OpenText’s Paul Reid on Preventing Next Generation Cyberthreats

eWEEK.com
30 May 202409:26

Summary

TLDRIn this RSA conference interview, Paul Reed from OpenText discusses the evolution of cybersecurity threats, particularly next-generation threats targeting cloud adoption and supply chains. He emphasizes the importance of understanding information management for effective data protection and introduces OpenText's new product, SideDNA, which offers a holistic approach to cyber resilience by identifying and prioritizing threats within a company's entire digital ecosystem, including supply chains.

Takeaways

  • 💡 OpenText is a $6 billion annual revenue company with a strong background in information security management, which gives them a unique perspective in data protection.
  • 🔒 They emphasize the importance of understanding what data you have, where it's stored, and its importance, as you can't protect what you don't know you have.
  • 🛡️ OpenText's advantage is combining information management with cybersecurity products to provide better data protection and cyber resilience.
  • 🌐 The company discusses 'Next Generation threats' which include attacks on cloud services, supply chains, and federated identities, as these are becoming more targeted by threat actors.
  • 🕵️‍♂️ Threat actors are conducting more reconnaissance and open-source intelligence gathering to understand their targets better before launching attacks.
  • 🔑 Centralized federated identity systems, while easier to manage, are seen as single points of access by threat actors, increasing the risk of a breach.
  • 👀 OpenText advises companies to look beyond their borders and understand the global adversary signals to gain visibility into current threats.
  • 📊 Adversary signal threat intelligence is highlighted as a way to provide specific, actionable insights into the threats targeting a company, rather than general information.
  • 🛑 The script mentions the importance of endpoint protection, patching, and prioritizing security measures based on the specific threats identified.
  • 🌟 OpenText's product offerings cater to businesses of all sizes, from small to large enterprises, with a range of products for endpoint protection, web gateways, and advanced threat intelligence.
  • 🔮 Looking to the future, OpenText predicts that generative AI will play a significant role in enhancing the effectiveness of phishing and spear-phishing attacks, increasing the volume of threats.
  • 🔄 The focus on supply chains as a new frontier for cyber threats is highlighted, with the potential for adversaries to target smaller businesses within a larger company's supply chain.

Q & A

  • What is OpenText's core business and how does it serve its clients?

    -OpenText is a $6 billion a year revenue company with a historical background in information security management. It serves its clients by leveraging its unique perspective in information management to understand where data is kept, how it is accessed, and its importance, which is crucial for effective data protection.

  • How does OpenText's background in information management give it an advantage in cybersecurity?

    -OpenText's background in information management allows it to understand the data landscape of its clients, including where data is stored and its importance. This understanding is critical for protecting data effectively, as knowing what you have is the first step in being able to protect it.

  • What are Next Generation threats in the context of cybersecurity?

    -Next Generation threats refer to the evolving strategies and tactics used by threat actors as companies move to the cloud, leverage supply chains, and adopt federated identity. These threats are more coordinated, involve more reconnaissance, and target new areas such as supply chains and centralized identity systems.

  • How do threat actors compromise a company's supply chain to influence business operations?

    -Threat actors can compromise a company's supply chain by indirectly influencing its ability to do business or conduct operations. If they can compromise a supplier, they can potentially disrupt the supply chain and affect the company's operations.

  • What is the significance of centralized Federated Identity in the context of Next Generation threats?

    -Centralized Federated Identity, while easier to manage, presents a single point of access for threat actors. Compromising this identity can give attackers access to all systems and data that rely on it, making it a prime target for Next Generation threats.

  • What advice does Paul Reed give to companies to protect themselves against cyber attacks?

    -Paul Reed suggests that companies should focus on understanding global adversary signals, which involves knowing what adversaries are doing and how they are attacking. He also emphasizes the importance of looking beyond traditional borders and working with companies like OpenText to define a 'covered space' that includes all aspects of a company's digital presence.

  • What is the concept of 'adversary signal threat intelligence' and how does it differ from traditional threat intelligence?

    -Adversary signal threat intelligence is a more specific form of threat intelligence that tells organizations what is happening to them in real-time, rather than just providing general information about what adversaries are doing. It focuses on the attacks targeting the organization specifically, rather than a broader overview.

  • How can companies prioritize their patching efforts in the face of numerous threats?

    -With the help of tools like OpenText's SID, companies can identify which adversaries are targeting them and the tools and techniques they are using. This information allows companies to prioritize their patching efforts to address the most immediate threats first.

  • What is the role of OpenText's product, SID, in helping companies understand and manage their cyber threats?

