Blog

Taking the Cyber No-Fly List to the Skies

Hugh Njemanze
February 13, 2018
Table of contents
<p style="text-align: justify;"><em>In our <a href="https://www.anomali.com/blog/how-the-no-fly-list-approach-can-be-used-to-improve-cybersecurity" target="_blank">last post</a></em>, we talked about how companies can use the concept of a No-Fly list to keep malicious actors out of their networks. So how does a cyber No-Fly list work in a real situation? We spoke with one of our customers, Alaska Airlines, about how they make the most of threat intelligence and the threat intelligence sharing community to protect their networks from malicious attacks.</p><p>Jessica Ferguson, Director of Information Security Architecture at Alaska Airlines, has implemented threat intelligence programs at multiple large enterprises. “Threat intelligence gives us visibility into known security threats, letting my team focus more time on hunting for unknown threats,” says Ferguson.</p><h3><em>Threat intelligence in action</em></h3><p>At Alaska Airlines, Ms. Ferguson collects threat intelligence from research partners, internal sources and even other airlines. She then integrates this intelligence with security infrastructure, including firewalls, intrusion detection systems, endpoint monitoring tools and security monitoring solutions. In doing so, she automates detection and blocking of known threats in the network and on the endpoint wherever possible.</p><p>Ms. Ferguson states threat “indicators” (malicious cyber “fingerprints”) vary in confidence. I.e., certain indicators are very high confidence, meaning there is near certainty that the traffic is malicious. The network can take automated action in response to these high confidence threats, including blocking traffic from that source. In other instances, there is lower confidence, in which case Ms. Ferguson puts these events through a cyber “secondary screening” process. This involves a more manual investigation into the traffic, understanding what took place, what process initiated traffic, what changes were made, whether files were downloaded, etc.</p><p>In fact, “the hunt begins in the gray area” according to Ms. Ferguson, referring to the need to examine less obvious security threats. “The beauty of this approach is we may detect potential threats based on suspicious behavior or strange network activity. We then dig into the traffic and may discover a unique, specific threat indicator, which then feeds into our threat intelligence program – and gets integrated with all our security infrastructure – which starts the whole process loop again.” In many cases an investigation into one suspicious indicator will lead to a discovery of an entire new family of threats – taking unknown threats and making them known.</p><p>The web of known threats becomes much wider as companies share and exchange this kind of information. Threat sharing has become a critical element of Ms. Ferguson’s security arsenal, “just as the TSA shares no-fly list dossiers with other intelligence agencies.” In the last few years numerous Information Sharing and Analysis Centers (ISACs) have formed. These are communities of organizations, often aligned with a specific industry (e.g., Aviation ISAC, Financial Services ISAC, Automotive ISAC), where members collaborate with each other on cybersecurity topics and share intelligence. Ms. Ferguson frequently engages other airline security teams to discuss threats targeting their sector. </p><p style="text-align: justify;">To pinpoint malicious humans, the FBI recognized that knowledge of their activities outside of what’s observable at the last point of entry is a necessity. While airline passengers and digital traffic are not interchangeable, enterprises need to recognize that the same level of knowledge is required to better identify and stop dangerous digital traffic.</p><p style="text-align: justify;"><br/> * Missed part 1 of this series? <a href="https://www.anomali.com/blog/how-the-no-fly-list-approach-can-be-used-to-improve-cybersecurity" target="_blank">Check it out here</a>. Want to read the original article, posted on Harvard Business Review? <a href="https://hbr.org/2018/02/why-every-company-should-consider-creating-a-cyber-no-fly-list" target="_blank">Read it here</a></p>
Hugh Njemanze

Hugh Njemanze is the President of Anomali. Hugh has an illustrious 30-year career in the enterprise software industry. Hugh co-founded ArcSight in May 2000 and served as CTO as well as Executive Vice President of Research and Development. He led product development, information technology deployment, and product research at ArcSight, and expanded these responsibilities to lead all engineering and R&D efforts for HP’s Enterprise Security Products group, the organization that ArcSight became part of post-acquisition. Prior to joining ArcSight, Hugh worked as the CTO at Verity, where he led product development, and before that he was at Apple in software engineering, where he was one of the key architects behind the Data Access Language (DAL). Hugh is a CISSP and holds a B.S. in computer science from Purdue University.

