[From the desk of Paul Davis – his opinions and no-one else’s, apart from the reporter’s opinions ]
* NIST to release new guidance for strengthening hospital cybersecurity
* Measure your Readiness – Incident Response Program
* Implementing Disaster Recovery as a Service to Avoid Losing your Business
* Why a layered defense is your best protection against malware
* AGA American Gas Association : Natural Gas Utilities Value Effective Security Partnership with TSA
* Nasscom Cyber Security Project Embraces over a Million Job Opportunities
* Australia ready to hit back at foreign cyber attacks as $230m security strategy launches
* Tips for detecting ransomware and other malware before it cripples your network
* Council of Europe adopts guidelines to protect journalists
* Understanding the Key Drivers for the Data Center Business Segment
* US leads Europe for malicious websites, banking trojans still at large
* Bangladesh Bank exposed to hackers by cheap switches, no firewall: police
* CGU launches revolutionary new cyber product into the Australian market
* These CISOs explain why they got fired
* Osterman Research Study Finds Most Organizations Lack Necessary Visibility Into Data and Database Assets
* Nebraska Amends Data Breach Notification Law
* Vast majority of tested applications have at least one vulnerability: cyber security report
* Singapore penalises firms for data breaches
* South Korea Sharpens the Teeth of Its Privacy Law
* Boston Cybersecurity Map Shows Deep, Diverse Local Sector
* Logicalis US Asks 10 Tough Security Questions Every CIO Must Be Able To Answer
* Cyber insurance penetration grows 27%: Report
* Threat Spotlight: Exploit Kit Goes International Hits 150+ Countries
* Integrated Threat Defenses and Why Connection is Crucial
* Maritime Cybersecurity: The Old and New
* Docker security: How to monitor and patch containers in the cloud
NIST to release new guidance for strengthening hospital cybersecurity
The National Institute of Standards and Technology is poised to deliver new cybersecurty guidance, according to NIST fellow Ronald Ross.
Ross likened the NIST framework, developed for the federal government under the Federal Information Security Modernization Act, to a very large catalog of privacy and security controls to safeguard the enterprise form hostile cyberattacks.
And the latest iteration comes as the proliferation of advanced technologies is rapidly exceeding healthcare executives’ ability to protect their organizations from cyberthreats, Ross added, because every new system or device expands an organization’s attack surface.
To that end, the guidance will include best practices for buidling software and systems that are both secure and trustworthy.
In the forthcoming guidance he said that NIST is working to reduce complexity of systems security engineering.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=104f84142c&e=20056c7556
Measure your Readiness – Incident Response Program
Inspired by other well-known maturity models, in this article I depict a new framework that is a combination of analytical and operational capabilities, processes, governance and metrics that together can enable all types of organizations to assess, shape and accelerate the continuous process improvements of their Incident Response program and benchmark it against the industry.
Level 1 – Initial (Processes unpredictable, reactive)
Level 2 – Managed (Processes developed but inconsistent, often reactive)
Level 3 – Defined (Processes consistent across the organization, and are proactive)
Level 4 – Quantitatively Managed (Processes measured and controlled)
Level 5 – Optimizing (Focus on process improvement)
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d72685c00f&e=20056c7556
Implementing Disaster Recovery as a Service to Avoid Losing your Business
With data increasingly being stored and transferred digitally, the risk of cyber breaches is deemed to be at an all-time high.
If zero-day viruses, Cryptolocker-type trojans or ransomware hit data could be at risk of permanent damage.
Field tests suggest that with a holistic recovery and backup system in place, downtime is minimised, impact on lost revenue is reduced and associated costs are limited.
Considering that business disasters commonly derive from either hardware failure, human or software error, a holistic approach to disaster recovery and storage protection ensures that vital files and systems don’t suffer from long-term damage.
Data insurance is as crucial as insuring your health or your home.
Such a Disaster Recovery as a Service (DRaaS) strategy can maintain employee productivity and a business’s ability to generate revenue.
If implemented at the right time, minimised downtime coming from the agile security of Disaster Recovery as a Service helps to preserve a business’s reputation with customers and partners whilst preventing a business from losing out to competitors.