    -SID (Security Intelligence and Detection) helps companies by providing visibility into the incoming and outgoing adversary signals across their entire digital presence, including cloud and supply chain. This visibility allows companies to understand what threats are taking place and to better manage their own security.

  • What are some of the key features of OpenText's product offerings for clients?

    -OpenText offers a range of products that cater to businesses of all sizes, from small and medium businesses to large enterprises. These products include endpoint protection, web and email security, web gateways and firewalls, and advanced threat intelligence and detection capabilities.

  • What does Paul Reed predict for the future of cybersecurity in the next 2 to 4 years?

    -Paul Reed foresees an increase in coordination among threat actors, more sophisticated attacks, and a focus on softer targets like supply chains. He also highlights the importance of fundamental cybersecurity practices such as patching, credential management, and encryption, as well as the growing impact of generative AI on cyber threats.

Outlines

00:00

🛡️ Cybersecurity Threats and OpenText's Solutions

James Maguire interviews Paul Reed, the Global Head of Threat Intelligence at OpenText, at the RSA conference. Paul explains that OpenText, a $6 billion annual revenue company, has a unique background in information security management, which helps in understanding the importance of data management and protection. OpenText's advantage lies in combining information management with cybersecurity products to offer clients better cyber resilience. The discussion highlights next-generation threats, which are more coordinated and focused on holistic business operations, including supply chain compromises and federated identity vulnerabilities. Paul emphasizes the importance of understanding and protecting against these evolving threats by leveraging OpenText's cybersecurity solutions.

05:02

🔍 Adversary Signal Threat Intelligence and OpenText's Product Offerings

The conversation delves into how companies can protect themselves against cyber attacks, focusing on the importance of endpoint protection, global adversary signals, and threat intelligence. Paul Reed discusses OpenText's approach to providing specific threat intelligence tailored to a company's needs, rather than general information. He introduces the concept of 'adversary signal threat intelligence' which offers visibility into current attacks against a company. OpenText's product offerings are explored, ranging from endpoint protection to advanced threat detection with products like Bright Cloud, Net IQ, Fortify on Demand, and the newly announced Side DNA. The future of cybersecurity is also discussed, with a focus on the increasing role of generative AI in attacks, the importance of patching, credential management, and the potential vulnerabilities within supply chains. Paul suggests that while perfect cybersecurity may never be achieved, fundamental practices can significantly increase an organization's resilience against threats.

Mindmap

Keywords

💡Cybersecurity Threats

Cybersecurity threats refer to any type of malicious activity that aims to disrupt, damage, or gain unauthorized access to a digital system. In the video, Paul Reed discusses how companies are facing new and evolving threats, particularly as they move to the cloud and leverage supply chains. The script mentions 'Next Generation threats' which are more coordinated and sophisticated, requiring a holistic approach to cybersecurity.

💡Information Management

Information management is the process of organizing and controlling an organization's information resources to support its business processes. In the context of the video, OpenText's background in information management is highlighted as a unique advantage in understanding where data is stored, how it's accessed, and its importance, which is crucial for effective cybersecurity measures.

💡Cloud

The cloud refers to the delivery of computing services over the internet. In the script, the move of companies to the cloud is mentioned as a factor that has changed the landscape of cybersecurity threats, as it introduces new vulnerabilities and requires a reevaluation of data protection strategies.

💡Supply Chain

A supply chain is the network of organizations, people, activities, information, and resources involved in producing and delivering a product or service. The video script discusses how threat actors are focusing on compromising supply chains to indirectly influence a company's ability to conduct business, emphasizing the importance of securing not just the company's own systems but also those of its partners and suppliers.

💡Federated Identity

Federated identity is a system of identity management where a user can use one set of login credentials across multiple independent websites. In the video, it is mentioned that threat actors are targeting federated identity systems as a single point of access, which, if compromised, can grant them access to a wide range of systems and data.

💡Threat Intelligence

Threat intelligence is the process of gathering, analyzing, and disseminating information about potential threats to an organization's information assets. The video distinguishes between traditional threat intelligence and 'adversary signal threat intelligence,' which provides specific insights into current attacks against an organization, helping to prioritize defenses.

💡Endpoint

An endpoint refers to a remote location or device that communicates back to a central system or server. In the script, the importance of endpoint security is emphasized, with products like EDR and web gateways mentioned as tools to protect endpoints such as laptops, desktops, and servers from attacks.

💡Patch Management

Patch management is the process of applying software updates and patches to systems to fix newly discovered security vulnerabilities. The video script discusses the challenges of managing patching in large enterprises and how understanding the specific threats and vulnerabilities targeted by adversaries can help prioritize and streamline this process.

