{"id":1168,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail172-suw12-mcsv-net\/"},"modified":"2021-12-30T11:38:53","modified_gmt":"2021-12-30T11:38:53","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail172-suw12-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail172-suw12-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail172.suw12.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Mature &#038; Unconfident: The Best Information Security Teams Ever!<br \/>\nThe organization that is mature and unconfident is the best kind, in my opinion.<br \/>\nThese types of organizations took all the same steps as the mature and confident organizations.<br \/>\nWhat\u2019s the difference.<br \/>\nThey are never satisfied.<br \/>\nThey always remain hungry.<br \/>\nThey are never confident that they are safe.<br \/>\nOrganizations that are immature and unconfident are my favorite type of organization to work with.<br \/>\nAt first this may seem like a puzzling statement but hear me out: Lack of security maturity may indeed be a weakness.<br \/>\nBut if an organization is self-aware enough to honestly evaluate where they stand, it is something that can be overcome.<br \/>\nWhich type of organization are you.<br \/>\nI never ask this question of organizations I meet with, for obvious reasons.<br \/>\nIt is a question that each organization needs to ask itself and answer honestly.<br \/>\nThe resulting introspection and self-awareness may not be comfortable, but it is the best way for an organization to develop a robust and mature security posture based upon security operations and incident response.<br \/>\nMaturity is the key to improving an organization\u2019s security posture, but it is not something that can be arrived at through dishonesty.<br \/>\nSecurity through maturity and humility is a workable philosophy with proven results for those organizations that are willing to give it a try.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fa08014db4&#038;e=20056c7556 (http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a33472e754&#038;e=20056c7556)<\/p>\n<p>The Future of Passwords Isn\u2019t Just Biometric, It\u2019s Behavioral<br \/>\nMotivated, no doubt, by the rash of large-scale online security breaches in recent years, companies like Apple and Google have attempted to move security into a post-password world with features like fingerprint or iris recognition.<br \/>\nBiometric technology represents a vast improvement over strings of letters and numbers, but the future\u2019s most secure passwords will likely also be behavioral.<br \/>\nOur bodies, it turns out, are easier to imitate than our actions.<br \/>\nThe two things in concert, well, that\u2019s what makes us recognizable to each other and will soon be what makes us recognizable to our phones and computers.<br \/>\nSwiping.<br \/>\nFingerprints, the quintessential personal ID, are less replicable than the average string of alphanumerics, which is why devices from the iPhone to the Lenovo ThinkPad are equipped with fingerprint scanners.<br \/>\nTalking.<br \/>\nIn addition to carrying a baseline acoustic \u201cvoiceprint,\u201d the human voice carries information about variables like cadence, accent, and emotional state, all of which make hacking more difficult as long as authentication rests on the characteristics of speech and not simply on a spoken password, which could easily be replicated mechanically.<br \/>\nBlinking.<br \/>\naces can be replicated even more easily than fingerprints and voices.<br \/>\nIn addition to recognizing your face, systems like IdentityCheck also require users to blink \u2014 verifying that you\u2019re actually there.<br \/>\nWalking.<br \/>\nBy analyzing a person\u2019s walk, a phone could determine whether it was in its rightful owner\u2019s pocket without requiring them to actively authenticate.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=93cbde1373&#038;e=20056c7556<\/p>\n<p>Private Reporting Helpline to Check Cyber Crime in Delhi-NCR<br \/>\nNew Delhi: Victims of cyber offences can now report their cases and seek technical help at zero cost at the first private cyber crime reporting helpline which has become operational in Delhi-NCR.<br \/>\nThrough the helpline number launched last month, the reporting centre has received around 250 complaints in 15 days.<br \/>\nOf the total complaints, 130 pertained to cases of financial fraud mostly phishing, and around 80 cases of outraging modesty of women through social networking sites, said a source in the Indian Cyber Army, developer of the helpline and consultant to Delhi Police and their counterparts in three other states.