SlideShare a Scribd company logo
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 1 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
September 16, 2016
The 99.999 percent
cybersecurity problem
Commentary: A once-not-so-reliable phone
company set the standard for "five nines" service.
Perhaps it's time to ask how cybersecurity might
achieve the same standard.
BIO
By JR Reagan
JANUARY 29, 2016 3:30 AM
Ex-servicemen receive practical instruction on an operator board in 1946. What can the
cybersecurity industry learn from telephone utilities as it strives to boost reliability?
(State Library of Victoria/Flickr)
CYBERSECURITY
So, you've assumed
compromise. Now
what?
CYBERSECURITY
NSA: no zero days
were used in any
high profile
breaches over last
24 months
HOUSE OF
REPRESENTATIVES
Election systems
safe from
cyberattacks,
experts believe
PRIVACY
White House calls
for updated senior
agency privacy
positions
RELATED ARTICLES
NEWS EVENTS TV RADIO PEOPLE SUBSCRIBE CHANGE SCOOP !"
SUBSCRIBE CONNECT WITH US
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 2 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
JR Reagan writes regularly for
FedScoop on technology, innovation
and cybersecurity issues.
Near-perfection is a lofty goal, one utilities strive for. “Five nines” has
become, it’s said, the “holy grail” of reliability: Under this scenario,
customers have service 99.999 percent of the time, with outages
averaging only about five minutes per year. Now, that's service.
A major telephone company set this standard, boasting of its 99.999-
percent reliability. Now, some are calling for “five nines” service from
Internet providers and websites.
Perhaps we should ask how cybersecurity, too, might achieve this
standard. How can our industry protect data with near-perfect
reliability, especially as an ever-growing number of “connected”
devices join the global data network?
Telephones weren’t always so reliable. In its early years, the industry
faced challenges similar to cybersecurity’s. Phone service began as a
strictly local phenomenon: The earliest adopters in 1878 had to buy
the phones they wanted to use on either end — one for home and one
for work, for instance — and hire a telegraph line installer to connect
them. Reliability wasn’t difficult to ensure at this small scale, as long
as someone heard the caller whistle through the line — the pre-ringer
signal that a call was coming in.
Likewise, cybersecurity in its earliest
years relied almost exclusively on
firewalls to filter out “untrusted”
Internet traffic. Safeguarding a single
desktop computer connected by phone
lines to a contained World Wide Web
was fairly simple. As happened in the
telephone industry, however, the
cyber scale is quickly expanding – and
so are the challenges.
According to the book “Seeing What’s
Next,” by Clayton M. Christensen,
telephones first appealed to
businesses, which saw value in
enabling workers to communicate more efficiently among
themselves and with other offices. The trend soon spread to
Cybersecurity Insights &
Perspectives
Invincea's Anup
Ghosh on using
machine learning
to improve
cybersecurity
detection
capabilities
Cybersecurity Insights &
Perspectives
Veracode's Chris
Wysopal talks
about the impact
of '90s hacker
think tank
Content from Sponsors
DHS' Vincent
Sritapan on federal
IT modernization
September 20, 2016
Leveraging Your
Workforce in the
New
Communications
Era
September 28, 2016
Privileged User &
Insider Threat
Federal 2016
Ponemon Survey
Findings
October 05, 2016
VIEW ALL
TV/RADIO
EVENTS
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 3 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
households, and by 1900, the number of phone users reached 1
million. By 1904, more than 6,000 telephone companies
independently provided phone service, which, by most accounts, fell
far short of the “five nines.”
“Coordination was difficult, network monitoring was next to
impossible, operators experienced diseconomies of scale, and service
quality suffered,” Christensen writes. Sound quality also suffered,
shared “party lines” often forced people to wait to make calls, and
long distance calling was extremely difficult, complicated and
expensive.
And yet — the industry reached “five nines” availability. How?
Consolidation is one answer: As Christensen's book details, the Bell
Telephone Co. bought its competitors, forming a virtual monopoly
throughout the U.S. One positive result was standardization, which
enabled the utility to invest heavily in research and development. It
also led to new technologies for use across its ever-expanding service
area: private phone lines, direct dialing as opposed to placing calls via
operators, long-distance calling and 99.999 percent reliability.
As a result, the telephone has become an essential item for all, even
given for free to low-income residents under a federal program.
The telephone’s success happened, in part, because innovators moved