With the Disaster Recovery as a Service market expected to grow considerably by 2020, protecting virtual business data needs to be as important as protecting your physical business to ensure business continuity.
Without securing data, a business could lose stakeholder assurance, lose out to competitors, lose customer trust and loyalty, and ultimately lose the business itself.
By working with networking experts and implementing a holistic Data Recovery as a Service and storage strategy, businesses can be confident they can continue to function even when a disaster strikes.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e4c56c3d64&e=20056c7556
Why a layered defense is your best protection against malware
There are a lot of misconceptions about malware, so here are some of the key things we do know.
1. Malware exploits a system vulnerability or user vulnerability for access
2. Malware runs code in system memory
3. Malware modified the registry or WMI for persistence
4. Malware generates network traffic to a C&C node
5. Malware possibly drops file(s) onto the system
The key take away here is to use a layered defense to make it as difficult as possible for bad guys to implant a remote access Trojan and mess with your computer (stealing or encrypting your data).
Patching and updating your system and applications, keeping your antivirus up-to-date, using web protection or network intrusion prevention system to prevent command and control signals.
Maintaining robust system and data backups will allow you to recover quickly if the bad guys get through all your cyber defenses.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=fb86109f7a&e=20056c7556
AGA American Gas Association : Natural Gas Utilities Value Effective Security Partnership with TSA
Washington, D.C. – Keeping America’s pipelines safe from physical harm and cyber attacks are top priorities for natural gas utilities.
Kathy Judge, Director, Risk & Compliance, Corporate Security at National Grid testified today on behalf of the American Gas Association before the U.S.
House of Representatives Committee on Homeland Security, Subcommittee on Transportation Security.
She said that the Transportation Security Administration’s Pipeline Section of the Office of Security Policy and Industry Engagement plays a pivotal role in keeping natural gas customers and the communities that they live in secure and safe.
Gas utilities employ numerous strategies to ensure pipeline security, including but not limited to: site-specific security and crisis management plans to ensure operations are reinforced with workforce and system redundancies; embedding security requirements into pipeline design and construction; weaving security requirements into corporate governance, participating with Information Sharing and Analysis Centers to improve situational awareness; coordinating with Federal, state, and local first responders to ensure effective incident prevention and response; and partnering with Federal security partners at TSA, Department of Energy, and Federal Bureau of Investigation to better understand potential threats.
The American Gas Association has developed the Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC) as an online platform for sharing cyber and physical threat intelligence and tools to help further enhance the security of natural gas utilities.
AGA also chairs the Oil & Natural Gas Sector Coordinating Council Cybersecurity Working Group, an operators’ forum supported by the U.S.
Department of Energy, in coordination with the U.S.
Department of Homeland Security, to promote effective security strategies and activities, policy and communication across the oil and natural gas sector to achieve the nation’s homeland security mission.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=7d09601137&e=20056c7556
Nasscom Cyber Security Project Embraces over a Million Job Opportunities
A report that has been published in The Economic Times says about Nasscom’s declaration of cyber attacks and data protection project efforts globally, and is expected to make about $ 2.5 – 3 Billion revenue opportunity in Indian IT sector.
On the other hand, the sector is on track to reach USD 350 Billion by 2025.
Further, here is a glimpse of the estimated report by NASSCOM.
The NASSCOM Cybersecurity project will not only help companies from cyber attack but also bring a huge employment opportunity for millions of people.
Rajendra Pawar, Chairman, Cyber Security Task Force, NASSCOM says that the forthcoming startup plans of another important project includes almost 1,000 new start-ups to be established in this arena.
It has been noticed that several investors to be interested in this field because of the incidents of cyber-attacks.
The report specifies about the recent release of ‘National Occupational Standards’ by Nasscom’s Data Security Council of India along with Security Software Company – Symantec.
It spoke about the 10 Cybersecurity job roles and the aim to deliver Certified Cyber security professionals across India.
Additionally, the qualification packs for these job roles has been developed in assistance with the consultation services including financial, consultancy advisory and IT services.
