Business continuity strategies for cyber defence: Battling time and information overload

John Streufert, Chief Information Security Officer, US Department of State

Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity — too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called ‘information overload’. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called ‘risk scoring’, resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State’s servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This article explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

cybersecurity, risk, metrics, change, technology, executive


Read this sample article now.
To read this article and receive further updates on Henry Stewart Publications content please register using the form below.