurity investment you can make is better training
It is false to think that investing in good technology is sufficient to have a reasonable Cybersecurity. In the end, humans are the greatest risk factor and good training for all employees or people interacting with the system (contractors) is the best defense. Expect there will be a breach and train employees how to react.
Article 7: better Cybersecurity starts with fixing your employees' bad habits
Ways to fix bad habits of employees/people:
- have the default version as a very secure one as the default version tends to stick (aka VPN usage, two-factot authentication)
- when postponing updates, postpone to a specific point of time
- tell people what others (especially the best in regard to Cybersecurity) are doing as people tend to do what others are doing
- look at awareness training as a continual process instead of a once-a-year event
Article 8: The key to better Cybersecurity
Keep "best practices" simple.
- avoid overly complex rules as that leads to shortcuts (e.g. password generation)
- when testing the security, adapt it to the group or individual (spear phishing compared to the same phishing mail to all employees)
- avoid disconnections between IT/security and regular employees, especially avoid an adversarial mindset
Article 9: The avoidable mistakes executives continue to make after a data breach
- not notifying customers/stakeholders immediately after a breach (but waiting until the data is being sold on the dark net)
- no good customer service after breaches
- not being honest and authentic and not providing clear and frequent updates
- organizations, and especially upper management must accept accountability and responsibility for responses
Article 10: Active Defense and "Hacking Back"
Active defense goes beyond passive monitoring.
A working definition: "active cyber defense is a direct defensive action to destroy, nullify, or reduce the effectiveness of cyber threats against friendly forces and assets.
Hacking back is another, more aggressive concept that should not be confused with active defense. It includes trying to access the attackers systems and is generally considered to be unethical and probably illegal.
Article 11: Cybersecurity is putting customer trust at the center of competition
Security cannot be proven on the level of whole organisations. That's why it has to be signaled. For costumers to trust corporations it must evident that these corporations are doing everything in their power to keep the customer's data secure. Companies must clearly communicate that breaches are to be expected.
Article 12: privacy and Cybersecurity are converging
Privacy and security, in the past, two separate things, one legal and one technical. Historically, unauthorized access to personal data was the biggest threat. Nowadays, machine learning enables the people with access to data to infer a lot of information.
Article 13: What countries and companies can do when trade and Cybersecurity overlap
In times of globalization, a lot of products (HW and SW) are being imported. The risk of a potential backdoor always exists as one can not examine every product. This article explores different options countries and private companies have in response to that.
Article 14: AI is the future of Cybersecurity, for better and for worse
AI is becoming more capable and will, of course, also be used in cybersecurity, both for hacking and defense.
Traditionally, cybersecurity wants to minimise successful attacks. Perfect security is not possible and can not be achieved.
In the age of superintelligent AIs, a single failure could be enough to destroy or seriously harm human life on a global scale.