R Chandrashekhar, President of Nasscom says, “This initiative has a two-pronged approach – it contributes to containing the spurt of cybercrime and also enhances the employability of the workforce.
The launch of 10 QPs & the courseware for QP Analyst-Application Security is the collective effort of the industry and is going to be a landmark in empowering women while fighting major issues such as cybercrime.”
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=eb36d5f813&e=20056c7556
Australia ready to hit back at foreign cyber attacks as $230m security strategy launches
The message that the government is ready to “deter and respond to malicious cyber activities”, comes amid a $230 million cyber security strategy to be announced by Prime Minister Malcolm Turnbull on Thursday.
The first update to the nation’s cyber attack plan since 2009 will largely be spent recruiting 100 more police and cyber specialists to boost the fight against “foreign adversaries”, both state-sponsored and those linked to organised crime, and also widen information sharing between business and government.
China, Russia, North Korea and Iran are among the nations suspected to be the most active in launching daily “cyber crime intrusions” against government, business and people in Australia.
Mr Turnbull will appoint a new minister assisting the prime minister on cyber security and a new special adviser on cyber security in his department.
Foreign Minister Julie Bishop will appoint Australia’s first cyber ambassador.
The 46-page strategy document confirms that resources have already gone into “offensive cyber capabilities”.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c0214d4e6a&e=20056c7556
Tips for detecting ransomware and other malware before it cripples your network
To successfully detect malware, healthcare CIOs, CISOs and other executives must create a strategy, a plan of attack – or in the case of malware, counterattack.
One important part of an effective detection strategy, Pollard added, is the underlying assumption that an organization’s protection layer has failed.
John Fowler, deputy information security officer at Henry Ford Health System, says when healthcare executives are formulating malware detection strategies, they need to channel ancient Chinese general and military strategist Sun Tzu, who famously said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.”
A good place to start when creating and effecting a malware detection strategy is to inventory all hardware and software within a healthcare organization, Chuck Kesler, chief information security officer at Duke Health, recommended.
“Organizations need good intrusion detection software and intrusion prevention software, which are very good at detecting indicators of malware and compromises and can generate alerts to staff – and with the prevention systems, take action on alerts,” Duke Health’s Kesler said. “Sometimes IDS and IPS systems are bundled in with next-generation firewalls.
These IDS systems incorporate behavioral characteristics as opposed to just straight signatures and as a result are very good at finding those needles in the haystack.”
When it comes to detection and general security technologies, the latest acronym to hit the scene is EDR, which stands for end-point detection and remediation.
The two biggest names in the EDR market today are Carbon Black and Tanium, said Firstbrook of Gartner.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0f92097d3e&e=20056c7556
Council of Europe adopts guidelines to protect journalists
The FINANCIAL — The Council of Europe has adopted a set of guidelines aimed to ensure the protection of journalism and the safety of journalists in its 47 member states.
In a Recommendation supported by the European Federation of Journalists (EFJ), the Committee of Ministers – the organisation´s decision-making body – encouraged states to review their national legislation and practice concerning media freedom to make sure they are in conformity with the European Convention of Human Rights.
The guidelines contain specific measures to be taken by states to prevent violations of media freedom – including physical violence against journalists – to effectively protect journalism and journalists, and to prosecute crimes committed against them.
It also offers guidance to states on how to fulfill their obligations, combining legal, administrative and practical measures.
To protect journalists, the recommendation stresses that whenever there is a threat to journalists, states should adopt preventive measures, such as police protection or voluntary evacuation to a safe place.
They should encourage the creation or create themselves hotlines or emergency contact points that journalists and other media actors under threat can have immediate access.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=eefb49a730&e=20056c7556
Understanding the Key Drivers for the Data Center Business Segment
The revolution of digitizing enterprises generates huge amounts of data over networks.
This forces network providers to find alternate approaches to their existing network architectures.
According to Cisco Systems’ (CSCO) Global Cloud Index total data center, traffic is expected to reach 10.4 zettabytes in 2019 from 3.4 zettabytes in 2014.
Data center traffic from the cloud will likely account for 83% of the total data center traffic in 2019, as compared to 61% in 2014.
