SlideShare a Scribd company logo
1 of 4
Download to read offline
AlumniNews ISSUE 131
FEBRUARY 2014
■TheBigIssue/Fighting the cyber hackers
THE WORDS ‘CYBER SECURITY’
MAY have a futuristic ring to them,
but they represent an issue that
has the potential to affect all of us
at home or on the move and at the
companies we work for – even
governments are defending their
borders on a new online front.
For John McAdam
SEP27(1990), President and CEO
of application delivery firm F5
Networks, the persistent and
constant innovation of the hackers,
phishers and online ne’er-do-wells
has helped turn F5 Networks from
a relatively small IT organisation
with a $109m turnover when he
joined in the burst-bubble phase of
the dotcom boom to a business
turning over well in excess of $1bn.
And, while much of this may be
attributable to his business
prowess, he attributes recent
growth – at least in part – to our
love of all things mobile.
“I have never seen such fast
change as I’ve seen in the past
couple of years,” he says. “Mobility
has changed everything and is a
real driver for our business.” And
while that’s good news for
businesses such as F5 Networks, it
means that more of our intellectual
property, personal, customer and
company data is at risk.
John defines cyber security in
the big sense as securing the
stability and integrity of the internet
and the “whole online
environment”. Things have moved
on from the rather amateurish
‘phishing’ attacks, where hackers
would put up bogus web shop-
fronts of banks or emails
requesting personal data. Now
there are legion and far more
coordinated forms of attack
featuring techniques like ‘denial of
service’ where servers are made to
flood a website with data,
effectively knocking it out.
“This is where you get an
organising, informal group of
people who want to disrupt a
business for whatever reason,” he
says. “Then there are attacks on
governments, and there are
examples of blackmail attacks,
where people from across the
It’s a digital jungle out there, and any company that gets
complacent about its cyber security is likely to pay a
heavy price. Alumnus John McAdam’s company F5
Networks has become a business with a $1bn+
turnover by making applications fast, available and also
secure, helping firms stay one step ahead of the
hackers. He talks to PHIL HEARD
■TheBigIssue/Fighting the cyber hackers
world have got together and said
‘unless you meet our demands we
will bring your site down’.”
The advent of mobile internet
access combined with the ‘big
data’ phenomenon that sees
companies tracking and storing
information on customer behaviour
has multiplied the risks. “Big data
complicates things. The ability to
analyse vast data sets and draw
meaningful conclusions from them
means businesses know more
about customers than ever before,
especially in the online and retail
spaces,” says John.
The ethical balancing act
between privacy and security is
one for clients to mull over. Cyber
security gatekeepers are too busy
tackling the growth in mobility and
the constant proliferation of apps,
which are the most valuable target
for hackers. “Making apps secure
is a major challenge,” says John.
For many of us, internet security
may not extend beyond making
sure that our virus software is up to
date. But, as with flu jabs, these
updates tend to be made from out-
of-date material – or ‘signatures’ as
they’re known. And relying solely
on them is not enough. “A lot of
security is built on signatures, and
you need to make sure that they’re
all up to date, but the way you get
ahead is by using ‘policies’ – layers
of them,” says John.
These are the permissions that
grant access for certain users to
certain parts of a network or
specific applications. Similarly,
should an employee leave with a
personal mobile phone, for
example, company-specific data
can be identified and removed,
leaving their personal data intact.
“You may encounter a policy as
soon as you connect to a data
centre whether you’re on office
premises on a computer, or
connecting in from an internet café
on a mobile or a tablet,” says John.
“Your device, where you are and
other factors determine what you
can access.”
He advocates strongly the notion
of application ‘firewalls’, which
provide security and more policies
at an application level. Every
company will have a firewall to
protect their servers, but having a
walled garden filled with otherwise
“It’s a game that keeps on
going. You can never sit back
and think you’re secure
because the bad guys will think
of something”
JOHN McADAM SEP27(1990)
■TheBigIssue/Fighting the cyber hackers
unprotected crops is just not
protection enough. “It’s a game
that keeps on going,” he says.
“You can never sit back and think
you’re secure because the bad
guys will think of something.”
And while every stage of the
journey can be encrypted, part of
the cyber security expert’s role is to
look for opportunities that hackers
might use, balancing that with
individual privacy. “You track what’s
happening, so you see logs of
things within an application and if
you see that someone was trying
something you weren’t expecting,
you might think that’s interesting –
and then you build in more
protection.”
The challenge seems to be
endless, but recognition of this is
now topping the agenda in
enlightened boardrooms. “If you go
back three to five years, there
wouldn’t have been the
awareness,” says John, no
stranger to most leading CIOs and
CEOs.
“I haven’t met anyone at board
level in a Fortune 500 company not
versed about the enterprise risk
that cyber security presents,” he
adds. “I can’t imagine a scenario in
which cyber security isn’t on the list
of risk-management issues to look
out for.”
And, as the online environment
continues to grow, John’s
company looks set to remain one
of Fortune magazine’s top tech
stocks to watch. ■