beyond a piecemeal approach to design on a grand scale, engineering
improvements across the entire network. At the same time, they
figured out how to give people what they want: around-the-clock
reliability, with the phone company — not the customer — held
responsible when things go wrong; ease of use – making a call today,
even long distance, today is a simple, intuitive task , requiring no
special training; and quality experiences, without the frustrations of
dropped calls or distorted sound.
What can we in cybersecurity learn from this success story? In many
ways, our profession seems still in the early, “piecemeal” phase, with
many focusing on protecting their own organizations’ data and that
of their customers, or on developing apps to secure a single device or
network.
But as the telephone’s history indicates, success may come only when
October 05, 2016
What Hackers
Reveal About IT
Vulnerabilities
VIEW ALL
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 4 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
-In this Story-
Government IT News, Innovation, Tech, Cybersecurity, Commentary, Guest
Columns
Stay alert to all the latest government IT news.
SIGN UP TODAY
we “think big,” enlarging our scale, moving beyond the local
(company-focused or product-focused) to the global (industry- or even
Internet-focused). To get there, we might collaborate with one
another for a common good — such as data protection — and
innovate strategies and solutions to thwart intrusions systemwide.
And, like the phone industry, we ought to always keep the customer
front and center in whatever we design, aiming for easy-to-use
cybersecurity with nearly perfect reliability.
It’s one thing to manage cybersecurity on a single cell phone, tablet or
laptop. It’s more difficult when you’re protecting all the devices in a
single business. And it’s exponentially more challenging to design
security for systems used by millions and billions of users.
The Internet of Things, with connected devices perhaps numbering in
the trillions someday — potentially serving as hackable portals to our
networks and data, could explode the cyber scale almost beyond
comprehension. Do we wait until that happens to finally figure out
how to keep data safe?
For truly effective cybersecurity design, scale is becoming a critical
factor. Ironically, as the telephone’s narrative shows, large-scale
solutions can be not only the most difficult to devise, but, once
achieved, the most effective. Now, as never before, we in the
profession need to ask: How do we solve for the really big problems?
JR Reagan is the global chief information security officer of Deloitte. He
also serves as professional faculty at Johns Hopkins, Cornell and Columbia
universities. Follow him @IdeaXplorer. Read more from JR Reagan.
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 5 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
-Explore Stories in Tech- NEWS > TECH
JOIN THE CONVERSATION
So, you've
assumed
compromise. Now
what?
NSA: no zero days
were used in any
high profile
breaches over last
24 months
Election systems
safe from
cyberattacks,
experts believe
9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem
Page 6 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem
3 Comments FedScoop SherryJones!
Share⤤ Sort by Best
Join the discussion…
• Reply •
Merovech • 8 months ago
If one out of 100,000 security attacks succeeds, then we have 99.999%
success. However, we still fail because they have complete success.
1 △ ▽
• Reply •
rbag • 8 months ago
We already tried big scale. We gave Microsoft nearly total control of
internet devices. And that was the beginning of our cybersecurity
problems.
The phone company achieved reliability by squashing diversity. That's
great when you have a specific need to meet and your problem is device
failure. That is exactly the opposite of what's needed. When you've got a
general purpose tool and your enemy is bad actors, diversity is what you
need.
1 △ ▽
• Reply •
Jeff N • 8 months ago
The phone system, while reliable, was far from secure. Line tapping for
unauthorized devices was simple, and in band signalling and switching
relied on security via obscurity. Once the signal tones leaked out came the
rise of the famous blue and red boxes. Long distance calls were horribly
expensive with ridiculous time of day rates. Service in smaller markets
could easily result in an "all circuits busy" message. In the late 1960s
businesses in New York City were taking out full page newspaper ads
demanding better phone service. In 1974 Bell suffered a major fire at the
NYC 2ND Avenue switching center that severed major lines and knocked
out phone service to lower Manhattan for weeks. They had no disaster plan
to cover situations like this.
△ ▽
Subscribe✉ Add Disqus to your site Add Disqus Addd Privacy%
Recommend♥
Share ›
Share ›
Share ›
ABOUT / CONTACT LEADERSHIP TEAM EDITORIAL TEAM
CONTRIBUTE CAREERS
# $ % & ' + )
BACK TO TOPCOPYRIGHT 2008-2016 FEDSCOOP. ALL RIGHTS RESERVED. ∠