Machine-to-machine communication should also proliferate data flow across devices, along with BYOD (bring your own device).
In turn, these will create a requirement for network and computing platforms.
Kelly Ahuja, Cisco’s Senior Vice President, stated that “service providers are looking to leverage the operational best practices established in massively scalable computing environments and marry them with their own networking reach to compete and innovate faster.”
The SDCC (software-defined data center) market is also forecasted to rise to ~$77.2 billion in 2020 from nearly $21.8 billion in 2015, a CAGR (compounded annual growth rate) of 28.8%.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=050c4d2486&e=20056c7556
US leads Europe for malicious websites, banking trojans still at large
According to a new report from German security company G DATA, more malicious websites were hosted in the US in 2015 than in any other country, originating around 57 per cent of recorded attacks.
China, Hong Kong, Russia and Canada are also major hosts of malware, though Europe is little in evidence, only Germany and Italy making the top seven and accounting for just six per cent between them.
It also shows that there has been an increase in malicious websites purporting to be gambling portals, up from 13th place in the rankings to first in just six months, accounting for 18.7 per cent of malicious sites.
In second place are blog sites on 12.9 per cent followed in third by technology and communications sites on 12.8 per cent.
There has been a shift in the methods of attack on banking targets, with the banking Trojan Swatbanker, which was responsible for the highest number of averted attacks in the first half of 2015, having almost completely disappeared from the picture in the second half.
A new piece of malware called Sphinx – a variant of the ZeuS banking Trojan – contributed to a rise in attacks in the second half of the year but was short lived.
By December attack levels were back up to July levels due to the Dridex banking Trojan being distributed in emails supposedly containing invoices.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=aec0a4cac7&e=20056c7556
Bangladesh Bank exposed to hackers by cheap switches, no firewall: police
DHAKA (Reuters) – Bangladesh’s central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world’s biggest cyber heists said.
The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank’s SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police’s criminal investigation department.
Cyber criminals broke into Bangladesh Bank’s system and in early February tried to make fraudulent transfers totaling $951 million from its account at the Federal Reserve Bank of New York.
Most of the payments were blocked, but $81 million was routed to accounts in the Philippines and diverted to casinos there.
Most of those funds remain missing.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=8ff5d65631&e=20056c7556
CGU launches revolutionary new cyber product into the Australian market
CGU Insurance has launched a new cyber defence product aimed at mitigating the rising tide of cyber-attacks.
The company believes its new offering CGU Cyber Defence, developed with SME customers in mind, will protect businesses from cybercrimes such as privacy breaches, system damage, extortion, computer viruses, crime and hacking.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=cbbf24b6de&e=20056c7556
These CISOs explain why they got fired
Today’s Chief Information Security Officer (CISO) leads an increasingly precarious life.Since the emergence of the job title in the late 1990s, the CISO job has become more complex – and demanding – by the day.
“CISOs have an incredibly difficult job in that they are responsible for something they can never provide 100 percent assurance on, i.e. securing the enterprise.
All it takes is one missed vulnerability, one insider or one accidental “insecure” process.
Sackings rarely make the headlines
One CISO, who previously worked in the UK financial services sector, says that his dismissal was ultimately came down to “a difference of opinion” between him and the CIO.
Another CISO, working in the US pharmaceutical industry, explained why he resigned after blowing the whistle on insider fraud following an M&A.
So, how do CISOs avoid getting the chop.
Here are three tips:
“Definitely know your scope, and your boundaries, plus where you can break [the business] and where you can add value”.
“Understand the business and be clear what the priorities of the business are”
“Try and make it real for executives.
If they understand it and it challenges them, then you’re less likely to be sacked!”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5de33b4d4c&e=20056c7556
Osterman Research Study Finds Most Organizations Lack Necessary Visibility Into Data and Database Assets
SAN DIEGO, CA–(Marketwired – Apr 20, 2016) – Osterman Research, an industry analyst firm focused on research in messaging, collaboration and related areas, and DB Networks®, a leader in database cybersecurity, today announced the results of Osterman Research’s first-of-its-kind database security industry report.