More Related Content

Viewers also liked

Deep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoDeep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoSri Ambati
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchaingeetachauhan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (7)

Deep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoDeep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry Larko
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchain
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

More from London Business School

Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondKuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondLondon Business School
 
Active vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesActive vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesLondon Business School
 
Partners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingPartners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingLondon Business School
 
Sharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementSharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementLondon Business School
 
The ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolThe ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolLondon Business School
 
Soren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeSoren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeLondon Business School
 
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...London Business School
 
Smurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolSmurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolLondon Business School
 
Systemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustrySystemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustryLondon Business School
 
Myths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingMyths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingLondon Business School
 
5 top reads on human potential | London Business School
5 top reads on human potential | London Business School5 top reads on human potential | London Business School
5 top reads on human potential | London Business SchoolLondon Business School
 
AQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsAQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsLondon Business School
 

More from London Business School (20)

Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondKuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
 
Microsoft and London Business School
 Microsoft and London Business School Microsoft and London Business School
Microsoft and London Business School
 
Active vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesActive vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectives
 
Portfolio Construction Today
Portfolio Construction TodayPortfolio Construction Today
Portfolio Construction Today
 
Partners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingPartners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity Investing
 
Risk taking the ATP way
Risk taking the ATP wayRisk taking the ATP way
Risk taking the ATP way
 
Is factor investing a bubble?
Is factor investing a bubble?Is factor investing a bubble?
Is factor investing a bubble?
 
Sharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementSharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active Management
 
Money management in equilibrium
Money management in equilibrium Money management in equilibrium
Money management in equilibrium
 
The ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolThe ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business School
 
Soren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeSoren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational change
 
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
 
Telenor and London Business School
Telenor and London Business SchoolTelenor and London Business School
Telenor and London Business School
 
Smurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolSmurfit Kappa and London Business School
Smurfit Kappa and London Business School
 
Systemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustrySystemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management Industry
 
Myths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingMyths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index Investing
 
Systemic Risk in Asset Management
Systemic Risk in Asset Management Systemic Risk in Asset Management
Systemic Risk in Asset Management
 
Nordea and London Business School
Nordea and London Business School Nordea and London Business School
Nordea and London Business School
 
5 top reads on human potential | London Business School
5 top reads on human potential | London Business School5 top reads on human potential | London Business School
5 top reads on human potential | London Business School
 
AQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsAQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit Markets
 

Recently uploaded

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Recently uploaded (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

