{"id":1198,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail73-suw13-rsgsv-net\/"},"modified":"2021-12-30T11:38:56","modified_gmt":"2021-12-30T11:38:56","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail73-suw13-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail73-suw13-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail73.suw13.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n* GSMA outlines thoroughly sensible IoT security rules<br \/>\n* New Trustwave Report: Cybersecurity Pros Face Increased Pressures<br \/>\n* Why SMBs should build a threat intelligence program &#8212; no tech investment required<br \/>\n* Infosec pros still pressured to release unsecure projects: Survey<br \/>\n* 5 Big Incident Response Mistakes<br \/>\n* Time to rethink your approach to security budgeting<br \/>\n* CERT Bulgaria Registered 737 Cyber Incidents in 2015<br \/>\n* Marsh names former U.K. intelligence director as cyber risk adviser<br \/>\n* Interview with Troels Oerting on cybersecurity in modern organizations<br \/>\n* Terrorism key security threat facing Singapore<br \/>\n* The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks<br \/>\n* Tripwire Study: IT Professionals Overconfident in Cyber Attack Detection<br \/>\n* How to build secure supply chains: 3 key steps<\/p>\n<p>GSMA outlines thoroughly sensible IoT security rules<br \/>\nAbout time: the GSM Association has released a bunch of guidelines to try and address the chronic insecurity of the Internet of Things.<br \/>\nThe group has put together documents for the three key segments (as it sees the IoT market anyhow): telecommunication carriers, service operators, and device manufacturers.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cc493cd884&#038;e=20056c7556<\/p>\n<p>New Trustwave Report: Cybersecurity Pros Face Increased Pressures<br \/>\nCHICAGO, IL &#8211; Trustwave\u00ae today released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.<br \/>\nIn addition to providing year-over-year comparisons of 2014 and 2015, the third-annual report adds previously unmeasured insight related to cybersecurity pressures including new data and regional viewpoints.<br \/>\nIn addition to respondents from the United States, Canada and the United Kingdom, the 2016 report features 398 Asia Pacific respondents from Australia and Singapore and adds new questions that address the timing of increased pressure, job security, and specific security threats that pose the greatest challenges to security practitioners.<br \/>\nKey findings from the 2016 Security Pressures Report from Trustwave include:<br \/>\nUnder pressure: 63% of information security professionals felt more pressure to secure their organizations in 2015 compared to the previous 12 months, and 65% expect to feel additional pressure this year.<br \/>\nThose numbers grew 9% and 8%, respectively, compared to last year.<br \/>\nSkills gap: Shortage of security expertise has climbed from the eighth-biggest operational pressure facing security pros to the third-biggest, behind advanced security threats and adoption of emerging technologies.<br \/>\nBoard burden: 40% of respondents feel the most pressure in relation to their security program either directly before or after a company board meeting &#8211; 1% higher than how they feel after a major data breach hits the headlines.<br \/>\nDetection trumps prevention: The largest security responsibilities facing 54% of respondents are related to detection of vulnerabilities, malware and compromised systems.<br \/>\nMoved to managed: The number of respondents who either already partner or plan to partner with managed security services providers has climbed from 78% to 86%.<br \/>\nEmpty promises: Pressure to select security technologies containing all of the latest features has jumped from 67% to 74% among respondents, but having the proper resources to put them to use has fallen from 71% to 69%.<br \/>\nData and DDoS gloom: Customer data theft and intellectual property theft remain the top two worrying outcomes following an attack or data breach, but a disabled corporate website is the biggest riser (from 7% to 13%).<br \/>\nDemand outpacing supply: Respondents wishing to quadruple their staff from its current size has risen from 24% to 29%.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ff2d0b1ff0&#038;e=20056c7556<\/p>\n<p>Why SMBs should build a threat intelligence program &#8212; no tech investment required<br \/>\n&#8220;Contrary to popular narrative, I believe it makes a lot of sense for small information security programs to build a threat intelligence capacity,&#8221; mentions Swanson in this Swannysec blog post. &#8220;While this may not be a popular opinion, I know smaller operations can benefit from a right-sized threat intelligence program because I&#8217;m in the process of building one currently and there have been tangible results.