Forget ransomware, a lack of global norms is killing the security industry

Better protocols to facilitate global cyber co-operation should be at the forefront of innovation in the sector

Mockup of global norms agreement

One of the biggest challenges for businesses around the world is the inability to properly attribute cyber attacks and enforce prosecution, according to an (ISC)2 security leader.

Many countries are working to promote and drive this movement forward but failing, according to Tony Cole, CTO at Attivo Networks and (ISC)2 board member. He says the security industry needs a highly structured set of norms which outline the offences that can be prosecuted.

The industry also needs globally accepted rules on data sharing agreements, he says, so businesses and nations can collect adequate evidence needed to prosecute cyber attackers. These rules simply don't exist today and there is a "complete lack of agreement," Cole told IT Pro at the annual (ISC)2 Security Conference.

However, that isn't to say efforts haven't been made. Some good work was being done in Estonia on the two versions of the Talinn Manual, which aims to highlight how our current international laws could be applied to cyber but aren't. If it was, "we wouldn't have the issues that we do [today]," said Cole.

Cole has hands on experience of trying to create this kind of unified international standard. In 2013, he worked on the US State Department's Framework for Cyber Stability  a document trying to unify the US, Russia and China through cyber norms that would eventually be adopted the world over.

This eventually "went by the wayside" after it was discovered that members of the Chinese armed forces the People's Liberation Army were attacking US and UK companies, according to Cole.

"Now, the next year is when President Xi and President Obama signed an agreement and yet that really didn't have any teeth," he said. "And now we know there are even more nations that are allowing many of their cyber experts in the cyber espionage space to moonlight underneath. So it's becoming more problematic, not less."

Related Resource

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Ransomware is here to stay

Although global cyber challenges should be solved through uniform policy, Cole said ransomware the most pervasive method of cyber attack for the past few years  is going to retain its crown for quite some time.

He said businesses and organisations aren't doing the right things to counter the threat and cyber hygiene isn't being taken as seriously as it should be, either.

Organisations are being regularly hit by ransomware because well-known vulnerabilities just aren't being patched. "That activity is not going to change until organisations truly understand from the board level down, that security is important, that you need to put an emphasis on it and you need to apply resources to it, just like anything else that you do," said Cole.

Cole said he spoke with a board member of a mining conglomerate at World Economic Forum two years ago who was adamant that the company wasn't a target for cyber attacks, despite nearly all of their competitors having publicly disclosed data breaches.

"It's pretty consistent still around the globe where you have a still a number of organisations that just don't think [security is] that important," he said.

"So yes, it's going to continue to be a problem for the long term until we change attitudes across the board and people start to accept that it's a component of risk, no different than any other area of the business."

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

14 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
ransomware

Senator to introduce new bill to force ransomware payment disclosures

6 Oct 2021
Two-thirds of organizations have fallen victim to ransomware
ransomware

Two-thirds of organizations have fallen victim to ransomware

29 Sep 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021