What’s the best cyber defense? Physical and logical security MacDonnell Ulsch, CEO and Chief Analyst, ZeroPoint Risk Research LLC Danny Miller, Principal and National Practice Leader, Grant Thornton LLP Cybersecurity and Privacy Practice Whether it’s legislated or mandated, managing cyber risk is one of the most important initiatives companies will undertake. And one of the most common mistakes they can make is failing to integrate physical security and logical security to create a secure culture. Ask any IT professional to define security, and he or she will probably answer with references to safety nets like firewalls, passwords, antimalware and encryption. Ask the same question of a security guard at a building’s front entrance, and you’ll hear about gates with retractable wings, and locks and passes. An executive will answer the same question yet another way, with a view of the company’s culture and industry, while the average employee’s answer is apt to be focused with a more individual lens. But the answer should be the same from everyone. It’s no wonder that information breaches continue to escalate, both in frequency and in severity. As the decades march on and companies amass more digital complexity with growing data stores fed by our personal data consumption, social media exposure and mobile devices, the risks are expanding and intensifying. Link the word “cyber” to crime, strike, attack, disruption, fraud, theft and disinformation, and your understanding — or fear — of exposure grows exponentially. For many companies, security isn’t holding up to incessant attack. Personal information is targeted, as are intellectual property and trade secrets. Cyber attacks are launched from a long list of nationstates, organized crime networks, and other loosely coordinated organizations with a long list of motives — not to mention the talented and often very young attention-seekers. Some estimates place the loss of intellectual property and trade secrets at billions per year globally. When security fails Consider the global company that has physical security reporting into facilities or into corporate real estate. Physical security gets outsourced to a third-party company. Physical security stops at the front door and that small zone separating employees from visitors. Then there’s logical security. The focus here is most often on creating a hard electronic perimeter. This approach is often reflected in IT security budgets, where a disproportionate level of investment can be made in reinforcing that perimeter. Unfortunately, smart adversaries assess company vulnerabilities and exploit them by playing physical and logical security against each other. Here’s how: If the electronic perimeter is hardened, don’t try to break it. There are easier ways to get inside. When physical security and logical security lack tight integration, it is easier to breach both securities and gain access to the very information both groups believe they are adequately protecting. When the electronic perimeter is hard, the adversaries will try to slip through the physical perimeter. Using social engineering techniques, the physical perimeter can be breached by simple manipulation. Sometimes that means getting an employee to hold open an otherwise secured door. Once inside the perimeter, the real work of the intruder begins: The hunt for personal information or intellectual property and trade secrets. A key vulnerability in many companies is the help desk. Trained to be cooperative, these workers are selected because they are often polite and incented to help their co-workers. What they are usually not is security savvy or aware of those who may be seeking unauthorized access to company systems. One dangerous assumption is that anyone calling the help desk from inside the company is authorized. The same intruder who socially engineered himself or herself into the building will often gain access to the company’s information system by contacting the help desk. Sitting at an employee’s desk, the social engineer often has numerous indicators of identity within reach: business cards, employee contact list, paper files and even mobile devices that offer the keys to identity. Then the intruder simply calls the help desk, complaining that the system is What’s the best cyber defense? Physical and logical security locked, saying he or she has an imminent conference call and a client is awaiting the delivery of a webinar. These messages defocus the help desk from identity confirmation and create a rush to connect the social engineer to the system. The basic, and erroneous, assumption is to trust anyone inside. When physical and logical security are out of sync, you are vulnerable. Once you realize it, though, it’s too late. The damage is done and the fallout assured. Unfortunately, it gets worse. While the problem exists within so many companies, it penetrates the extended enterprise in both outsourcing and offshoring. In fact, the greater likelihood is that a third party will be instrumental in a breach. These outsourcing and offshore partners often lack the rigorous integrated security and a control framework applied by the principal party. Many companies fail to hold third parties accountable for integrating physical and logical security. What you can do A few best practices will start you down the road to building a secure culture: • Integrate your physical and logical security builds, giving equal status to both. They have equal bearing on risk. • Building a culture takes time and money. It doesn’t happen overnight, and it isn’t free. Remember, the cost of building an integrated culture of security is less than the cost of risk impact. • Decide what needs to be protected on the basis of its value and any regulatory requirements. Create a classification management system based on value. 1 • • • • • Not every piece of information must be protected. Place the management of physical and logical security into one organization. If this can’t be done, make certain that the heads of these groups meet frequently and resolve outstanding issues that interfere with information integrity. Cross-train each group so that every member of the security team understands the roles and responsibility of their own and the other group. Hold third parties accountable. Make sure physical and logical security integration is the hallmark of managing the risks in your business associate contracts.1 Create a strong sense of security awareness throughout your enterprise. Make sure that hot spots such as your help desk are trained in the virtues of “Trust but verify.” If appropriate, create secure zones in the environment. Just as no one serum alone will defeat the wide range of threats to human health, no singular silver bullet for information defense exists. Managing cyber risk in a hostile world requires a diversified approach. Awareness, from the board of directors to entry-level employees, is critical. Measuring your organization’s level of integration between physical and logical security is one of the most effective barometers of risk identification and mitigation of any enterprise in any region of the world. Once you know that metric, you can build your plan for improving it. he concept of Risk-Reinforced Service Level Agreements™, created by ZeroPoint Risk Research LLC, in managing third-party T risk is based on the foundation of physical and logical security integration. The Risk-Reinforced Service Level Agreement includes a detailed risk assessment based on security, privacy, threat/risk analysis, compliance, enforcement, audit and foreign corrupt practices management. For more information, contact: Danny Miller Principal and National Cybersecurity & Privacy Practice Leader Grant Thornton LLP T 215.376.6010 E danny.miller@us.gt.com MacDonnell Ulsch CEO and Chief Analyst ZeroPoint Risk Research LLC T 617.517.0063 E don.ulsch@ZeroPointRisk.com About ZeroPoint Risk Research LLC ZeroPoint Risk Research LLC conducts pre-breach operational risk analyses, and investigates breaches of intellectual property, trade secrets, regulated data, and compromised corporate brands targeted by organized crime, nation-state espionage, enterprise insiders and cyber hackers. About Grant Thornton LLP The people in the independent firms of Grant Thornton International Ltd provide personalized attention and the highest quality service to public and private clients in more than 100 countries. Grant Thornton LLP is the U.S. member firm of Grant Thornton International Ltd, one of the six global audit, tax and advisory organizations. Grant Thornton International Ltd and its member firms are not a worldwide partnership, as each member firm is a separate and distinct legal entity. In the U.S., visit Grant Thornton LLP at www.GrantThornton.com. Content in this publication is not intended to answer specific questions or suggest suitability of action in a particular case. For additional information on the issues discussed, consult a Grant Thornton client service partner. © Grant Thornton LLP All rights reserved U.S. member firm of Grant Thornton International Ltd