Start your day with intelligence. Get The OODA Daily Pulse.
This OODA Network Member Only content has been unlocked for unrestricted viewing by RiskIQ through the OODA Unlocked program which lets community members promote thought leadership to a broader global audience.
Corporate and private security teams have well established procedures and practices for protecting the safety and security of their executives and clients which can include high net worth families and celebrities. This can include tried and true measures like bodyguards, physical security measures around facilities and homes, secured vehicles with trained drivers, and a whole suite of protective monitoring technologies such as cameras, sensors, alarm systems, and panic buttons.
In the cyber domain, security teams are less practiced at personnel protection and often focus their efforts on protecting work systems and credentials. In today’s hyper-connected world, physical and cyber security have fully converged and must be looked at as one unified security effort.
Consider the following ways in which cybersecurity can impact the physical security of an at risk executive.
Threat intelligence derived from online platforms and the dark web can provide an early indicator that an executive is at risk. Perhaps a threat is discovered via Twitter or sensitive residence information has been posted online. It could be that a threat actor is offering to sell informational details about an executive, or in some instances direct targeting is indicated by a request to purchase sensitive information.
Conducting a risk review is an essential first step in managing this risk and the review will include things like:
In some instances online postings can be indicative of an attack or an attacker might monitor the executive (and their family) social media accounts. Consider the following three real-world case studies.
Each of these examples are based on real examples we have encountered in the recent past. Each reinforce the need to conduct periodic risk audits and then remediate any findings and incorporate the intelligence into your traditional protection activities. A threat intelligence monitoring service can provide dynamic input to physical security teams regarding emerging threats as well as critical warning on geopolitical or industry-associated risks.
The physical security team should also make sure the cyber threat analysts are aware of physical compromises that could increase cyber risks as well. For example, was an executive’s phone recently stolen? Did some steal mail from a residential mailbox? Have there been any successful or unsuccessful burglaries?
It is also important to expand the protection circle and recognize the value of monitoring and improving the cybersecurity posture of direct relatives. Many times, the critical information leak that represents a risk to the executive is a result of indirect sharing or compromise of someone close to them.
Executives should also ensure that all electronic devices are configured for high-security, especially when traveling. For detailed cybersecurity travel guidance, please visit our Cybersecurity Guidelines for Executive Travel.
Another key convergence between the physical and cyber domains as it relates to executive protection is the increasing use of network connected security, home automation, and IOT devices. Consider the average house might include all of these devices connected to the same network and allowing a potential compromise vector:
For any given household this is a large attack surface, but the greatest risk comes from attackers leveraging an unimportant device (your DVD player) to pivot into a security device like a camera or alarm system. This allows them to collect intelligence and impact the physical security of the location.
Consider a few real-world examples:
Best practices in cybersecurity should be part of any comprehensive protection strategy. Some key actions:
Another attack vector that can be used to introduce risk is through social engineering in which an attacker engages in electronic or voice communications to obtain information that can facilitate another attack. For example, an email spearphishing attack might allow for a personal computer or mobile device to become compromised or an employee might give out sensitive or personal information to a phone caller masquerading as a service provider or partner. In one instance we observed, attackers tried to lure a high net worth individual to a foreign location to kidnap them.
These social engineering attacks might be coupled with other physical fraud activity like accessing household mailboxes or opening accounts.
In some instances, the perpetrators might be spoofing or impersonating the executive in order to drive other fraud activity. Imagine the famous business woman who is successful impersonated on social media and has thousands of follower pointing those followers to malware enabled or fraud themed websites.
There are three primary means to managing this risk.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.