💡Cyber Resilience

Cyber resilience is the ability of a system or organization to resist, recover, and adapt to cyber attacks. The video script mentions increasing cyber resilience as a goal, achieved by combining information management with cybersecurity products and understanding the broader context of threats to an organization.

💡Generative AI

Generative AI refers to artificial intelligence systems that can generate new content, such as text, images, or videos. In the video, Paul Reed talks about how generative AI is being used to make phishing and spear-phishing attacks more effective by increasing the volume and sophistication of the content generated to deceive users.

💡Covered Space

In the context of the video, a covered space refers to the entire area of an organization's digital presence that needs to be protected, including not just the main corporate systems but also content in cloud services and other external locations. The script discusses how OpenText's product, Side DNA, helps define and monitor this covered space to detect incoming and outgoing adversary signals.

Highlights

Openex is a $6 billion revenue company with a background in information security management, providing a unique perspective on data protection.

Combining information management with cybersecurity products gives Openex an advantage in offering better cyber resilience.

Next Generation threats involve more coordinated attacks, focusing on supply chains and leveraging Federated identity as a single point of access.

Threat actors are conducting extensive reconnaissance and open source intelligence to understand their targets better.

Adversary signal threat intelligence provides real-time information on specific adversaries attacking a company, enhancing visibility and response.

Companies need to extend their cybersecurity beyond corporate borders, encompassing all their presences, including content delivery networks and hyperscalers.

Side DNA helps define a covered space to monitor incoming and outgoing adversary signals, offering a comprehensive view of the threat landscape.

Distributed architecture, like the cloud and home-based systems, creates more attack points for adversaries.

With Side DNA, companies can prioritize patching based on specific adversary tools and techniques targeting them.

Openex offers products for small to large enterprises, including endpoint protection, web gateways, firewalls, and threat intelligence solutions.

Generative AI is making phishing and spear-phishing attacks more effective and increasing the volume of such attacks.

Coordination between threat actors is increasing, and they share a lot of information to enhance their attacks.

Supply chains are becoming a significant target for adversaries, as smaller suppliers often lack robust cybersecurity resources.

Side DNA extends cyber protection to an enterprise's supply chain, improving overall cybersecurity posture.

Visibility into threats and using advanced threat intelligence is vital for enhancing cybersecurity.

Fundamental practices like patching, credential management, and encryption are essential for robust cybersecurity.

Transcripts

play00:01

[Music]