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ce86b9dc0b&#038;e=20056c7556<\/p>\n<p>Wells Fargo study: Businesses not well-prepared for cyber attacks<br \/>\nThe study of 100 U.S. middle-market companies and large corporations found that 85 percent have purchased cyber security and data privacy insurance coverage and 44% have already filed an insurance claim because of a breach.<br \/>\nBut besides insurance coverage, companies aren\u2019t very prepared for a cyber breach.<br \/>\nThe study found that one in five businesses have not tested their \u201cincident response plan\u201d and 27% don\u2019t have an employee awareness training program for cyber security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8700a7d48f&#038;e=20056c7556<\/p>\n<p>90% of directors believe regulators should hold firms liable for hacks<br \/>\nA new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.<br \/>\nNine out of 10 of those surveyed believe regulators such as the FTC should hold businesses liable for cyber breaches if due care has not been followed, and more than 50 percent expect investors to demand more transparency as a result of the increased public focus on cybersecurity liability.<br \/>\nPressure is building for boards and management teams to be especially wary of any corporate behavior that can impact their brand and erode shareholder value.<br \/>\nSecurity is now the second leading risk to a company\u2019s brand \u2013 behind ethical issues and ahead of traditional risks related to safety, health, and the environment.<br \/>\nNearly 50 percent who knew of the FTC\u2019s lawsuit against a major hotel chain said the case has influenced their executive discussions on cybersecurity liability.<br \/>\n90 percent of respondents feel third-party software providers should bear legal liability when vulnerabilities are found in their packaged software.<br \/>\nThis is particularly relevant because, according to Veracode\u2019s 2015 State of Software Security Report, nearly three out of four enterprise applications produced by third-party software vendors contain vulnerabilities listed in the OWASP Top 10, an industry-standard security benchmark.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5597eec119&#038;e=20056c7556<\/p>\n<p>Firefox 42 is out, with many privacy and security improvements<br \/>\nMozilla has released Firefox 42, and with it, a new feature that should increase user privacy online.<br \/>\nIt&#8217;s called Tracking Protection and it&#8217;s incorporated into the Private Browsing option.<br \/>\nAnother new feature in Firefox is a new Control Center &#8211; a central place for reviewing and changing site security and privacy controls.<br \/>\nIt&#8217;s located in the browser&#8217;s address bar.<br \/>\nIn addition to this, the company has updated the browser&#8217;s security indicators.<br \/>\nFinally, the new version of the browser also includes fixes for a dozen security issues, some of which could lead to arbitrary code execution.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a071265293&#038;e=20056c7556<\/p>\n<p>Global banking, cyber, blockchain, digital IDs and Varoufakis \u2013 experts examine the future of banking<br \/>\nKey figures voiced big predictions at yesterday&#8217;s FT Banking Summit.<br \/>\nCredit Suisse chief executive Tidjane Thiam&#8217;s thoughts on why the global economy needs European investment banks to succeed grabbed the headlines, as did, the four point plan on how to boost the Eurozone through reforms to the European Central Bank outlined by former Greek finance minister Yanis Varoufakis.<br \/>\nThree points stood out for me.<br \/>\nThere is a pressing need for greater support for cyber threat intelligence sharing; there may be a need for a &#8216;regulatory pause&#8217; to banking reform, and the hour has come for digital currencies, payments and identities to take online financial services to a new level.<br \/>\nOver the coming months therefore banks have good reason to move forward quickly with this initiative while they still have some advantage in terms of being viewed as the most trusted type of entity to provide financial services.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2bdf4e4624&#038;e=20056c7556<\/p>\n<p>OPINION: Top 10 security predictions for 2016<br \/>\nSniper&#8217; and &#8216;shotgun&#8217; malware:<br \/>\nWe believe that larger breaches in 2016 will be the result of custom-designed malware designed to get past the defences of specific organisations, such as the attack on US retailer Target.<br \/>\nMoving to mobile:<br \/>\nMobile attacks continue to increase as mobile devices become more commonplace in the workplace, offering hackers direct and potentially lucrative access to personal and corporate data.