{"id":1260,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail174-atl61-mcsv-net\/"},"modified":"2021-12-30T11:39:03","modified_gmt":"2021-12-30T11:39:03","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail174-atl61-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail174-atl61-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail174.atl61.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* Cyber crime \u2018evolving\u2019 ahead of Police Scotland<br \/>\n* Boards don&#8217;t understand maturity of cybercrime model, warns Trend Micro<br \/>\n* Going \u2018disposable\u2019 could save hacking, ID theft nightmares<br \/>\n* Why cyberpreparedness lags. 3 security experts weigh in<br \/>\n* More Businesses Fear Losing Data than Getting Hacked, Survey Shows<br \/>\n* Congressional Probe Says OPM Hackers Arrived in 2012 And We Will Never Know What They Took<br \/>\n* Ransomware prevalent in cloud-based malware<br \/>\n* The Shifting Mindset Of Financial Services CSOs<br \/>\n* FS-ISAC&#8217;s First Chief Info Risk Officer Describes New Role<br \/>\n* Google puts screws to HTTP with new warnings in Chrome<br \/>\n* FTC Highlights How Agency\u2019s Approach to Data Security Aligns with NIST Cybersecurity Framework<br \/>\n* New SANS Institute Survey Shows Data Breach Prevention Practices Are Evolving<br \/>\n* Five IT Security Projects That Will Accelerate Your Career<br \/>\n* Private Cloud Security<br \/>\n* White House Announces the First Federal Chief Information Security Officer<br \/>\n* In Information Security, the Only Constant is Change<br \/>\n* The evolution of data breach prevention practices<br \/>\n* Berkeley Research Group Releases Cybersecurity Preparedness Benchmarking Study<\/p>\n<p>Cyber crime \u2018evolving\u2019 ahead of Police Scotland<br \/>\nThe Association of Scottish Police Superintendents said falling recorded crime figures belied the true picture of a service struggling to come to terms with online offending.<br \/>\nThe national force must make savings totalling \u00a31.1 billion by 2026 but is expected to face a budget shortfall of \u00a321m for the current financial year.<br \/>\nWhile recorded crime is now at its lowest level since the mid-1970s, senior officers are worried about the level of crime taking place online, much of which goes unreported.<br \/>\nA Scottish Government spokeswoman said: \u201cWe fully recognise the danger that cyber-crime poses to individuals and businesses and are supporting Police Scotland to respond effectively to the changing nature of modern crime with more specialists, including experts in cyber-crime and counter-fraud.<br \/>\nLast year we launched a new strategy to help individuals and businesses increase their online resilience and enable Scotland to become a world leader in cyber-resilience.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=59b904eba3&#038;e=20056c7556<\/p>\n<p>Boards don&#8217;t understand maturity of cybercrime model, warns Trend Micro<br \/>\nThat&#8217;s the view of Rik Ferguson, vice president, security research at Trend Micro, speaking at the recent Cloudsec 2016 event in London.<br \/>\n&#8220;Boards get it with cybersecurity,&#8221; said Ferguson. &#8220;But they don&#8217;t necessarily get how mature the business model is with online crime.<br \/>\nYou shouldn&#8217;t understimate your adversary.&#8221;<br \/>\nDarren Argyle, global CISO at financial services company Markit, explained that while boards now understand the importance of security, they want more detail from security and technology teams on the risks.<br \/>\n&#8220;Organisations like Barclays have now started hiring people like Troels, that didn&#8217;t happen three to four years ago.<br \/>\nHe&#8217;s a walking demonstration that attitudes in the boardroom around recruiting C-level positions has changed,&#8221; argued Ferguson.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=11591cfa2f&#038;e=20056c7556<\/p>\n<p>Going \u2018disposable\u2019 could save hacking, ID theft nightmares<br \/>\nOne starting point is adopting a \u2018disposable\u2019 identity for credit cards and email addresses.<br \/>\nEntroPay offers a prepaid virtual Visa card to make purchases online.<br \/>\nYou can prepay with your credit or debit card, and your personal and financial details are not shared with merchants.<br \/>\nA big trend at the moment is \u201csubscription models\u201d for products ranging from the monthly delivery of nappies to subscribing to podcasts.<br \/>\nThen there are the hopeful deceivers that offer you \u201cfree trials\u201d but only if credit card details are provided!<br \/>\nIn such cases, disposable cards are your friend.<br \/>\nYou can get a card with only $5 value so it will pass as a valid card (these services often conduct a test charge using small amounts like $0.01 to make sure it\u2019s a real card with credit).<br \/>\nYou can rest assured that unless you top up the card, they will not be able to charge you.