Industry Insights

Industry Insights

Opinions expressed on this blog reflect the writer’s views and not the position of the Capgemini Group

Even though today's enterprises are utilizing the latest #cybersecurity technologies, they're still being compromised. Why?

Category : Digital Strategies
 It’s time to get real and think like a cyber attacker
 
Organizations are under attack. No matter the industry or size of the organization, today’s digital enterprise is preparing for cyber security attacks in several ways. It is utilizing the latest cyber security technologies to detect and prevent; its internal team or vendor partners are testing vulnerabilities and managing a Security Operations Center (SOC). These internal teams and partners are helping to ensure compliance and control, as well as guiding the organization towards industry best practices.
 
These are all vital tools in the cyber defence arsenal. Yet, still, the modern enterprise is being breached and exploited. Organizational, procedural and technical weaknesses are opening the door to hackers, committed professional criminals, and more strategic attacks. Alarmingly, it is increasingly apparent from my conversations with clients and other organizations, as well as with fellow InfoSec professionals, that there is a lack of awareness about just how vulnerable an organization is to an attack.
 
Exposing information security threats
 
This stems from a number of different reasons, including a lack of security resource or budget, and limited knowledge of the toolsets being deployed by cyber criminals to bypass the controls that have been put in place. What this means is that even those enterprises with a mature security program must start to think differently – or more specifically, to think like an attacker. They need a real-world attack simulation to test the complete stack of People, Process, Technology and Compliance. It’s the only way to truly understand their exposures to today’s most damaging and ever-changing information security threats.
 
As an example, I recently worked with a US-based client who had implemented many of the IT security practices and tools you’d expect from an organization keen to protect its data assets, reputation and bottom line. But we surprised them. Using our Cyber Attack Simulation solution, we demonstrated that the client’s vulnerabilities were much larger than they thought.
 
We exposed the unknown vulnerabilities. How? Well, an exercise like this goes beyond traditional penetration testing, which often excludes the very tactics, assets or locations most valuable to real attackers or threat communities. Instead, our approach takes information that is open source and available publicly to understand an attacker’s point of view. This enables us to quickly identify the security gaps in how an organization’s most valued assets are being protected.
 
Assessing every attack surface
 
By thinking like a cyber attacker, our Cyber Attack Simulation puts enterprise defences under the same duress as in the real and evolving threat landscape. So, it will embrace such things as:
 
  • Testing the stack (People, Process, Technology)
  • Phishing email testing across the organization
  • Denial of Service – Packet & Application Layer
  • SQL Injection of applications
  • System naming & version conventions
  • Deepweb & Darknet information leak exposure
  • Leaked customer information exposures
  • Metadata information exposure
  • Search database exposures
  • Mis-configuration of detection systems

Addressing unknown vulnerabilities

 
It’s a long list of areas that must be considered. So, it’s no wonder that organizations struggle to understand their threat position, leaving them vulnerable to increasingly sophisticated cyber attacks. It is this vulnerability that a Cyber Attack Simulation exercise addresses, leveraging our state-of-the-art Security Operations Center (SOC) Lab. Our well-refined and proven methodologies span multiple technologies and security control areas, from physical security to personnel and procedural security controls, to system and application-level penetration. That’s because we know the real-world cyber criminal will target any vulnerable attack surface.
 
For more information or to arrange a confidential Cyber Attack Simulation exercise, please contact us at https://www.au.capgemini.com/secure-your-assets/cyber-attack-simulation
 
Learn more about Capgemini Cybersecurity solutions 
 

About the author

Clifford Vazquez
Clifford Vazquez
Apart from my role in Capgemini I provide support in FBI Cyber Investigation to research and stay ahead of the cyber attacks and methods

Leave a comment

Your email address will not be published. Required fields are marked *.