&#8221;<br \/>\n&#8220;Anyone interested in threat intel should start by seeking out and reading published threat reports from companies such as FireEye, Palo Alto, or Symantec,&#8221; suggests Swanson. &#8220;A large repository of these reports can be located on GitHub.&#8221;<br \/>\nThe next step, according to Swanson, would be introducing low-effort and low investment automation to process the freely available threat intelligence.<br \/>\nHowever, before even considering any form of automation, Swanson feels the following must be considered.<br \/>\nNo matter how empowering machine learning is humans need to be part of the equation. &#8220;No automated system is going to make any amount of threat intelligence magically useful without people making informed decisions about the data as it relates to the security and risk posture of the organization,&#8221; explains Swanson.<br \/>\nWith threat data coming in and being analyzed, the next step is developing a plan based on information gleaned from the threat intelligence.<br \/>\nBesides external threat intel, Swanson suggests data mining all possible internal sources for actionable intelligence.<br \/>\nSwanson cautions to start small, &#8220;Generate top ten lists of exploits, malware, brute-force attempts, etc. and start to observe trends in those reports.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=12fd4da89a&#038;e=20056c7556<\/p>\n<p>Infosec pros still pressured to release unsecure projects: Survey<br \/>\nDespite an increase in the number of data breaches last year infosec pros say they continue to be pressured by the business side to release projects that aren\u2019t fully secure, according to an international survey.<br \/>\nThe survey, paid for by Trustwave, showed that 77 per cent of respondents in five countries \u2014 and 71 per cent of Canadians \u2014 felt either frequent or periodic pressure to roll out IT projects that weren\u2019t security ready.<br \/>\nThe good news is that the majority agreed it was once or twice rather than frequently.<br \/>\nHowever, if a bug slips by that could be once too many.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=615dd5c21c&#038;e=20056c7556<\/p>\n<p>5 Big Incident Response Mistakes<br \/>\nWhile the initial breach itself tends to draw the most attention, how an organization responds to the incident shapes the eventual scope and damage of the attack.<br \/>\nNot having a formal plan and being unprepared are just two of the mistakes that organizations make.<br \/>\nHere are some of the others:<br \/>\n1) Responding before understanding the full scope of the breach.<br \/>\n2) Not communicating effectively.<br \/>\n3) Not getting legal involved early.<br \/>\n4) Tipping your hand.<br \/>\n5) Using an improperly staffed response team.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=57b3809549&#038;e=20056c7556<\/p>\n<p>Time to rethink your approach to security budgeting<br \/>\nSome healthcare security budgets are increasing at a modest pace according to Forrester; 16% of the IT budget compared with 19% across all industries.<br \/>\nHowever, there are still many other healthcare security budgets that appear to get trivial increases, and, in some cases, a reduction in security-related expenditures.<br \/>\nIncreases in the accompanying chart are not exceptionally large.<br \/>\nAccording to Forrester, almost 30% of the healthcare security budget consists of staffing and maintenance costs with staffing representing almost 14% and maintenance of existing on-premises security technology representing approximately 15%.<br \/>\nBut scarce security skills in the labor pool are ongoing challenges for all healthcare organizations.<br \/>\nThis not only raises the cost of staffing but also restricts efficiency.<br \/>\nTo reduce both staffing and maintenance costs, Forrester recommends that healthcare organizations consider increasing the adoption of managed security or security-as-a-service.<br \/>\nThey contend that security is a critical function, but not all of it needs to be delivered in-house.<br \/>\nSecurity spending in the healthcare industry can vary widely, as does the efficiency and cost-effectiveness of that spending.<br \/>\nHealthcare organizations can guide their budgets for optimal outcomes by thinking through and answering the types of functions and activities that it should own and the staff skills to hire vs. outsource.