<br \/>\nDisposable email addresses is one way to ensure that stolen private data can be ring-fenced.<br \/>\nAnother benefit of using such email addresses is you can easily setup a filter using with that email address to auto-delete unwanted messages from particular vendors or services. .<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=eb3c40484d&#038;e=20056c7556<\/p>\n<p>Why cyberpreparedness lags. 3 security experts weigh in<br \/>\nThe barrage of recent headlines about cybersecurity breaches at prominent companies and government institutions should have at least one silver lining: It will prompt organizations to finally get their security act together.<br \/>\nWikibon chief analyst David Vellante said overreliance on tools is a big part of the problem.<br \/>\nImplementing new technology \u201cdemonstrates to management that something is being done,\u201d he said, \u201cbut it doesn&#8217;t get to the root of the problem which is that security should be both a shared responsibility across the enterprise and also an embedded part of risk management.\u201d Organizational issues are tougher to solve than tech ones, and risk management requires time that many business leaders don\u2019t believe they have in these chaotic times.<br \/>\nNo Text in Clipboard<br \/>\nStikeleather also suspects there is a bit of the \u201cavoiding the doctor\u201d syndrome at work.<br \/>\nIt\u2019s better not to know how unprepared you are for a breach than it is to do the work necessary to find out how ugly things really are.<br \/>\nJon Oltsik stated his views succinctly. \u201cMany organizations are simply overwhelmed by the cybersecurity workload,\u201d said Oltsik, a senior principal analyst at Enterprise Strategy Group. \u201cThey are reacting in fire-drill fashion and not spending enough time on assessment, training, planning and strategy.\u201d Putting out fires without priority levels or rehearsed responses \u201ccan lead to devastating results.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b708b6b7a1&#038;e=20056c7556<\/p>\n<p>More Businesses Fear Losing Data than Getting Hacked, Survey Shows<br \/>\nA survey released today by San Francisco, Calif.-based Wells Fargo Insurance shows 47 percent of mid-sized companies were concerned with losing private data compared with 26 percent worrying about hackers disrupting their systems.<br \/>\nThe survey highlights the top network security and data privacy concerns among companies with $100 million or more in annual revenue.<br \/>\nIt was constructed by talking to 100 decision makers empowered to make insurance purchases about network security and data privacy issues.<br \/>\nWhile losing data topped the list, followed by concerns over hacking, it appears few companies are worried about their employees misusing technology.<br \/>\nSeven percent of those polled cited that as a concern.<br \/>\nFollowing is the top eight network security and data privacy concerns with last year\u2019s ranking in parentheses:<br \/>\n&#8211; Loss of data \u2013 47 percent (45 percent)<br \/>\n&#8211; Hackers \u2013 26 percent (25 percent)<br \/>\n&#8211; Security breaches \u2013 26 percent (20 percent)<br \/>\n&#8211; Maintaining reputation \u2013 9 percent (4 percent)<br \/>\n&#8211; Viruses \u2013 7 percent (10 percent)<br \/>\n&#8211; Software vulnerabilities \u2013 7 percent (7 percent)<br \/>\n&#8211; Employee misuse of technology \u2013 7 percent (0 percent)<br \/>\n&#8211; Other \u2013 7 percent (13 percent)<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=aa8de190a1&#038;e=20056c7556<\/p>\n<p>Congressional Probe Says OPM Hackers Arrived in 2012 And We Will Never Know What They Took<br \/>\nA new congressional probe into a massive Office of Personnel Management hack reveals the first traces of adversary activity on OPM&#8217;s network date back to 2012, too far back in time to know what else beyond 21.5 million background check records might have been compromised.<br \/>\nThe congressional investigation links the breaches to the hacker groups Axiom and Deep Panda, whom security consultants like Novetta and CrowdStrike have tied to the Chinese.<br \/>\nSpeaking at the American Enterprise Institute this morning, committee chairman Jason Chaffetz didn\u2019t connect the hackers to a specific nation but said the adversaries were outside of the U.S.<br \/>\nThe report also colors in the chronology of four separate heists believed to be part of the cyberspy operation: Following the hack of manuals and potentially other unknown data, attackers next copied the background check records in July and August of 2014.<br \/>\nThird, in December 2014, hackers scurried into a connected Interior Department data center holding OPM repositories and retrieved 4.2 million federal personnel records.<br \/>\nFinally, less than a month before OPM caught on to the game plan, adversaries sucked out 5.6 million employee fingerprints on March 26, 2015.<br \/>\nAt the top of the committee&#8217;s 13 recommendations for avoiding another federal mega breach is advice that agencies ensure chief information officers are empowered, accountable and competent.