• Home
  • Latest
  • Coins2Day 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Brainstorm Tech

Three types of cybersecurity threats (and two employees) to worry about most

Andrew Nusca
By
Andrew Nusca
Andrew Nusca
Editorial Director, Brainstorm and author of Coins2Day Tech
Down Arrow Button Icon
Andrew Nusca
By
Andrew Nusca
Andrew Nusca
Editorial Director, Brainstorm and author of Coins2Day Tech
Down Arrow Button Icon
July 16, 2014, 3:28 PM ET
Left to right: Michael Schrage, Sloan School, MIT; Stephen Gillett, COO, Symantec; Dan Kaufman, Director of the Information Innovation Office, DARPA; Christy Wyatt, CEO, Good Technology.
Left to right: Michael Schrage, Sloan School, MIT; Stephen Gillett, COO, Symantec; Dan Kaufman, Director of the Information Innovation Office, DARPA; Christy Wyatt, CEO, Good Technology.Stuart Isett/Coins2Day Brainstorm TECH

ASPEN, Colo.—For corporations, the cybersecurity landscape has changed. The threats are coming from new places. They’re aiming at different targets. The executives tasked with stopping them? The strategies—internally and externally—are evolving.

At the Coins2Day Brainstorm Tech conference on Wednesday, executives from Symantec (SYMC), Good Technology, and DARPA—the U.S. Department of Defense’s research arm—explored (in sobering detail) how to identify and defend against today’s threats.

“The landscape has changed,” said Stephen Gillett, Symantec’s chief operating officer. “It used to be we had a perimeter we need to defend against the perimeter. Now the active opponents, as we call them—they’re usually much more organized, much more funded. They’re tiered by incentives.”

There are three types of threats, Gillett said.

“You have the young student—we call them ‘script kiddies.’ They want to hack their alumni website, and they want notoriety,” he said. “Then you have digital arms of organized crime. They have org designs, journeymen charts, pay scales. People make a career out of that. Their incentive is primarily economic: they want money, they want access to cash. Then you have what is ultimately the most dangerous and sophisticated [group], which is not in it for notoriety, not in it for economics, and that’s state-sponsored. It’s very sophisticated. It’s probably the second-most talked about topic in [Washington] D.C. In terms of its threat.”

What’s truly scary is that many employees don’t understand how much they are at risk, said Christy Wyatt, chief executive at Good Technology.

“The question is not who is the enemy, the question is where are the vulnerabilities?” She said. It’s more likely that an employee doesn’t realize the value of the data access they have, even if they’re a low-profile employee. “It’s figuring out the weak links,” she said.

Ditto executives, who underestimate how much their companies are at risk.

“A number of companies that I speak to say, ‘I don’t know that what we have all that much that’s valuable’ or the end users that say, ‘I’m an admin or I’m a controller or I’m in marketing, what do I possibly have? It’s not like I’m filing patents.’ ” Wyatt said. “The path in is probably not as obvious as you’re carrying around top secret information on your device. It’s that’s a stepping stone to the next point where they can kind of get into the network and start to do the really naughty things when they get in.”

And they’ve been doing that at an increasing rate. A number of Coins2Day 500 companies, such as Target (TGT), have experienced major breaches this year. Others, such as Starbucks (SBUX), discovered vulnerabilities that left personal data at risk.

Senior executives may not be aware of the weakest link in their organization, Gillett said.

“One of the big retailers was compromised through the heating and ventilation contractor,” he said. “So the subcontractor would come in—no matter how much that big retailer had purchased in terms of security, point solutions, network gateways, devices, encryption—the lowest common-denominator was a heating and ventilation cooling technician who had access.”

He added: “That’s where the bad guys are going. They’re not going after the COO or the CEO. In 2013, we saw that they’re going after the PR—the person traveling with [the senior executive]—and the administrative assistant. We’re relatively hardened as executives, but our PR and our assistant are not.”

So how to defend against all this? Dan Kaufman, the director of DARPA’s Information Innovation Office, said that companies need to rethink the way they approach security.

“People are always searching for the silver bullet. I don’t think it exists,” he said. “There’s a speed and a need to adapt that’s often much faster than corporate policy can do.”

Worse, corporations often try to put the burden on the user, requiring multiple pass phrases or elaborate access flows. That’s not sustainable, Kaufman said. “I actually think it falls on us as technologists. I think that has to be invisible to the user. I think we need to build devices in an intelligent manner so that you use them the way you want to use them and we’ll do the protection.”

