Events

Illumination Summit Preview: Cybersecurity and Aviation

Table of Contents

When his Airbus A320 hit a flock of birds over New York and lost both engines, Captain ‘Sully’ Sullenberger immediately grasped the gravity of the situation. “This isn’t happening to me. This doesn’t happen to me, ” he recalls thinking. That reaction is universal during disasters, whether in cybersecurity or aviation. Unfortunately, it comes far more often for cybersecurity operators.

Cybersecurity Breach or Airplane Crash: Which Is More Common?

The answer, of course, is that airplanes (despite many people’s fears) are very safe, while catastrophic breaches occur with mundane frequency.  There are many contributing reasons for this, but it largely comes down to rigorous, consistent testing policies. Extensive data is collected and scrutinized during flights,  in pre-flight checks, and especially after disasters. The observations gained in this manner have led to incremental safety improvements culminating in today’s safety standards. For example, the investigation that followed Flight 1549’s landing in the Hudson River led to many improvements in how commercial pilots operate. 

Proficiency in Operation

The tolerance for failure is also practically nonexistent in aviation. This isn’t too surprising considering the lives of passengers and crew that are at stake, underscoring the importance of proficiency in aviation. According to one flight instructor, proficiency means that you can be successful at landing 100% of the time. If the announcer at a boarding gate announced that the pilot of that flight was successful at landing 98% of the time, few passengers would choose to board the plane.

In cybersecurity, by contrast, some commentators say that there is no such thing as security, but only degrees of insecurity. While that might be true, it leads to an unnecessarily defeatist attitude. While we might never achieve 100% security, it is still a target worth aiming for and worth striving for in increments.

The Importance of the Operator

Captain Sullenberger said that he couldn’t have hoped for a better co-pilot on the day of Flight 1549’s crash. Together, Sully and First Officer Jeff Skiles were able to complete the processes and procedures required of them not only because of their preparation and knowledge of the resources at their disposal, but also the character they showed in the face of adversity. 

As employers look to fill the estimated 500,000 open positions in cybersecurity, it’s important to look at character in addition to certifications and experience. In Forrester’s recently released research on the Cybersecurity Analyst’s role profile, Analyst Allie Mellen found that despite being considered an ‘entry-level’ position, the Security Analyst position has requirements much closer to an intermediate one. The research also guides recruiters on desired characteristics such as the ability to deal with high-stress situations.

On Thursday, April 21st, Lumu hosted the Illumination Summit: Not in the Flight Plan | Preparing for the Unexpected in Cybersecurity and Aviation. At this freely available online summit, First Officer Jeff Skiles and Forrester Analyst Allie Mellen took part in discussions on the parallels mentioned above, and much more. You can relive the Illumination Summit at your leisure here.

Recent Posts

  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

1 week ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

2 weeks ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

2 weeks ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

1 month ago
  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

1 month ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

2 months ago