OPM Data Breach — We Should Focus on How, Not Who
In cybersecurity, knowing your adversaries’ techniques and tactics can help you better defend and prevent successful attacks. It’s an important part of your strategy. But when att…

In cybersecurity, knowing your adversaries’ techniques and tactics can help you better defend and prevent successful attacks. It’s an important part of your strategy.
But when attribution becomes the focus of the story, we risk not examining how an attacker was successful.
Looking at a breach from a “whodunit” point of view makes for better headlines and helps sell threat intelligence services. However, it fails to address how the compromise was possible and how to address those gaps.
In the case of the Office of Personnel Management breach, it is now reported that a privileged user account was compromised and then used to gain a greater foothold in the network and steal information from 18 million accounts. For me, that raises questions about the management of identity and access controls and failure to identify anomalies in user behavior. This is much more mundane than pondering which nation-state is behind an attack and what their motivation is.
Good cybersecurity is predicated upon people, process and technology. The best way to approach access control is make sure each individual is only given the amount of access necessary to perform his or her job. Users should also understand that their account is tied to them, all activity generated by that account is being recorded and they should never let someone borrow their account credentials (think Edward Snowden).
Behavioral analytics should be used to spot anomalous activity. Alerts can be generated when an account is used outside of normal parameters, such as time of day the account is active or unusually large amounts of data being copied by a user. Streaming network analytics that examine entity behavior for variances are far more valuable than the most advanced signature or pattern matching Intrusion Detection system (think EINSTEIN 3).
We have to know what is normal versus not normal on our networks. Until we do that, we will not know about an attack until after it happens.
Popular Posts

Business and IT Alignment is Critical to Your AI Success
These are the five pillars that can unite business and IT goals and convert artificial intelligence into measurable value — fast
Read more
Average U.S. FICO Score at 717 as More Consumers Face Financial Headwinds
Outlier or Start of a New Credit Score Trend?
Read more
FICO® Score 10 T Decisively Beats VantageScore 4.0 on Predictability
An analysis by FICO data scientists has found that FICO Score 10 T significantly outperforms VantageScore 4.0 in mortgage origination predictive power.
Read moreTake the next step
Connect with FICO for answers to all your product and solution questions. Interested in becoming a business partner? Contact us to learn more. We look forward to hearing from you.