The term "advanced persistent threat" is the latest incarnation of fear, uncertainty, and doubt that plagues the security industry.
Use of the phrase advanced persistent threat (APT) in the security community is nothing more than a new angle for risk and security professionals to continue to use fear, uncertainty, and doubt (FUD) to try to force their own agendas upon their constituencies and the population at large.
Risk and security professionals often use FUD -- rather than actual data -- to persuade others to align with their point of view and take actions they prescribe, or to get budget.
Unfortunately, FUD also results in a lack of trust and confidence in security professionals by the business leaders, stakeholders, constituents, and customers they serve.
In recent years, the risk and security community has promoted the idea of limiting the broad and unchecked use of FUD in favor of a more data-driven and risk-balanced approach to communication and influence.
This data-driven, risk-balanced approach isn't sensational; it can be difficult and time-consuming, and it represents a journey rather than a quick fix. And yet until recently, it was starting to take hold. As a result, risk and security professionals were becoming more accepted rather than feared and shunned.
Unfortunately, FUD still exists. Its latest incarnation is the APT buzzword. APT is widely used in the risk and security community and in media stories, and it is an element of many vendor marketing campaigns.
But APT doesn't represent a new, unique category of threats, or even an unexpected development in security and risk management.
The word "advanced" in APT implies new and never-before-encountered levels of threats, adversaries, and attacks. In fact, it's the defenders that have fallen behind.
The adversary community continues to evolve and refine its techniques and tactics. Attacks are more proficient and less obvious, and they employ multiple methods and mature rapidly.
In many cases, however, these attacks are considered advanced only because they have surpassed the abilities of the defenders to mitigate risks with traditional tools and techniques.
It would also be disingenuous for risk and security professionals to argue that they couldn't foresee such developments in the adversary community. So-called APTs are often permutations or derivatives of existing attack methods, tools, and techniques. In many cases, they have been postulated for some time by the risk and security community through threat and vulnerability research.
Threats to information and information infrastructure have always existed and will continue to exist as long as there are motivated and capable adversaries who can derive value from their activities.
Attack tools and tactics will evolve. So must our approach to security and risk management. The rise of the APT buzzword is no excuse for security professionals to fall back on bad FUD habits.
Join me and other security experts at Interop New York. The Risk Management and Security track will address a host of cutting-edge issues, including IoT security, managing third-party risks, cyberthreat intelligence, and more.
In its ninth year, Interop New York (Sept. 29 to Oct. 3) is the premier event for the Northeast IT market. Strongly represented vertical industries include financial services, government, and education. Join more than 5,000 attendees to learn about IT leadership, cloud, collaboration, infrastructure, mobility, risk management and security, and SDN, as well as explore 125 exhibitors' offerings. Register with Discount Code MPIWK to save $200 off Total Access & Conference Passes.
John P. Pironti is the President of IP Architects LLC. He has designed and implemented enterprise-wide electronic business solutions, information security and risk management strategies and programs, enterprise resilience capabilities, and threat and vulnerability management ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.