{"id":1219,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail37-atl11-rsgsv-net-2\/"},"modified":"2021-12-30T11:38:58","modified_gmt":"2021-12-30T11:38:58","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail37-atl11-rsgsv-net-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail37-atl11-rsgsv-net-2\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail37.atl11.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* MEPs back sharing airline data to \u2018fight terrorism\u2019<br \/>\n* Cybersecurity of critical infrastructure is a &#8216;mess&#8217; and nations must cooperate to fix it, warns Eugene Kaspersky<br \/>\n* Newark police: Cyberattack disrupted some computer systems<br \/>\n* How to get the most out of your security investment<br \/>\n* UEBA is only one piece of the cyber risk management puzzle<br \/>\n* IRS Chief: Agency Faces Loss of Key InfoSec Personnel<br \/>\n* SANS to Host First-Ever Salt Lake City, Utah Information Security Training Event<br \/>\n* Software tools and services used to achieve ISO 27001<br \/>\n* New Research From SANS And DomainTools Reveals Shift Towards Threat Hunting Model And &#8216;Work Smarter Not Harder&#8217; Approach To Security<br \/>\n* 3 steps to embracing NIST 800 security controls<br \/>\n* Ottawa open for comments on proposed breach notification regulations<\/p>\n<p>MEPs back sharing airline data to \u2018fight terrorism\u2019<br \/>\nThe European Commission first proposed the so-called Passenger Name Record in 2011.<br \/>\nIt marks a five-year battle to get the legislation approved, having being held up over privacy concerns.<br \/>\nThe so-called Passenger Name Record was approved by 416 votes for, to 179 votes against, with nine abstentions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d784182792&#038;e=20056c7556<\/p>\n<p>Cybersecurity of critical infrastructure is a &#8216;mess&#8217; and nations must cooperate to fix it, warns Eugene Kaspersky<br \/>\nThe European Commission first proposed the so-called Passenger Name Record in 2011.<br \/>\nIt marks a five-year battle to get the legislation approved, having being held up over privacy concerns.<br \/>\nThe so-called Passenger Name Record was approved by 416 votes for, to 179 votes against, with nine abstentions.<br \/>\nKaspersky urged governments to do more to combat the threats hackers pose to power-grids, turbines, reactors and other essential facilities.<br \/>\nKaspersky pointed out how, when it comes to ensuring buildings are physically secure, there are regulations which must be adhered to, but that there isn&#8217;t anything of this kind for cybersecurity at all, not even for critical infrastructure.<br \/>\nSpeaking at the same event, Cevn Vibert, industrial control security evangelist at industrial IT provider SolutionsPT, argued that governments do understand the challenges surrounding securing critical infrastructure, but rather the problem is they don&#8217;t know how to implement the changes.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9e11c1259d&#038;e=20056c7556<\/p>\n<p>Newark police: Cyberattack disrupted some computer systems<br \/>\nBut they say the attack didn&#8217;t disrupt the delivery of emergency services.<br \/>\nAnd there&#8217;s no indication that any information stored on the affected servers was compromised.<br \/>\nActing Public Safety Director Anthony Ambrose told NJ.com (http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3707a9ba1b&#038;e=20056c7556) that department staffers couldn&#8217;t access the various systems while crews worked to clear servers of a virus implanted during the attack.<br \/>\nThe virus temporarily locked down the servers, blocking access to the program used to track and analyze crime data and another used to dispatch police and emergency officers.<br \/>\nA backup system was used for dispatch services.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cb5be642cb&#038;e=20056c7556<\/p>\n<p>How to get the most out of your security investment<br \/>\nAll too often organisations look to resolve security issues by simply purchasing more expensive security products, without ensuring the solution can evolve with the company.<br \/>\nHowever, misconfigured or poorly set up security tools do not offer increased security, rather, they can lead to increased vulnerability.<br \/>\n-Build a long-term plan for your security investment<br \/>\n-Find the best security solution for your company<br \/>\n-Continue to analyse and improve<br \/>\n-How to respond to a security breach: Plan,do, check, act<br \/>\n-Let go of your ego<br \/>\n-Figure out what went wrong<br \/>\n-Eliminate the problem<br \/>\n-Test, test, test<br \/>\nErdal has found that Data Loss Prevention solutions (DLP) offer valuable information if breaches occur, which normally doesn\u2019t happen if policies are properly built.<br \/>\nThe available reports provide details like confidential data transfers that took place, from which computers, at what time and the exact transferred content.<br \/>\nOnce IT Administrators or security staff analyse these reports, they can address the issue by restricting data transfers for the problematic users, they can even use the reports as proof in court or they can take further measures depending on the vulnerability.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=220a212dad&#038;e=20056c7556<\/p>\n<p>UEBA is only one piece of the cyber risk management puzzle<br \/>\nEven &#8220;at the front&#8221;, UEBA is only a threat detection tool.<br \/>\nIt uncovers individuals or technologies that are exhibiting unusual behavior but it doesn\u2019t take into account greater context like the business context of the user\u2019s activities, associated vulnerabilities, indicators of attack, value of the assets at risk or the probability of an attack.