Cyber Security: Rules of engagement have broadened, says Grady Summers, CTO, FireEye

Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.

Security, Security Business, Cybercrime, Fireeye, Technology, Cybersecurity, Cybersecurtity Prediction For 2018, Cybersecurity In 2018, Grady Summers
One of the greatest aspects of my job is that I get to interface with some of the brightest and most innovative minds in the industry. (Photo/Agency)

One of the greatest aspects of my job is that I get to interface with some of the brightest and most innovative minds in the security industry. As an added bonus, many of these people are from the first and second generation of analysts and researchers and incident responders, so their knowledge and expertise is based on a rich experience that dates as far back as when this whole industry was still referred to as “computer security”.

Some of my colleagues, including FireEye CEO Kevin Mandia, were on the frontlines of security in the early to mid-1990s, and they remember when the game was primarily espionage – governments and militaries spying on one another. Many more remember how quickly the game changed a few short years later, when hackers started using Windows NT to carry out . And even more remember when we started to see militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.

These individuals have experienced decades of evolving trends firsthand. They've lived through change, analysed threat and attacker and technology advancements, and have come to understand it all in a way that makes their insights absolutely crucial as we begin discussions about what to expect in the new year.

-Advertisement-

Adapted from intro to “Looking Ahead: Cyber Security in 2018”