The study found that only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets.
This level of visibility is necessary to rapidly identify a data breach.
Furthermore, 47 percent of those surveyed do not have an assigned team or even an individual to oversee the security of their databases.
“This study reveals there’s a clear shift beginning to occur in information security away from total reliance on perimeter security toward a greater emphasis on database security,” said Michael Osterman, president of Osterman Research. “Identifying compromised database credentials and insider threats will likely receive far more investment in the future.
And, the actual rate of successful infiltrations or other leakage events is likely greater than discussed in this report due to inadequate organizational systems for tracking successful threats.”
Additional key findings of the study include:
In addition to most survey respondents lacking excellent visibility into their organizations’ data and databases, 59 percent of respondents lack a high degree of certainty about which applications, users and clients are accessing their databases.
When asked what database security issues are of most concern, compromised credentials was the top concern of half of the survey respondents.
Thirty-nine percent of organizations surveyed lack the necessary tools to allow them to identify a database breach resulting from compromised or abused credentials.
Only 21 percent of survey respondents indicated they can discover such a data breach almost immediately.
Thirty-eight percent of organizations surveyed revealed they do not have the mechanisms and controls in place to allow them to continuously monitor their organization’s databases in real time.
Only 20 percent of organizations surveyed conduct database activity assessments on a more or less continuous basis.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=8af88c65f9&e=20056c7556
Nebraska Amends Data Breach Notification Law
Last week, Nebraska Governor Pete Ricketts signed into law LB 835, which makes the following amendments to the state’s data breach notification statute:
Adds to the definition of “personal information” a user name or email address, in combination with a password or security question and answer, that would permit access to an online account.
Requires notice to the Nebraska Attorney General no later than notice is provided to Nebraska residents.
Clarifies that data is not considered encrypted, defined as “converted by use of an algorithmic process . . . into a form in which the data is rendered unreadable or unusable without use of a confidential process or key,” if the confidential process or key was or is reasonably believed to have been acquired as a result of the breach.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=76111af46a&e=20056c7556
Vast majority of tested applications have at least one vulnerability: cyber security report
Cyber criminals are increasingly making use of malware-as-a-service, an issue of concern given that 97% of applications tested by Trustwave in 2015 had at least one vulnerability, note findings from the 2016 Trustwave Global Security Report.
While the lion’s share of applications tested last year had at least one vulnerability, 10% of the vulnerabilities discovered were rated as critical or high risk, notes the report, based on hundreds of real-life data breach investigations, billions of security and compliance events and thousands of penetration tests across 17 countries in 2015.
The median number of vulnerabilities discovered per application by Trustwave’s security testing service was 14.
The report points out that 64% of the applications had session management vulnerabilities, up from 58% in 2014. “Session management vulnerabilities can allow an attacker to take over or eavesdrop on a user session, which can place sensitive information at risk,” it explains. [Click on image below to enlarge)
In all, 42% of the malware observed by Trustwave used obfuscation, while 33% used encryption.
Perhaps less surprising are the types of businesses being targeted.
Retail was the most compromised industry, accounting for 23% of Trustwave investigations, followed by hospitality at 14%, and food and beverage at 10%.
The report notes that in 10% of the cases examined, the attackers simply sought to destroy or damage information rather than to collect it. “Other attackers sought proprietary information (11%), financial credentials (7%), and personally identifiable information (4%).
In some cases, multiple types of data were exposed and targeted, meaning that the exposure of any one type of data does not reflect the totality of the breach.” [Click on image to enlarge]
The report highlights some stark geographical differences, including that 24% of breaches in North America were discovered by law enforcement agencies in 2015 compared to 0% elsewhere in the world. “The longer a data compromise lasts, the more harm the attacker can do, and the more costly the breach can be,” it emphasizes.
Overall, 59% of breach victims did not detect breaches themselves, although self-detection increased from 19% in 2014 to 41% in 2015.
Self-detection leads to quicker containment of a breach.
Still, for self-detected breaches in 2015, a median of 15 days elapsed from intrusion to containment.
