Risk

9/26/2017
09:30 AM
50%
50%

FBI's Freese Shares Risk Management Tips

Deputy Assistant Director Donald Freese advises enterprises to lead with a business case and not fear addressing the C-suite on risk management.

Confusion over the definitions of "threat" and "risk" exist when IT security teams talk to members of the executive suite. One strategy security professionals may consider is approaching the discussion from a business perspective instead of leading with fear, said Don Freese, deputy assistant director with the FBI's information technology branch.

Freese, who served as a keynote speaker Monday at the ISC(2) Security Congress convention in Austin, Texas, noted that risks are measurable, providing that companies practice good security hygiene, such as logging network activity and taking inventory of the data that the enterprise possesses.

In addition to those best practices, Freese also advised IT security leaders to consider the industry that they operate in and the type of data that would be desired by cybercriminals or nation-states. That assessment would help provide a framework for the potential intent of the attackers and the magnitude of the impact to the company's business.

And while companies may prefer to horde as much information as possible on customers - to use for driving sales - Freese cautioned against this practice.

"The more data you keep, the more ways an actor can come after you," he said.

Calling on the FBI

If a company suspects a nation-state has launched a cyberattack against their organization, they can work with the FBI in a confidential manner, Freese said. And the type of information that will help the FBI in its investigation are strong data metrics, such as incident logs and data that shows activity trends for at least a three-year period, he advised.

Recent trends in nation-state activity that concern Freese are an expanded role these entities are adopting. Although intelligence gathering is the tradecraft of nation-states, these players are taking coding, technology, and social engineering to new levels and morphing into cybercriminals as well, he added.

For example, the FBI has noticed nation-states are using malware sniffers to see how the federal agency will react, depending on which industry is poked, Freese said. While not much is going beyond the sniffing, the FBI is aware criminal intent is behind these actions, he added.

In addition to stressing the importance of building relationships with customers, vendors, and employees, Freese also noted companies may want to take the initiative and get to know the agents at their local FBI office before a cyberattack ever hits.

"Going to the field office is one first step," Freese said. "We are very relationship oriented."

But it takes more than just one visit to develop a relationship, he said. Consistently meeting with the agency to develop trust and respect between the parties is the best tack.

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.