<br \/>\nBy itself, UEBA output lacks situational awareness, and still leaves SOC analysts with the task of figuring out if the events are truly problematic or not.<br \/>\nIf the behavior, though unusual, is justified, then it is a false positive.<br \/>\nIf the threat is to corporate information that wouldn\u2019t impact the business if it were compromised, it\u2019s a real threat, but only worth chasing down after higher priority threats have been mitigated.<br \/>\nFor example, let\u2019s say through UEBA software, it is identified that an employee on the finance team is logging into a human resources application that he typically would not log into.<br \/>\nUEBA is only informing the incident responder of a potential threat.<br \/>\nThe SOC will have to review the activity, determine if it is legitimate, if not, check if the user has access privileges to access sensitive information in the application, see if their laptop has a compromise that may indicate a compromised account and then make what is at best a not so educated guess that will often result in inaccurate handling.<br \/>\nJust as important, the SOC analyst will likely do all of their homework and handle the incident appropriately, but without the right context they may have wasted a lot of time chasing down a threat that of low importance relative to others in the environment.<br \/>\nA true &#8220;inside-out&#8221; approach to cyber risk management begins with an understanding of the business impact of losing certain information assets.<br \/>\nThe information assets that, if compromised, would create the most damage are the information CISOs, line-of-business and application owners, SOC investigators, boards of directors and everyone else within the company should focus on protecting the most.<br \/>\nThey should determine where those assets are located, how they may be attacked, if they are vulnerable to those attacks and the probability of it all happening.<br \/>\nOnce that contextualized information is determined, everyone within the company can prioritize their efforts to minimize cyber risk.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2b10d8367b&#038;e=20056c7556<\/p>\n<p>IRS Chief: Agency Faces Loss of Key InfoSec Personnel<br \/>\n&#8220;The loss of streamlined critical pay authority has created major challenges to our ability to retain employees with the necessary high-caliber expertise,&#8221; IRS Commissioner John Koskinen testified at an April 12 hearing on cybersecurity and protecting taxpayer information held by the Senate Finance Committee.<br \/>\nHe said the agency&#8217;s top cybersecurity expert recruited through the program recently left. &#8220;In fact, out of the many expert leaders and IT executives hired under critical pay authority, there are only 10 IT experts remaining at the IRS, and we anticipate there will be no staff left under critical pay authority by this time next year.&#8221;<br \/>\nThe lapsed law, which expired in September 2013, allowed the IRS to pay more than usual to hire up to 40 individuals for positions requiring extremely high-level expertise, including information security.<br \/>\nAmong those recruits: IRS Chief Technology Officer Terence Milholland, who served as executive vice president and CTO at card issuer Visa International when recruited 8\u00bd years ago and is leaving the agency later this year.<br \/>\n&#8220;When it comes to blocking hackers, Congress has done next to nothing while the IRS loses its ability to hire the experts who can keep taxpayer information safe,&#8221; Wyden said. &#8220;If you&#8217;re a top-notch tech expert, you&#8217;re already taking a pay cut to work in public service.<br \/>\nNow, without what&#8217;s called streamlined critical pay authority, it can take four to six months to bring a new hire on board at the IRS.<br \/>\nSo let&#8217;s be clear: Taxpayer information is under assault every day, but the IRS does not have the legal authority it needs from Congress to build a cybersecurity team that can beat back the crooks.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8ba3527010&#038;e=20056c7556<\/p>\n<p>SANS to Host First-Ever Salt Lake City, Utah Information Security Training Event<br \/>\nBETHESDA, Md., April 14, 2016 \/PRNewswire-USNewswire\/ &#8212; SANS Institute, the global leader in information security training, today announced its first-ever Salt Lake City, Utah training event.<br \/>\nScheduled for June 27 through July 2, SANS Salt Lake City 2016 will feature InfoSec courses focused on traditional information security, digital forensics and industrial control systems (ICS) security.<br \/>\nDeveloper and management courses will be offered in addition to bonus evening sessions covering some of today&#8217;s most complex security issues.<br \/>\nIncluded among the courses offered at SANS Salt Lake City are the popular SEC504: Hacker Tools, Techniques, Exploits and Incident Handling course and the FOR508: Advanced Digital Forensics and Incident Response.<br \/>\nSANS will also offer its ICS410: ICS\/SCADA Security Essentials course.<br \/>\nIn addition to helping InfoSec professionals greatly sharpen and expand their skills, some of these courses will also help with DoD 8570 and GIAC approved certification exam preparation.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0bd03e366e&#038;e=20056c7556<\/p>\n<p>Software tools and services used to achieve ISO 27001<br \/>\nMany organizations are unsure of what\u2019s available to help them implement and get certified in quick time, so CertiKit summarized the most common areas of the ISO 27001 standard where software tools and services come in handy.