Americas

Asia

Oceania

Tyler Farrar
Contributor

Cybersecurity should return to reality and ditch the hype

Opinion
14 Aug 20246 mins
CSO and CISOIT LeadershipSecurity Practices

The conversation around cybersecurity is abuzz with product pitches and promises of technological cure-alls, according to Exabeam CISO Tyler Farrar, who argues professionals need to reclaim the discussion.

Overlay, dashboard or trader with stress, headache or burnout from trading data, bad investment or stocks. Anxiety, debt or frustrated man with digital ui or ux on financial loss on screen at night
Credit: Yuri A/Shutterstock

As a chief information security officer (CISO), I’ve witnessed firsthand the transformation of cybersecurity from a niche IT function to a boardroom priority. Yet, despite its rise in prominence, this field is flooded with voices that often lack the depth and precision essential for true cybersecurity practice.

At its core, cybersecurity is about safeguarding information systems from unauthorized intrusions and attacks. However, the term has been diluted by an influx of content that, while related to security, strays from the critical tasks that effectively mitigate risks and bolster system integrity.

For instance, many online articles start on legitimate cybersecurity topics but quickly pivot to promoting specific vendor tools as the ultimate solution, transforming valuable discussions into thinly veiled sales pitches.

This shift from educational content to marketing blurs the line between genuine security insights and commercial interests, leading organizations to invest in solutions that may not address their unique challenges.

Additionally, buzzword-driven content has become rampant, where terms like “zero-trust architecture” or “blockchain for security” are frequently mentioned in passing without delving into the practicalities and limitations of these technologies.

Superficial discussion obscures cybersecurity’s complexity

Such superficial discussions obscure the complex reality of cybersecurity, suggesting that sophisticated threats can be countered with simplistic, off-the-shelf fixes. The repercussions of this trend are substantial. As the line between genuine cybersecurity measures and peripheral tech discussions blurs, organizations and individuals are misled, channeling investments into solutions and practices with minimal security returns.

A notable incident in early 2023 involving a US pharmacy network that affected 5.8 million patients serves as a stark illustration. In this breach, cyber criminals accessed a vast array of personal data including names, addresses, social security numbers, and medical information.

This event underscores the pitfalls of inadequate security measures and the vulnerability of organizations that handle highly sensitive health-related data. The proliferation of “miracle” technologies and methods, which promise all-encompassing protection with minimal effort, suggest that challenges can be outsourced or resolved with simple fixes, detracting from foundational cybersecurity practices — elements that form the cornerstone of effective defense.

Technological advances aren’t a cure-all

Despite these challenges, there remains a strategic role for advanced technologies in our cybersecurity toolkit. While the primary argument emphasizes the primacy of human insight and fundamental security routines, there is a pivotal, albeit limited, role for cutting-edge technologies that support continuous monitoring, threat detection, investigation, and response.

When carefully selected and integrated with the expertise of seasoned cybersecurity professionals, these technologies can significantly enhance our ability to identify and counteract threats more efficiently. Their inclusion is not a cure-all but rather a complementary layer that boosts the effectiveness of traditional security measures, ensuring that our defenses remain dynamic and resilient against the evolving threats we face.

What is real cybersecurity work?

To truly address these issues, we must first recognize the critical distinction between genuine cybersecurity work and the broader tech-centric content that often overshadows it. Real cybersecurity practice is anchored in a relentless pursuit to understand and mitigate the ever-evolving threats to our systems.

It is a discipline that demands deep, continuously updated knowledge of systems, networks, and human behavior, alongside a steadfast commitment to the principles of confidentiality, integrity, and availability. True cybersecurity practitioners are those who engage in the laborious tasks of vulnerability assessment, threat modeling, incident response, and the continuous enhancement of security postures, often without the allure of viral recognition or simplistic solutions.

In contrast, there are other valuable roles within the cybersecurity industry, such as those in sales and marketing, which focus on promoting and selling security solutions. While these roles are crucial for advancing the adoption of security technologies and meeting market needs, they do not involve the same hands-on, technical rigor.

It is important to distinguish between these functions to ensure that we recognize and value the expertise and meticulous work that true cybersecurity demands. By doing so, we can better appreciate each role’s different contributions to the overall goal of securing our systems.

True cybersecurity is not a commodity

It is our duty as custodians of cybersecurity to redefine this field in a way that prioritizes these fundamental activities. We must cultivate a community that values depth over breadth, recognizing the hard-earned insights of true practitioners over the superficial allure of tech influencers. This calls for a shift in focus, from consuming content that merely speculates on potential threats to engaging with material that provides actionable, effective strategies for strengthening our defenses.

 Simultaneously, organizations must adopt a more discerning approach to cybersecurity investment, recognizing that true security is not a commodity that can be purchased off the shelf. Leaders should prioritize allocating resources toward building robust internal capabilities, including skilled security teams, comprehensive security policies, and the implementation of continuous monitoring and improvement practices. By doing so, they not only enhance their security posture but also contribute to elevating the cybersecurity profession.

 Our task is clear and challenging: to reclaim cybersecurity from the clutches of superficiality and re-anchor it in the rigorous, methodical pursuit of defense. True practitioners need to stay focused on core practices such as vulnerability assessment, threat modeling, and incident response, avoiding distractions from buzzwords and superficial trends. They must challenge vendor claims, insisting on rigorous testing and proof of effectiveness before integrating new solutions.

Question the status quo

Additionally, it is crucial to question the status quo in all areas, from industry standards to popular cybersecurity conferences, which can often resemble a circus of sales and marketing rather than providing practical, actionable insights.

Practitioners should also strive to connect more closely with each other through platforms that offer collaboration and transparency, fostering a community dedicated to continuous improvement and shared knowledge. By promoting a culture of critical thinking and continuous learning, practitioners can cut through the noise, uphold the integrity of their work, and drive the industry toward meaningful, effective cybersecurity practices.

As we advance, let us be guided by a renewed commitment to the principles of cybersecurity, dedicating ourselves to the hard, essential work that keeps our systems safe. Only then can we hope to build a cyber-secure future that is resilient in the face of the evolving threats that characterize our age.

Tyler Farrar
Contributor

Tyler Farrar is the Chief Information Security Officer (CISO) at Nextracker, CEO and Co-Founder of Stacking Bytes LLC, and an advisor on go-to-market strategies for cybersecurity companies. As a CISO, he focuses on enabling businesses to securely make money, grow, and build resilience. Tyler has led security programs at Exabeam and Maxar Technologies, driving security operations, infrastructure governance, and US Government program protection. A former Naval Officer, he managed cyber operations for a multimillion-dollar Department of Defense program. Tyler holds an MBA from the University of Maryland, a Bachelor of Science in Aerospace Engineering from the US Naval Academy, and the Certified Information Systems Security Professional (CISSP) certification.

More from this author