WWW.INFORMATIONWEEK.COM
Cybercriminals and the SEC: What Companies Need to Know
Todd Weber, Vice President of Professional Services, SemperisDecember 19, 20245 Min ReadYevhenShkolenko via Alamy StockThe Securities and Exchange Commission (SEC) is putting a spotlight on security incident reporting. This summer, the SECannounced a rule changethat requires certain financial institutions to notify individuals within 30 days of determining their personal information was compromised in a breach. Larger entities will have 18 months to comply, and enforcement will begin for smaller companies in two years.This new rule change follows cybersecurity disclosure requirements for public companies that were adopted only a year prior -- and implemented on December 18, 2023 for larger companies and June 15, 2024 for smaller reporting companies. These changes are already having an impact on disclosures, even if not in the way the SEC intended.Under these disclosure requirements, public companies must report cybersecurity incidents within four business days of determining that an incident was material. But in mid-November, even before the rules were officially adopted, the AlphV/BlackCat ransomware gang added an early twist to its typical game by notifying the SEC that one of its victims had failed to report the groups attack within the four-day limit.This incident raised the sobering possibility that if companies dont report cyberattacks to the SEC, attackers will do it for them. The action has sparked concerns about the abuse of regulatory processes and worries that the new rules could unintentionally lead to early disclosures, lawsuits, and an increase in attacks.Related:Im not convinced threat groups have the upper hand. We must assume the SEC or contractors are monitoring the dark web for info on attacks that impact publicly traded companies. Still, organizations would be wise to strengthen their defenses and prepare for the worst-case scenario.As Cyberattacks Increase, Identity Is in SpotlightThe SECs disclosure rules come as cyberattacks continue to rise in scale and severity, with identity-based attacks at the forefront. Verizons 2023 DBIR found that 74% of all breaches involved the human element, while almost a quarter (24%) involved ransomware.Active Directory (AD) and Entra ID identity systems, used in more than90% of enterprisesworldwide, provide access to mission-critical user accounts, databases, and applications. As the keeper of the keys to the kingdom, AD and Entra ID have become primary targets for identity-based attacks.Its too early to know if cybercriminals reporting their attacks to the SEC will become a trend. Regardless, it is critical for organizations to take a proactive approach to identity security. In todays digital world, identities are necessary to conduct business. But the unfettered access that identity systems can provide attackers presents a critical risk to valuable data and business operations. By taking steps to strengthen their cybersecurity posture, incident response and recovery capabilities, and operational resilience, organizations can help prevent bad actors from infiltrating identity systems.Related:Protect Active Directory, Build Business ResilienceSecuring AD, Entra ID, and Okta is key to identifying and stopping attackers before they can cause damage. AD security should be the core of your cyber-resilience strategy.Attacks are inevitable, and organizations should adopt an assume breach mindset. If AD is taken down by a cyberattack, business operations stop. Excessive downtime can cause irreparable harm to an organization. Henry Schein was forced to take its e-commerce platform offline for weeks after being hit by BlackCat ransomware three times; the company lowered sales expectations for its 2023 fiscal year due to the cybersecurity breach.Having an incident response plan and tested AD disaster recovery plan in place is vital.Here are three steps for organizations to strengthen their AD security -- before, during, and after a cyberattack.Related:1. Implement a layered defense. Cyber resilience requires a certain level of redundancy to avoid a single point of failure. The best defense is a layered defense. Look for an identity threat detection and response (ITDR) solution that focuses specifically on protecting the AD identity system.2. Monitor your hybrid AD. Regular monitoring of the identity attack surface is critical and can help you identify potential vulnerabilities before attackers do. An effective monitoring strategy needs to be specific to AD. Use free community tools like Purple Knight to find risky configurations and vulnerabilities in your organizations hybrid AD environment.3. Practice IR and recovery. An incident response (IR) plan is not a list to check off. It should include tabletop exercises that simulate attacks and involve business leaders as well as the security team. Even with a tested AD disaster recovery plan, your organization is still vulnerable to business-crippling cyber incidents. However, IR testing greatly improves your organizations ability to recover critical systems and data in the event of a breach, decreasing the risk of downtime and data loss.From my own experience, I know that the key difference between an organization that recovers quickly from an identity-related attack and one that loses valuable time is the ability to orchestrate, automate, and test the recovery process.Here are my tips for a swift incident response:Having backups is an essential starting point for business recovery. Make sure you have offline/offsite backups that cannot be accessed by using the same credentials as the rest of your production network.The best approach for recovery is practice makes progress. A convoluted recovery procedure will delay the return to normal business operations. Verify that you have a well-documented IR procedure that details all aspects of the recovery process -- and that the information can be accessed even if the network is down.Orchestrate and automate as much of the recovery process as possible. Time is the critical factor in recovery success. Automation can make the difference between a recovery that takes days or weeks and one that takes minutes or hours.The prospect of attackers outing their victims to the SEC underscores the importance of protecting systems in the first place. Organizations need to take the necessary steps, starting with securing their identity system. Whether your organization uses AD, Entra ID, or Okta, any identity can provide a digital attack path for adversaries seeking your most valuable assets.About the AuthorTodd WeberVice President of Professional Services, SemperisTodd Weber is the Vice President of Professional Services at Semperis, where he is responsible for developing and executing the companys professional services strategy, driving new revenue through service offerings and building and maintaining client relationships. Weber has more than 20 years of experience in cybersecurity professional services, technology development and integration, business strategy and venture investing. He has worked with many of the largest companies in the world developing and deploying information security technologies and architectures. Prior to Semperis, Todd was an Operating Partner and CTO at Ten Eleven Ventures. He previously served as the CTO at Optiv. He holds a B.S. from Virginia Tech.See more from Todd WeberNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
0 Comments
0 Shares
13 Views