What’s keeping CISOs up at night?
(Part I)

Perhaps, unsurprisingly, everything most CISOs need to know about Zero Day Vulnerabilities is that they’re one of the hardest threats to mitigate against, let alone detect. That kind of says it all.

Zero Day Vulnerabilities are tough to see coming and sometimes, even the most protected environments are vulnerable. While there are some technical solutions that will detect potential threats arising from unexpected changes to an environment related to a zero day vulnerability, they’re not widely deployed. They’re also not bullet proof.

Zero day vulnerabilities are essentially breaches arising from security problems with existing software, patches or new releases of software or firmware. They’re vulnerabilities which previously did not exist and often are not detected until someone finds them and exploits them. And even then, as in several recent cases, the exploits remain undetected for days, months or sometimes many years until someone discloses them.

The proliferation of devices, applications, cloud service providers, co-location data centres and the often complex operating environments of larger organisations can make zero day vulnerabilities tough to find. They’re usually brought to your attention by academics, industry researchers or the vendors themselves, and occasionally white hat hackers. The black hat hackers will often want to keep the information secret or sell it on the black market so they can use it for malicious purposes.

So, what to do?

Well, plenty of us just have it top of mind all the time and we spend a lot of time locking down our critical infrastructure and identifying and controlling possible attack vectors. It’s part of most ITSM programs and an important part.

Patches need to be tested and not released into production without verification and, for critical systems, usually after the initial industry feedback on the patch has settled down, as sometimes vendors can get it wrong. Sometimes patches are so buggy that they create more issues than they solve and more patches are released to address the problems they introduce. Some patches really, for certain environments, offer no tangible advantages and are never released or implemented.

So, for a lot of CISOs, unless there’s a very high security priority given to the patch and we’re forced to potentially release them very quickly, they may not be deployed. For other systems we lock them down and test in sandboxes, and test and test until we’re as sure as we reasonably can be that we’re not introducing a problem or other vulnerability.

Unfortunately, complexity is the enemy of security, and as we move into more complex systems and networks more security issues will be found. It’s part of the world now, and we must manage it.

Why do CISOs worry about zero day vulnerabilities?

It’s because, on top of keeping a watchful eye on malicious attacks, we also have to keep an eye on the legitimate technology we deploy or connect to as part of our everyday work.

It’s like having a much loved pet which one day, unpredictably, bites you when you simply aren’t expecting it. You simply can’t be complacent – and that gets tough sometimes. You just don’t expect the authorised and lovingly managed technology your team has painstakingly secured to suddenly become a threat vector. It keeps plenty of CISOs awake at night.

Why else do we worry about zero day?

It’s because, by definition, zero day vulnerabilities are brand new to the world. While a new virus in the wild can be quickly dissected and analysed, it’s a lot harder to detect, let alone understand, the magnitude of the threat discovered in a zero day vulnerability. In one environment it may be benign. In another it could lead to a catastrophic security breach or malfunction of mission critical infrastructure or applications.

It’s unlikely this challenge is going to go away soon, although more advanced tools are likely to help in the future.

In the meantime, CISOs like me keep one eye open at all times, train our staff and ensure our people and processes are the best they can be, but still look out for the likely random appearance of zero day vulnerabilities and someone trying to get into our systems.

About Steve Challans

Steve has more than 33 years’ experience working in the IT security sector and over 20 years specialising in Information Security. He has been the CISO at Prophecy International for 5 years.

Steve holds security qualifications including the CISM, CISA, CRISC, CISSP, PCIP, and ISO27001 Lead Auditor certifications.

Through a partnership with Denver Public Schools, Prophecy International will offer an internship program to a technology focussed high-school student this coming summer.

As part of the CareerLaunch Internship Program, a lucky high school student will complete 100-120 hour internship at Prophecy International over the June/ July 2018 period learning about the Cyber-security industry and putting their STEM coursework into practice.

Following the initial CareerLaunch program, Denver Public Schools said “98% of the business partners who had participated in the program felt offering internships to high school students was a viable way to groom future employees and said they hoped their company would continue to participate in CareerLaunch in the future”.

