CyberWire Daily - Encore: Examining the current state of security orchestration. [CyberWire-X]

Episode Date: January 15, 2024

In this encore episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table membe...r Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. Hey, everyone. Welcome to Cyber Wire X, a series of specials where we highlight important security topics affecting security professionals worldwide. I'm Rick Howard, N2K's Chief Security Officer and the Cyber Wire's Chief Analyst and Senior Fellow. And today, we're talking about the current state of security orchestration. After the break, we'll take a deep dive look at CISO initiatives such as vendor consolidation, automation, attack surface management, and the hot topic of the moment, how machine learning and large language models might help to achieve both increased security maturity and decreased operational load. Come right back.
Starting point is 00:01:12 The cybersecurity landscape is full of single-solution providers, making it easy for unexpected cyber threats to sneak through the cracks. That's why Fortra is creating a stronger, simpler strategy for protection, one that increases your security maturity while decreasing the operational burden that comes with it. This is all possible thanks to Fortra's best-in-class portfolio and deep bench of expert problem solvers. Fortra's integrated, scalable solutions help customers face their toughest challenges with confidence. Learn more at fortra.com. I'm joined at the CyberWire hash table today by Rohit Dhamankar. He's the Vice President of Product Strategy at Fortra and my best friend, Steve Winterfeld, the Advisory CISO at Akamai
Starting point is 00:02:03 and a repeat CyberWire hash table visitor, I started out by asking Rohit to describe what vendor consolidation is. I'm joined today by Rohit Damankar. He's the vice president of product strategy at Fortra and Steve Winterfeld, the advisory CISO at Akamai. And we're here today to talk about recent developments in vendor consolidation, automation, and attack surface management to see if it's possible to achieve both increased security maturity
Starting point is 00:02:33 and decreased operational load. So in other words, is security orchestration getting any easier? So Rohit, let's start with you. Can you describe what this idea of vendor consolidation is? Well, I think to me, the saying that comes to mind is in security world, it's almost becoming like, are there too many cooks in the kitchen? Are too many cooks spoiling what is being delivered?
Starting point is 00:03:02 And by that, what I mean is the industry has been evolving in a way where we look at, I would say, each aspect of a dark surface, each new technology that comes through the picture. And the idea is, let's put a solution around it.
Starting point is 00:03:21 So sometimes, like for example, big evolutions happen, like cloud came up. So now there's a whole slew of acronym sometimes, for example, big evolutions happen, like cloud came up. So now there's a whole slew of acronym soup, in fact, of cloud products that's supposed to do cloud security. That's the status of that. For the same old problems that we have had, like malware has been around for, what, 20, 30 years? Now we have a lot of companies who are claiming on wonderful AI and next-generation and maybe the next generation to solve that problem. The question really is the amount of security happenings, breaches, stolen data that has not been stopping.
Starting point is 00:04:00 And people have sort of been led into saying, okay, for that problem, go and take that pill, go and install that solution. And I think now people are asking back saying, okay, I have like 40, 50 tools, a bigger enterprise sometimes when I speak to customers, have more than 100 tools. than 100 tools and they're left with, I would say, a small staff that even can operate the tools and understand what the tools are producing. And so then they are taking a question back saying, have we done too many? Is it time for us to go and look for just a few of this and make sure that we can make more meaningful outcomes, meaningful security outcomes, that is actionable outcomes out of those. And I think that's what people are asking very loudly
Starting point is 00:04:50 and people are trying to gravitate more towards that. Well, we're all old timers here, right? Especially Winterfell, okay? And when we started, you know, this is back in the 90s, right? We all only had like three tools. So we could manage it, you know, this is back in the 90s, right? We all only had like three tools. So we could manage it, you know, ourselves. You know, we had intrusion detection.
