How to Eliminate Cybersecurity Clutter

Chief information security officers are fatigued. They have to eliminate clutter to find time to get on top of the more determined adversaries.

sixthings
Earlier this year, defense contractor Raytheon spun out the cybersecurity services it had been supplying via Raytheon Cyber Products into a new business entity called Forcepoint. Forcepoint is also composed of security software vendor Websense and next-generation firewall vendor Stonesoft, both of which Raytheon acquired in the past year or so. See Also: Cyber Threats to Watch This Year Forcepoint isn’t your typical security start-up. It already has 20,000 customers and ranges from businesses with 50 to 200,000 employees. Based in Austin, Texas, the company has about 2,200 employees in 44 offices worldwide. At the helm is CEO John McCormack, who was previously a senior executive at Websense, Symantec and Cisco.
John McCormack, Forcepoint CEO
John McCormack, Forcepoint CEO
McCormack sat down with us at ThirdCertainty as he takes command of the freshly minted entity. The text has been edited for clarity and length. ThirdCertainty: What is Forcepoint all about? McCormack: We want to be the company that helps organizations move to the age of cloud computing in a safe and secure way. And we want to help in reducing what I call "point product fatigue." We’ve created a lot of point solutions for many of the cyber challenges that organizations face. And as I look in the eyes of many chief information security officers, I see real fatigue in their eyes. They’re still struggling to manage the environment they have today. Yet they need to get on top of these more determined adversaries. 3C: How is Forcepoint seeking to address that? McCormack: Our viewpoint is that, as we work to reduce that point-product fatigue, you build an open architectural approach. You build it on cloud computing concepts and capabilities that reduce their administrative burden, that reduce that operational footprint. We have to make a meaningful difference so that we can work on more important topics of hardcore security analytics and analysis of the inevitable breaches that happen to most organizations. 3C: Where does an organization begin addressing a worsening cloud-centric environment? McCormack: Have a healthy risk assessment and threat assessment done, and do best practices regularly. The other thing I would recommend is absolutely working on your weakest link. For all the technology and capabilities around cybersecurity, humans have been, and continue to be, the weakest link in the security chain. They get fooled. They aid and abet, and they make mistakes because of a lack of security awareness. 3C: Many times employees are just hustling to be more productive, not necessarily being careless. McCormack: Absolutely right. Most accidents happen because you’ve got users who are trying to do a great job, quite frankly, and are just trying to be productive. But we also know firsthand that adversaries will recruit people to put into your organization who will work to compromise your organization. You have to be able to identify those insiders. And you’ve got to be able to identify the intent. If it’s an accident, that’s one route to take. But if it involved malicious intent, that’s a different route that you might want to take. 3C: So a new mindset, really, is needed in this environment. McCormack: Yeah, you’ve got to bring your users into the fold. Cybersecurity is a highly technical field. You’ve got to make it reasonable to understand. Here at Forcepoint, we run a program called "Catch Of The Day." Anything suspect, whether it’s physical security or cybersecurity, can be reported and immediately responded to by our teams with both feedback and education about what they found and what they saw. Then we celebrate every quarter. Some of the best catches have kept us from being compromised.

Byron Acohido

Profile picture for user byronacohido

Byron Acohido

Byron Acohido is a business journalist who has been writing about cybersecurity and privacy since 2004, and currently blogs at LastWatchdog.com.

MORE FROM THIS AUTHOR

Read More