Tech Trends 2013 Preview: No Such Thing as Hacker-proof
If you build it (secure it, harden it), they will come (hack it, exfiltrate it, take it down).
You’ve been breached or you will be soon. Your boss knows it, your Board knows it, your customers know it, and the hackers know it. Now, how do you deal with it?
Everyone agrees that perimeter protection – “wall and moat” – is necessary, but not sufficient. We made commitments to “defense-in-depth”, but those investments haven’t always seen the greatest follow through. Is the solution intrusion detection (IDS)? Prevention (IPS)? All of the above?
On top of everything else, attacks continue to change and sophisticate. The attackers are well-resourced, professional and dedicated. They wage multi-year campaigns to compromise your systems and access the data you hold most valuable. This isn’t limited to any one scope. It’s across industries, geographies, commercial and public sectors.
The key is to move from reactive to proactive. Leverage intelligence, both from internal as well as external sources. Use forensic and analytic techniques to drive faster decision making and proactive response to activities in the network. Add attribution and accountability to know more about where the attacks originate. Once attacks can be attributed to the actual source, there may be a significant decline in that specific hack.
To learn more about No Such Thing as Hacker-proof and what the future may hold, subscribe now to receive the next installment of Tech Trends – Deloitte Consulting LLPs annual review of the leading technology trends impacting business today and into the future.
Deloitte Consulting LLP