<br \/>\nAt the AEI event, Chaffetz highlighted how a \u201czero trust\u201d policy could also prevent future breaches from occurring.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7347c3024c&#038;e=20056c7556<\/p>\n<p>Ransomware prevalent in cloud-based malware<br \/>\nCloud-based filesharing, collaboration and social networking applications are ransomware delivery vehicles, according to a report released today<br \/>\nJavascript exploits and droppers, Microsoft Office macros, and PDF exploits make up 43.7 percent of the total detected cloud malware, said Jamie Barnett, CMO at Netskope, the company that released the report.<br \/>\nSlack made Netskope&#8217;s top 20 enterprise cloud apps list for the first time since the company began gathering this data in 2014, but it is too early to tell how much malware is coming through this platform.<br \/>\nThe average enterprise now has a total of 977 cloud apps, up from 935 last quarter, and 95 percent of them are not enterprise ready.<br \/>\nThe worst category was cloud-based marketing applications, where 97 percent of the cloud apps used were not appropriate for the enterprise.<br \/>\nThe most secure category was cloud storage, where only 77 percent of cloud apps were not enterprise ready.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7a6a32fd73&#038;e=20056c7556<\/p>\n<p>The Shifting Mindset Of Financial Services CSOs<br \/>\nSecurity professionals in the financial services industry are no longer overconfident that their organizations have the skills and expertise to defend against threats.<br \/>\nThey\u2019ve taken a more realistic approach: CSOs now understand that they can\u2019t rely solely on internal expertise or tools to defend their companies against devastating cyber attacks.<br \/>\nRather, they\u2019re developing specific strategies to help them close gaps so they can protect their firms.<br \/>\nSecurity professionals in the financial services industry can learn a lot from the steps that we have seen these proactive CSOs taking, which include:<br \/>\n-Turning to outside help<br \/>\n-Training employees to be the first line of defense<br \/>\n-Viewing security as a company-wide issue<br \/>\nOverall, this mindset shift is a positive development.<br \/>\nCSOs at financial services organizations are being realistic about their firms\u2019 strengths and weaknesses.<br \/>\nThey\u2019ve realized that relying solely on technology to prevent attacks isn\u2019t an effective approach; security requires everyone at an organization to do their part.<br \/>\nMoreover, by bringing in outside security experts and technology, they\u2019ve demonstrated their willingness to tackle security challenges head on in an effective manner.<br \/>\nAlthough new security challenges will arise, many of today\u2019s financial services CSOs believe they\u2019re ready to meet them.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=528fe8d5d9&#038;e=20056c7556<\/p>\n<p>FS-ISAC&#8217;s First Chief Info Risk Officer Describes New Role<br \/>\nGreg Temm, the first chief information risk officer at the Financial Services Information Sharing and Analysis Center, says he&#8217;ll focus on helping members analyze cyberthreats and expand global threat intelligence sharing.<br \/>\nIn an interview with Information Security Media Group, Temm says his position was created to help ensure that the FS-ISAC continues to help its 7,000 member firms support the resilience and continuity of the global financial-services infrastructure.<br \/>\nTemm will serve as an adviser to FS-ISAC members, leading the organization&#8217;s global intelligence and risk management programs.<br \/>\nHe says he&#8217;ll work to analyze &#8220;cyber threat information that we have at our disposal and glean insight from it to inform our stakeholders about what it might mean to them.<br \/>\nThey can then use that intelligence to feed into their own risk management practices to help them further mitigate risk.&#8221;<br \/>\nThe new FS-ISAC chief information risk officer says his experience at MasterCard, where he led various components of the card association&#8217;s security program, helped prepare him to take on the role of disseminating meaningful threat information to FS-ISAC members.<br \/>\nIn this interview (see audio link below photo), Temm also discusses:<br \/>\n&#8211; Why ransomware attacks are a growing concern for the global financial community;<br \/>\n&#8211; How the merging of physical threats and cyber threats is changing how organizations fight cybercrime; and<br \/>\n&#8211; Steps the FS-ISAC is taking to expand global intelligence sharing.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=aeb2828e87&#038;e=20056c7556<\/p>\n<p>Google puts screws to HTTP with new warnings in Chrome<br \/>\nGoogle today continued its campaign to tighten the screws on unencrypted web traffic as it outlined the next steps it will take with Chrome to warn users of insecure connections.