RSA Conference: ‘Countries trying to see how far they can push before causing war,’ says Cisco exec

SAN FRANCISCO – A giant game of chicken is being played out on the Internet between countries that are trying to figure out who’s going to blink.

That’s the analysis of a senior official at Cisco Systems when he looks at the increasing number of cyber attacks attributed to nation states.

Craig Williams, Cisco Systems

“I think we’re stuck with this race where countries are trying to figure out how far they can push the envelope before they can cause something like a war,” Craig Williams, director of engineering at Cisco’s Talos threat intelligence unit told reporters and an industry analyst Wednesday. “Meanwhile their victims try to figure out how far do I have to go to stop them.

“Hopefully that gap will end soon and we’ll have clear lines of what’s acceptable” in cyberspace.

”Some countries continue to not play well on the Internet. Unfortunately that’s going to continue for the foreseeable future.”

394542,/401930 [/relateed]

Williams was speaking on the sidelines of the RSA Conference here at a day-long for reporters, analysts and customers outlining Cisco’s cyber security strategy. The company says it’s the world’s biggest enterprise vendor, with a range of products and services from end point security and multi-factor authentication to incident response.

It sells about US$3 billion in security products and services a year. Still, Cisco is primarily known as a networking company. Network-related products and services accounts for about US$47 billion of is annual revenue.

Wednesday’s event is one of the ways the company wants to get more into the minds of security buyers.

Cisco officials stress that its strategy is to push the threat intelligence it gains into almost every product it sells, a move that started some six years ago. One message to Cisco network customers is that buying security from the company reduces the number of vendors they have to deal with.

Known for favouring acquisitions, its latest move was to buy multi-factor authentication product supplier Duo Security for about US$2.35 billion in cash and assumed equity in October, 2018. MFA helps with access control.

Al Huger, vice-president of engineering at Cisco’s security business group, gave reporters a peek at where the company is going.

With encryption increasingly being offered by browsers, network traffic network is becoming more opaque, he said. That impairs the ability of products like deep packet inspection to see inside traffic. It’s good for consumers worried about privacy, not so good for CISOs. So Cisco thinks endpoints will increasingly be more important as the place where some visibility will remain.

Cisco is focusing more on metadata collection there and using artificial intelligence to make decisions about the security of traffic relating to behaviour without having to see into the packets — do I trust the user? what does their endpoint look like, what do I know about their behaviour in the past.

It also means pushing security intelligence into the network fabric, turning switches and routers into data providers for security — where did the traffic came from, where it went, for example.

Just before the conference Cisco published its annual CISO Benchmark Study, a survey of more than 3,000 security leaders in organizations from 18 countries. (To get the report click here. Registration required)

Among the interesting findings:

— Only 24.1 per cent of alerts that were investigated last year turned out to be legitimate, down from 34 per cent in 2017. “This shows that the accuracy of the tools used to determine which alerts should be investigated are not doing their jobs,” the report concluded. 5.

–The number of legitimate alerts that get remediated fell from 50.5 per cent to 42.8 per cent in the latest report. That means a lot of legitmate alerts weren’t being looked into.

It’s also important to organizations that use time to remediation as a metric of their security maturity.

–Only 75 per cent of respondents were very knowledgeable about incident response. “This is a problem,” says the report: Everyone in an organization should be knowledgeable about incident response.

–Only 61 per cent of organizations performed a drill or exercise every six months to test response plans to cyber security incidents.

In Williams’ briefing he noted that many people think nation states – having a lot of money – often use zero day vulnerabilities in their attacks. Not so. “The vast majority of those threats (actors) take advantage of people: they = use old Microsoft macro attacks or vulnerabilities because they can convince someone at their target to click on it and compromise the whole company. It’s just not worth it for them to spend the capital to buy a zero day,” which could run up to seven figures.

To get an idea of his worst nightmare, Williams pointed to the global spread in 2017 of the Notpetya ransomware, which he estimated infected millions of computers. “It was the most destructive campaign we’ve seen,” he said.

The Talos intelligence unit rarely gives attribution to an attack. In this case the U.S. accused Russia.

While the malware was installed in an update to a popular Ukrainian accounting software, Williams said it is a common misconception that the target was Ukraine. The deployers could have limited the malware to only looking for devices with an IP address in Ukraine, he argued. Instead, the code was made to run on any computer with the software.

In his opinion the message of the malware was global: “Don’t do business in the Ukraine.”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now