SlideShare a Scribd company logo
washingtonbusinessjournal.com                                                                                                           January 13-19,2012

FedBizExtra
Expert Insight
Government, business need new general on cyberbattlefield
By Christopher Ling                                 and equipping the network team, while the             cluding malware analysis to understand the
                                                    CISO directs the action on the actual cyber-          attack. In addition, cyber and industry/gov-


T
       he crown jewels of capitalism — the          battlefield, directly monitoring and engag-           ernment experts on the team will assess the
       innovative ideas that drive competi-         ing the enemy. The two counterbalance each            risk generated by the attack, and reverse en-
       tion and bring nations, companies            other, and the ultimate cost-benefit decisions        gineering will fix the weakness and strength-
and individuals to the forefront of accom-          are made at a higher level, in the C-suite in         en the broader network.
plishment — are being stolen, one by one, at        the commercial world or a different structure            ● Evolutionary response: The team must
an increasingly faster pace.                        to accommodate government operations.                 conduct ongoing vulnerability assessments,
   As the list of government agencies and              CISOs can operate at all levels of an orga-        examine proven best practices and develop
companies victimized by hacking grows each          nization, and the good ones will end up ruf-          comprehensive response strategies to keep
week, it is clear that no network is complete-      fling a few feathers to drive new thinking and        the defensive posture at its greatest strength
ly impenetrable. To thwart these attacks, one       a focused commitment on cyberprotection.              at any given moment.
must embrace a defense that embodies the               Today’s sophisticated cyberattacks call               ● Institutional improvements: These are
same aggressive and methodical approach as          for a response that integrates the best knowl-        efforts that require discipline and focus to
our cyber-adversaries use against us today.         edge of a given company or government                 ensure the cyberprotection is fully integrated
And that includes finding the right people to       agency — concerning the most precious                 and all parts are operating effectively. They
lead a dynamic defense — one designed to            secrets, the unique operational and business          will provide constant attention to cyberpol-
continuously evolve as the threats change.          requirements — and the best experts in the            icy, operations, new technologies, manage-
   While many of today’s networks are               techniques of cyberdefense.                           ment techniques and the recruiting and train-
largely run by chief information officers, the         A cybersecurity operations center, man-            ing the best cyber workforce.
CIO’s primary focus is on efficiency. Need          aged separately from the CIO’s network                   Those capabilities can be eroded if the pri-
to meet today’s skyrocketing data manage-           operations center, should focus on four key           mary network focus is on efficiency alone.
ment requirements at lower costs? The CIO           areas of intelligence and response.                   And admittedly, in today’s economic envi-
can do it. Need to defend against insidious            ● Threat vector intelligence: This ap-             ronment, efficiency is a strong argument.
attackers who are feeding off the best ideas        proach takes virus-scan programs to a high-              But the more powerful counterargument
of governments and companies? The focus             er level. Not only does the process detect            is the skyrocketing cost that nations will
must be on effectiveness, and the CIO needs         known threats or attack types, but it also            endure if we don’t adopt a more effective
help.                                               serves as an active, continuous presence on           way to combat cybercrime. Certain foreign
   Unique challenges require a unique lead-         the Internet to gain situational awareness of         governments and individual cybercriminals
er: A chief information security officer can        what’s happening and what’s changing. This            are not just taking our ideas; they’ll soon be
serve as the powerful tactical general on the       enhanced approach monitors trends and de-             using them against us to win in the global
cyberbattlefield. But how many organiza-            velops insights into new and emerging threat          marketplace. As the daily headlines remind
tions have a CISO? And, if they do, what            sets. Protection against just known threats           us, cybersecurity isn’t something on which
resources are available to them?                    may be helpful at home, but won’t fully pro-          anyone can “declare victory,” but with the
   The best organizations will have both a          tect a corporate brain trust.                         right approach we can avoid defeat.
CIO and a CISO working closely together.               ● Rapid response: Every second counts,             Christopher Ling is a Senior Vice President at Booz
The CIO serves in a role analogous to the           and the best response teams will be capable           Allen Hamilton and leads the firm’s cyber military op-
military’s armed services, creating, training       of conducting a full analysis life cycle, in-         erations business.




