Many of today's most destructive advanced persistent threats (APTs) were conceived a decade ago, so enterprises that rely on most traditional approaches to cyber security are unlikely to succeed against the next generation of attacks. This is one of the cautions in a new book published by global IT association ISACA in Cybersecurity Awareness Month.
Advanced Persistent Threats: How to Manage the Risk to Your Business advises that traditional defences such as firewalls and anti-malware are not up to the challenge of today's APTs and that organisations need to add new skills, processes and technology to their cyber security arsenals.
"The motives behind APTs are as old as civilization itself: espionage, sabotage, crime, terrorism, warfare and protest. What's not old is the increase in attacks and sophistication. Enterprises need to think about APTs more as a different breed than a new generation," said author David Lacey, CITP. Lacey is a leading futurist and IT security authority whose professional experience includes risk and security positions at Royal Mail Group and Royal Dutch/Shell Group.
An ISACA cyber security survey of more than 1 500 security professionals worldwide found that 94% of respondents believe APTs represent a credible threat to national security and economic stability. One in five enterprises have already experienced an APT attack, but more than half of respondents don't believe that APTs differ from traditional threats.
The book communicates two important messages: combating APTs is not business as usual, and APTs should be everyone's business. It is written in clear, non-technical language to reach business managers and government officials responsible for valuable intellectual assets or critical services that might be targeted by an APT attack. It also details the differences between the controls needed to counter an advanced persistent threat and those used to mitigate everyday information security risk.
The ISACA book equips enterprises with information on effective techniques for combating APTs. It was written as a practical look at topics many organisations do not fully understand, including:
* Typical shortcomings of existing cyber security processes
* How to tell if you're experiencing an APT attack
* What a moral hazard is and how it affects APTs
* How to disrupt a cyber "kill chain" (stages of a cyber attack)
Mitigating an APT attack intersects in part with conventional guidance and controls, such as those set out in ISACA's COBIT 5 framework, SANS Institute critical controls and ISO/IEC 27001 security standards. This book focuses on enhancements needed, and it highlights areas where controls need to be strengthened or extended.
This is the latest addition to ISACA's cyber security resources, which includes the Responding to Targeted Cyberattacks book; Transforming Cybersecurity Using COBIT 5; a cyber crime audit programme, the Advanced Persistent Threats Survey; the cyber security community in ISACA's Knowledge Center, and the Information Security and Risk Management Conference, taking place from 6 to 8 November 2013 in Las Vegas. ISACA is a partner of European Cyber Security Month and a champion of National Cybersecurity Awareness Month.
Advanced Persistent Threats: How to Manage the Risk to Your Business is available at www.isaca.org/apt-book.
Share