Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cyber-attacks are asymmetrical and reap large monetary and national security rewards, far greater than the resources they require.

Consider this statement from the 2014 Verizon Data Breach Investigations Report: “2013 may be remembered as the ‘year of the retailer breach,’ but a comprehensive assessment suggests it was a year of transition from geopolitical attacks to large-scale attacks on payment card systems.”

Stealing cars, robbing banks, or stealing an individual’s identity, offer less financial return than a database or stream of millions of credit card numbers. The frequency and volume of attacks indicates that current cybersecurity methods to protect sensitive information may not be sufficient, and perhaps the rate of attack will not slow until the risk or cost to the attackers becomes too high compared to the value of a breach.

Raising the cost or reducing the value of an attack is not easy, particularly when many attacks originate from countries without extradition agreements. Limited law enforcement capabilities make many of methods to combat this controversial. The notion of a counterattack requires more precision than we usually have in identifying the attacker within the necessary timeframe. A counterattack risks a great deal of collateral damage and potential diplomatic fallout. This is a long-term problem that requires long-term, indirect actions for any economic change. In that context, here are some ideas that might have an impact:

  • Participating in economic activity with the U.S. is a boon to most countries. As a result, cybercrime also impacts their economies. Before agreeing to trade agreements and economic treaties, the U.S. might require other countries to commit to cooperative law enforcement investigations and legislated programs for reducing cybercrime activities within their borders
  • Assign each credit card issued a set of decoy numbers that are recorded at the same time the real number is used to make a purchase. Over time, databases and point of sale applications will become loaded with several multiples of decoy numbers, lessening the chance that a real number is used in a fraudulent transaction involving stolen numbers. This makes it easier for the retailer to identify fraudulent transactions, and reduces the value of the compromised data

The complexity of geopolitics, technology, economic interests, and law enforcement operations for combating cyber-attacks will continue to make reaching, litigating, and incarcerating cyber-criminals very challenging. Efforts to increase the risk or cost to attackers will take a long time to implement and have an effect, but this is clearly a long time problem. 

Contributors

* Arc Aspicio |

Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. As a rapidly growing company, Arc Aspicio has a bold strategy for 2016-2018 that drives growth through new capabilities in strategy, design, human capital, data analytics, information sharing, cybersecurity, and strategic communications. The company is known for a strong, collaborative culture that values gratitude – for its clients and its great team. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Lynn Ann Casey / Chief Executive Officer
info@arcaspicio.com
703.465.2060

Mr. Roboto: Your Newest Coworker

Mr. Roboto: Your Newest Coworker

Could your next cubemate be a robot? Elon Musk, the Tesla and SpaceX founder, is building our future coworkers and forming a world filled with Artificial Intelligence (AI) that could “beat us in just about everything,” including our jobs. As Musk attempts to create a real-life iRobot, many advantages and a possible partnership arise with this future. How can the Government and Homeland Security prepare and welcome new technological advancements?

Data + Strategy: Using Data to Inform Agency Strategy

Data + Strategy: Using Data to Inform Agency Strategy

Understanding the types of data available, gaining access to the right data, and making sense of data are daunting tasks for most organizations as they develop a strategy to meet mission demands and enterprise-wide goals. Data is especially challenging for the Government, yet provides the opportunity for insight for leaders as they strategically move their agencies forward.

Workplace Morale is Going to the Dogs… Literally!

Workplace Morale is Going to the Dogs… Literally!

There are few greater feelings than a dog’s unconditional love. And some are finding that a dog’s love can help combat stress at work. Secretary Zinke of the Interior Department announced his intent for "Doggy Days" where he encouraged employees to bring their canine companions to work on designated days. More than 80 dogs arrived for first event and the overjoyed employees immediately scheduled the next.

Accelerating FITARA Compliance: Five Steps That Leaders Can Take Today

Accelerating FITARA Compliance: Five Steps That Leaders Can Take Today

Implementing change is not always easy, but it is always necessary. Federal agencies have been working to transform how they acquire and manage Federal information technology (IT). The Federal Information Technology Acquisition Reform Act (FITARA) in December 2014 has increased visibility into this transformation.Although FITARA enhances the authority and accountability of Chief Information Officers (CIOs) in reviewing and approving major IT investment projects, CIOs continue to look for new ways to implement best practices at their agencies.

Combating the Rise of Transnational Criminal Organizations

Combating the Rise of Transnational Criminal Organizations

Crime, corruption, and violence – particularly involving drug, human, and weapons trafficking – continue to increase at an alarming rate in the U.S. Transnational Criminal Organizations (TCOs) are a critical part of this trend and pose a serious and growing threat to homeland security – at our borders and beyond.U.S. Customs and Border Protection (CBP) is at the tip of the spear to combat TCOs. With the context that the first goal in their Vision and Strategy 2020 Strategic Plan is Counter Terrorism and Transnational Crime, CBP is focusing on disrupting TCOs responsible for the cross-border trafficking of illegal drugs, humans, and guns.

Design Thinking: Putting the Citizen at the Heart of Lasting Change

Design Thinking: Putting the Citizen at the Heart of Lasting Change

For the past few decades, there has been a growing increase in the digital channels available to network with the Federal government. These channels have made it easier for the public to interact and elicit responses from elected officials.These growing interactions have increased expectations for Government to be more transparent and collaborative. From the Department of Homeland Security (DHS) to the Department of State (DOS), Design Thinking transformations have begun to develop and modernize programs to be more human-centered. Agencies and programs beholden to serve the public good should logically adopt a problem-solving mindset that places the individual at the heart of any lasting changes.

Using Behavioral Science to Improve Mission Outcomes

Using Behavioral Science to Improve Mission Outcomes

Although behavioral science has been studied and applied within academia for decades, recently the concept has emerged everywhere – from Silicon Valley tech giants such as Google and Uber, to various Government agencies including the Department of Education, the Department of Defense, and the Department of Agriculture.But defining and applying such a broad and sometimes-nebulous discipline can prove difficult. What exactly is behavioral science? How can the Government use the concepts and lessons learned effectively?

Crowdsourcing to Improve Security

Crowdsourcing to Improve Security

Many of us are familiar with the idea of crowdsourcing. Corporations and the Government both use crowdsourcing to generate data, raise awareness campaigns, and produce ideas. So, what if we used crowdsourcing to enhance our security and bridge communication gaps between the Government and American citizens at the same time?

Homeland Security Managers = Innovative Leaders

Homeland Security Managers = Innovative Leaders

The search for and implementation of innovative methods to protect the homeland should play an important role in homeland security managers’ approach to how they guide their organizations. Citizens expect government leaders to propose and implement organizational, acquisition, and personnel management practices that enhance our nation’s ability to prepare for and mitigate potential threats. They expect these to make them safer and the nation more secure.