Understanding Cyber Time
Due to the vast number of high-profile cyber-attacks in 2017, cyber threats are now deeply present within the psyche of all industries and within our private lives. The response has been explosive, fueling rapid increases in technology spending, calls for increased regulation, in cyber workforce expansion and in insurance and risk management strategies. For any of these responses to be effective the math, specifically the impact and realities of time, must be studied very carefully. With hundreds of new attacks launched each minute, traditional technology management approaches are proving inadequate due to the simple fact that they cannot keep up with the pace of the adversaries. Cyber threats can be viewed (Preprint)
BACKGROUND There is an old expression in agriculture that the best time to plant a tree was 20 years ago. The second best time, is today. This is exactly where we find ourselves today with healthcare cyber security. The systems we use simply were not designed or built, nor are they currently managed, for the types of advanced persistent threats that face us. There are many ways that cyber security and cyber resilience can be approached and optimized but the most significant factor is time. The majority of systems supporting critical healthcare missions were developed over the course of years, or even decades. Major revisions and new features are developed over the course of months and years. Fixes and updates are typically delivered monthly or as daily emergency releases. System operators extend the time to achieve these system improvements with testing and validation of systems, updates, and patches to ensure functionality and that no unintended consequences are being introduced. This extended lifecycle leaves critical missions lacking functionality and exposed to cyber risks on a continual basis. It is impossible for most organizations to stay up to speed with cyber defense. OBJECTIVE To relay the importance of building cyber strategies that understand and optimize the essential nature of cyber time. METHODS NA. Viewpoint piece RESULTS NA - viewpoint Piece CONCLUSIONS Cybersecurity varies greatly from most domains of risk management in that there is always a determined adversary actively executing an agenda that inevitably brings harm to targeted organizations. This adversary is moving at unprecedented speed and organizations must build and execute strategies that enable response and resiliency in real-time to meet this unprecedented level of persistent threat.