Security Capgemini: Capping IT Off

Even though today’s enterprises are utilizing the latest #cybersecurity technologies, they’re still being compromised. Why?

July 10, 2017

It’s time to get real and think like a cyber attacker

Organizations are under attack. No matter the industry or size of the organization, today’s digital enterprise is preparing for cyber security attacks in several ways. It is utilizing the latest cyber security technologies to detect and prevent; its internal team or vendor partners are testing vulnerabilities and managing a Security Operations Center (SOC). These internal teams and partners are helping to ensure compliance and control, as well as guiding the organization towards industry best practices.


 > For Big Data, Cloud, and IoT, May 2018 is closer than you think?


These are all vital tools in the cyber defense arsenal. Yet, still the modern enterprise is being breached and exploited. Organizational, procedural and technical weaknesses are opening the door to hackers, committed professional criminals, and more strategic attacks. Alarmingly, it is increasingly apparent from my conversations with clients and other organizations, as well as with fellow InfoSec professionals, that there is a lack of awareness about just how vulnerable an organization is to an attack.

Exposing information security threats

This stems from a number of different reasons, including a lack of security resource or budget, and limited knowledge of the toolsets being deployed by cyber criminals to bypass the controls that have been put in place. What this means is that even those enterprises with a mature security program must start to think differently – or more specifically, to think like an attacker. They need a real-world attack simulation to test the complete stack of People, Process, Technology and Compliance. It’s the only way to truly understand their exposures to today’s most damaging and ever-changing information security threats.

As an example, I recently worked with a US-based client who had implemented many of the IT security practices and tools you’d expect from an organization keen to protect its data assets, reputation and bottom line. But we surprised them. Using our Cyber Attack Simulation solution, we demonstrated that the client’s vulnerabilities were much larger than they thought.

We exposed the unknown vulnerabilities. How? Well, an exercise like this goes beyond traditional penetration testing, which often excludes the very tactics, assets or locations most valuable to real attackers or threat communities. Instead, our approach takes information that is open source and available publicly to understand an attacker’s point of view. This enables us to quickly identify the security gaps in how an organization’s most valued assets are being protected.

Assessing every attack surface

By thinking like a cyber attacker, our Cyber Attack Simulation puts enterprise defenses under the same duress as in the real and evolving threat landscape. So, it will embrace such things as:

  • Testing the stack (People, Process, Technology)
  • Phishing email testing across the organization
  • Denial of Service – Packet & Application Layer
  • SQL Injection of applications
  • System naming & version conventions
  • Deepweb & Darknet information leak exposure
  • Leaked customer information exposures
  • Metadata information exposure
  • Search database exposures
  • Mis-configuration of detection systems

Addressing unknown vulnerabilities

It’s a long list of areas that must be considered. So, it’s no wonder that organizations struggle to understand their threat position, leaving them vulnerable to increasingly sophisticated cyber attacks. It is this vulnerability that a Cyber Attack Simulation exercise addresses, leveraging our state-of-the-art Security Operations Center (SOC) Lab. Our well-refined and proven methodologies span multiple technologies and security control areas, from physical security to personnel and procedural security controls, to system and application-level penetration. That’s because we know the real-world cyber criminal will target any vulnerable attack surface.

For more information or to arrange a confidential Cyber Attack Simulation exercise, please contact us at: https://www.capgemini.com/secure-your-assets/cyber-attack-simulation

 

This article was from Capgemini: Capping IT Off and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com.

Great ! Thanks for your subscription !

You will soon receive the first Content Loop Newsletter