He added: “Machine learning will play a much, much larger role. The scope of this is so large, the idea of a person at a keyboard defending your network is extremely antiquated.”

It all rolls up to the chief security officer (CSO) or chief information security officer (CISO), who needs to work differently with his peers to counter these threats, the panelists said.

“They’re increasingly having to step up their game and truly be the security thought leader, and the partner for their CEOs and their boards,” Gillett said. “You see chief security officers and chief information security officers moving out of the office of the CIO and reporting to CEOs. But that comes with responsibility.”

Wyatt concurred. “There are so many conflicting voices in the enterprise today: the users want one thing, the CISO wants something else, line of businesses in the middle, board of directors is being held accountable,” she said. “It’s not so much that they don’t know, it’s being able to sort of travel the path to get what they need.”

The days of the CISO telling employees that they can’t use a certain device or have access to certain data are over, she added. Today, employees know how to access the data anyway, or they’ll move it to the cloud. There’s a balance that a security officer must strike, and it needs to align with—not slow—a company’s normal operations, Wyatt said.

“It’s a business requirement that’s going to drive value for the business,” she said. “The CISO has to find some way to get comfortable with the risk that that opens up.”

[Youtube https://www.youtube.com/watch?v=TEl1qXYK0z0]

Correction, July 17, 2014: An earlier version of this article incorrectly stated that Starbucks experienced a “major breach.” The company instead found (and fixed) a vulnerability in its mobile application. “No customer data was stolen whatsoever,” said Linda Mills, a company spokeswoman.

About the Author
Andrew Nusca
By Andrew NuscaEditorial Director, Brainstorm and author of Coins2Day Tech
Instagram iconLinkedIn iconTwitter icon

Andrew Nusca is the editorial director of Brainstorm, Coins2Day's innovation-obsessed community and event series. He also authors Coins2Day Tech, Coins2Day’s flagship tech newsletter.

See full bioRight Arrow Button Icon

Latest in

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Coins2Day Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.


Most Popular

placeholder alt text
Economy
Treasury spent $276 billion in interest on the national debt in the final three months of 2025, says the CBO—up $30 billion from a year prior
By Eleanor PringleJanuary 12, 2026
22 hours ago
placeholder alt text
Economy
‘Sell America’: Investors dump U.S. assets in fear of the end of Fed independence
By Jim EdwardsJanuary 12, 2026
23 hours ago
placeholder alt text
Success
An exec at $62 billion giant Colgate says Gen Z workers, despite getting flak for being woke and lazy, are actually ‘pushing us to get better’
By Emma BurleighJanuary 10, 2026
3 days ago
placeholder alt text
AI
This CEO laid off nearly 80% of his staff because they refused to adopt AI fast enough. 2 years later, he says he'd do it again
By Nick LichtenbergJanuary 11, 2026
2 days ago
placeholder alt text
Economy
A Supreme Court ruling that strikes down Trump's tariffs would be the fastest way to revive the stalling job market, top economist says
By Jason MaJanuary 11, 2026
2 days ago
placeholder alt text
Commentary
I run one of America's most successful remote work programs and the critics are right. Their solutions are all wrong, though
By Justin HarlanJanuary 11, 2026
2 days ago

Latest in

Young teacher in classroom
SuccessGen Z
Echoing the Great Recession, Gen Z graduates are pouring into education, with Teach For America reporting a 43% surge
By Emma BurleighJanuary 12, 2026
17 hours ago
Future of WorkJobs
Acquisition.com CEO says leaders ‘have it backwards’ when it comes to hiring: She says she hires for emotional intelligence over technical skills
By Jacqueline MunisJanuary 12, 2026
17 hours ago
Real EstateHousing
‘Something big’ just happened in the U.S. housing market, real estate CEO says. And it could mean the difference of being able to buy a home or not
By Sydney LakeJanuary 12, 2026
17 hours ago
EconomyFederal Reserve
The FOMC has the power to pick its own chair and could keep Powell—unless the DOJ probe and Supreme Court let Trump oust him from the Fed
By Jason MaJanuary 12, 2026
17 hours ago
Sergey Brin
SuccessEducation
Google’s Sergey Brin admits he’s hiring ‘tons’ of workers without degrees: ‘They just figure things out on their own in some weird corner’
By Preston ForeJanuary 12, 2026
17 hours ago
Jerome Powell adjusts his glasses, looking to his left.
EconomyFederal Reserve
Goldman Sachs top economist says Powell probe won’t change the Fed: ‘Decisions are going to be made based on employment and inflation’
By Sasha RogelbergJanuary 12, 2026
17 hours ago