More Related Content

What's hot

The Next Information Technology- A Preview of Tomorrow’s Innovations and Cha...
The Next Information Technology-  A Preview of Tomorrow’s Innovations and Cha...The Next Information Technology-  A Preview of Tomorrow’s Innovations and Cha...
The Next Information Technology- A Preview of Tomorrow’s Innovations and Cha...
Nadir Belarbi
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
Laura Tibbo
 
The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STAT
M-STAT
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
Symantec
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Brian Metzger
 
Daniel Collico Savio Web 2.0 Influence On Telcos Its 2008 Rome
Daniel Collico Savio   Web 2.0 Influence On Telcos   Its 2008 RomeDaniel Collico Savio   Web 2.0 Influence On Telcos   Its 2008 Rome
Daniel Collico Savio Web 2.0 Influence On Telcos Its 2008 Rome
Daniel Collico Savio
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
Spiceworks Ziff Davis
 
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
Cisco Service Provider Mobility
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
uKnow.com
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
Disruptive digital disciplines in the era of cloudonomics joe weinman
Disruptive digital disciplines in the era of cloudonomics   joe weinmanDisruptive digital disciplines in the era of cloudonomics   joe weinman
Disruptive digital disciplines in the era of cloudonomics joe weinman
Hardway Hou
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
Mobile Trends & Innovations: What Your Business Needs To Know
Mobile Trends & Innovations: What Your Business Needs To KnowMobile Trends & Innovations: What Your Business Needs To Know
Mobile Trends & Innovations: What Your Business Needs To Know
NavigationArts
 
Mobile marketing theme
Mobile marketing themeMobile marketing theme
Mobile marketing theme
whatagency
 
Law Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig RispinLaw Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig Rispin
Craig Rispin
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Latin America’s Internet Usage Increases
Latin America’s Internet Usage IncreasesLatin America’s Internet Usage Increases
Latin America’s Internet Usage Increases
Lorence Fogelman
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting Experience
Geoff Peterson
 

What's hot (19)

The Next Information Technology- A Preview of Tomorrow’s Innovations and Cha...
The Next Information Technology-  A Preview of Tomorrow’s Innovations and Cha...The Next Information Technology-  A Preview of Tomorrow’s Innovations and Cha...
The Next Information Technology- A Preview of Tomorrow’s Innovations and Cha...
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
 
The Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STATThe Mobile Internet Revolution by M-STAT
The Mobile Internet Revolution by M-STAT
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
 
Daniel Collico Savio Web 2.0 Influence On Telcos Its 2008 Rome
Daniel Collico Savio   Web 2.0 Influence On Telcos   Its 2008 RomeDaniel Collico Savio   Web 2.0 Influence On Telcos   Its 2008 Rome
Daniel Collico Savio Web 2.0 Influence On Telcos Its 2008 Rome
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Disruptive digital disciplines in the era of cloudonomics joe weinman
Disruptive digital disciplines in the era of cloudonomics   joe weinmanDisruptive digital disciplines in the era of cloudonomics   joe weinman
Disruptive digital disciplines in the era of cloudonomics joe weinman
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Mobile Trends & Innovations: What Your Business Needs To Know
Mobile Trends & Innovations: What Your Business Needs To KnowMobile Trends & Innovations: What Your Business Needs To Know
Mobile Trends & Innovations: What Your Business Needs To Know
 