Discover More About Anomali

Get the latest news about Anomali's Security and IT Operations platform,

SEe all Resources
No items found.
No items found.

Propel your mission with amplified visibility, analytics, and AI.

Learn how Anomali can help you cost-effectively improve your security posture.

February 13, 2018
-
Hugh Njemanze
,

Taking the Cyber No-Fly List to the Skies

<p style="text-align: justify;"><em>In our <a href="https://www.anomali.com/blog/how-the-no-fly-list-approach-can-be-used-to-improve-cybersecurity" target="_blank">last post</a></em>, we talked about how companies can use the concept of a No-Fly list to keep malicious actors out of their networks. So how does a cyber No-Fly list work in a real situation? We spoke with one of our customers, Alaska Airlines, about how they make the most of threat intelligence and the threat intelligence sharing community to protect their networks from malicious attacks.</p><p>Jessica Ferguson, Director of Information Security Architecture at Alaska Airlines, has implemented threat intelligence programs at multiple large enterprises. “Threat intelligence gives us visibility into known security threats, letting my team focus more time on hunting for unknown threats,” says Ferguson.</p><h3><em>Threat intelligence in action</em></h3><p>At Alaska Airlines, Ms. Ferguson collects threat intelligence from research partners, internal sources and even other airlines. She then integrates this intelligence with security infrastructure, including firewalls, intrusion detection systems, endpoint monitoring tools and security monitoring solutions. In doing so, she automates detection and blocking of known threats in the network and on the endpoint wherever possible.</p><p>Ms. Ferguson states threat “indicators” (malicious cyber “fingerprints”) vary in confidence. I.e., certain indicators are very high confidence, meaning there is near certainty that the traffic is malicious. The network can take automated action in response to these high confidence threats, including blocking traffic from that source. In other instances, there is lower confidence, in which case Ms. Ferguson puts these events through a cyber “secondary screening” process. This involves a more manual investigation into the traffic, understanding what took place, what process initiated traffic, what changes were made, whether files were downloaded, etc.</p><p>In fact, “the hunt begins in the gray area” according to Ms. Ferguson, referring to the need to examine less obvious security threats. “The beauty of this approach is we may detect potential threats based on suspicious behavior or strange network activity. We then dig into the traffic and may discover a unique, specific threat indicator, which then feeds into our threat intelligence program – and gets integrated with all our security infrastructure – which starts the whole process loop again.” In many cases an investigation into one suspicious indicator will lead to a discovery of an entire new family of threats – taking unknown threats and making them known.</p><p>The web of known threats becomes much wider as companies share and exchange this kind of information. Threat sharing has become a critical element of Ms. Ferguson’s security arsenal, “just as the TSA shares no-fly list dossiers with other intelligence agencies.” In the last few years numerous Information Sharing and Analysis Centers (ISACs) have formed. These are communities of organizations, often aligned with a specific industry (e.g., Aviation ISAC, Financial Services ISAC, Automotive ISAC), where members collaborate with each other on cybersecurity topics and share intelligence. Ms. Ferguson frequently engages other airline security teams to discuss threats targeting their sector. </p><p style="text-align: justify;">To pinpoint malicious humans, the FBI recognized that knowledge of their activities outside of what’s observable at the last point of entry is a necessity. While airline passengers and digital traffic are not interchangeable, enterprises need to recognize that the same level of knowledge is required to better identify and stop dangerous digital traffic.</p><p style="text-align: justify;"><br/> * Missed part 1 of this series? <a href="https://www.anomali.com/blog/how-the-no-fly-list-approach-can-be-used-to-improve-cybersecurity" target="_blank">Check it out here</a>. Want to read the original article, posted on Harvard Business Review? <a href="https://hbr.org/2018/02/why-every-company-should-consider-creating-a-cyber-no-fly-list" target="_blank">Read it here</a></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.