It goes without saying that rigorous security controls are irreplaceable. But no matter how strong an organization’s cybersecurity defenses are, determined attackers will still get in. Whether malicious insiders or external actors, persistent attackers fly below the radar and reside for months inside a network. They’re patient, studying the infrastructure and carefully planning their attack because what they’re typically after are the crown jewels of your business: essential data volumes, intellectual property, financial transactions, or revenue-dependent business operations.
The risk of an Advanced Persistent Threat (APT)—the possibility of an advanced cyber attacker moving under cover in an enterprise network—keeps CISOs awake at night. But it's making more C-level executives and their board members restless, too, because of the potentially massive damage advanced attacks can cause to business reputations, critical systems, data manipulated or stolen and operations compromised. Boards and senior execs are demanding better accountability and assurances that their organizations are adequately protected.
The second and third most common inhibitors to better cyber defense, according to the 2017 Cyberthreat Defense Report are “the shortage of skilled personnel and too much data for IT security teams to analyze.” The two are undoubtedly related.
By annually tracking the cost of data breaches, Ponemon Institute has helped instill broad awareness that these costs continue to increase. As noted in our report earlier this year, Ponemon also offers some insight on steps companies can take to minimize these costs, citing the positive impact of investment in pre-established incident response teams, employee training, and enhanced encryption.
Deception technologies fundamentally change the way we face cyberthreats. Advanced attackers know that the weakest link in any security chain is usually a human being. But the reverse is also true: deception technologies leverage the fact that advanced attackers are human, too.