Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Tailoring Security Training to Specific Kinds of Threats

Researcher by Researcher
November 1, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Faced with the daily barrage of reports on new security threats, it is important to keep in mind that while some are potentially disastrous, many are harmless or irrelevant to individual organizations.

CISOs often find themselves needing to prioritize the specific threats they need to defend against. In addition, they must take stock of their security strengths and weaknesses so they can focus their efforts on relevant threats. 

A major challenge to staying focused is media-driven distraction. CISOs who understand their security posture can ignore the media noise knowing that threat X is not a risk — either because it has been patched or because such an attack is highly unlikely to target an organization of their size or type. 

The benefits of tailoring security skills training to specific threats are transparent and ongoing. It enables an organization to address relevant risks with vigor and focus, to craft clearly defined training goals, and to ensure all team members acquire the right skills to identify and defend against the most dangerous threats.

How to Tailor Training

The best starting point is to be strategic — to focus on the type of attackers that threaten or could threaten the organization, create a profile of these adversaries, and identify their tools and tactics. Next, it’s important to perform an honest and realistic assessment of the security team’s tools and skills for combating the attackers — and to improve them where holes and deficiencies exist.

Below are five broad categories of threat actors, ranked by their level of sophistication, along with the corresponding defense measures needed to protect against them.

Opportunists

These are typically amateurs or script kiddies who use publicly-available malware, credentials, and other TTPs that require low skills to use.

Defense needed: these actors can often be contained by automated machine detection using signature-based capabilities on an endpoint or network.

Prudent Threat Actors

Slightly more advanced than the first rank of criminals, these actors avail themselves of paid or publicly-available malware, credentials, and other TTPs that require low skills to use.

Defense needed: Automated detection works mostly, but sometimes an organization will need more complete configuration and log aggregation.

Emerging Actors

These criminals, often hacktivists, deploy modified public tools and paid tools. Many of the tools, such as Metasploit and Cobalt Strike, have potent, interactive capabilities. 

Defense needed: Basic threat intelligence and behavioral signatures are needed for full coverage.

Established Actors

Here the actors are nation-states and high-level criminal gangs, who use internally developed tools and capabilities.

Defense needed: Behavioral and advanced threat detection.

Strategic Actors

These are high-level attackers working for nation-states. Their tools and capabilities consist of the best OPSEC for specific situations. 

Defense needed: Behavioral detection supported by deep manual analysis of the environment.

Once an organization has determined which category or categories of threat actors they must defend against, the following best practices can be used to develop threat-centric security training.

Develop a detailed plan. Planning is always the bedrock of a good roadmap. The more time an organization takes to prepare a training plan — by researching its needs, critically assessing its resources, and by talking to partners and customers —the more likely its strategy will be successful.

Objectively assess new threats. Chances are, not all new threats will affect a given organization, either because it has been remediated by a patch or other control, or it is simply irrelevant to the organization’s size or vertical industry.

Use industry resources to identify threats to the organization/vertical industry. Some excellent resources are the major security publications, the Verizon data breach incident report, and industry specific ISAC threat intelligence feeds.

Collaborate with training partners to transform the plan into action. Partners can provide not just valuable insights but concrete advice on how to implement upskilling exercises, assessment and reporting.

The importance of tailoring security training to specific threats has never been more urgent, given the variety and volume of cyber risks facing the average organization. By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.

view counter

Jeff Orloff is Vice President of Products and Technical Services at RangeForce, a cybersecurity training company. He has over ten years of experience in cybersecurity, computer and network security and system administration. Prior to RangeForce, he was Director of Product Management and UX at COFENSE, a company specializing in email security, phishing detection and response. He also served as Technology Coordinator for the Palm Beach County Florida School District.

Previous Columns by Jeff Orloff:
Tags:



Source link

Related articles

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
Tags: KindssecurityspecificTailoringThreatstraining
Share76Tweet47

Related Posts

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
0

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in...

New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
0

Several days after news of exploit attempts against a zero day vulnerability in the GoAnywhere MFT secure file transfer tool...

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

February 8, 2023
0

World’s fastest real-time quantum random number generator with a photonic integrated chip. Credit: Bing Bai and Yao ZhengThe world of...

Sentra Raises $30 Million for DSPM Technology

Germany Appoints Central Bank IT Chief to Head Cybersecurity

February 8, 2023
0

The German government announced the appointment Tuesday of the European Central Bank’s head of IT systems to lead the national...

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

February 8, 2023
0

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved