Elisa Costante, Forescout | RSA 2019
Elisa Constante, OT Technology Innovation at Forescout talks with Jeff Frick at RSA 2019 from the Forescout booth in Moscone North in San Francisco, CA. #RSAC #Forescout #theCUBE https://siliconangle.com/2019/03/11/it-and-ot-plus-iot-equals-big-challenge-for-security-against-nimble-attackers-rsac-guestoftheweek/ IT and OT plus IoT equals big challenge for security against nimble attackers Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter. One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown great agility in fixing code bugs and responding to blocking attempts. At the RSA Conference in San Francisco this month, McAfee Chief Scientist Raj Samani described how he was traveling by car to a meeting one morning in February when a client called him seeking the latest GandCrab protection kit, which had been released earlier that day. By the time he got back in his car, the criminals had already issued a bypass of the new protections, according to Samani. This example highlights the arms race that security professionals are engaged in as they must deal with a world where the bad actors are as nimble and advanced as they are. It is an increasingly greater challenge, because software coding is just one of the many threats confronting the tech community today. Of perhaps even greater concern is the rapid growth of internet-connected devices, which are designed to communicate with networks, despite having little or no security. “All of these systems that were conceived to be standalone are now starting to communicate,” said Elisa Costante (pictured), senior director of industrial and operational technology innovation at Forescout Technologies Inc. “We’re looking at threats this can bring and what we can do to defend the customer.” Costante spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed how Forescout manages security vulnerabilities across a wide range of technologies, the challenges of protecting legacy systems, and the importance of having visibility throughout the connected enterprise. (* Disclosure below.) This week, theCUBE features Elisa Costante as its Guest of the Week. Threats move to the edge Forescout is focused on device visibility and control, an increasingly important area as the cybersecurity threat “perimeter” has moved to data in edge internet of things devices. The company’s technology addresses the marriage of information technology with operational technology while guarding the connected services that support both. An example of this can be found in the application of IP camera security solutions. For several years, the Insecam project has provided a directory of 73,000 unsecured IP cameras in 256 countries. Reolink Digital Technology Co. Ltd. has published a breakdown of the cameras available in the directory by country and manufacturer, including a list of usernames and default passwords. (Hint: “admin” and “1234” are very popular.) With this kind of unsecured vulnerability for only one device, it’s no wonder that companies need technology for access management whenever an IP camera is connected to a network. When a camera is attached, Forescout creates rules to manage the camera’s internet access and ensures that the customer’s operations team is properly alerted. “IP cameras should do one thing — record stuff,” Costante said. “There could be leverage to turn the camera against the owner. We enter into a network and give full visibility of all the IP devices that are there.” Vulnerable legacy systems The many layers of IT and OT infrastructure can get messy, especially in large organizations. This is particularly true in the presence of legacy systems, where outdated technologies that have not been correctly patched with the latest software could result in significant security vulnerability down the line. ... Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the RSA Conference. (* Disclosure: Forescout Technologies Inc. sponsors theCUBE’s coverage of the RSA Conference. Neither Forescout nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)