Sleepless in cyberspace

Five problems that keep cybersecurity experts awake at night

Sleepless in cyberspace

Raytheon Cyber Services Chief Strategy Officer Josh Douglas on five common cybersecurity problems.

By Josh Douglas, chief strategy officer, Raytheon Cyber Services

It was a conversation I thought I'd never hear.

On a recent trip from Washington, D.C., to Boston, I overheard a passenger ask his colleague, “Did you just get this spearphishing attack? It looks so obvious.”

Just two years ago, that discussion would never have happened. When you consider that 91 percent of targeted cyberattacks begin with a spearphishing email, open dialogue and recognition of such threats represent a significant shift in our collective awareness of cyber risks.

With major attacks permeating news headlines and social media platforms, cybersecurity has become a mainstream topic. Unfortunately, the rise in sophistication of threats is outpacing the uptick in cybersecurity training and the growth of the talent pipeline. These concerns, among others, are what keep chief information security officers tossing and turning at night.

Most employees remain vastly unprepared for the risks posed by individual hackers, hacktivist groups and state actors. This was evident earlier this year, when a phishing scam spread quickly across the internet through an email embedded within a fake Google Docs file. This was a more advanced attack, as the scam required those affected to grant permission through a legitimate Google sign-in screen. Even the cybersecurity-savvy were susceptible to that disguise.

To address today's challenges, CISOs need to reassess their common concerns and consider a different approach. Here are five things to keep in mind:


Globally, 70 percent of employers plan to increase the size of their cybersecurity staff this year. Not only is there a lack of cybersecurity professionals to meet this skyrocketing demand, but there are even fewer of what I call “unicorns” — security experts who understand networks and know how to protect them. Cybersecurity unicorns are curious analysts who have experience with protecting network perimeters, scripting, and identifying endpoints. Organizations can't afford a full security detail to cover these skills, which is why we will likely see more of them opting to outsource security operations in the near future. Cybersecurity service teams can be located anywhere and dedicate the necessary time and skills to both react to attacks and proactively hunt for them to ensure organizations remain operational and secure.


The darknet is a breeding ground for cybercrimes. It hosts all types of tools required to execute them, including malware for purchase and cybercrime services, so that criminals don't even need to be technical experts to launch a major attack. As the internet becomes an open field for predators, organizations must hunt around the clock. The average mean time to detect threats on a network is already around 200 days. That time — when hackers are able to steal data or damage the network — can be dramatically reduced by proactive threat hunting. This involves monitoring normal and abnormal network traffic patterns to identify threats before they become damaging.


When it comes to managing data and hiring or outsourcing talent, many companies face budget constraints that stem from compliance. Businesses must be compliant, but compliance and security are not interchangeable when it comes to cyberattacks. Compliance is critical but shouldn't be confused with security. The Defense Federal Acquisition Regulation Supplement, for example, requires organizations to have a firewall for segmentation and logging policies. While a firewall limits access and logging provides insight on network incidents, these are only tools. Without trained people to look at the threats and act on them, there isn't enough protection. Organizations must conduct a thorough security assessment, identify existing threats and the riskiest users, prioritize security measures, and implement and test an incident response plan. Compliance often falls into place when it's the final consideration and not just a top budget item.


Just as most travelers in the past never casually chatted about a phishing scam, board members didn't dabble in cybersecurity concerns. Today, it's a different story. There is a tremendous fear of a cyberattack severely damaging brand image and the bottom line. Organizations have a fiduciary responsibility to protect customer data, but cyberattacks threaten this stewardship. In health care, an industry with mountains of sensitive personal data, breaches by hackers affected 15.2 million Americans last year. Beyond data loss, the loss of intellectual property could further cripple organizations. To maintain the confidence of shareholders and customers, organizations must align their brand with one of security — and make sure they can back it up.


Our businesses are more exposed to unseen risk than ever before from employee devices, automated manufacturing, the global supply chain, and the Internet of Things. The cyberattacks that are not visible simply by looking at your own networks could cause harm to information and operational technology. Now, a heating and air conditioning system could be the conduit through which nation-states attack each other. A gas turbine or nuclear facility could be a tool to harm more than just systems, putting human safety at risk. So companies need to provide cybersecurity for more than just their networks. They must embed cybersecurity into their products and services, into their supply chains, and into their partnerships.

The cybersecurity threat is hitting government agencies, commercial businesses and critical infrastructure harder than ever before. As a result, organizations need better visibility into networks, more cyber unicorns to defend those networks and an informed workforce capable of recognizing threats. Those factors provide stronger defenses and enable CISOs to sleep better at night, knowing their organizations are ready for the next attack.

A version of this article originally appeared on the cybersecurity information site Dark Reading.

Published On: 09/28/2017
Last Updated: 02/01/2018