Forget ransomware, a lack of global norms is killing the security industry

Better protocols to facilitate global cyber co-operation should be at the forefront of innovation in the sector

Mockup of global norms agreement

One of the biggest challenges for businesses around the world is the inability to properly attribute cyber attacks and enforce prosecution, according to an (ISC)2 security leader.

Many countries are working to promote and drive this movement forward but failing, according to Tony Cole, CTO at Attivo Networks and (ISC)2 board member. He says the security industry needs a highly structured set of norms which outline the offences that can be prosecuted.

Advertisement - Article continues below

The industry also needs globally accepted rules on data sharing agreements, he says, so businesses and nations can collect adequate evidence needed to prosecute cyber attackers. These rules simply don't exist today and there is a "complete lack of agreement," Cole told IT Pro at the annual (ISC)2 Security Conference.

However, that isn't to say efforts haven't been made. Some good work was being done in Estonia on the two versions of the Talinn Manual, which aims to highlight how our current international laws could be applied to cyber but aren't. If it was, "we wouldn't have the issues that we do [today]," said Cole.

Cole has hands on experience of trying to create this kind of unified international standard. In 2013, he worked on the US State Department's Framework for Cyber Stability  a document trying to unify the US, Russia and China through cyber norms that would eventually be adopted the world over.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

This eventually "went by the wayside" after it was discovered that members of the Chinese armed forces the People's Liberation Army were attacking US and UK companies, according to Cole.

"Now, the next year is when President Xi and President Obama signed an agreement and yet that really didn't have any teeth," he said. "And now we know there are even more nations that are allowing many of their cyber experts in the cyber espionage space to moonlight underneath. So it's becoming more problematic, not less."

Related Resource

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Ransomware is here to stay

Although global cyber challenges should be solved through uniform policy, Cole said ransomware the most pervasive method of cyber attack for the past few years  is going to retain its crown for quite some time.

He said businesses and organisations aren't doing the right things to counter the threat and cyber hygiene isn't being taken as seriously as it should be, either.

Organisations are being regularly hit by ransomware because well-known vulnerabilities just aren't being patched. "That activity is not going to change until organisations truly understand from the board level down, that security is important, that you need to put an emphasis on it and you need to apply resources to it, just like anything else that you do," said Cole.

Advertisement - Article continues below

Cole said he spoke with a board member of a mining conglomerate at World Economic Forum two years ago who was adamant that the company wasn't a target for cyber attacks, despite nearly all of their competitors having publicly disclosed data breaches.

"It's pretty consistent still around the globe where you have a still a number of organisations that just don't think [security is] that important," he said.

"So yes, it's going to continue to be a problem for the long term until we change attitudes across the board and people start to accept that it's a component of risk, no different than any other area of the business."

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement
Advertisement

Recommended

Visit/security/28170/what-is-cyber-warfare
Security

What is cyber warfare?

16 Mar 2020
Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/security/phishing/355810/zloader-malware-returns-as-a-coronavirus-phishing-scam
phishing

ZLoader malware returns as a coronavirus phishing scam

27 May 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/data-breaches/355777/easyjet-faces-class-action-lawsuit-over-data-breach
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020