Mobile marketing theme
Mobile marketing themeMobile marketing theme
Mobile marketing theme
 
Law Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig RispinLaw Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig Rispin
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Latin America’s Internet Usage Increases
Latin America’s Internet Usage IncreasesLatin America’s Internet Usage Increases
Latin America’s Internet Usage Increases
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting Experience
 

Viewers also liked

Java- JDBC- Mazenet Solution
Java- JDBC- Mazenet SolutionJava- JDBC- Mazenet Solution
Java- JDBC- Mazenet Solution
Mazenetsolution
 
CGA Millennials in the Workforce
CGA Millennials in the WorkforceCGA Millennials in the Workforce
CGA Millennials in the Workforce
Ryan Mekech
 
The Live Online Class
The Live Online ClassThe Live Online Class
The Live Online Class
Kristen Sosulski
 
Medición del radio terrestre Proyecto Eratóstenes
Medición del radio terrestre Proyecto EratóstenesMedición del radio terrestre Proyecto Eratóstenes
Medición del radio terrestre Proyecto Eratóstenes
Sole Pomilio
 
RESUME
RESUMERESUME
Basics of Html
 Basics of Html Basics of Html
Basics of Html
Arslan Butt
 
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
Richard Schwarz
 
Abdel Hamied Lotfy cv
Abdel Hamied Lotfy cvAbdel Hamied Lotfy cv
Abdel Hamied Lotfy cv
Abdul hamid Lotfy
 
Praca.pl sytuacja na rynku pracy w I kw.2016 raport
Praca.pl sytuacja na rynku pracy w I kw.2016 raportPraca.pl sytuacja na rynku pracy w I kw.2016 raport
Praca.pl sytuacja na rynku pracy w I kw.2016 raport
Praca.pl
 
Guide to Furnace Sootblowing
Guide to Furnace SootblowingGuide to Furnace Sootblowing
Guide to Furnace Sootblowing
Richard Smith
 
JDBC
JDBCJDBC

Viewers also liked (11)

Java- JDBC- Mazenet Solution
Java- JDBC- Mazenet SolutionJava- JDBC- Mazenet Solution
Java- JDBC- Mazenet Solution
 
CGA Millennials in the Workforce
CGA Millennials in the WorkforceCGA Millennials in the Workforce
CGA Millennials in the Workforce
 
The Live Online Class
The Live Online ClassThe Live Online Class
The Live Online Class
 
Medición del radio terrestre Proyecto Eratóstenes
Medición del radio terrestre Proyecto EratóstenesMedición del radio terrestre Proyecto Eratóstenes
Medición del radio terrestre Proyecto Eratóstenes
 
RESUME
RESUMERESUME
RESUME
 
Basics of Html
 Basics of Html Basics of Html
Basics of Html
 
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
Nassi Shneiderman Diagrams: Algorithms Made Easier (at least a little bit)
 
Abdel Hamied Lotfy cv
Abdel Hamied Lotfy cvAbdel Hamied Lotfy cv
Abdel Hamied Lotfy cv
 
Praca.pl sytuacja na rynku pracy w I kw.2016 raport
Praca.pl sytuacja na rynku pracy w I kw.2016 raportPraca.pl sytuacja na rynku pracy w I kw.2016 raport
Praca.pl sytuacja na rynku pracy w I kw.2016 raport
 
Guide to Furnace Sootblowing
Guide to Furnace SootblowingGuide to Furnace Sootblowing
Guide to Furnace Sootblowing
 