Starting point is 00:05:10 We had firewalls. Probably had some sort of antivirus on the endpoint. All right. But like you said, Rohit, the number of tools that people have managed over the years, that's slowly been creeping up. You said, what were you saying, 50 to 100 different tools? I've heard bigger numbers. Steve, I know you've talked about this, right? What are you seeing out there when you talk to other CISOs? Yeah, and I would start off with probably my favorite quote that ties right into
Starting point is 00:05:35 what he was saying. Complexity is the enemy of security. Bruce Schneier said that. A lot of people have said that. I've written an article on Security Boulevard. It is such a ground truth, but we're not operationalizing it. And when we look at things like, you know, Panseer put out a report that the average company of, I think, 500 employees has 76 different tools growing at 19%. Last year, RSA had 599 speakers and 605 vendors. And so it's just, how am I as a CISO supposed to wade through this and figure out which is the right one for me, how to integrate these. You know, we've talked about this before, this shift away from best athlete to best teammate.
Starting point is 00:06:34 I love Michael Jordan's quote, talent wins game, but teamwork and intelligence win championships. Yeah, I'll tell a story, Roy. Steve and I both worked at a company together a number of years ago where the predecessor CISO went out and bought all the tools. I mean, we had all the cool things. I mean, it was like a kid in a candy store, right? But he ran out of money before he ran out of resources to buy people with. So we all had, we had tier one analysts in the SOC and all those big Ferrari engines of security tool capability were sitting idle because we didn't know how to configure them and make them work for us. So it was so complex
Starting point is 00:07:14 that we didn't know how to solve the problem. And so, I don't know, Steve, what was your, do you remember any of that from back in the day? Yeah, and I remember quickly, we were like, we went into, you know, where do we have overlap? Where can we reduce tools? Where can we get rid of technical debt? We had so much technical debt. And just kind of shifted away from that because ultimately it does come down to both people, processes, and technology. And I think if you fail at any one of those, the whole thing falls apart.
Starting point is 00:07:48 Well, I think one of the reasons we're here, and Rohit, Steve mentioned this before, but I'm wondering what your thought is on this. We kind of creeped up on this situation where our environments are so complex. Because in the early days, we had this, I don't know, we always wanted to have the best of breed product, right? And some people, you know, they didn't have
Starting point is 00:08:06 one product in their networks. They had two or three doing the same thing because they were afraid they didn't have the best pieces. Is that how you see the industry going to? Is it we all just kind of crept up on it because we wanted the very best tool that was out there? Yeah, I think it's that whoever propagated
Starting point is 00:08:22 the best of breed, you know, I would say, set on words and security. And I think that's where a lot of this thing has begun because you're looking now for suddenly, you know, best 80. You're looking for best next generation firewall. You're looking for best whatever else out there, right?
Starting point is 00:08:40 And I think that's what is causing a disaster because the other tendency that this art industry specifically has seen, there, right? And I think that's what is causing a disaster because the other tendency that our industry specifically has seen, and I think Mr. Winterfeld pointed that out very nicely. Mr. Winterfeld, let's be formal here. Yes, Mr. Winterfeld. Some people respect me, Rick. Some people actually respect me. Go ahead, Roy. We interrupted you. Well, that's fine. When you had more speakers at RSA,
Starting point is 00:09:08 more companies than speakers at RSA, and I think that's kind of the evolution of it. And I have come from startups. I've come from small startups into this industry. And I always see that usually you end up having one small problem. That, okay, today EDRs are not solving this. Let me make a company around it now.
Starting point is 00:09:28 You know, let me go for the VC funding. And it's like one sort of attack vector out of 10 that you're wanting to make a company around. So you kind of hold all of that IP close to your chest, all that, whatever the threat intelligence, any algorithms very close to your chest, and you start competing saying, hey, I differentiate my product this way. And lo and behold, that product is gone. And sometimes it is the best of the breed
Starting point is 00:09:53 that it detects that particular attack vector very well. But then it doesn't work very well with the other tools that you have. It may not share the right data with other tools. It may not create that big picture. That's what many people are looking at. And that's how your tool proliferation starts. And then, of course, you have, there are people, there are CISOs who think,
Starting point is 00:10:14 sorry, you are a CISO, Mr. Winterfeld. It's okay. We're used to being disparaged. Go ahead. You're not the first one, Rohan. No, I think some of the best thought process is that they would consider themselves cool if they're using these cutting-edge technologies. Like right now, there's
Starting point is 00:10:36 a lot of hype around AI, for instance. They think that in order for them to be looking and forward-looking and all that, they need to have those best Ferraris out there. It doesn't matter if you don't have drivers. It doesn't matter if you don't have parking garages for it. It doesn't matter if you don't have fuel money for it.