The median time between intrusion and detection for externally detected compromises was 168 days in 2015, up from 126 in 2014, the report notes.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=831b39cde8&e=20056c7556
Singapore penalises firms for data breaches
Several organisations in Singapore have been fined and issued warnings for breaching the country’s Personal Data Protection Act (PDPA), including local IT retail chain Challenger Technologies and Chinese handset maker Xiaomi.
The Personal Data Protection Commission (PDPC) said Thursday that it had imposed financial penalties of various amounts to four organisations, which had failed to implement adequate security measures to safeguard the personal data of its customers.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ef12729fee&e=20056c7556
South Korea Sharpens the Teeth of Its Privacy Law
The Act on the Promotion of Information Communication Network Utilization and Information Protection (“PICNUIA”) has been amended to include potential punitive damages for South Korean businesses that provide services over the internet.
From 23 September this year, any serious data breach experienced by such businesses will lead to financial liability of up to three times the actual damages suffered by their customers.
The amendments to the PICNUIA were announced by the Korea Communications Commission (“KCC”) in March, and they authorise the KCC to impose corporate sanctions against top management in data breach cases, and order companies to delete any personal data exposed in such breaches.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e2e6e66947&e=20056c7556
Boston Cybersecurity Map Shows Deep, Diverse Local Sector
Just how big is the local cluster.
Xconomy surveyed the landscape and found more than 60 firms within an hour’s drive of downtown Boston, including locally based companies and outposts of firms based elsewhere.
We mapped them out below and listed them in a table with key facts and figures about each company.
The map and accompanying data illustrate the local sector’s diverse and dynamic nature.
There are security arms of big companies, like EMC-owned RSA Security, IBM Security, and Lockheed Martin Industrial Defender.
Longstanding companies like Rapid7, Carbon Black (formerly Bit9), Digital Guardian, Veracode, and CyberArk have raised vast sums from venture capitalists and the public markets in a quest for industry domination.
Well-funded startups like Cybereason, Recorded Future, and Threat Stack are advancing new techniques for combating threats.
And a bevy of small startups like Cybric, Lexumo, and Seceon are just getting started.
Investors have pumped about $1.7 billion into local cybersecurity companies on our list, and that amount counts only the firms that haven’t been acquired or gone public.
Meanwhile, local cyber exits (both IPOs and acquisitions) have generated a total of around $3.6 billion—again, a conservative number since many of the purchase prices for the deals on this list weren’t disclosed publicly.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=f224e969c0&e=20056c7556
Logicalis US Asks 10 Tough Security Questions Every CIO Must Be Able To Answer
Cybercrime is an insidious business; it happens in plain sight, avoids detection and causes damage quickly.
There are even cybercrime-as-a-service offerings available to criminals who lack the technical know-how to reap the big jackpots capable of totaling tens of millions of dollars.
So, how do you prepare your organization to overcome an eventual attack.
According to Logicalis, the solution begins by answering 10 important questions:
If you knew that your company was going to be breached tomorrow, what would you do differently today?
Has your company ever been breached.
How do you know?
What assets am I protecting, what am I protecting them from (i.e., theft, destruction, compromise), and who am I protecting them from (i.e. cybercriminals or even insiders)?
What damage will we sustain if we are breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
Have you moved beyond an “inside vs. outside” perimeter-based approach to information security?
Does your IT security implementation match your business-centric security policies.
Does it rely on written policies, technical controls or both?
What is your security strategy for IoT (also known as “the Internet of threat”)?
What is your security strategy for “anywhere, anytime, any device” mobility?
Do you have an incident response plan in place?
What is your remediation process.
Can you recover lost data and prevent a similar attack from happening again?
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0a7686c268&e=20056c7556
Cyber insurance penetration grows 27%: Report
According to “Benchmarking Trends: Operation Risks Drive Cyber Insurance Purchases” from brokerage giant Marsh, there has been a 27% increase in cyber purchases in the US – up 32% in 2014 over 2013, and up 21% in 2013 over 2012.
That yearly increase shows organizations’ commitment to managing cyber, rather than relegating the task to IT departments, Marsh said – particularly as r