JDBC
JDBCJDBC
JDBC
 

Similar to The 99.999 percent cybersecurity problem

Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
IBM Security
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
DMIMarketing
 
Goodmill whitepaper: the ultimate vehicle broadband solution
Goodmill whitepaper: the ultimate vehicle broadband solutionGoodmill whitepaper: the ultimate vehicle broadband solution
Goodmill whitepaper: the ultimate vehicle broadband solution
Juhani Lehtonen
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
Rhys A. Mossom
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
RobertPike
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
Digium
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
Dana Gardner
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
Dana Gardner
 
16231
1623116231
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
aNumak & Company
 
The ultimate public safety broadband solution is a blue ocean one
The ultimate public safety broadband solution is a blue ocean oneThe ultimate public safety broadband solution is a blue ocean one
The ultimate public safety broadband solution is a blue ocean one
Juhani Lehtonen
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
Julius Adams
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
Vanson Bourne
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
Dominic Vogel
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
Samir Kotarwar
 

Similar to The 99.999 percent cybersecurity problem (20)

Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Goodmill whitepaper: the ultimate vehicle broadband solution
Goodmill whitepaper: the ultimate vehicle broadband solutionGoodmill whitepaper: the ultimate vehicle broadband solution
Goodmill whitepaper: the ultimate vehicle broadband solution
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 
16231
1623116231
16231
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
 
The ultimate public safety broadband solution is a blue ocean one
The ultimate public safety broadband solution is a blue ocean oneThe ultimate public safety broadband solution is a blue ocean one
The ultimate public safety broadband solution is a blue ocean one
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 

More from Sherry Jones

The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
Sherry Jones
 
Data on a leash
Data on a leashData on a leash
Data on a leash
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
S-B Schools to Prison Pipeline
S-B Schools to Prison PipelineS-B Schools to Prison Pipeline
S-B Schools to Prison Pipeline
Sherry Jones
 
S-B Immigrants
S-B ImmigrantsS-B Immigrants
S-B Immigrants
Sherry Jones
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
Sherry Jones
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
Sherry Jones
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
Sherry Jones
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Sherry Jones
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of Me
Sherry Jones
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of Things
Sherry Jones
 
The ‘Third Space’ in the cloud
The ‘Third Space’ in the cloudThe ‘Third Space’ in the cloud
The ‘Third Space’ in the cloud
Sherry Jones
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
Sherry Jones
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?
Sherry Jones
 
Data on a leash
Data on a leashData on a leash
Data on a leash
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Bridging the cybersecurity culture gap
Bridging the cybersecurity culture gapBridging the cybersecurity culture gap
Bridging the cybersecurity culture gap
Sherry Jones
 

More from Sherry Jones (20)

The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
S-B Schools to Prison Pipeline
S-B Schools to Prison PipelineS-B Schools to Prison Pipeline
S-B Schools to Prison Pipeline
 
S-B Immigrants
S-B ImmigrantsS-B Immigrants
S-B Immigrants
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of Me
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of Things
 
The ‘Third Space’ in the cloud
The ‘Third Space’ in the cloudThe ‘Third Space’ in the cloud
The ‘Third Space’ in the cloud
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Bridging the cybersecurity culture gap
Bridging the cybersecurity culture gapBridging the cybersecurity culture gap
Bridging the cybersecurity culture gap
 