        Reprinted with permission from the Washington Business Journal. ©2012, all rights reserved. Reprinted by Scoop ReprintSource 1-800-767-3263.

More Related Content

PDF
Ask the Experts final
PDF
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
PPT
December ISSA Meeting Executive Security Presentation
PDF
IDC Best Practices in Private Sector Cyber Security
PDF
How Cyber Resilient are we?
PDF
csxnewsletter
PDF
AI-Cyber-Security-White-Papers-06-15-LR
PPT
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Ask the Experts final
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
December ISSA Meeting Executive Security Presentation
IDC Best Practices in Private Sector Cyber Security
How Cyber Resilient are we?
csxnewsletter
AI-Cyber-Security-White-Papers-06-15-LR
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015

What's hot (20)

PDF
Gartner Security & Risk Management Summit Brochure
PPT
Improving cyber-security through acquisition
PDF
Executive Summary on the Cyber Risk Webinar
PDF
From checkboxes to frameworks
PDF
Cybersecurity infographic
PDF
Cybersecurity-2013
PDF
Information Security Shake-Up
 
PDF
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
PDF
12 Top Talks from the 2017 R-CISC Summit
PDF
For Corporate Boards, a Cyber Security Top 10
PDF
Cyber Secuirty Visualization
PPTX
Managing Enterprise Risk: Why U No Haz Metrics?
PDF
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
PDF
Responding to and recovering from sophisticated security attacks
 
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PDF
SBIC Enterprise Information Security Strategic Technologies
 
PDF
2017 in Review: Infosec Pros Look Back on the Year
PPTX
Think Cyber Think Resilience | William Barker | March 2016
PDF
RocketCyber Top 10 Security Startups - 2019
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
Gartner Security & Risk Management Summit Brochure
Improving cyber-security through acquisition
Executive Summary on the Cyber Risk Webinar
From checkboxes to frameworks
Cybersecurity infographic
Cybersecurity-2013
Information Security Shake-Up
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
12 Top Talks from the 2017 R-CISC Summit
For Corporate Boards, a Cyber Security Top 10
Cyber Secuirty Visualization
Managing Enterprise Risk: Why U No Haz Metrics?
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Responding to and recovering from sophisticated security attacks
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
SBIC Enterprise Information Security Strategic Technologies
 
2017 in Review: Infosec Pros Look Back on the Year
Think Cyber Think Resilience | William Barker | March 2016
RocketCyber Top 10 Security Startups - 2019
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
Ad

Viewers also liked (20)

PDF
Delivering on the Promise of Big Data and the Cloud
PPTX
Using Advanced Analytics for Data-Driven Decision Making
PDF
Mission Engineering Solution Infographic
PDF
RightIT™ Maximizing Government IT Efficiency
PDF
Supply Chain Data Standards in Healthcare
PPTX
Improving Intelligence Analysis Through Cloud Analytics
PDF
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
PDF
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
PDF
Reform Playbook
PDF
Booz Allen Hamilton's 100-Year Timeline
PDF
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
PDF
Cloud Brokering Brochure
PDF
Polaris Product Fact Sheet
PDF
PDF
The Business of Change
PDF
Technology Injection
PDF
Miles To Go Before They Are Green
PDF
The Vigilant Enterprise
PDF
The Next Gen Program Analysis Infographic
PDF
Re-Imagined Infrastructure System: US 2040 Economy
Delivering on the Promise of Big Data and the Cloud
Using Advanced Analytics for Data-Driven Decision Making
Mission Engineering Solution Infographic
RightIT™ Maximizing Government IT Efficiency
Supply Chain Data Standards in Healthcare
Improving Intelligence Analysis Through Cloud Analytics
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
Reform Playbook
Booz Allen Hamilton's 100-Year Timeline
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Cloud Brokering Brochure
Polaris Product Fact Sheet
The Business of Change
Technology Injection
Miles To Go Before They Are Green
The Vigilant Enterprise
The Next Gen Program Analysis Infographic
Re-Imagined Infrastructure System: US 2040 Economy
Ad