Starting point is 00:10:54 Well, and I agree that there's a cool piece to this, right? But, you know, back in the day, there was a time when we wouldn't have even considered bringing in one vendor to solve most of our problems. So, we would never pick one security company and say, please do everything for us. But Steve, I wonder if you can talk about the shift in our thinking here is that you were mentioning complexity before. We are now choosing less complexity over that kind of trust model. Well, yeah. And, you know, as you're saying, transformation is driving a lot of this problem. We've transformed off of, you know, our networks to cloud networks. We've transferred off of servers
Starting point is 00:11:35 to serverless and containers. We've transferred, you know, deploying once a year to multiple times a day. This has required new skill sets. This has required new skill sets. This has required new technology. And so for a while there, it was like, oh, I need a security tool for this environment. I need a security tool for that.
Starting point is 00:11:57 And then at some point, I spent all of my time in vendor management and integration. And I literally was a vendor manager over a security leader. And so then I was like, okay, so how do I get back to being security first? And that was where I went back to that keep it simple, stupid principle, that KISS principle of how do I reduce this to a manageable number? And the way is by platforms. You know, Gartner came out with SASE for a while, and then it was SSE.
Starting point is 00:12:30 And I think those terms caught on for a little while because it followed the trend of we as leaders are trying to reduce the complexity, reduce the number of vendors. So I'm changing to a culture of simplicity. You know, for a while, I've worked in an organization that did not fear complexity.
Starting point is 00:12:51 And that has operational impacts. It has security impacts. It has cost impacts. Whereas if I focus on, do I have a current vendor can do that? Do I have a current tool that I can expand its capabilities and cover most of that risk? I think ultimately, I feel a better security posture with better integration
Starting point is 00:13:15 and fewer tools. So, Roy, let me ask you this then, because we've seen the emergence or the transformation from the old firewall companies like Cisco and Check Point and Juniper and the like, and they just kept adding more services into the box, meaning it's a one-stop shop for everything. So it's one approach that we could do. So I wonder what you think about that, and is that something that you see your customers
Starting point is 00:13:44 looking at over and over again? So I think, first of all, Rick, we are sort of getting out of that box age to some extent, right? Because the box age was very much kind of pre-cloud days where people wanted to have their AV, their email security, their firewall, their application security, all in like one box, right? Effectively, I think the sort of that new box today,
Starting point is 00:14:09 I would say is platform where, you know, it's a cloud-based platform where people are bringing a lot of their wares together. And I would say that even from that perspective, I don't think there will be just like one vendor ruling everything in a customer's environment, but it will not be 50 or 100. It could be four or five, which are very specialized.
Starting point is 00:14:36 And to, again, Mr. Winterfeld laid it out nicely. At the end of the day, it's risk reduction, right? In your attack surface. Do you know what your attack surface looks like? Can you explain that risk to a layman as well as to a technical staff on your team well enough?
Starting point is 00:14:53 Do you have that ability either inherently yourself or through some of the dashboards that are provided? And then can you apply the appropriate set of vendors who are going to cover that for you? And you can choose strategy. There may be some overlaps, there are no overlaps,
Starting point is 00:15:08 depending on how you find the strength of those vendors. What have they been good at? And what do you need to kind of, you know, have a plan B in case they miss something? And if you do that well enough, you should be able to have,
Starting point is 00:15:21 I mean, at the end of the day, even today, the attack surface has like six components to it. You have your servers, you have your desktops, laptops the end of the day, even today, the attack surface has like six components to it. You have your servers, you have your desktops, laptops, end of the endpoints. You may have your native cloud infrastructure, maybe more like
Starting point is 00:15:35 the function as a service or more the platform as a service. Then you have people who are going to lift and shift in the cloud. You have your network devices, IoT, stuff like that. So there is very finite thing, I mean, in terms of the category. And then you need to choose the right things and the right level. First of all, it all boils down to also your business side.
Starting point is 00:15:56 How much is your business ready to invest in the security? What's that budget look like? And then how do you optimize between what you want to spend on tools, what you want to spend on people, and how do you want to architect your processes? There's a book by Sunil Yil called Cyber Defense Matrix and kind of explains what you were talking about, Rohit, the complexity of the environments. And his thesis is that whatever your strategy is, and he uses the NIST cybersecurity framework as the overall strategy, and making sure that you have the right tool in all the buckets across the matrix, right?
Starting point is 00:16:32 But not too many tools, right? And make sure there's no overlap. And by the way, find where there's gaps, where you thought you had coverage and you didn't have coverage. Or five tools in one category. Right, right. And so there I have, you know,
Starting point is 00:16:48 I've over-calculated that risk. I need to, I can get rid of two or three of those. You and I have talked about using the MITRE ATT&CK frame, those, you know, ATT&CK sequences in a similar, you know, way to take advantage of that framework concept. I think either one of those work. It's a great analytical tool to say, do I have a broad and appropriate level of coverage?
Starting point is 00:17:15 The other thing that he mentioned there was risk. And you've talked a lot about reducing the probability of material impact due to a cyber event over the next three years. Pick your period of time. Pick your, you know, material impact. But I think if you come back to a couple core things like that and then tag on a goal of reducing complexity, I think that's enough to start to operationalize this. And that's when you start looking for the partners that can help you do those things. Well, Ron, let me bring it back to
Starting point is 00:17:49 you because Steve mentioned SASE and SSE kind of brothers and sisters of technology architecture. He and I may disagree about the importance of that. I think it's the thing that we're all going to move to at some point. However, it is now on its way down the trough of disillusionment. We were all very hyped about it in the first couple of years, but we found out how hard it is. But I expect that it will slowly move up the slope of enlightenment. This is all termed from the Gardner and how they describe technology. I expect to see that in three or four years.
Starting point is 00:18:20 And what SASE and SSE are is, I don't know grammar okay that's we'll just go from there all right but it's a complexity reduction engine okay we give all the complexity to some vendor right and all we do is manage the policy wherever our devices are and i'm are you thinking that's a good solution for us roy yeah i Yeah, I think I mean, I will double down on the policy perspective because the SASE, SSE are, you know, tackling on, especially in a lot of the edge
Starting point is 00:18:53 devices and how they kind of come in, how can you apply like zero trust models, how can you apply a whole bunch of other cyber security hygiene to that. But where I would double down is this policy business, right? Like, in general, if the products that we are working with are well orchestrated,
Starting point is 00:19:14 where something happening in one product is able to trigger a policy in the other, like, for example, like I said for a second, you have a trained security product where somebody, you send a phishing email, a user gets phished, right? If you are able to then go out and say, okay, tell your staff that this user has gotten phished, I think this user is more risky, look at all his events or whatever coming out,
Starting point is 00:19:41 you have to be more careful, far more careful than you normally would do because he's at a chance of risk. If similar kind of policies automatically translate across products and they're easy to write, not complex, not geeky, you know, like JSON or XML or whatever other formats,
Starting point is 00:20:01 that's what I think will kind of tie everything together. So I think that common policy framework and a rich policy framework of that would be sort of cornerstone of whatever we are doing next in terms of consolidation. So Steve, let me go to you. So one idea here is a move to consolidation platforms of some form.
Starting point is 00:20:20 That's one way we could do it. The other way we could do it, Steve, is through automation, all right? Through an extended project to reduce the toil of all the technical debt that we have. I wonder if you could talk to that a little bit, you know, and what's the state of DevOps
Starting point is 00:20:37 and DevSecOps in our industry now? Certainly. And again, some of these, you know, we talked about SASE, and I think, you know, the disillusionment comes because of the buzzword bingo with vendors. And these are other terms that are so abused. You know, we have automation.
Starting point is 00:20:56 We have AI. And AI now, some people call large language models versus machine learning versus, you know, movement. And they treat it all the same. And what you just talked about, you know, DevOps versus DevSecOps, if the three of us defined DevSecOps, we'd have at least four definitions. So as we look at all of this, it is absolutely imperative because the skills and the speed and the scale can only
Starting point is 00:21:28 be met through leveraging the technology. Again, it goes back to most of this, I think, should support people. Most of this should be developed after we have our process to implement our process. But then it absolutely, you know, if there is two steps in my investigation in the security operations center, those should be automated. When the ticket pulls up, those should already be filled in. You know, if I'm doing an investigation
Starting point is 00:22:00 and we have a private large language model, you know, generative AI, to help me do, my threat intelligence team do rapid, you know, understanding of something or policy development based on our internal documentation. The machine learning and deep learning algorithms are critical to move at cyber speed. I think all of these are critical to our future
Starting point is 00:22:25 and need to be part of our skill set as leaders to understand when and how to leverage these. Well, you mentioned filling in our security podcast bingo card. It wouldn't be a podcast about cybersecurity if we didn't talk about artificial intelligence. So, Rohit, I think all of us agree that, you know, machine learning and large language models have all this potential to help us here. But, you know, we all have reservations. Our own
Starting point is 00:22:52 experience has been, you know, it's pretty good, but not quite good enough yet. So, I don't know. What do you think about that, Rohit? Well, I have always viewed, you know, AI or ML more as an aid for cybersecurity, a strong ally, a strong aid. And I am completely baffled when a lot of people end up saying, AI is going to solve all the problems of the world. And they say that. Yes, of course it is. Of course it's going to solve all the problems. No, no, no, let's be clear.
Starting point is 00:23:22 My AI, the AI I'm going to sell you is going to solve the problems. Yeah, yeah, that's true. My differentiated AI will solve all the problems, right? My differentiated AI, yeah. And you are seeing some of these effects, right? I mean, AI or ML, I mean, as I say, these days when I tell a six-grader learning equation of a line as y equals nx plus c,
Starting point is 00:23:46 that's the equation of a straight line. And I said, even that is AI these days. So everything is AI, statistically or whatever. If you did, if you computed just a standard deviation, now it's called machine learning, right? So if you don't take those definitions, where I have seen a lot of challenging problems, especially looking at anomalies and things like that, and ML has been great at it.
Starting point is 00:24:12 But again, all of those have to be dealt. And as, again, Ritrafer was saying about filling out steps in the process. So AI can generate something. And I'll give you an example. I see a lot of in these new EDR tools, it says this file is potentially malicious
Starting point is 00:24:31 and the risk rating is 70%. And if you happen to be a SOC of that company, or if you happen to be a general SOC provider, you don't know what to do with 70%. You are not going to
Starting point is 00:24:43 block all of it. You're not going to sort of say, okay, this file is bad and I'm going to delete it. You can't quantify that. So what you're trying to do, and that's where a lot of automation comes in, is saying, okay, what is the context I can build in that environment around this file?
Starting point is 00:24:59 Do I have more pointers? Do I have external pointers around this file? Does somebody else in the world know about it? And I would believe that all of that information we can get through various techniques, including Gen AI, for instance. And I think once you have all of that pulled together, you still will need, in some sense,
Starting point is 00:25:20 the human mind to kind of say, okay, this signal here is the most dominant, this is the least dominant, and make sure that I make a decision based on all of these factors. And maybe that can then further be codified into AI through channel. But it needs that process.
Starting point is 00:25:37 Just single, I would say, applications of AI in, again, in different areas of cybersecurity, I hope to just produce some more haphazard outcomes of AI in, again, in different areas of cybersecurity, I hope to just produce some more hack-as-art outcomes that are not, again, well correlated, well contextualized, and that just increases more noise and results in many further problems. That's my current state, too. You know, I just don't trust it yet.
Starting point is 00:26:00 I've had so many experiences just with the early models here that they give you a partial answer and then information that's not true at all, right? And so, you definitely can't turn it on and just let it go. So, we're not there yet. But Steve, I'm wondering if you want to put your, you know, look into your crystal ball. Do you see this being solved anytime soon? Or I won't make you talk about history, but we'll make you talk about future stuff. Well, I won't talk about history, but a recent example was the first generation of SIMs,
Starting point is 00:26:30 you know, the security event management tools. Felt like it was a device to just let you watch incidents scroll off the screen. It was something we needed. It's something that took some time and maturity. I think we're in a similar process now. We're early days. I think the potential there is if we look at some of the pros and cons, you know, the pros are we need something to help us with the speed and scale of some of the tasks we're doing.
