Q: You have predicted there's going to be some kind of a major Internet shutdown this year as the result of a cyberattack. Why do you think that will happen? What has gotten us to this stage?
I believe a primary driver is the continued movement to, and reliance on, cloud service providers. If a major cloud service provider were to be targeted and successfully attacked, an outage could be significant. While this wouldn't be a wide scale Internet outage in the traditional sense, it would significantly disrupt Internet services and operations for large and small companies across the globe.
You can also look to the DDoS attacks of 2016 as a contributor. The attack against DynDNS, leveraging the Mirai botnet, could just be the tip of the iceberg. The explosion of IoT only compounds the possibility of even larger botnets that can be used to target critical internet services.
Finally, there's WannaCry and the impact it had on so many companies globally, some who even shut down their operations to attempt to minimize its impact and prevent its propagation. While WannaCry is easily thwarted by diligent patching of computer systems, that attack proved that the majority of companies across the globe are really bad at patching their systems or implementing mitigating controls for the things they can't patch, leaving them perpetually vulnerable. A ransomware attack that can spread as quickly as WannaCry did without bringing down the internet yet deliver an infection bad enough to trigger companies to shut down computer systems should certainly be seen as the equivalent of a major internet shutdown.
In the end, the explosive growth of internet-enabled/connected technology and services, combined with the fact that most don't go through rigorous security testing and the inability to keep those systems maintained, ensures that companies will remain in a constant vulnerable state for any type of attack, including those that could be used to shut down the internet.
Q: What is LogRhythm's Technology Alliance Partner program about? How will it benefit your customers?
LogRhythm's Technology Alliance Partner (TAP) Program is meant to facilitate interoperability with our platform and ensure a seamless experience for users while navigating the plethora of products that encompass a typical security stack.
Our [Number One] goal is to help companies around the globe rapidly detect and respond to threats. So minimizing the obstacles to neutralizing those threats is vital to our mission. Some of the obstacles we see include swivel chair analysis, data silos, alarm fatigue, or lack of automated response. Think of our TAP Program as a conduit to a broader alliance with market-leading vendors across various segments in the security space—whether that's around endpoint security, next-generation firewalls, vulnerability management, identity & access management or threat intelligence.
It's one thing to be able to collect logs or event data from various sources but it's a completely different game when that data is added to the overall environmental context and automated response actions occur with little to no analyst involvement. LogRhythm's TAP program is all about developing and refining bi-directional product integrations to foster closed loop security use cases. Once those are built, then the next critical piece is building awareness and driving widespread adoption.
Q: What are LogRhythm's plans at Black Hat USA 2017? What are you hoping attendees will learn about your company at the event?
We want to showcase ourselves as the heart and brain of the security operations center (SOC). You will see a ton of niche players at this event and at the end of the day, we don't believe that companies are optimized to detect and respond to any threats effectively—let alone advanced threats—by stacking a bunch of niche players together.
You need a solution that empowers your own data to work for you using built-in threat analytics and security orchestration and automation functionality to help you detect, respond to and neutralize events and incidents before they become breaches. I think Black Hat attendees will see that LogRhythm does much more than just help you see events and alert you to their existence. LogRhythm seriously empowers you to act on that information—automatically.
If you can't operationalize security effectively, you don't stand a chance.