{"id":15006,"date":"2014-09-22T19:06:18","date_gmt":"2014-09-22T19:06:18","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2587"},"modified":"2025-07-21T09:25:16","modified_gmt":"2025-07-21T13:25:16","slug":"businesses-should-strive-to-be-cyber-resilient","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/businesses-should-strive-to-be-cyber-resilient\/15006\/","title":{"rendered":"Businesses Should Strive to be Cyber-Resilient"},"content":{"rendered":"<p>What does it mean to be cyber-resilient \u2013 for businesses and governmental organizations? Cyber-resilience, <a href=\"https:\/\/threatpost.com\/nsa-director-rogers-urges-cyber-resiliency\/108292\" target=\"_blank\" rel=\"noopener nofollow\">Admiral Mike Rogers<\/a> explained, \u201cis the ability to sustain damage but ultimately succeed. Resiliency is all about accepting that I will sustain a certain amount of damage.\u201d Admiral Rogers is the new director of the National Security Agency and the commander of U.S. Cyber Command.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>This idea of cyber-resilience was a key theme at the fifth annual Billington Cybersecurity Summit, for which Admiral Rogers gave the keynote, in Washington D.C. last week. The event was primarily geared toward the U.S. government and U.S. business, but its central message is one that all businesses and all governments should heed: Defense should not be viewed as a process of 100 percent network protection. As they say, there are two types of companies out there: those that are owned and know it and those that are owned but don\u2019t realize it yet. <\/p><blockquote class=\"twitter-pullquote\"><p>Businesses Should Strive to be Cyber-Resilient #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fb6nv&amp;text=Businesses+Should+Strive+to+be+Cyber-Resilient+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There is no question that the security issues we all face are many. Critical infrastructure security is a mess, our government and corporate networks are, or will soon be, compromised and we\u2019re all \u2013 governments, businesses and people \u2013 wading through the muck together.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020132\/MichaelDaniel-1.jpg\"><img decoding=\"async\" class=\"alignright wp-image-2589 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020132\/MichaelDaniel-1.jpg\" alt=\"MichaelDaniel\" width=\"224\" height=\"224\"><\/a>Security is hard, as president Obama\u2019s special assistant and White House Cybersecurity Coordinator, Micha\u0435l Daniel pointed out at the event, but it is becoming incredibly clear that important people\u2019s opinions are coalescing around similar approaches to addressing cybersecurity. And this is very good news because an imperfect but unified plan is better than no plan at all.<\/p>\n<p>It seems that a big part of the movement to reform cybersecurity, which is being led in large part by Rogers and Daniel and people like them here in the U.S. and abroad, has to do with this idea of resilience and how to achieve cyber-resilience by working together, sharing information, and establishing partnerships. Organizations, government and private alike, need to ensure they can simultaneously remain operational and remedy threats, even when an attack is ongoing. What this means is forever stepping away from the all-too-common practice of shutting the network down in the face of an attack. The military, Rogers explained, does not cease operations when it is attacked. It merely multi-tasks.<\/p>\n<p>But how do you achieve cyber-resiliency? Well, according to any number of speakers at the Billington event, information sharing and crowd-sourcing \u2013 where we all share the responsibility for securing the Internet together \u2013 are necessary steps. In order to be resilient, organizations need to have a plan. One organization is dealing with attacks today that another will deal with tomorrow. If the first organization would only tell the second about how to deal with that attack, the second organization would be better equipped to devise a strong defense plan.<\/p>\n<p>Daniel is tasked with facilitating information sharing by the president. He presented an interesting paradox at the event: <a href=\"https:\/\/threatpost.com\/white-house-internet-not-borderless-but-lacking-interior\/108333\" target=\"_blank\" rel=\"noopener nofollow\">why is network and Internet security so hard<\/a> when the threats we face are so well known and seemingly simple?<\/p>\n<p>Indeed, we all think about this every day. The primary threats online are known bugs that have either been patched already or, for reasons that remain unclear, just aren\u2019t getting patched. Someone, either a vendor choosing not to patch or a user choosing not to update, is quite clearly making a bad security decision. In addition to that, passwords are still an enormous weakness. It\u2019s 2014; there are self-driving cars and computers in our pockets and we\u2019re still using passwords.<\/p>\n<p>Daniel cautioned that if these were easy problems to solve, which I think we all agree they seem on the surface to be, then they would be solved. The reality is that these are hard problems. The president\u2019s National Strategies for Trusted Identities in Cyberspace (NSTIC) has a number of strong leads toward replacing the password. In addition to securing the Internet, NSTIC could potentially drive new business as people begin putting data and services online that they are unwilling to put online under the current conditions.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The problem of old bugs looks simple, but it is not #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fb6nv&amp;text=The+problem+of+old+bugs+looks+simple%2C+but+it+is+not+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>As for the problem of known bugs not getting fixed or updates not getting installed, Daniel believes these are issues of economics and psychology. He claims we don\u2019t properly understand the incentive structure behind cybersecurity, which is why we need to step away from speaking about cyber-stuff using words that only the engineers understand. We need to talk about security in terms that the executives and board members and the regular, everyday people can understand and stand behind.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-2590\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020132\/6409-1.png\" alt=\"640\" width=\"640\" height=\"320\"><\/p>\n<p>This last point is key. It\u2019s a very large part of what we do here at Kaspersky Lab because if ordinary people are more prepared to protect themselves, then everyone is more secure as a result.<\/p>\n<p>Our very own Adam Firestone, president and general manager of Kaspersky Government Security Solutions, spoke at the event as well.<\/p>\n<p>\u201cPart of the problem we all face, everyone in this room, everyone at this conference, is that we live in a world where we have inherited an insecure internet,\u201d Firestone said in a panel discussion. \u201cWe live in a world where we have inherited insecure operating systems. And we ask, how do we fix this?\u201d<\/p>\n<p>In a podcast conversation with Firestone, which we will post Wednesday, he noted we are in a unique position at the moment. It is almost universally accepted that the security of critical infrastructure systems is woeful. The silver lining is that many of these systems, which were built 20 or even 30 years ago, are at a point where now they must be replaced. What this means is that we can do security right. You can\u2019t add security after the fact. You have to build security in from the ground up, and we\u2019re going to get the opportunity to do just that as we replace all these legacy systems.<\/p>\n<p>Firestone says that we must accept the fact that we are in a state of transition architecturally. We prioritized usability over security when we built the infrastructure the first time. It\u2019s time now that we have the technology to rebuild critical infrastructure with an eye toward security.<\/p>\n<p>\u201cIt\u2019s time to start looking at this as a build it from the ground up structure. Bandaids do not work,\u201d he warned.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-resilience is the ability to sustain damage, but ultimately succeed. In order to be resilient, businesses need to have a plan. One organization is dealing with attacks today that another will deal with tomorrow. There are ways businesses can help each other become cyber-resilient. <\/p>\n","protected":false},"author":42,"featured_media":15947,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2189,2190,282,2191],"class_list":{"0":"post-15006","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-billington-cybersecurity-summit","10":"tag-cyber-resilient","11":"tag-cybersecurity","12":"tag-security-for-businesses"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/businesses-should-strive-to-be-cyber-resilient\/15006\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/businesses-should-strive-to-be-cyber-resilient\/15006\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/businesses-should-strive-to-be-cyber-resilient\/15006\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/billington-cybersecurity-summit\/","name":"Billington Cybersecurity Summit"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15006"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15006\/revisions"}],"predecessor-version":[{"id":33324,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15006\/revisions\/33324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15947"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}