About Us | Contact Us
View Cart

The Magnificent Seven 2022

By Dan Hadaway | Monday, January 24, 2022 - Leave a Comment

Seven Trends . . .


that small bank Information Security Officers face in 2022
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of small banks (under five billion in assets).  My intent: help you organize your thoughts for the upcoming year.

So, what issues do we think Information Security Officers will tackle in 2022?

Normally we present our top seven trends in reverse order, in the spirit of a typical “David Letterman Top 10 List,” where we save the best for last, but including responding to risk, we feel the number one trend often has such a wide-reaching impact that it impacts the other six trends. So . . . no David Letterman Style list this time. Instead, let’s just jump to the number one trend of 2022.

And no, the number one trend is not the ongoing pandemic, though it was started and accelerated during the recovery. Instead, the number one trend is what I’m calling The Disappearance. The Disappearance is simply a reverse-way of saying, “the virtualization of everything.”

Everything physical is disappearing. Servers . . . disappeared. Phone systems. Gone. Conferences and workshops – virtual. Cameras . . . replaced by the webcams in our endpoints. I mean, when is the last time you saw your auditor in person?  Your examiner?

Even our meetings are disappearing.

This started a decade ago, when our servers continued their increase in numbers, but not in physical rack-space, as virtualization became the norm. What started as virtual machines is now virtual meetings, virtual training, virtual phone systems, and even virtual security systems. Taking this further: cloud computing is now in the late majority phase of adoption, and we’re even putting our networks in the cloud with Azure, AWS, etc.

The second trend is actually a superset of the first: the pent-up adoption of new technologies. The momentum of new technology adoption that we spoke of in recent years will continue to make this trend more and more pertinent, and we believe 2022 will see the continuing adoption of many new technologies including the virtualization of everything. As the “late majority” of many technologies was supposed to start over a year ago, we see small banks planning everything from finally pulling the trigger on new mobile banking products to identity access management to expanding and upgrading their security capabilities. Meanwhile, the paradigm shift created by the pandemic . . . with implications ranging from the final mobilization of endpoints to working from home . . . The Disappearance . . . is causing us to adopt new controls ranging from Network Access Control or Conditional Access on our perimeters to endpoint security on our laptops. Meanwhile, new technologies leveraging big data, machine learning, neural networks and even the seeds of artificial intelligence tactics are still in the mix. And with an eye on the risk of this, many of us are planning to adopt new technologies as we “look forward to the recovery.” This leads to the third and fourth trends: MFA Everywhere, and Endpoint and Cloud Security. And these two self-explanatory trends will help us when we embark on the fifth trend.

All this adoption of new technologies right during The Disappearance is requiring us to “try a different perspective” on technology risk management. While we were already growing concerned that the FFIEC’s Cybersecurity Assessment Tool was antiquated, management is growing increasingly apt to “micro-manage” response to the ransomware threat, out of legitimate concern. Though the FFIEC’s release of the Architecture, Infrastructure, and Operations Guidance has been a step in the right direction and may end up changing how we do Technology Planning, it is always a good idea to look for other organizations maintaining well-refreshed bodies of knowledge. Thus, when we saw the Conference of State Bank Supervisors release the Ransomware Self-Assessment Tool (RSAT), we started suggesting that even non-state bank ISOs consider answering the 16 questions in an exercise with their management teams. But beyond that, we are starting to see banks look at adopting the NIST Cybersecurity Standard, the CIS Top 20 Controls, or even Cybersecurity Profile published by the ABA endorsed Cyber Risk Institute. Each of these frameworks are updated far more regularly than the FFIEC guidance has been. The CIS Top 20 has been updated at least seven times since 2014, if I counted right.

All three of these frameworks lead a community-based bank, by the way, to adopt MFA on Everywhere and Endpoint and Cloud Security as basic controls. Beware: and maybe by way of disclosure, but each of these frameworks will also lead you to relying more heavily on the production of a good SIEM. While this is self-serving, we maintain the need to try a different perspective can be exuded by the sixth trend.

The sixth trend gives us pause. In the era of major breaches and ransomware attacks, we have come to the conclusion that in order to make our networks, and by extension our customer’s data, safer, we should start doing the sorts of things that we do when we suspect a breach. Acting like we’ve already been breached is a mindset that can help us think of the things that we may otherwise not in times of relative security. Things like Zero Trust, Network Segmentation, strengthened Admin account security, and heightened and more intense awareness. Doing all the due diligence on forensics firms and establishing a relationship with a good one is important, as well as interfacing with any MSSP or MSOCs you may have. If you have someone watching your network, isn’t it a good idea to ensure the lines of communication are open and well used?

Speaking of heightened and intense awareness, that brings us to our seventh and final trend. We should apply awareness in all directions! What does that mean exactly? Instead of doing awareness training once a year, we should take a “drip” approach to the process. Making sure that EVERYONE in the institution is made aware of awareness training topics is important, but beyond that you also need to give everyone this information regularly, teach them that information, and then test them on that information. It’s like making a dough. The water (awareness) is dripped into the flour (the bank) and the continuous kneading (testing) is what will make it dough and hold together when we introduce it against an outside force, like a fan (Technology Risk). The testing could be ongoing and mixed social engineering, continuous penetration testing, and testing controls that we may feel are basic and easy. We also believe that Incident Response Testing is what we like to call the One Test and is extremely important.

In 2022, the Magnificent Seven is a Sentence:
So, to summarize, the top seven trends for 2022, according to Dan:

1) The Disappearance,
2) plus the Pent-up Adoption of New Technologies,
3) causes us to apply MFA Everywhere
4) and revisit Endpoint and Cloud Security,
5) as we try a different perspective . . .
6) like acting like we’ve already been breached
7) causing us to apply awareness in all directions!

If you are interested in more in depth descriptions of the Magnificent Seven? Check out the webinar-movie below!


Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”


same_strip_012513


 

Latest News
    Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  
    infotex and GoTo To all infotex managed security service Clients: As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022.  Based on the advisory from GoTo the products they offer that are affected include LogMeIn Pro, LogMeIn Central, […]
    An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organizations to adapt holistic technologies that can correlate all attack events. Therefore, developing XDR […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be easy to forget some of the older threats that have never gone […]
    Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and assessment approaches which intimidate the management team with their complexity.  […]
    The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectively ending its use after nearly 30 years.  Introduced in 1995, SHA-1 used a 160-bit hash […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    Trending: Awareness Posters Meet Infographics Here are the top seven posters as of the last twelve months! As always, our Awareness Posters were a hit in 2022! So we decided to run some reports to see what our most popular posters were since November 2021. As everybody loves top ten lists and contests, we thought […]