Suzanne Healy, Director of Sales – North America and “Company Champion” for the program said Prophecy International was honoured to have been chosen to participate in the program and excited to share with the students the wealth of career options in cybersecurity.  “As one of the hottest career fields, we want to encourage students to learn more about how Prophecy helps companies develop sound system security architectures.   It is important for us as a global company to give back to the community and educate/ provide practical experience to the next generation of leaders”.

About Prophecy International

Prophecy International Holdings Limited (ASX: PRO) is the holding company for Snare, which develops a suite of advanced threat intelligence software solutions used around the world across industries ranging from defence, financial services and manufacturing to government agencies, transport and retail.

Prophecy International Holdings Limited Ltd was established in 1980 and services markets in the USA, Europe, Asia and Australia.  The international headquarters and global software development centre is at Prophecy House in Adelaide, Australia.

For further information please contact:

Media contact

Christine Bishop
Chief Marketing Officer
Prophecy International
+61 418 181 352
cbishop@prophecyinternational.com

Part 1: Australia & the National Data Breach Scheme

 There has been little media attention on the Privacy Act amendments which came into effect on February 22nd. Inspired by the proliferation of information stored in e-format, the Australian Government has introduced new data breach regulations governed by the Office of the Australian Information Commissioner (OAIC). The Privacy Amendment (Notifiable Data Breaches) Act establishes new requirements for businesses responding to data breaches – introducing reporting and data breach investigation obligations for many Australian businesses when a breach is suspected.

Do you need to comply?

You will be obligated to comply with the National Nata Breach Scheme (NDBS) if you are:

  • an Australian Government Agency, Business or Non-Profit with annual turnover greater than AU$3 Million; or
  • a private sector health provider; or
  • a childcare centre or private education institution; or
  • a credit provider, or if your business handles consumer credit, or tax file numbers

Ultimately, the government has cast a wide web, and many Australian businesses will be obligated to comply.

What are your obligations if you suspect a breach?

When you suspect that a breach has occurred, you are obligated to take all reasonable steps to perform a comprehensive investigation of the breach within 30-calendar days of the breach being identified to determine its extent and severity. Should you determine that the breach could result in serious harm to the individuals, then you are obligated to notify the affected persons and the OAIC. Where you suspect that the breach is likely to result in serious harm, when it is first identified, you are obligated to immediately notify the OAIC.

 How do you meet these expectations?

Mandatory Data Breach laws require your businesses to have the right mix of technical and administrative controls in place. It is crucial that you assess the policies and procedures that you have in place, undertake an audit of the information that you store, and implement policies that will protect this information

What are the ramifications for failing to comply?

The Australian Government views a failure to comply with the NDBS as “…an interference with the privacy of an individual”, and accordingly attaches sever pecuniary penalties. The financial penalty on individuals is up to AU$360,000 while the penalty for businesses is up to $1.8 million.

There is no silver bullet to complying with the regulations. Compliance requires a combination of people management, administrative processes and technological controls – working together to keep data secure. Using Snare can help you implement the requisite technical controls, if you need help with one or more of the other areas, then seek advice from a trusted advisor.

 For more information on how Snare can support your Privacy Act Compliance, refer to our whitepaper: Mandatory Data Breach Disclosure: Equipping your business for Privacy Act Compliance with Snare

 For more information specifically on the NDBS refer to these useful links:

https://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme

https://www.oaic.gov.au/resources/agencies-and-organisations/guides/data-breach-preparation-and-response.pdf

 

We are incredibly excited to announce that Snare Alliance has joined the Prophecy team. A long time partner with us here at Prophecy, and a critical part in Snare’s growth over the last several years, Snare Alliance joins us as we head into 2018, a year shaping up to be the most exciting yet in our long history. While several other major announcements are on the horizon we’d like to welcome the Snare Alliance team on board as well as all their wonderful customers who’ve we’ve been reaching out to and should hear more shortly if they haven’t already.

For those of you new to the Intersect website and Prophecy in general here are a few links to get you started, but you can of course just use the nav bar at the top of the page.

Product Information
Free Trial
Contact Us

Stay tuned as many more exciting announcements are coming soon!

The Prophecy Team