Speed Data: Thinking From a Cyberattacker's Perspective With Dalal Alharthi

Dr. Dalal Alharthi talks about the importance of organizations anticipating a breach and seeing the world through the eyes of an attacker.
Megan Garza
2 min read
Last updated March 25, 2024
Megan Garza and Dalal Alharthi

Welcome to Speed Data: Quick Conversations With Cybersecurity Leaders. Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight in a rapid format for security professionals pressed for time.

This week, Dr. Dalal Alharthi, Assistant Professor in the Cyber, Intelligence, and Information Operations Department at the University of Arizona, joins us to talk about the importance of organizations anticipating a breach and why you should see the world through the eyes of an attacker. The Saudi Arabia native uses her extensive background in industry and academia to help shape the minds of future tech leaders.

 

Cyber adversaries aren’t keen on handing over their playbook, and they aren’t going to tell you when they plan on attacking — or where. To stop a cybercriminal, you have to anticipate their next move, something Dr. Dalal Alharthi says will disrupt the attack early on.

“To build your defense strategy effectively, you need to think from a cyberattacker’s perspective,” said the Assistant Professor in the Cyber, Intelligence, and Information Operations Department at the University of Arizona. “That’s why in the field of cybersecurity, we teach cyber kill chain or MITRE attacks or some other frameworks that help us to understand the steps of cyberattacks.”

A worldly point of view

The Ph.D. and dual-master’s professional studied programming in Saudi Arabia before moving to the States in 2015, something she said allowed her to understand the global landscape of the cybersecurity field.

“One of the most notable differences is in Saudi Arabia, there is a strong emphasis on digital transformation through government initiatives, while in the United States, it’s a much larger, more diverse tech industry, with an emphasis on businesses and private-sector innovations,” she said.

These days, Dalal teaches her students what vulnerabilities to be aware of in security, including the most considerable risk: people.

Humans are the weakest link in the cybersecurity chain. That's why it's significant to have continuous education on an individual and organizational level.
Dr. Dalal Alharthi, University of Arizona

“We say ‘key’ in cybersecurity stands for ‘keep educating yourself,’ so ongoing education is really important.”

The impact of AI

Another area Dalal cautions her students about is the risks that accompany artificial intelligence.

“AI has a significant impact on the field of cybersecurity, both positively and negatively; AI-powered cyberattacks can pose the biggest cyber threats in the near future,” she said. “They are very sophisticated and very hard to detect or defend against.”

One of the ways Dalal recommends combating threats is by anticipating breaches and making the decision on whether to pay a ransom during the preparation phase of the incident response runbook, rather than making that call after an attack has occurred.

Being proactive is really important — expecting that you might be targeted by a cyberattacker and then act accordingly and build your own incident response.
Dr. Dalal Alharthi, University of Arizona

“That’s why most organizations have an incident response runbook of several incidents that might happen, like being targeted by ransomware. Being proactive is the key.”

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

speed-data:-behind-the-scenes-of-cyber-insurance-recovery-with-scott-godes
Speed Data: Behind the Scenes of Cyber Insurance Recovery With Scott Godes
Scott Godes, Insurance Recovery Litigator for Barnes & Thornburg LLP, chats about the importance of cyber insurance, and how data privacy has evolved.
speed-data:-rethinking-traditional-cybersecurity-principles-with-rick-howard
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
speed-data:-hiring-the-right-cybersecurity-professionals-with-leah-mclean
Speed Data: Hiring the Right Cybersecurity Professionals With Leah McLean
Cofounder of the nonprofit Whole Cyber Human Initiative, Leah McLean, shares her advice for recruiting teams looking for cybersecurity superstars and why it’s so important for women to have representation in tech.
speed-data:-protecting-private-healthcare-data-with-doug-cox
Speed Data: Protecting Private Healthcare Data With Doug Cox
The Salesforce leader emphasizes the importance of securing sensitive healthcare data