Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Aha Moments in Cyber Security

Black Hat607 views34:20about 2 years ago

This talk discusses the intersection of cybersecurity, risk management, and cyber insurance, focusing on how organizations can better quantify and mitigate cyber risk. It highlights the financial impact of major cyber incidents like NotPetya and the challenges of aligning security investments with business objectives. The speaker advocates for a more integrated, proactive approach to cyber insurance that moves beyond reactive, point-solution purchasing. The presentation emphasizes the need for standardized risk assessment and better communication between security teams and the C-suite.

Why Your Security Budget Is Failing to Stop Real-World Breaches

TLDR: Most enterprise security spending is misaligned with actual business risk, leading to a false sense of security that crumbles during real incidents. This talk highlights how major companies like FedEx were forced into manual, pen-and-paper operations after the NotPetya attack, proving that point-solution spending doesn't equal resilience. Security researchers and practitioners must shift from chasing "zero" to quantifying risk in financial terms to get the C-suite to fund the right controls.

Security teams are currently trapped in a cycle of buying point solutions to address individual vulnerabilities while ignoring the broader, systemic risks that actually threaten business continuity. We see this every day: a team drops a massive budget on a new EDR or a fancy vulnerability scanner, yet when a catastrophic event hits, the organization is still paralyzed. The disconnect between what we secure and what the business actually loses is the single biggest failure in modern security operations.

The NotPetya Reality Check

The NotPetya incident remains the gold standard for demonstrating this failure. When the malware hit, it didn't just trigger a few alerts; it effectively deleted the digital infrastructure of major global enterprises. FedEx, for instance, was forced to revert to pen-and-paper operations for months. This wasn't a failure of a specific firewall rule or a missing patch; it was a failure of enterprise resilience.

When you look at the financial fallout, the numbers are staggering. Companies lost hundreds of millions of dollars in a single quarter. Yet, in many organizations, these risks are treated as "afterthoughts" or relegated to page five of the business section in the Wall Street Journal. If you are a pentester or a researcher, you know that the technical vulnerability is only half the story. The other half is the business's inability to absorb the impact of that vulnerability being exploited.

Moving Beyond Point Solutions

The current "solution landscape" is a fragmented mess of thousands of vendors, each promising to solve a specific slice of the security pie. This fragmentation creates an opaque environment where visibility into actual technology operations is nearly impossible. For a researcher, this means that even if you find a critical bug, the path to remediation is often blocked by a lack of clear ownership or a misunderstanding of the business impact.

We need to stop treating security as a collection of isolated tools and start treating it as a component of business risk management. This requires a shift in how we communicate with the C-suite. Instead of talking about "threat actors" or "vulnerability counts," we need to talk about Business Interruption and the cost of downtime. When you can show a CFO that a specific control—like enforcing MFA or fixing a specific OWASP Top 10 vulnerability—directly reduces the probability of a multi-million dollar outage, the conversation changes.

The Role of Cyber Insurance as a Catalyst

Cyber insurance is often viewed by technical teams as a "check-the-box" compliance exercise, but it is actually a powerful, underutilized lever for change. When an insurer demands specific controls to underwrite a policy, they are essentially performing a high-level risk assessment of the entire organization.

The problem is that many organizations "teach to the test." They implement the bare minimum to get the policy, rather than using the insurance requirements as a roadmap for building a more resilient architecture. As a researcher, you can use this. If you are auditing an environment, look at the controls required by their insurance policy. Are they actually implemented, or are they just configured to pass a scan? The gap between those two states is where the most dangerous vulnerabilities live.

Bridging the Gap

The shortage of skilled security professionals—currently estimated in the millions—means we cannot simply throw more people at the problem. We have to be smarter about how we deploy our limited resources. This means prioritizing controls that provide the highest "return on resilience."

For the pentester, this means your reports should focus on the "so what?" factor. Don't just report a high-severity RCE; report the RCE in the context of the business process it threatens. If you can demonstrate that an exploit path leads directly to a critical business function, you are no longer just a bug hunter; you are a risk advisor.

We need to stop aiming for an impossible "zero" and start aiming for "quantifiable, manageable risk." The goal is to build systems that can survive an attack, not just systems that try to prevent every possible entry point. If you are building a security program or testing one, ask yourself: if this system goes down for 48 hours, what is the exact dollar amount of the loss? If you can't answer that, you don't understand the risk you are trying to secure.

The next time you are in a meeting with stakeholders, stop talking about the technical mechanics of the exploit and start talking about the financial mechanics of the failure. That is how you get the budget, that is how you get the buy-in, and that is how you actually move the needle on enterprise security.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in