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1b6d12d5df&#038;e=20056c7556<\/p>\n<p>CERT Bulgaria Registered 737 Cyber Incidents in 2015<br \/>\nA total of 737 cyber incidents were registered at the websites of central and local government authorities and other institutions in Bulgaria last year, according to the National Computer Security Incidents Response Team (CERT Bulgaria).<br \/>\nThe largest number of those incidents involved malicious code (294), followed by fraud (105), offensive content (100), attempted unauthorized intrusion (65), reaping information (26), and intrusions (10).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3c764f7915&#038;e=20056c7556<\/p>\n<p>Marsh names former U.K. intelligence director as cyber risk adviser<br \/>\nMarsh L.L.C. on Thursday said it has appointed Sir Iain Lobban, the former director of the U.K.<br \/>\nGovernment Communications Headquarters, the country&#8217;s security and intelligence organization, as senior adviser on cyber risk.<br \/>\nIn his newly created role, Mr.<br \/>\nLobban \u201cwill provide strategic advice as Marsh works with governments, regulators and clients on how best to address the growing threat of cyber risk,\u201d Marsh said in a statement.<br \/>\nHe will report to Mark Weil, Marsh&#8217;s CEO of U.K. and Ireland.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e59636b54b&#038;e=20056c7556<\/p>\n<p>Interview with Troels Oerting on cybersecurity in modern organizations<br \/>\nThe role of the chief information security officer (CISO) has profoundly changed over the years, from IT security management to high-level risk management.<br \/>\nToday Troels Oerting is the Chief Information Security Officer (CISO) at Barclays, I consider him a Master, in my opinion, only a few professionals have had its experience in cyber security, Troels is the incarnation of the modern CISO.<br \/>\nn the past, which is not so long ago, I believe that the CISO role was considered to be a technical role.<br \/>\nThe profile should be technical and it would often report to the Operations &#038; Technology chief in any bigger organisation.<br \/>\nThe role was rather reactive and aiming at \u2018ticking\u2019 boxes in auditors control schemes based on various vulnerabilities.<br \/>\nI think you will find that there is a growing understanding for the fact that the CISO role is not a tech role but a wider business role.<br \/>\nWhen we, in Barclays, assess the threat we first identify our Adversaries.<br \/>\nWho are they.<br \/>\nWe have intrusion attempts from Nation States, Organised cybercriminal networks and hacktivists.<br \/>\nNext in our assessment is to have a look at the Intent of each of the Adversaries.<br \/>\nam never satisfied if we have losses.<br \/>\nRegardless if it is losses of sensitive data, money or other valuables in our digital repository.<br \/>\nI think that the executive management already have a full understanding of digital security.<br \/>\nI believe that trust is key, and we will be measured by our customers, society and regulators if we can keep their trust.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7a05e3df17&#038;e=20056c7556<\/p>\n<p>Terrorism key security threat facing Singapore<br \/>\nTerrorism is the &#8220;most significant&#8221; security threat facing the Republic today, the Ministry of Home Affairs (MHA) said yesterday, even as it reassured Singaporeans that the overall crime rate here remains low.<br \/>\nThe ministry also highlighted trends of crime statistics which are set to be released by law enforcement agencies over the next few days.<br \/>\nThe overall crime rate remains low although there was a slight increase from 2014, fuelled by a sharp increase in online crime &#8211; such as scams &#8211; which has persisted since 2013.<br \/>\nAlmost all other types of crime have fallen.<br \/>\nViolent property offences and housebreaking are at their lowest levels in 20 years, while unlicensed moneylending harassment hit a 10-year low.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9dca7c68e6&#038;e=20056c7556<\/p>\n<p>The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks<br \/>\nYou invest in the slickest, smartest, security gear.<br \/>\nThe latest in threat intelligence, behavior analysis, and every other cutting-edge tech that widened your eyes on the trade show floor.<br \/>\nIt&#8217;s excellent, exciting, expensive&#8230;and useless against a top-notch social engineer.<br \/>\nThese days, the social engineer&#8217;s favorite tool isn&#8217;t the smile; it&#8217;s the humble phishing message.