play00:04

hi I'm James Maguire here at the RSA

play00:06

conference with Paul Reed Global head of

play00:09

threat intelligence at open text Paul

play00:11

thanks for talking with us today thanks

play00:12

for having with us today all right so I

play00:14

want to talk about some of the key Cy

play00:16

security threats the companies are

play00:17

facing but first please tell us what

play00:19

openex does and how does openex to serve

play00:22

its clients so openex is a $6 billion a

play00:25

year Revenue company we have a

play00:27

historical background in information

play00:29

security management and that really

play00:31

makes us a unique company that

play00:33

perspective understanding Information

play00:34

Management on where you keep your data

play00:36

how you access your data store your data

play00:38

the importance of the data if you don't

play00:40

know what you have you can't protect it

play00:42

so I think for us the advantage we have

play00:44

over other companies is that information

play00:45

management background you put on top of

play00:47

that our cyber security products now we

play00:50

know where your data is the importance

play00:51

of it we can help you protect it better

play00:52

we're going to give you better cyber

play00:54

resilience by combining those two

play00:56

together into a single offering to you

play00:58

and as a company we can give better

play01:00

coverage than you get everywhere else so

play01:02

you talk about something called Next

play01:04

Generation threats what do you refer to

play01:06

when you when you refer to Next

play01:08

Generation threats so as we've seen

play01:10

companies move to the cloud uh leverage

play01:13

Supply chains more look at Federated

play01:16

identity the threat actors have paid

play01:18

attention to that so they're really

play01:20

thinking about it more holistically on

play01:23

how can we focus on you and the type of

play01:25

business you do the type of things you

play01:27

use in your business against you so for

play01:30

example if I can compromise your supply

play01:32

chain then I can in indirectly influence

play01:35

your ability to do business or conduct

play01:37

operations or whatever it is right and

play01:40

the type of threats they're using are

play01:41

very different than what we saw before

play01:42

they're a lot more coordinated they're

play01:44

spending more time doing reconnaissance

play01:45

they're spending more time doing open

play01:47

source Intelligence on you to understand

play01:49

again who you're using so for example a

play01:52

lot of companies have done a really good

play01:53

job managing their identities right we

play01:55

had identity sprawl for a long time but

play01:57

now we've got centralized Federated

play01:59

identity that's been really great right

play02:01

easier to manage all those good type of

play02:03

things but at the same time for threat

play02:05

actors they look at that as a single

play02:06

point of access now right so now if I

play02:08

want access to your information in a CRM

play02:11

or in some other system I don't have to

play02:13

go compromise three or four different

play02:15

locations if I can compromise your

play02:17

Federated ID then I have access to

play02:19

everything so we're really seeing the

play02:21

threat actors focusing on that focusing

play02:23

their attacks on that and it's a really

play02:25

different way of thinking about cyber

play02:26

security I think the question that

play02:28

companies are really struggling with is

play02:30

how do we protect ourselves against the

play02:32

cyber attacks what advice would you give

play02:34

to companies so I think one of the

play02:36

things we've done a great job on

play02:37

especially most recently is we always

play02:40

recognize the importance of the endpoint

play02:42

right the the laptops the desktops the

play02:44

servers because that's where the

play02:45

attackers want to get to we've done a

play02:46

wonderful job with EDR and other

play02:49

products like our webw products zix um

play02:52

and be able to protect that what we're

play02:54

seeing now with these next generational

play02:55

threats is we need to sort of looking at

play02:57

Global adversary signals we need to

play02:59

understand what our adversaries are

play03:00

doing in terms of attacks against you so

play03:03

we're looking at the concept of

play03:05

adversary signal threat intelligence a

play03:07

little bit different than traditional

play03:07

threat intelligence where traditional

play03:09

threat intelligence says here what the

play03:11

adversaries are doing here's the type of

play03:12

ttps they're using here's where they're

play03:14

operating those here the verticals are

play03:16

focusing on so as an organization it's

play03:18

really good general information for me

play03:20

to know but it's not specific to me with

play03:22

our adversary signal threat intelligence

play03:24

we tell you this is what's happening to

play03:26

you now so you don't have to guess am I

play03:29

being packed by this adversary or

play03:31

different one we're saying this is the

play03:32

adversary that is attacking you today so

play03:35

when we do that we give you additional

play03:36

visibility so the big thing is we want

play03:38

to look beyond our borders right so

play03:40

again we great job EDR looking inside

play03:43

now we got to look out and so what we're

play03:44

asking companies to do is work with us

play03:46

to Def find what we call a covered space

play03:47

a protected area of their company that

play03:50

encompasses just not their main

play03:51

corporate but also things like do we

play03:54

have content in a Content delivery

play03:55

Network do we have content in a

play03:57

hyperscaler that's where the attackers

play03:59

are looking to attack you now they're

play04:01

going after all your presences just not

play04:03

your corporate presences so with our new

play04:05

product side DNA we Define a covered

play04:07

space that encompasses all that so we

play04:09

can see the incoming and outgoing

play04:11

adversary signals so you have a good

play04:12

idea what's taking place so if I'm

play04:14

hearing you correctly the fact that

play04:15

companies have a more of a distributed

play04:17

architecture like the cloud like the

play04:18

home base that creates more attack

play04:20

points it certainly does right um

play04:23

business has to continue right we really

play04:25

don't to some extent have control over

play04:27

our attack surface right we have to

play04:28

conduct business but it's incumbent upon

play04:30

us to understand what that looks like so

play04:32

with side DNA we're looking at those

play04:34

global adversary signals we there's

play04:35

other companies that do a tax service