<br \/>\nOur 2015 Security Report found that 42% of organisations had suffered mobile security incidents which cost more than $250,000 to remediate, and 82% expected incidents to rise.<br \/>\nThreat prevention:<br \/>\nThese new attack vectors require more proactive and advanced solutions that catch evasive malware.<br \/>\nCPU-level sandboxing is able to identify the most dangerous threats in their infancy before they can evade detection and infect networks.<br \/>\nAttacks on critical infrastructure:<br \/>\nAttacks on public utilities and key industrial processes will continue, using malware to target the SCADA systems that control those processes.<br \/>\nAnd as control systems become increasingly connected, this will extend the potential attack surface \u00e2\u0080\u0093 which will require better protection.<br \/>\nIoT and smart devices:<br \/>\nThe Internet of Things is still emerging and is unlikely to make a big impact in 2016.<br \/>\nNevertheless organisations need to think about how they can protect smart devices and prepare themselves for wider adoption of the IoT.<br \/>\nYou wear it well:<br \/>\nWearables like smartwatches are making their way into the enterprise, bringing with them new security risks and challenges.<br \/>\nTrains, planes and automobiles:<br \/>\n2015 saw the emergence of car hacking, in which the vehicle&#8217;s software is hijacked to take control of it.<br \/>\nReal security for virtual environments:<br \/>\nAs organisations move to virtualised environments, security needs to be designed in from the outset to deliver effective protection.<br \/>\nNew environments, new threats:<br \/>\nsince adoption of Windows 8 was relatively low, but with Windows 10 experiencing a high uptake driven by the free download available, cyber-criminals will turn their attention to trying to exploit these new operating systems where updates are more frequent and users are less familiar with the environment. &#8211; See more at: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=86f69fcc4c&#038;e=20056c7556<br \/>\nSecurity consolidation keep it simple!:<br \/>\nTo protect against multifaceted threats, security professionals are likely to increase their reliance on centralised security management solutions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=77cf3bf38d&#038;e=20056c7556<\/p>\n<p>4 in 10 Businesses Have Filed a Cyber Insurance Claim: Survey<br \/>\nA recent Wells Fargo survey of 100 U.S. middle-market and large companies found that 85 percent say they have purchased cyber and data privacy insurance, while 44 percent have already filed a claim as a result of a breach.<br \/>\nAnd how much do companies pay for cyber insurance.<br \/>\nThe cost of a policy depends on a variety of factors including the type of business, volume of records (personally identifiable information, protected health information, credit card data) and the organization&#8217;s security controls.<br \/>\n&#8220;Network security and privacy liability (aka &#8216;cyber&#8217;) is one of the most subjective lines of insurance, meaning that the underwriter has significant flexibility when pricing the risk,&#8221; Dena Cusick, national practice leader with Wells Fargo Insurance&#8217;s Technology, Privacy and Network Risk National Practice, told NBC News by email. &#8220;The premium can be as low as $750 for a small, well-managed organization and well into the seven figures for large organizations with significant volumes of data.&#8221;<br \/>\nMeanwhile, the rise in cyber claims filed is also driving up insurance rates.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b27520730d&#038;e=20056c7556<\/p>\n<p>OPM hires new cybersecurity adviser to address data breach concerns<br \/>\nClifton Triplett will serve as the senior cyber and information technology adviser to acting OPM Director Beth Cobert, the agency announced Wednesday in a press release.<br \/>\nIn his new role, Triplett will help carry out OPM\u2019s IT infrastructure plan, which calls for modernizing and overhauling its computer systems and minimizing the threat of future cyber intrusions.<br \/>\nTriplett is expected to work alongside OPM Chief Information Office Donna Seymour to make these improvements to the IT architecture.<br \/>\nPrior to joining OPM, Triplett was the managing partner at SteelPointe Partners, a global management consulting company.<br \/>\nHe holds 30 years of cross-industry and IT organizational transformation experience with Fortune 200 companies and industry leaders in the defense, telecommunications, oil field service, tractor, automotive, and aerospace industries.