Similar to Dynamic Defense (20)

PDF
What Every CISO Should Learn From the Target Attack
PDF
Security - intelligence - maturity-model-ciso-whitepaper
PDF
CROs must be part of the cybersecurity solution by david x martin
PDF
Countering Advanced Persistent Threats
PDF
Wef risk responsibility_hyperconnectedworld_report_2014
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Getting ahead of compromise
PDF
Darktrace_WhitePaper_EnterpriseImmuneSystem
PPTX
From Vulnerability to Strength: The Role
PDF
Top Cyber News Magazine - Oct 2022
PDF
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
PDF
Norman Broadbent Cybersecurity Report - How should boards respond
PDF
Darktrace enterprise immune system whitepaper_digital
PDF
Five principles for improving your cyber security
PDF
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
PDF
Securing the Digital Future
PDF
How close is your organization to being breached | Safe Security
PDF
Booz Allen's 10 Cyber Priorities for Boards of Directors
PDF
Improved-Cybersecurity-cooperation
What Every CISO Should Learn From the Target Attack
Security - intelligence - maturity-model-ciso-whitepaper
CROs must be part of the cybersecurity solution by david x martin
Countering Advanced Persistent Threats
Wef risk responsibility_hyperconnectedworld_report_2014
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Getting ahead of compromise
Darktrace_WhitePaper_EnterpriseImmuneSystem
From Vulnerability to Strength: The Role
Top Cyber News Magazine - Oct 2022
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
Norman Broadbent Cybersecurity Report - How should boards respond
Darktrace enterprise immune system whitepaper_digital
Five principles for improving your cyber security
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Securing the Digital Future
How close is your organization to being breached | Safe Security
Booz Allen's 10 Cyber Priorities for Boards of Directors
Improved-Cybersecurity-cooperation

More from Booz Allen Hamilton (20)

PDF
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
PDF
Examining Flexibility in the Workplace for Working Moms
PDF
The True Cost of Childcare
PDF
Inaugural Addresses
PDF
Military Spouse Career Roadmap
PDF
Homeland Threats: Today and Tomorrow
PDF
Preparing for New Healthcare Payment Models
PDF
The Product Owner’s Universe: Agile Coaching
PDF
Immersive Learning: The Future of Training is Here
PDF
Nuclear Promise: Reducing Cost While Improving Performance
PDF
Frenemies – When Unlikely Partners Join Forces
PDF
Booz Allen Secure Agile Development
PDF
Booz Allen Industrial Cybersecurity Threat Briefing
PDF
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
PDF
CITRIX IN AMAZON WEB SERVICES
PDF
Modern C4ISR Integrates, Innovates and Secures Military Networks
PDF
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
PDF
Women On The Leading Edge
PDF
Booz Allen Field Guide to Data Science
PDF
The Enterprise Integrator - C4ISR
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
Examining Flexibility in the Workplace for Working Moms
The True Cost of Childcare
Inaugural Addresses
Military Spouse Career Roadmap
Homeland Threats: Today and Tomorrow
Preparing for New Healthcare Payment Models
The Product Owner’s Universe: Agile Coaching
Immersive Learning: The Future of Training is Here
Nuclear Promise: Reducing Cost While Improving Performance
Frenemies – When Unlikely Partners Join Forces
Booz Allen Secure Agile Development
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
CITRIX IN AMAZON WEB SERVICES
Modern C4ISR Integrates, Innovates and Secures Military Networks
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Women On The Leading Edge
Booz Allen Field Guide to Data Science
The Enterprise Integrator - C4ISR

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Machine learning based COVID-19 study performance prediction
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
August Patch Tuesday
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Getting Started with Data Integration: FME Form 101
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Assigned Numbers - 2025 - Bluetooth® Document
Machine learning based COVID-19 study performance prediction
A comparative study of natural language inference in Swahili using monolingua...
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
August Patch Tuesday
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation_ Review paper, used for researhc scholars
Heart disease approach using modified random forest and particle swarm optimi...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Dynamic Defense