<br \/>\nHow many of these software tools and services you decide to use depends on your budget, timescales and how secure you want to be.<br \/>\nThe infographic below will help you to choose wisely in order to achieve ISO 27001.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0214020067&#038;e=20056c7556<\/p>\n<p>New Research From SANS And DomainTools Reveals Shift Towards Threat Hunting Model And &#8216;Work Smarter Not Harder&#8217; Approach To Security<br \/>\nSEATTLE, April 14, 2016 \/PRNewswire\/ &#8212; DomainTools, the leader in domain and DNS-based cyber threat intelligence, today announced the results of the first annual Threat Hunting: Open Season on the Adversary Survey, conducted by the SANS Institute.<br \/>\nThe research revealed that 85 percent of enterprises have already adopted some form of Threat Hunting to aggressively track and eliminate cyber adversaries as early as possible.<br \/>\nThis proactive &#8220;Threat Hunting Model&#8221; leverages existing tools combined with human intervention to strengthen the security posture of the organization.<br \/>\nAccording to the survey, adopters of this model reported positive results, with 74 percent citing reduced attack surfaces, 59 percent experiencing faster speed and accuracy of responses, and 52 percent finding previously undetected threats in their networks.<br \/>\nAdditional key findings from the SANS report include:<br \/>\nThe top seven data sets that support threat hunting are: IP addresses, network artifacts and patterns, DNS activity, host artifacts and patterns, file monitoring, user behavior and analytics, and software baseline monitoring.<br \/>\n86 percent of respondents said the most common trigger for launching a hunt is an anomaly or anything that deviates from normal network behavior.<br \/>\nOnly 23 percent of businesses have hunting processes that are invisible to attackers, meaning the majority of organizations are at risk from exposing internal hunting TTPs in a way that benefits the atta<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=714ec982a9&#038;e=20056c7556<\/p>\n<p>3 steps to embracing NIST 800 security controls<br \/>\nNIST 800-53, in particular, lays out recommended policies and procedures covering access control, incident response, business continuity, disaster recoverability and about a dozen more key areas.<br \/>\nHere are three key lessons I learned along the way:<br \/>\n1. Top management commitment is absolutely crucial<br \/>\nSeek senior-level buy-in at the start, and take steps to reinforce it as you go.<br \/>\nWithout senior executives fully on board, any wonderful new security policies and procedures you come up with will languish on your hard drive.<br \/>\n2. You can\u2019t do it all, so do what you can<br \/>\nNIST 800-53 very extensively outlines how to establish baseline infosec controls based on an organizational assessment of risk.<br \/>\nCommon sense tells you that controls must be in place to have any effect.<br \/>\nCreating policy for which you lack the manpower and resources to enforce is a recipe for futility.<br \/>\nTo account for this, we engaged our subject matter experts in a triaging process.<br \/>\n3. Be wary of the butterfly effect<br \/>\nAn insect flapping its wings in China can trigger a tornado in Florida.<br \/>\nCreating new polices can trigger new responsibilities and intensify pressure on existing resources.<br \/>\nIt is vital to get buy-in, not just from top management, but especially from mid-level management, on whose shoulders a new tier specified responsibilities will likely fall.<br \/>\nOur goal is to use the NIST controls not just to tighten security, but to free up our organization so it\u2019s more productive.<br \/>\nThus our mantra has become \u201cenabling the business securely.\u201d We express this often.<br \/>\nTransparency and teamwork are the result.<br \/>\nMeanwhile, this continual feedback loop is helping us keep our NIST controls alive and vital.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6e16956654&#038;e=20056c7556<\/p>\n<p>Ottawa open for comments on proposed breach notification regulations<br \/>\nIt\u2019s long been known that for many pieces of federal and provincial legislation, the regulations cabinet approves \u2014 but the wording of the law can have as much if not more impact on organizations.<br \/>\nIt\u2019s particularly true with the mandatory data breach notification and reporting regulations Ottawa is about to write for organizations that fall under the Personal Information Protection and Electronic Documents Act (PIPEDA).<br \/>\nLast month Innovation, Science and Economic Development Canada issued a 26-page discussion paper outlining issues and asking for answers to 26 questions that will help the government frame the regulations.<br \/>\nOrganizations have until the end of May to reply.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dec168b864&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=f052dd3b32)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * MEPs back sharing airline data to \u2018fight terrorism\u2019 * Cybersecurity of critical infrastructure is a &#8216;mess&#8217; and nations must cooperate to fix it, warns Eugene Kaspersky * Newark police: Cyberattack disrupted&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1219","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1219"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1219\/revisions"}],"predecessor-version":[{"id":3706,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1219\/revisions\/3706"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}