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=efcc499b33&#038;e=20056c7556<\/p>\n<p>Business Demand for Cyber and Data Privacy Insurance Surges While Gaps Remain in Incident Response Plans<br \/>\nThe FINANCIAL &#8212; In a recent study of 100 U.S. middle market companies and large corporations, 85% say they have purchased cyber security and data privacy insurance coverage to protect against financial loss, while nearly half (44%) have already filed an insurance claim as a result of a breach.<br \/>\nHowever, while more companies are purchasing cyber security and data privacy insurance, some gaps still remain in incident response plans, making those companies vulnerable to the financial consequences of a data privacy incident, according to the study, commissioned by Wells Fargo Insurance\u2019s Technology, Privacy and Network Risk Practice (TPN), part of Wells Fargo &#038; Co.<br \/>\nExamining middle market companies and large corporations with $100 million or more in annual revenue, the study looked at companies from a variety of industries ranging from manufacturing to educational services.<br \/>\nIt measured the companies\u2019 current levels of readiness to respond to a cyber security or data privacy incident, perceptions of their own security and network vulnerabilities, and challenges faced when purchasing coverage.<br \/>\nNot surprisingly, the most common reasons given for purchasing this specialized coverage were to protect the business against financial loss (78%), protect shareholders (64%), and help prepare for data privacy events (61%).<br \/>\nOf those that filed an insurance claim, 96% reported they were satisfied with their coverage, how the claim was handled, and that their policy had enough coverage for expenses and damages.<br \/>\nCompanies are not testing their plans \u2013 Despite that most companies surveyed have an incident response plan, one in five have not tested their plan.<br \/>\nOne in 10 companies that had to implement their plan did so without testing it beforehand, with three in four (74%) saying they needed to revise their plan following the incident.<br \/>\nLeaked data is the top cyber security and data privacy concern, yet one in 10 companies does not have an existing incident response plan \u2013 35% of companies are concerned about private data leaks, while 25% are concerned about hackers.<br \/>\nOf those companies that have a plan, (85%) developed it with the help of a third-party vendor.<br \/>\nFor almost half of the companies that have cyber and data privacy insurance, the biggest challenges they faced when purchasing the coverage was finding a policy to adequately fit their company\u2019s needs (47%) or the cost (42%) \u2014 highlighting the need for an experienced broker to help with this process.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1c25459148&#038;e=20056c7556<\/p>\n<p>Foreign business lobbies ask China to revise cyber insurance draft rules<br \/>\n(Reuters) \u2014 Foreign business lobbies have asked China to substantially revise proposed cyber security regulations for the insurance industry, signaling a dispute that started with the publication of similar bank technology rules earlier this year may widen.<br \/>\nThe draft regulations, announced by the China Insurance Regulatory Commission last month, state that insurers, along with their holding companies and asset managers, should prioritize the purchase of \u201csecure and controllable\u201d products, including domestic encryption technologies and local hardware and software.<br \/>\nMore than 20 foreign business lobbies, including the American Chamber of Commerce, the American Council of Life Insurers, and Japan Electronics and Information Technology Industries Association, stated that such provisions would run counter to global information security standards, in a joint letter to CIRC which they delivered at the end of last month.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4d0be4fcba&#038;e=20056c7556 (http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1972f33d5c&#038;e=20056c7556)<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=ec6de9325f)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Mature &#038; Unconfident: The Best Information Security Teams Ever! The organization that is mature and unconfident is the best kind, in my opinion. These types of organizations took&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1168","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1168"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1168\/revisions"}],"predecessor-version":[{"id":3655,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1168\/revisions\/3655"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}