  • 1. washingtonbusinessjournal.com January 13-19,2012 FedBizExtra Expert Insight Government, business need new general on cyberbattlefield By Christopher Ling and equipping the network team, while the cluding malware analysis to understand the CISO directs the action on the actual cyber- attack. In addition, cyber and industry/gov- T he crown jewels of capitalism — the battlefield, directly monitoring and engag- ernment experts on the team will assess the innovative ideas that drive competi- ing the enemy. The two counterbalance each risk generated by the attack, and reverse en- tion and bring nations, companies other, and the ultimate cost-benefit decisions gineering will fix the weakness and strength- and individuals to the forefront of accom- are made at a higher level, in the C-suite in en the broader network. plishment — are being stolen, one by one, at the commercial world or a different structure ● Evolutionary response: The team must an increasingly faster pace. to accommodate government operations. conduct ongoing vulnerability assessments, As the list of government agencies and CISOs can operate at all levels of an orga- examine proven best practices and develop companies victimized by hacking grows each nization, and the good ones will end up ruf- comprehensive response strategies to keep week, it is clear that no network is complete- fling a few feathers to drive new thinking and the defensive posture at its greatest strength ly impenetrable. To thwart these attacks, one a focused commitment on cyberprotection. at any given moment. must embrace a defense that embodies the Today’s sophisticated cyberattacks call ● Institutional improvements: These are same aggressive and methodical approach as for a response that integrates the best knowl- efforts that require discipline and focus to our cyber-adversaries use against us today. edge of a given company or government ensure the cyberprotection is fully integrated And that includes finding the right people to agency — concerning the most precious and all parts are operating effectively. They lead a dynamic defense — one designed to secrets, the unique operational and business will provide constant attention to cyberpol- continuously evolve as the threats change. requirements — and the best experts in the icy, operations, new technologies, manage- While many of today’s networks are techniques of cyberdefense. ment techniques and the recruiting and train- largely run by chief information officers, the A cybersecurity operations center, man- ing the best cyber workforce. CIO’s primary focus is on efficiency. Need aged separately from the CIO’s network Those capabilities can be eroded if the pri- to meet today’s skyrocketing data manage- operations center, should focus on four key mary network focus is on efficiency alone. ment requirements at lower costs? The CIO areas of intelligence and response. And admittedly, in today’s economic envi- can do it. Need to defend against insidious ● Threat vector intelligence: This ap- ronment, efficiency is a strong argument. attackers who are feeding off the best ideas proach takes virus-scan programs to a high- But the more powerful counterargument of governments and companies? The focus er level. Not only does the process detect is the skyrocketing cost that nations will must be on effectiveness, and the CIO needs known threats or attack types, but it also endure if we don’t adopt a more effective help. serves as an active, continuous presence on way to combat cybercrime. Certain foreign Unique challenges require a unique lead- the Internet to gain situational awareness of governments and individual cybercriminals er: A chief information security officer can what’s happening and what’s changing. This are not just taking our ideas; they’ll soon be serve as the powerful tactical general on the enhanced approach monitors trends and de- using them against us to win in the global cyberbattlefield. But how many organiza- velops insights into new and emerging threat marketplace. As the daily headlines remind tions have a CISO? And, if they do, what sets. Protection against just known threats us, cybersecurity isn’t something on which resources are available to them? may be helpful at home, but won’t fully pro- anyone can “declare victory,” but with the The best organizations will have both a tect a corporate brain trust. right approach we can avoid defeat. CIO and a CISO working closely together. ● Rapid response: Every second counts, Christopher Ling is a Senior Vice President at Booz The CIO serves in a role analogous to the and the best response teams will be capable Allen Hamilton and leads the firm’s cyber military op- military’s armed services, creating, training of conducting a full analysis life cycle, in- erations business. Reprinted with permission from the Washington Business Journal. ©2012, all rights reserved. Reprinted by Scoop ReprintSource 1-800-767-3263.