New CIO paradigms for cybersecurity and prevention

New CIO paradigms for cybersecurity and prevention

New CIO paradigms for cybersecurity and prevention

You probably won’t believe it. The new approach to enterprise security is tectonic; traditional virus protection software is not required. You can stop doing your daily enterprise updates of new virus definitions. The premise that antivirus software is useful in the identification and removal of unauthorized software is flawed. Now introducing the new paradigm of prevention-based incident response.

A new paradigm shift is changing the prevailing security frameworks. First, let’s uncover the underbelly of a paradigm.

Thomas Kuhn’s famous book, The Structure of Scientific Revolutions, changed scientific thinking and introduced the concept of a “paradigm shift.” He shared his view that “Men whose research is based on shared paradigms are committed to the same rules and standards.” Whether we’re speaking of concrete scientific achievements, emerging theories or traditional paradigms, old beliefs can slow progress.  What is particularly of interest is Kuhn’s viewpoint that a shift can’t occur using full communication, forced logic or neutral experience. Rather, this uprooting must occur all at once. In other words, you can’t be "half in" when it comes to adoption.

Read Also:
What Is Your Bank's Big Data IQ?

Past, present and future belief systems rest on a bedrock of paradigms: Beliefs that are internalized by the practitioners who study their effects. Several paradigms were entrenched societal belief systems — until they were changed. We are familiar with many of the past paradigms:

It’s often more intriguing to pontificate about modern quantum physics and unified field theory and the design of future paradigms:

In this modern world, we wrestle with existing paradigms that are accepted, if not overtly then by limited attempts to prove the alternative. Expanded value requires expanding thinking. The U.S. Office of Personnel Management (OPM) data breach presents a transferable case relevant to every CIO responsible for organizational security. A practical case that presents a lesson and has a clear solution.

Thomas Pace, a principal consultant at Cylance, delivered a presentation titled “Dissecting the OPM Breach” at the East IT Leader Forum (#EASTIT), which kicked off in sunny Miami in mid-November and was hosted by Ross Abbott, CEO of SINC USA.

Read Also:
Big Data and the Philosophy of Knowledge

Pace led an amazing presentation on the advanced persistent threat (APT) case study on the Office of Personnel Management data breach full report. APT is a type of threat actor, an “advanced persistent threat.” An APT utilizes network-based attacks to gain unauthorized access to exfiltrate data.

The OPM data breach resulted in personnel records (4.2 million), background checks (21.5 million) and fingerprint records (5.6 million) being exfiltrated from OPM undetected. OPM had traditional antivirus software running. It didn’t help.

This threat went undetected until 2015 (not a typo). Records from current, former and prospective federal employees were compromised from a system called Standard Form 86 or “SF-86.” The template for the SF-86 form is 127 pages, and most applications require additional pages. This system contained detailed lists of federal and military personnel going back 30 years.

 



Chief Analytics Officer Europe

25
Apr
2017
Chief Analytics Officer Europe

15% off with code 7WDCAO17

Read Also:
7 Ways To Leverage Your Small Business Data For Enhanced Revenues
Read Also:
Big data architectures face big hurdles with technology integration

Chief Analytics Officer Spring 2017

2
May
2017
Chief Analytics Officer Spring 2017

15% off with code MP15

Read Also:
Will the GDPR prevent the next headline-grabbing data breach?

Big Data and Analytics for Healthcare Philadelphia

17
May
2017
Big Data and Analytics for Healthcare Philadelphia

$200 off with code DATA200

Read Also:
The Smart Way to Deal With Messy Data

SMX London

23
May
2017
SMX London

10% off with code 7WDATASMX

Read Also:
Fresh New Features for Teradata in the Cloud

Data Science Congress 2017

5
Jun
2017
Data Science Congress 2017

20% off with code 7wdata_DSC2017

Read Also:
User behavior analytics: Building a business case for enterprises

Leave a Reply

Your email address will not be published. Required fields are marked *