Q1. Why is crowdsourcing cybersecurity a good idea? How do enterprises benefit from it?
The security industry's talent shortage is growing faster than any other industry and it's also one of the only industries where computers simply can't replace the creativity of a human. Would you trust Siri with your security? Most industries and governments are under constant fear of attack, and crowdsourcing ethical hackers as part of an offensive security solution gives organizations access to hundreds of trusted and highly-skilled cybersecurity experts who approach security problems like the adversary sees them.
Enterprises benefit from crowdsourcing cybersecurity by going beyond compliance standards to find exploitable vulnerabilities that often remain undetected by other solutions. However, if a CISO or a security team leader committed to merely take a "crowdsourced" approach to testing, they would be missing some key benefits. With Synack, it's not just "crowdsourced testing", but it's "managed, controlled, and data-driven crowdsourced testing".
Synack's crowdsourced security testing helps our customers triage, patch, and manage vulnerabilities found by our crowd of ethical hackers. We provide our customers with Coverage Analytics so that security teams can see the number of researchers on the project, hours spent testing, and number and type of attack attempts to help them better understand the thoroughness of the testing. Our customers also receive an Attacker Resistance score, which shows them how strongly their assets stand up to attack, helping them benchmark against the industry average, prioritize resources, and manage their risk.
Q2. What has your experience as a penetration tester taught you about enterprise readiness to deal with existing and emergent cyber threats? Where do the biggest gaps exist?
During my time as a member of the DoD's Incident Response and Red Team and as a Senior Computer Network Exploitation and Vulnerability Analyst at the NSA, I saw firsthand that adversaries were swimming through networks with relative ease. Often they used known vulnerabilities as points of entry, but in others, they leveraged common vulnerabilities that should have been discovered (but weren't) by a testing team. Traditional solutions were leaving exploitable vulnerabilities unknown and undiscovered.
There are a lot of gaps left by traditional pen testing. I see those as: delayed start-up times; point-in-time testing on a semi-annual or annual basis; limited testers with variable skill sets; a system based on billable hours instead of incentives and; limited support following the final deliverables.
The fact of the matter is, cyber adversaries are persistent, creative, and evolving. The incoming threats to an organization are constant. Not only are the threats constant, but an organization's digital systems change often with new software releases, code changes, network configuration updates, etc., meaning their attack surface is constantly changing as well. A pen test will help the organization achieve compliance, but, realistically, it won't protect them from a breach. If you aren't testing regularly, you're leaving vulnerabilities open for an adversary to exploit it.
It's important for security teams to cover those gaps in order to effectively defend against and even outpace the adversary. Organizations need to look for solutions that are on-demand, scalable and flexible, continuous, utilize trusted experts, incentivize based on findings, controlled, data-driven, and able to effectively mitigate their cyber risk.
Q3. Why is it important for Synack to be at Black Hat USA 2018? What do you want attendees to know about the company?
Corporate security teams, undoubtedly, are feeling the burden of trying to manage a myriad of vendors, recruit and retain scarce talent, and stay on top of a constantly changing digital landscape. Synack comes to Black Hat as not just a bug bounty platform or a pen-testing provider, but as a true partner to current and future customers.
Bug bounties have been gaining traction in the past year, which is good for the industry, because they are proving to be more effective than traditional testing at finding unknown vulnerabilities. However it's no small task scoping assets for testing, recruiting and vetting hackers, reviewing vulnerability submissions, paying hackers for their findings in a timely fashion, remediating valid vulnerabilities, and extracting testing metrics to review results. A CISO needs more than a platform to take on these tasks without further burdening the security team.
Synack's managed and controlled approach to crowdsourced testing utilizes the power of technology alongside the creativity of humans. This technology empowers our crowd of hackers to find more critical vulnerabilities and it also allows our customers to view and track all testing traffic on their assets.
When resources or budgets get tight, people tend to make compromises. Synack is at Black Hat this year because we stand for zero compromise. That means zero compromise in trust, consistency, talent, incentives, reputation, ethics, efficiency, and results. Without any form of compromise, we stand behind both our crowd of ethical hackers and our growing base of customers, with total respect for the work done by our hacker crowd and with high regard for the security teams trying to protect their organizations under a lot of scrutiny and pressure.