• CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY

007 Life Lessons through the Verizon Breach Report: #3 Innovation

Published by anders on December 3, 2020
Categories
  • Blog
Tags
  • TPRM Best Practices
James Bond Life Lessons Innovation

We continue with our “007 Life Lessons through the Verizon Breach Report” series, which combines lessons from the gadget wielding international crime-fighter, James Bond with data from the DBIR to secure our enterprises. Today is the turn of lesson 3: Innovation.

These lessons come from a recent presentation by our CEO Anders Norremo and Jason Torres from Rush University Medical Center at the 7th Annual Hacking Conference by ISACA and The Institute of Internal Auditors.

What does it mean to innovate? 

The landscape of cyber security solutions is huge and growing everyday, fueled by a strong influx of venture capital. 

At the same time, cyber security managers and directors encounter more and more potential risks and start looking for the right tools to reduce them with the minimum amount of effort possible.

Does that mean that we as an industry are innovating? The answer is both yes and no.

Innovative tools are built everyday, but often they are just too hard to use. Leonardo da Vinci once said, and Steve Jobs at Apple later adopted, that “Simplicity is the ultimate form of sophistication”.

In other words, our innovative tools must be easy to use. This is more important now than ever, as we are seeing a shift in the workforce. 

Managing security is no longer purchasing tools for your network engineers or developers. Consider a hospital, where nurses are now interacting with a number of different solutions, or manufacturing workers who are incorporating technology to their processes.

The workforce is becoming digitized across all industries, but not all workers are heavy users of technology. So simplicity becomes the key to make it effectively available for everybody.

What would James Bond do?

Let’s draw a parallel to James Bond, who inspired this series of blogs. In the movie “Tomorrow Never Dies”, there’s a famous garage scene where he gets ambushed by countless numbers of Elliott Carvers goons. 

During this scene Bond drives the car at break neck speed forwards and backwards all while hunched down in the back seat. He shoots missiles and deploys tire shredders all from a 1997 era “smartphone”. 

How did he do this? 

Bond famously never trains or tests out his gadgets. When he is around Q he’s more focused on coming up with clever lines than learning how to use the gadget. 

The secret is that Q always makes it so easy that he doesn’t need any training. He can actually learn on the fly on his own.

The lesson learned there is that cyber security should be similar to this. Technology needs to be built on the premise that users at all levels can leverage functionality, even if they don’t have a technical background. So when introducing a new feature, let’s do it Q’s way – let others quickly see the effectiveness for themselves.

We all love to work and invest on innovation, but we can’t let it negatively affect the ease of use. The primary driver for any innovation should be improving the experience for cyber security professionals.

How does this relate to the Verizon Data Breach Investigation Report?

We’ve previously discussed that credential dumps are a big issue. In fact, stolen credentials are the top type of attack that’s affecting organizations, as a result of attackers abusing both compromised accounts and system vulnerabilities.

A knee jerk reaction to this insight would be to use stronger passwords and increase the complexity rules around them, but this tends to be ineffective at a policy compliance level.

Instead of applying restrictions, a better approach would be to turn this into a positive. Utilizing a SSO that across the board makes it easier to manage access, and can be secured with multi-factor authentication and more security controls.

This would be a good step towards addressing the number one threat enterprises are facing when it comes to cyber attacks.

Taking this a step further, when it comes to managing security, doing the same thing all the time is not necessarily the answer. Don’t be afraid to innovate your security approach from a thought perspective, as well as a technology solution perspective.

Changing our thinking leads to changing our focus, which leads to true security innovation. If attackers are looking for every angle to exploit, and James Bond is looking at all the angles to save the day, why can’t we do the same in security?




To learn more about how ThirdPartyTrust can help you manage third-party risk across your organization, request your free trial now:


Trial Account Sign-Up
anders
anders
  • Phone
    |+1-617-245-0469
  • Address
    |
    111 Huntington Ave, Suite 2010, Boston, MA 02199
  • Sales
    |sales@bitsighttech.com
  • Contact Us
Laika_SOC2_TypeI_PurpleIris        CSA_Trusted_Cloud_Provider

©2024 ThirdPartyTrust, LLC and its Affiliates. All Rights Reserved. | 111 Huntington Ave. Suite 2010 Boston, MA 02199
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Reject AllAccept
Cookie Settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT