{"id":34940,"date":"2023-02-01T11:00:35","date_gmt":"2023-02-01T16:00:35","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=524809"},"modified":"2023-02-02T12:03:34","modified_gmt":"2023-02-02T17:03:34","slug":"cyber-attacks-work-because-cisos-dont-do-basic-security-microsoft","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-attacks-work-because-cisos-dont-do-basic-security-microsoft\/","title":{"rendered":"Cyber attacks work because CISOs don\u2019t do basic security: Microsoft"},"content":{"rendered":"<p data-ar-index=\"0\">Infosec leaders are still behind in cybersecurity basics, leaving their organizations unnecessarily open to attacks, says the vice-president of Microsoft Security.<\/p>\n<p data-ar-index=\"1\">Cyber attacks aren\u2019t successful because they are getting more sophisticated, Kelly Bissell told the <a href=\"https:\/\/www.siberx.org\/\" rel=\"noopener\">siberX<\/a> CISO Forum Canada on Tuesday.<\/p>\n<p data-ar-index=\"2\">\u201cNinety-eight per cent of attacks are elementary,\u201d he said, and take advantage of unpatched devices, a lack of multifactor authentication to protect logins, no privileged access controls, no identity management, and password vulnerabilities.<\/p>\n<p data-ar-index=\"3\">\u201cThose things are happening every day. I think why we\u2019re getting more [successful] attacks is because this is one of the industries where crime actually pays.\u201d<\/p>\n<p data-ar-index=\"4\">Seventy-eight per cent of computing devices have an unpatched vulnerability that\u2019s at least nine months old, he added. \u201cWe\u2019re not patching our systems. We\u2019re taking the approach, \u2018I\u2019ll patch these systems if I can.\u2019 But what you\u2019d better do is patch now, even at the risk of breaking an application.<\/p>\n<p data-ar-index=\"5\">\u201cWe have to re-think our DevSecOps function to be far more resilient in the patching of our environments.\u201d<\/p>\n<p data-ar-index=\"6\">The good news is law enforcement agencies around the world are having some success against attackers, he added. He urged CISOs to work with police agencies if their IT environments are compromised.<\/p>\n<p data-ar-index=\"7\">There are a number of things CISOs should do to stiffen their security, he said, including<\/p>\n<p data-ar-index=\"8\">\u2014 move away from best-of-breed solutions to a platform;<\/p>\n<p data-ar-index=\"9\">\u2014 get intelligence feeds;<\/p>\n<p data-ar-index=\"10\">\u2014 move workloads to the cloud;<\/p>\n<p data-ar-index=\"11\">\u2014 invest in artificial intelligence solutions to speed analysis and response;<\/p>\n<p data-ar-index=\"12\">\u2014 make sure data is well protected;<\/p>\n<p data-ar-index=\"13\">\u2014 \u201cbe brilliant at the basics,\u201d particularly having a well-designed Active Directory protection structure;<\/p>\n<p data-ar-index=\"14\">\u2014 get privileged access under control to prevent lateral movement;<\/p>\n<p data-ar-index=\"15\">\u2014 and optimize and simplify your IT architecture.<\/p>\n<p data-ar-index=\"16\">On this last point, Bissell offered proof:<\/p>\n<p data-ar-index=\"17\">\u201cI was part of an organization a while back that had a ransomware attack on our AD domain. By the way, we had 90 domains. Thank goodness we had the right architecture. The ransomware was contained to one domain structure. If we didn\u2019t have the right design, it would have spread to all domains. It would have been devastating. So the architecture of your security environment matters.\u201d<\/p>\n<p data-ar-index=\"18\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-attacks-work-because-cisos-dont-do-basic-security-microsoft\/524809\">Cyber attacks work because CISOs don\u2019t do basic security: Microsoft<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft exec tells the CISO Forum Canada conference failure to do cybersecurity basics is why cyber<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,16],"tags":[824,391,62,393,275],"class_list":["post-34940","post","type-post","status-publish","format-standard","hentry","category-leadership","category-security","tag-cisos","tag-di","tag-microsoft","tag-security-strategies","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/34940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=34940"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/34940\/revisions"}],"predecessor-version":[{"id":34991,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/34940\/revisions\/34991"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=34940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=34940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=34940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}