how to fight cyber crime

4
Alumni News ISSUE 131 FEBRUARY 2014

Post on 14-Sep-2014

975 views

Category:

Education


4 download

DESCRIPTION

Alumnus John McAdam’s company F5 Networks has become a business with a $1bn+ turnover by making applications fast, available and also secure, helping firms stay one step ahead of the hackers. This was first published in AlumniNews, Issue 131, February 2014. Find out more about our alumni community at http://www.london.edu/alumni

TRANSCRIPT

Page 1: How to fight cyber crime

AlumniNews ISSUE 131FEBRUARY 2014

Page 2: How to fight cyber crime

■TheBigIssue/Fighting the cyber hackers

THE WORDS ‘CYBER SECURITY’MAY have a futuristic ring to them,but they represent an issue thathas the potential to affect all of usat home or on the move and at thecompanies we work for – evengovernments are defending theirborders on a new online front.For John McAdam

SEP27(1990), President and CEOof application delivery firm F5Networks, the persistent andconstant innovation of the hackers,phishers and online ne’er-do-wellshas helped turn F5 Networks froma relatively small IT organisationwith a $109m turnover when he

joined in the burst-bubble phase ofthe dotcom boom to a businessturning over well in excess of $1bn.And, while much of this may beattributable to his businessprowess, he attributes recentgrowth – at least in part – to ourlove of all things mobile.“I have never seen such fast

change as I’ve seen in the pastcouple of years,” he says. “Mobilityhas changed everything and is areal driver for our business.” Andwhile that’s good news forbusinesses such as F5 Networks, itmeans that more of our intellectualproperty, personal, customer and

company data is at risk.John defines cyber security in

the big sense as securing thestability and integrity of the internetand the “whole onlineenvironment”. Things have movedon from the rather amateurish‘phishing’ attacks, where hackerswould put up bogus web shop-fronts of banks or emailsrequesting personal data. Nowthere are legion and far morecoordinated forms of attackfeaturing techniques like ‘denial ofservice’ where servers are made toflood a website with data,effectively knocking it out.“This is where you get an

organising, informal group ofpeople who want to disrupt abusiness for whatever reason,” hesays. “Then there are attacks ongovernments, and there areexamples of blackmail attacks,where people from across the

It’s a digital jungle out there, and any company that getscomplacent about its cyber security is likely to pay aheavy price. Alumnus John McAdam’s company F5Networks has become a business with a $1bn+turnover by making applications fast, available and alsosecure, helping firms stay one step ahead of thehackers. He talks to PHIL HEARD

Page 3: How to fight cyber crime

■TheBigIssue/Fighting the cyber hackers

world have got together and said‘unless you meet our demands wewill bring your site down’.”The advent of mobile internet

access combined with the ‘bigdata’ phenomenon that seescompanies tracking and storinginformation on customer behaviourhas multiplied the risks. “Big datacomplicates things. The ability toanalyse vast data sets and drawmeaningful conclusions from themmeans businesses know moreabout customers than ever before,especially in the online and retailspaces,” says John.The ethical balancing act

between privacy and security isone for clients to mull over. Cybersecurity gatekeepers are too busytackling the growth in mobility andthe constant proliferation of apps,which are the most valuable targetfor hackers. “Making apps secureis a major challenge,” says John.

For many of us, internet securitymay not extend beyond makingsure that our virus software is up todate. But, as with flu jabs, theseupdates tend to be made from out-of-date material – or ‘signatures’ asthey’re known. And relying solelyon them is not enough. “A lot ofsecurity is built on signatures, andyou need to make sure that they’reall up to date, but the way you getahead is by using ‘policies’ – layersof them,” says John.

These are the permissions thatgrant access for certain users tocertain parts of a network orspecific applications. Similarly,should an employee leave with apersonal mobile phone, forexample, company-specific datacan be identified and removed,leaving their personal data intact.“You may encounter a policy as

soon as you connect to a datacentre whether you’re on officepremises on a computer, orconnecting in from an internet caféon a mobile or a tablet,” says John.“Your device, where you are andother factors determine what youcan access.”He advocates strongly the notion

of application ‘firewalls’, whichprovide security and more policiesat an application level. Everycompany will have a firewall toprotect their servers, but having awalled garden filled with otherwise

“It’s a game that keeps ongoing. You can never sit back

and think you’re securebecause the bad guys will think

of something”

JOHN McADAM SEP27(1990)

Page 4: How to fight cyber crime

■TheBigIssue/Fighting the cyber hackers

unprotected crops is just notprotection enough. “It’s a gamethat keeps on going,” he says.“You can never sit back and thinkyou’re secure because the badguys will think of something.”And while every stage of the

journey can be encrypted, part ofthe cyber security expert’s role is tolook for opportunities that hackersmight use, balancing that withindividual privacy. “You track what’shappening, so you see logs ofthings within an application and ifyou see that someone was tryingsomething you weren’t expecting,you might think that’s interesting –and then you build in moreprotection.”The challenge seems to be

endless, but recognition of this isnow topping the agenda inenlightened boardrooms. “If you goback three to five years, therewouldn’t have been the

awareness,” says John, nostranger to most leading CIOs andCEOs.“I haven’t met anyone at board

level in a Fortune 500 company notversed about the enterprise riskthat cyber security presents,” headds. “I can’t imagine a scenario inwhich cyber security isn’t on the listof risk-management issues to lookout for.”And, as the online environment

continues to grow, John’scompany looks set to remain oneof Fortunemagazine’s top techstocks to watch. ■