The 99.999 percent cybersecurity problem

  • 1. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 1 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem September 16, 2016 The 99.999 percent cybersecurity problem Commentary: A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard. BIO By JR Reagan JANUARY 29, 2016 3:30 AM Ex-servicemen receive practical instruction on an operator board in 1946. What can the cybersecurity industry learn from telephone utilities as it strives to boost reliability? (State Library of Victoria/Flickr) CYBERSECURITY So, you've assumed compromise. Now what? CYBERSECURITY NSA: no zero days were used in any high profile breaches over last 24 months HOUSE OF REPRESENTATIVES Election systems safe from cyberattacks, experts believe PRIVACY White House calls for updated senior agency privacy positions RELATED ARTICLES NEWS EVENTS TV RADIO PEOPLE SUBSCRIBE CHANGE SCOOP !" SUBSCRIBE CONNECT WITH US
  • 2. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 2 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem JR Reagan writes regularly for FedScoop on technology, innovation and cybersecurity issues. Near-perfection is a lofty goal, one utilities strive for. “Five nines” has become, it’s said, the “holy grail” of reliability: Under this scenario, customers have service 99.999 percent of the time, with outages averaging only about five minutes per year. Now, that's service. A major telephone company set this standard, boasting of its 99.999- percent reliability. Now, some are calling for “five nines” service from Internet providers and websites. Perhaps we should ask how cybersecurity, too, might achieve this standard. How can our industry protect data with near-perfect reliability, especially as an ever-growing number of “connected” devices join the global data network? Telephones weren’t always so reliable. In its early years, the industry faced challenges similar to cybersecurity’s. Phone service began as a strictly local phenomenon: The earliest adopters in 1878 had to buy the phones they wanted to use on either end — one for home and one for work, for instance — and hire a telegraph line installer to connect them. Reliability wasn’t difficult to ensure at this small scale, as long as someone heard the caller whistle through the line — the pre-ringer signal that a call was coming in. Likewise, cybersecurity in its earliest years relied almost exclusively on firewalls to filter out “untrusted” Internet traffic. Safeguarding a single desktop computer connected by phone lines to a contained World Wide Web was fairly simple. As happened in the telephone industry, however, the cyber scale is quickly expanding – and so are the challenges. According to the book “Seeing What’s Next,” by Clayton M. Christensen, telephones first appealed to businesses, which saw value in enabling workers to communicate more efficiently among themselves and with other offices. The trend soon spread to Cybersecurity Insights & Perspectives Invincea's Anup Ghosh on using machine learning to improve cybersecurity detection capabilities Cybersecurity Insights & Perspectives Veracode's Chris Wysopal talks about the impact of '90s hacker think tank Content from Sponsors DHS' Vincent Sritapan on federal IT modernization September 20, 2016 Leveraging Your Workforce in the New Communications Era September 28, 2016 Privileged User & Insider Threat Federal 2016 Ponemon Survey Findings October 05, 2016 VIEW ALL TV/RADIO EVENTS
  • 3. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 3 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem households, and by 1900, the number of phone users reached 1 million. By 1904, more than 6,000 telephone companies independently provided phone service, which, by most accounts, fell far short of the “five nines.” “Coordination was difficult, network monitoring was next to impossible, operators experienced diseconomies of scale, and service quality suffered,” Christensen writes. Sound quality also suffered, shared “party lines” often forced people to wait to make calls, and long distance calling was extremely difficult, complicated and expensive. And yet — the industry reached “five nines” availability. How? Consolidation is one answer: As Christensen's book details, the Bell Telephone Co. bought its competitors, forming a virtual monopoly throughout the U.S. One positive result was standardization, which enabled the utility to invest heavily in research and development. It also led to new technologies for use across its ever-expanding service area: private phone lines, direct dialing as opposed to placing calls via operators, long-distance calling and 99.999 percent reliability. As a result, the telephone has become an essential item for all, even given for free to low-income residents under a federal program. The telephone’s success happened, in part, because innovators moved beyond a piecemeal approach to design on a grand scale, engineering improvements