Starting point is 00:26:58 We need something to help our research become more effective and efficient, especially with big data where we're querying a lot of things. And we don't need a Google search, we need contextual search. And I think a lot of the private initial queries in degenerative AI are helping with that. We need responsive to malware
Starting point is 00:27:19 and some of the machine learning stuff is helping us to on the fly through learning help respond to malware. And so all of this is absolutely needed. It's early days. It's, you know, for the more mature shops, it's where we should be. The cons are real, too. I mean, we saw data spill of code on a large language model.
Starting point is 00:27:48 model. We've seen OWASP put out a large language model top 10 threats because there are attacks against the actual large language model itself. The audibility of both machine learning and large language models is scary. We have to be able to say how we got there. There are biases that could come through depending on how you're using it that are unacceptable. And finally, having the skill and the staffing to leverage you correctly. If you would have told me there was a title of prompt engineer a couple years ago, I wouldn't have believed you. And yet, there's a job out there now. So, I think we're early days, but actually we need to be engaged. We need to be, as leaders, figuring out when and how to leverage this.
Starting point is 00:28:29 The trick is how fast to go into this, how much to invest early. So I'm going to characterize what Steve just said as hopeful, which is, you know, not usually what he comes up with around here. So Rohit, I'm wondering if you agree with him or not. No, I think, I mean, I do agree from the standpoint. We do need something that covers, I would say, constantly evasive,
Starting point is 00:28:52 you know, tactics in the security industry. And again, as you can see, the cat and the mouse game continues, right? Like, so people were doing a lot of evasion. So now we said, okay, let's detect them through AI ML. And as Winterfeld said, I have seen now lots of, okay, let's detect them through AI ML. And as Winterfell said, I have seen now
Starting point is 00:29:06 lots of, in fact, even there were talks at RLC, for instance, on how to defeat the AI ML model. So the adversary is always thinking the next step.
Starting point is 00:29:14 So you probably have to then think of, you know, the counter to that. And so that's kind of, again, and you will see all, the funny part
Starting point is 00:29:23 about security, I think I would say, is that once something gets on the security track, it never leaves it. So you still have people who are probably running some version of Windows XP out there who are still vulnerable maybe to, you know, a lot of the pull runs from the past.
Starting point is 00:29:39 And it's not a joke. I have heard of some, you know, like production environments that are still running very old version of Windows. You can see that in airports still. The NT crashes. So all the different to today's world when somebody is trying to defeat a new AI
Starting point is 00:29:55 model for something else. So it's all there. So we're at the end of this. I'm going to come to both of you for last words about this topic. My summary of what we just talked about is we all agree that the environments we operate in are fairly complex. And instead of going for more tools to solve individual problems, we're looking for orchestration ideas that will reduce complexity and do a good enough job that will allow us to do our jobs for us. Steve, what's your last word there? Yeah, I think culture eats strategy for breakfast.
Starting point is 00:30:32 I think we need a culture of avoiding complexity, moving away from complexity. Rohit, last word to you, sir. Last word to you, sir. Well, choose your vendors wisely, consolidate them, and automate the heck out of it for what you can. We'd like to thank Rohit Dhamankar, Fortra's VP of Product Strategy, and Steve Winterfeld, the Advisory CISO at Akamai, for helping us get our arms around these latest developments in security orchestration. And most importantly, we'd like to thank Fortra for sponsoring the show. This has been a production of the CyberWire and N2K, and we feel privileged that podcasts like CyberWireX are part of the daily intelligence routine of many of the most
Starting point is 00:31:22 influential leaders and operators in the public and private sector, as well as the critical security teams supporting the Fortune 500 and many of the world's preeminent intelligence and law enforcement agencies. N2K Strategic Workforce Intelligence optimizes the value of your biggest investment, people. We make you smarter about your team while making your team smarter. Learn more at n2k.com. Our senior producer is Jennifer Iben. Our sound engineer is Trey Hester, and I'm Rick Howard. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.