<br \/>\nRead on to see which attack campaigns and categories earn the dubious honor of winning one of the coveted Phishie Awards.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2cc937427d&#038;e=20056c7556<\/p>\n<p>Tripwire Study: IT Professionals Overconfident in Cyber Attack Detection<br \/>\nTripwire, Inc., a leading global provider of endpoint detection and response, security and compliance solutions, today announced the results of an extensive study conducted by Dimensional Research on behalf of Tripwire.<br \/>\nThe study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to quickly detect a cyber attack in progress.<br \/>\nStudy respondents included 763 IT professionals from retail, energy, financial services and public sector organizations in the U.S.<br \/>\nThe majority of the respondents displayed high levels of confidence in their ability to detect a data breach even though they were unsure how long it would take automated tools to discover key indicators of compromise.<br \/>\nFor example, when asked how long it would take automated tools to detect unauthorized configuration changes to an endpoint on their organizations\u2019 networks, 67 percent only had a general idea, were unsure or did not use automated tools.<br \/>\nHowever, when asked how long it would take to detect a configuration change to an endpoint on their organizations\u2019 networks, 71 percent believed it would happen within minutes or hours.<br \/>\nConfiguration changes are a hallmark of malicious covert activity.<br \/>\nForty-eight percent of energy and health care respondents said they had the lowest percentage of successful patches in a typical patch cycle, with a success rate of less than 80 percent.<br \/>\nNearly two-thirds (62 percent) of respondents were unsure how long it would take for automated tools to generate an alert if they detected an unauthorized device on the network, while 87 percent believed it would happen within hours.<br \/>\nNearly half (48 percent) of respondents working for federal government organizations said not all detected vulnerabilities are remediated within 15 to 30 days.<br \/>\nForty-two percent of midmarket organizations do not detect all attempts to access files on local systems or network-accessible file shares by users who do not have the appropriate privileges.<br \/>\nSixty-one percent of respondents working in the financial services sector said their automated tools do not pick up all the information necessary to identify the locations, departments and other critical details about unauthorized configuration changes to endpoint devices.<br \/>\nOnly 23 percent of respondents said that 90 percent of the hardware assets on their organizations\u2019 networks are automatically discovered.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e8c582cb48&#038;e=20056c7556<\/p>\n<p>How to build secure supply chains: 3 key steps<br \/>\nThe solution is not to build stronger firewalls, as one might think.<br \/>\nEven the Great Wall of China was breached \u2013 and, besides, firewalls inhibit the kind of seamless interaction on which collaborative supply chains depend.<br \/>\nThe better approach is for supply chains to adopt an approach that addresses the challenge holistically, and is agile enough to respond to an ever-changing threat landscape.<br \/>\nThe key here is to address security in terms not just of technology but also in terms of people and processes.<br \/>\nThis approach is critical because it allows supply chain companies to look at their risks properly.<br \/>\n1) Define the ecosystem.<br \/>\nCompanies need to define who their partners are in the supply chain, and categorise them by importance.<br \/>\n2) Identify the primary contacts within each partner company as well as their location \u2013 and make sure everybody in your company has this information.<br \/>\n3) Establish controls and guidelines for each business partner\/category of business partner.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=806c37480d&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=5fb2014fff)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; * GSMA outlines thoroughly sensible IoT security rules * New Trustwave Report: Cybersecurity Pros Face Increased Pressures * Why SMBs should build a threat&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1198","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1198"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1198\/revisions"}],"predecessor-version":[{"id":3685,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1198\/revisions\/3685"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}