across the entire network. At the same time, they figured out how to give people what they want: around-the-clock reliability, with the phone company — not the customer — held responsible when things go wrong; ease of use – making a call today, even long distance, today is a simple, intuitive task , requiring no special training; and quality experiences, without the frustrations of dropped calls or distorted sound. What can we in cybersecurity learn from this success story? In many ways, our profession seems still in the early, “piecemeal” phase, with many focusing on protecting their own organizations’ data and that of their customers, or on developing apps to secure a single device or network. But as the telephone’s history indicates, success may come only when October 05, 2016 What Hackers Reveal About IT Vulnerabilities VIEW ALL
  • 4. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 4 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem -In this Story- Government IT News, Innovation, Tech, Cybersecurity, Commentary, Guest Columns Stay alert to all the latest government IT news. SIGN UP TODAY we “think big,” enlarging our scale, moving beyond the local (company-focused or product-focused) to the global (industry- or even Internet-focused). To get there, we might collaborate with one another for a common good — such as data protection — and innovate strategies and solutions to thwart intrusions systemwide. And, like the phone industry, we ought to always keep the customer front and center in whatever we design, aiming for easy-to-use cybersecurity with nearly perfect reliability. It’s one thing to manage cybersecurity on a single cell phone, tablet or laptop. It’s more difficult when you’re protecting all the devices in a single business. And it’s exponentially more challenging to design security for systems used by millions and billions of users. The Internet of Things, with connected devices perhaps numbering in the trillions someday — potentially serving as hackable portals to our networks and data, could explode the cyber scale almost beyond comprehension. Do we wait until that happens to finally figure out how to keep data safe? For truly effective cybersecurity design, scale is becoming a critical factor. Ironically, as the telephone’s narrative shows, large-scale solutions can be not only the most difficult to devise, but, once achieved, the most effective. Now, as never before, we in the profession need to ask: How do we solve for the really big problems? JR Reagan is the global chief information security officer of Deloitte. He also serves as professional faculty at Johns Hopkins, Cornell and Columbia universities. Follow him @IdeaXplorer. Read more from JR Reagan.
  • 5. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 5 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem -Explore Stories in Tech- NEWS > TECH JOIN THE CONVERSATION So, you've assumed compromise. Now what? NSA: no zero days were used in any high profile breaches over last 24 months Election systems safe from cyberattacks, experts believe
  • 6. 9/16/16, 1:10 PMThe 99.999 percent cybersecurity problem Page 6 of 6http://fedscoop.com/the-99-999-percent-cybersecurity-problem 3 Comments FedScoop SherryJones! Share⤤ Sort by Best Join the discussion… • Reply • Merovech • 8 months ago If one out of 100,000 security attacks succeeds, then we have 99.999% success. However, we still fail because they have complete success. 1 △ ▽ • Reply • rbag • 8 months ago We already tried big scale. We gave Microsoft nearly total control of internet devices. And that was the beginning of our cybersecurity problems. The phone company achieved reliability by squashing diversity. That's great when you have a specific need to meet and your problem is device failure. That is exactly the opposite of what's needed. When you've got a general purpose tool and your enemy is bad actors, diversity is what you need. 1 △ ▽ • Reply • Jeff N • 8 months ago The phone system, while reliable, was far from secure. Line tapping for unauthorized devices was simple, and in band signalling and switching relied on security via obscurity. Once the signal tones leaked out came the rise of the famous blue and red boxes. Long distance calls were horribly expensive with ridiculous time of day rates. Service in smaller markets could easily result in an "all circuits busy" message. In the late 1960s businesses in New York City were taking out full page newspaper ads demanding better phone service. In 1974 Bell suffered a major fire at the NYC 2ND Avenue switching center that severed major lines and knocked out phone service to lower Manhattan for weeks. They had no disaster plan to cover situations like this. △ ▽ Subscribe✉ Add Disqus to your site Add Disqus Addd Privacy% Recommend♥ Share › Share › Share › ABOUT / CONTACT LEADERSHIP TEAM EDITORIAL TEAM CONTRIBUTE CAREERS # $ % & ' + ) BACK TO TOPCOPYRIGHT 2008-2016 FEDSCOOP. ALL RIGHTS RESERVED. ∠