ISACA Now Blog

Knowledge & Insights > ISACA Now > Posts > Understanding Hackers’ Motivations, Techniques, Are Keys to Deterrence

Understanding Hackers’ Motivations, Techniques, Are Keys to Deterrence

Alex Holden, President and CISO, Hold Security, LLC
| Posted at 3:08 PM by ISACA News | Category: Security | Permalink | Email this Post | Comments (0)

How do we stop hackers without understanding their true nature? What are they after, what is valuable to them? And how does what is valuable to them translate to our losses?

Being in the business of threat intelligence, we see how disproportionate hackers’ gains are when compared to the losses they inflict upon affected organizations. By far, not every stolen record gets abused. Yet, since there is no easy way to determine what becomes of the stolen data, the organization has to declare a total loss, even in a case of a minor breach.

Let’s try to understand hackers a little bit more. Who are they? Who do they work for? Where do they reside? What motivates them? How did they learn their craft? What do they do with the stolen data? What are they afraid of?

Today, brazened hackers take over our systems and demand a ransom. They give interviews to the press, they walk around their hometowns with their head held high, far away from justice. The world’s current political environment serves as their encouragement and provides cover for their evil acts.

In our plans to discuss these issues at North America CACS 2017, we will take real-life examples from personal experience and make them relatable to your realm of expertise. That includes how to combat seamless or unstoppable threats, like DDoS or ransomware, by understanding who is behind these attacks. Further, we will illustrate how to avoid being collateral damage or the lowest-hanging fruit.

The practical defense advice detailed in the presentation should prove invaluable. Sure, we have regulatory security to give us the guidelines on what is the standard of care for our data, yet the hackers do not care about “certified” secure sites. They look for the vulnerabilities beyond patches and beyond application faults. They are moving into the arena of exploiting the end-users.

You cannot “patch” a person. Yet, hackers are getting smarter and creating repeatable formulas playing on people’s empathy and/or feelings.

The primary goal is to stop hackers. Even with the current level of knowledge and experience gained from previous hacks, stopping hacking is not an easy task. There are no universal hacker deterrents, but there are ways to slow down their advances over time.

Better access management is one of the keys. That not only focuses on better passwords, but on leveraging available authentication techniques, variances and safety measures. We also will address the development of honeypots, not only as systems that are perceivably weaker, but as applications, components and even credentials, where a compromise will alert when attempted to be exploited.

At the end of the talk, we are not going to be afraid of the unknown. Each attendee will come out with a list of viable steps to formulate a plan to deter hackers – to make them turn away at the door, and even if they try their virtual assault, to ensure they are met with alarms and proactive actions specific to their attack type.

Editor’s note: Alex Holden will present on “Threat Intelligence – Exploiting Hackers” at North America CACS 2017, which will take place 1-3 May in Las Vegas, Nevada, USA.

Comments

There are no comments yet for this post.
You must be logged in and a member to post a comment to this blog.
Email