How to fight cyber crime

  • 2. ■TheBigIssue/Fighting the cyber hackers THE WORDS ‘CYBER SECURITY’ MAY have a futuristic ring to them, but they represent an issue that has the potential to affect all of us at home or on the move and at the companies we work for – even governments are defending their borders on a new online front. For John McAdam SEP27(1990), President and CEO of application delivery firm F5 Networks, the persistent and constant innovation of the hackers, phishers and online ne’er-do-wells has helped turn F5 Networks from a relatively small IT organisation with a $109m turnover when he joined in the burst-bubble phase of the dotcom boom to a business turning over well in excess of $1bn. And, while much of this may be attributable to his business prowess, he attributes recent growth – at least in part – to our love of all things mobile. “I have never seen such fast change as I’ve seen in the past couple of years,” he says. “Mobility has changed everything and is a real driver for our business.” And while that’s good news for businesses such as F5 Networks, it means that more of our intellectual property, personal, customer and company data is at risk. John defines cyber security in the big sense as securing the stability and integrity of the internet and the “whole online environment”. Things have moved on from the rather amateurish ‘phishing’ attacks, where hackers would put up bogus web shop- fronts of banks or emails requesting personal data. Now there are legion and far more coordinated forms of attack featuring techniques like ‘denial of service’ where servers are made to flood a website with data, effectively knocking it out. “This is where you get an organising, informal group of people who want to disrupt a business for whatever reason,” he says. “Then there are attacks on governments, and there are examples of blackmail attacks, where people from across the It’s a digital jungle out there, and any company that gets complacent about its cyber security is likely to pay a heavy price. Alumnus John McAdam’s company F5 Networks has become a business with a $1bn+ turnover by making applications fast, available and also secure, helping firms stay one step ahead of the hackers. He talks to PHIL HEARD
  • 3. ■TheBigIssue/Fighting the cyber hackers world have got together and said ‘unless you meet our demands we will bring your site down’.” The advent of mobile internet access combined with the ‘big data’ phenomenon that sees companies tracking and storing information on customer behaviour has multiplied the risks. “Big data complicates things. The ability to analyse vast data sets and draw meaningful conclusions from them means businesses know more about customers than ever before, especially in the online and retail spaces,” says John. The ethical balancing act between privacy and security is one for clients to mull over. Cyber security gatekeepers are too busy tackling the growth in mobility and the constant proliferation of apps, which are the most valuable target for hackers. “Making apps secure is a major challenge,” says John. For many of us, internet security may not extend beyond making sure that our virus software is up to date. But, as with flu jabs, these updates tend to be made from out- of-date material – or ‘signatures’ as they’re known. And relying solely on them is not enough. “A lot of security is built on signatures, and you need to make sure that they’re all up to date, but the way you get ahead is by using ‘policies’ – layers of them,” says John. These are the permissions that grant access for certain users to certain parts of a network or specific applications. Similarly, should an employee leave with a personal mobile phone, for example, company-specific data can be identified and removed, leaving their personal data intact. “You may encounter a policy as soon as you connect to a data centre whether you’re on office premises on a computer, or connecting in from an internet café on a mobile or a tablet,” says John. “Your device, where you are and other factors determine what you can access.” He advocates strongly the notion of application ‘firewalls’, which provide security and more policies at an application level. Every company will have a firewall to protect their servers, but having a walled garden filled with otherwise “It’s a game that keeps on going. You can never sit back and think you’re secure because the bad guys will think of something” JOHN McADAM SEP27(1990)
  • 4. ■TheBigIssue/Fighting the cyber hackers unprotected crops is just not protection enough. “It’s a game that keeps on going,” he says. “You can never sit back and think you’re secure because the bad guys will think of something.” And while every stage of the journey can be encrypted, part of the cyber security expert’s role is to look for opportunities that hackers might use, balancing that with individual privacy. “You track what’s happening, so you see logs of things within an application and if you see that someone was trying something you weren’t expecting, you might think that’s interesting – and then you build in more protection.” The challenge seems to be endless, but recognition of this is now topping the agenda in enlightened boardrooms. “If you go back three to five years, there wouldn’t have been the awareness,” says John, no stranger to most leading CIOs and CEOs. “I haven’t met anyone at board level in a Fortune 500 company not versed about the enterprise risk that cyber security presents,” he adds. “I can’t imagine a scenario in which cyber security isn’t on the list of risk-management issues to look out for.” And, as the online environment continues to grow, John’s company looks set to remain one of Fortune magazine’s top tech stocks to watch. ■