play04:37

management they do a great job of that

play04:38

that's not what we do we're actually

play04:40

looking at the signals that are coming

play04:41

into and out of your coverage space to

play04:43

let you know what's happening one of the

play04:45

things we're hearing from companies one

play04:46

of the side benefits of that besides

play04:48

just simply knowing your adversaries

play04:49

what type of attacks are taking place if

play04:51

we think about the level of patching a

play04:53

large Enterprise needs to do every day

play04:55

every week every month right there's

play04:57

only so much time money energy and

play04:59

effort they can put into it with Sid we

play05:01

can tell you this is the adversary who's

play05:03

targeting you with these tools and

play05:05

techniques leveraging these CBS and

play05:07

exploits so now as a company I can take

play05:09

and prioritize that patching over maybe

play05:12

something else more specific that's

play05:14

right we're going to help increase your

play05:15

cyber resiliency all right let's drill

play05:17

down into the openex product offering

play05:19

what what are the key features of what

play05:21

Opex does for clients so we have

play05:23

products that span all the way from

play05:25

small medium business Enterprise all the

play05:27

way up to large Enterprises we have

play05:29

products that help protect you on your

play05:31

endpoint with things like web and email

play05:33

Z we have our bright Cloud product which

play05:35

is used by a number of OEM vendors for

play05:38

web gateways and firewalls and then as

play05:40

we move up the stock we have things like

play05:42

net IQ we have fortify on demand and

play05:44

then of course the products I'm more

play05:45

actively involved with our arite

play05:46

intelligence and of course what we're

play05:48

announcing this week side DNA all right

play05:50

let's look to the future of cyber

play05:51

security I mean when you look in your

play05:52

crystal ball what what do you see

play05:54

evolving in the next oh two to four

play05:56

years and and most importantly how can

play05:58

companies get ready for that now it goes

play06:01

back to a lot of fundamental things

play06:02

we've talked about right patching it's

play06:04

taking care of your credentials it's

play06:05

really the DNA of our company being an

play06:08

information management company know your

play06:10

data know where your data is know the

play06:12

value of your data where it's stored

play06:13

what's inside of it and then choose the

play06:16

right things to protect it with right

play06:17

you'd like to have a holistic approach

play06:19

to your cyber security but you got to

play06:21

know yourself first when we look at

play06:23

where cyber threats are going obviously

play06:25

generative AI it's having a big impact

play06:27

on that and actually in our recent

play06:29

threat report let just come out we talk

play06:31

about how generative AI is being used to

play06:33

make fishing and spear fishing much more

play06:35

effective right the volume that they can

play06:37

generate on that is significantly higher

play06:39

we saw that this year we saw volumes go

play06:41

up you know uh we we quarantined 7.7

play06:44

billion emails last year we see 700,000

play06:47

unknown files a day we're going to see

play06:50

more and more attacks I think what we're

play06:51

going to see is more coordination

play06:52

between thread actors they work really

play06:55

well together they share a lot of

play06:56

information together and it's only going

play06:57

to increase right as we move to the

play07:00

cloud and we see that we get better at

play07:02

protecting ourselves there the threat

play07:04

actors are really going to look for a

play07:05

softer side and today that's our supply

play07:07

chains so they're really going after

play07:09

them we've done a number of what we call

play07:11

situational reports with our sidna

play07:13

product for customers where we showed

play07:15

them that they've done a really good job

play07:17

protecting themselves the adversaries

play07:18

are not able to Target them effectively

play07:21

but yet when we expand to their supply

play07:22

chain and we look at their suppliers we

play07:25

see that that's where the adversaries

play07:26

are focusing right I may be a billion

play07:28

dollar company but I may depend upon a

play07:31

supply chain of small medium businesses

play07:33

of 50 less people they're not have the

play07:34

same cyber resources as I do right but

play07:37

the sidea product actually allows that

play07:38

Enterprise to extend that cyber

play07:40

protection to their to their supply

play07:43

chain and help them understand the

play07:44

threats they're seeing and then in turn

play07:45

better manage their own threats that are

play07:48

coming into their organization and be

play07:50

able to protect themselves right if I

play07:52

can compromise one of your suppliers I

play07:54

you may have a trust relationship with

play07:56

them already you may just naturally

play07:57

accept their traffic through emails sure

play07:59

and I may never know as the sewer of

play08:01

that that you've been compromised when

play08:03

we put the side DNA covered space over

play08:05

that I then get visibility that you know

play08:07

what maybe there was an attack by a

play08:09

threat actor who's going to leverage an

play08:11

email exploit against me so visibility

play08:14

is going to be key and abis threat

play08:15

intelligence is going to be absolutely

play08:17

vital for that I wonder if we ever get

play08:19

to a point in the future say five years

play08:20

from now wherever where you know it's

play08:22

really we are quote unquote done with

play08:24

cyber security it's really solved the

play08:27

Ford is in place we don't need to wor

play08:29

about it so much will that day ever

play08:31

arrive is that you're optimistic so I

play08:33

think that as long as we have

play08:35

adversaries and the adversaries want to

play08:37

harm us we're never going to get to that

play08:39

perfect point I think we can make it a

play08:41

lot harder for our adversaries by doing

play08:43

some fundamental things right patch

play08:45

separation of Duty credential management

play08:47

all the fundamental things we've talked

play08:48

about encryption at rest encryption of

play08:50

em motion things like that but to get

play08:54

yourself the visibility you need to see

play08:56

those threats coming use things like AV

play08:58

AER signal or

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityThreat IntelligenceOpen TextJames MaguirePaul ReedCloud SecuritySupply ChainFederated IdentityEndpoint ProtectionAdversary SignalsCyber Resilience
Besoin d'un résumé en anglais ?