Takeaways From The Former CISO of the CIA, Robert Bigman

Yesterday, I had the privilege of attending Deltek’s Federal Executive Breakfast where Robert Bigman, the CIA’s former Chief Information Security Officer gave a presentation on cybersecurity and his time with the agency. My five key takeaways are:

  1. Data v. Systems – Mr. Bigman illustrated this point by quoting a Russian hacker who told him the US is great at securing its systems and computers, but terrible at securing its data. Take the time to protect your data and don’t think hiding it behind a firewall is guarding it; Russian hackers actually look for firewalls because they can bypass them easier.
  2. Leverage Technology You Already Have – Mr. Bigman said most computers come with prepackaged cybersecurity protection; you just need to know how to turn them on. For example, he named Oracle Advanced Security and Windows Server Security Compliance Manager as such prepackaged technologies. Also keep in mind that simply securing your web browser is another free way to help secure employees while they are on the internet.
  3. The Cloud is Not the Answer to Your Information Security Problems – Mr. Bigman said too many organizations think that by putting their data on the cloud, they are protecting it. While cloud services like Amazon Web Services are secure, you can’t fully outsource information security. Even if you are putting data on the cloud, you must set guidelines within your organization to protect it.
  4. Open Source Works – Mr. Bigman said that although it’s difficult for government agencies to get open source software approved, some of the best programs he’s seen for protecting data are pen source. He said that the open source community tends to have a better understanding of the hacking culture and protects their interests faster than big developers. But please keep in mind, to successfully use open source, you must determine who will manage it and set rules for governing it.
  5. Technology Enablers – Mr. Bigman offered these six technology enablers:
  • PKI Cert on Hardened Small Card
  • Application Layer Firewalls
  • Data Rights Management/Data Loss Prevention
  • Secure Browser
  • Security Event Log Analyzer
  • Total Application ControlBONUS: It’s The Russians (and Chinese) – When Mr. Bigman was asked if we should be worried about Iran or North Korean hackers, he said no. He said the most sophisticated hackers are Russian, then the Chinese. Russians tend to attack organizations by directly targeting firewalls, while the Chinese rely on phishing through e-mails. With the former in mind, have e-mail processes in place for employees. He also mentioned that if someone hacks into your bank account and only leaves you $0.29, it was the Russians.