Search Results

This article was written by Michael Santarcangelo from CSO Magazine and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to

“Just because you're paranoid doesn't mean they aren't after you.”

Joseph Heller penned that in Catch-22. It captures the challenge of many security leaders today. In a profession that breeds paranoia, we need to worry less about how paranoid we are and ask ourselves, “How productive is our paranoia?”

Udi Mokady (LinkedIn), founder, chairman and CEO of CyberArk, has some ideas on how to answer the question.

A few months ago, I talked with Mokady about the need to "sprint before getting forced to scramble." During that conversation, I asked if he saw a trend in the security leaders advancing their positions. Without hesitation, he explained that the leaders embracing red teams had a deeper understanding and were demonstrating more success.

I asked him to expand a bit. Here’s his security slap shot:

Security leaders must be 'productively paranoid'

Successful business leaders understand the power of disruption as a pathway to anticipating unstated future customer needs. The concept of disruption as a force for innovation is powerful in the field of cybersecurity and often pushes business leaders to problem solve in new or unexpected ways. Proactively simulating attacks on your own organization is an excellent example.

With now-broad acceptance that attackers will get in and that compromise is expected, there are distinct advantages to being “productively paranoid.”

Security leaders who are productively paranoid fully embrace the idea that the best way to play defense is to start playing offense. This doesn’t mean companies should “attack back,” but they need to understand the mindset and pathways attackers take to infiltrate organizations. This is why CyberArk encourages customers to consider the benefits of conducting red team exercises.

Attackers are continually honing their skills and looking for new vulnerabilities to exploit. Security teams must have an equally agile approach — with the ability to confidently identify weak spots before the attackers do — and mitigate associated risks.

Effective risk management becomes harder as enterprises embrace cloud and DevOps strategies, which can expand the attack surface and create new blind spots. Red team exercises are designed to simulate a real-world adversary and test the security operations team’s ability to respond to advanced threats. By conducting red team exercises, enterprises can test their ability to detect and protect against known and unknown threats, find their most vulnerable points, and better understand what steps attackers may take during the phases of the attack.

Whether conducted by internal teams or by external groups, it’s important for business leaders to remember that red team exercises don’t result in a pass or fail grade. Attackers will always find a way in, and organizations should take an “assume breach” approach in their security posture. With the current threat environment, CEOs and boards will increasing ask if this sort of proactive testing and threat simulation is happening. With red teaming, organizations can do more than demonstrate that they are checking boxes; they are demonstrating a quantifiable commitment to risk management that puts security first.

My analysis (color commentary)

I want to amplify a key point: Proper testing is not pass or fail. I see a lot of security leaders get the required test to satisfy a requirement. Or they use it as a way to demonstrate a need for something. While those might be important, testing is a way to better understand what is likely to happen. Proper testing — embracing a red team, for example — is a great to clarify your focus and prioritize your effort on what is going to make the most difference.

The more we understand the reality of attackers, the better our ability to defend. And sometimes that means building in the right resilience. I’m not worried about a breach, per se. I’m more interested in how quickly you detect a breach and how rapidly you respond appropriately. Embracing your red team efforts might just give you an edge.

Your turn — react

How do you feel about red teams? Are you getting the most of your red team efforts?

Take it to Twitter and engage with me (@catalyst) to let me know what you think.

Ready, set, react!

Cyber security is a key concern for organisations of all sizes. Protecting devices, networks, data and apps is an essential component of doing business. Vodafone provides security products and services to businesses of all sizes, helping you secure your business anywhere because we are everywhere. We are trusted by organisations globally, including utilities, financial institutions and government agencies. For more cyber security insights, you can find us on Twitter and LinkedIn.

main_icn_24_7_support24-delivery 360-view4gmain_icn_Accessoriesmain_icn_Appsapple market_icn_Batterybroadband-devicecalendarmarket_icn_Minutesmain_icn_Cameramain_icn_Chatmain_icn_Chevron_downmain_icn_Chevron_leftmain_icn_Chevron_rightmain_icn_Chevron_upmain_icn_Tick_simpleClose_thick_0.1main_icn_Closecommunity-thin main_icn_Community_or_Foundationdashboard-hidashboard-thin main_icn_Dashboardmarket_icn_Data_Sharingmarket_icn_Dealsmain_icn_Deletemain_icn_Deliverymain_icn_Dislikemain_icn_Downloadmain_icn_Editerror-circlefacebook-thin main_icn_Social_Facebookmain_icn_Filtermain_icn_Filtergogoogle-plus-thin social-google-plushelp-hi_1helpmain_icn_Likemarket_icn_LinkedInlocation-hilocation-regular location-thin main_icn_Locationmail-newmarket_icn_Screen_sizemain_icn_Menumarket_icn_SMSmobile-broadbandmain_icn_Mobilemain_icn_My_Vodafonenetwork-signal-hinetwork-thin main_icn_Network_signalmain_icn_Pausemain_icn_PAYGsocial-paypalmain_icn_Photospin_alertpin_manpin_warningplay-circle main_icn_Play_circlemain_icn_Play_arrowmain_icn_Add_or_Plus0_rating5_ratingrating-filled ratingmain_icn_Ratingsrefresh main_icn_Bill_or_Reportmain_icn_Reportsmain_icn_Roamingmain_icn_Searchmain_icn_Securityshareshoppingmarket_icn_SIM_Swapmain_icn_Social_Twitterspeech-bubble main_icn_Studenttail [Converted]technology test_app main_icn_Texttick-bordered tick-simple main_icn_Tick_simplemain_icn_Top_upmain_icn_TVtwitter-thin main_icn_Social_Twitterusersmain_icn_Viewedmarket_icn_Vodafone_storeWarning_0.1warningweightwindow market_icn_Multinationalyoutube-thin social-youtube