<br \/>\nStarting with Chrome 56, which is currently scheduled to ship in stable format on Jan. 31, 2017, the browser will mark sites that transmit either passwords or credit card information over HTTP connections as &#8220;non-secure.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d2fd36c57e&#038;e=20056c7556<\/p>\n<p>FTC Highlights How Agency\u2019s Approach to Data Security Aligns with NIST Cybersecurity Framework<br \/>\nThe Federal Trade Commission (FTC) recently presented an analysis of how its approach to data security over the past two decades compares with the Framework for Improving Critical Infrastructure Cybersecurity (NIST Framework) issued in 2014 by the National Institute of Standards and Technology (NIST) and strongly endorsed by the White House.<br \/>\nThe FTC\u2019s recent blog post on \u201cThe NIST Cybersecurity Framework and the FTC\u201d frames its discussion around the frequently asked question, \u201cIf I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?\u201d<br \/>\nThe FTC first explains how this question has a faulty premise, as the Framework is not designed to be a compliance checklist.<br \/>\nInstead, in this new blog post, the FTC outlines how the FTC\u2019s enforcement actions comport with the Framework\u2019s five Core functions\u2014Identify, Protect, Detect, Respond, and Recover\u2014and emphasizes how both the Framework and the FTC\u2019s approach highlight risk assessment and management, along with implementation of reasonable security measures, as the touchstones of any data security compliance program.<br \/>\nThe blog post provides background on the NIST Framework and the FTC\u2019s approach under Section 5, then summarizes FTC enforcement actions against companies for practices that allegedly did not comply with the Framework\u2019s Core functions.<br \/>\nThe blog post lists a total of thirty-eight data security practices identified in FTC enforcement actions that align with Framework action steps.<br \/>\n&#8211; Identify<br \/>\n&#8211; Protect<br \/>\n&#8211; Detect<br \/>\n&#8211; Respond<br \/>\n&#8211; Recover<br \/>\nThe FTC concludes that use of the Framework can help companies better protect personal information.<br \/>\nAs the FTC notes, the Framework \u201ccan serve as a model for companies of all sizes to conduct risk assessments and mitigation, and can be used by companies to: (1) establish or improve a data security program; (2) review current data security practices; or (3) communicate data security requirements with stakeholders.\u201d The FTC recommends companies consult the Start with Security guidance alongside the Framework to enhance their data security posture and reduce cybersecurity risks.<br \/>\nJulie Brill, Harriet Pearson and Paul Ott<br \/>\nJulie Brill, Harriet Pearson and Paul Ott<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1a60969339&#038;e=20056c7556<\/p>\n<p>New SANS Institute Survey Shows Data Breach Prevention Practices Are Evolving<br \/>\nThe survey, Breach Detected.<br \/>\nCould It Have Been Prevented?, looked at how practitioners might overcome barriers to implementing effective prevention, including developing clear requirements and defining specific preventive measures, such as the role of automation, threat intelligence and others.<br \/>\nThe survey also illustrates an apparent disconnect between what is considered preventive by the majority of respondents and the measures that have been implemented for prevention:<br \/>\n&#8211; 85 percent of respondents consider blocking known malware as a preventive measure, yet less than half (40 percent) have implemented these methods;<br \/>\n&#8211; 63 percent consider robust testing is preventive, while only 39 percent have implemented robust testing;<br \/>\n&#8211; Nearly 60 percent consider metrics-based evaluation and reporting preventive but only 40 percent are using evaluation and reporting.<br \/>\nRespondents indicated that lack of enough staffing, inadequate budgets and a deficit of skills are barriers to preventing breaches.<br \/>\nLimitations in legacy infrastructure also emerged as a factor prohibiting organization from not being more proactive in protecting critical data.<br \/>\nThe survey also looked at how practitioners might overcome barriers to implementing effective prevention, including developing clear requirements and defining specific preventive measures, including the role of automation, threat intelligence and others.<br \/>\nFull results will be shared during a free webcast Tuesday, Sept. 13, 1:00 p.m.<br \/>\nEastern Standard Time, sponsored by Palo Alto Networks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=677a14edd8&#038;e=20056c7556<\/p>\n<p>Five IT Security Projects That Will Accelerate Your Career<br \/>\nThe skills required to be successful in IT security are changing.<br \/>\nIn a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss.<br \/>\nRespondents also listed incident response management, expertise analyzing large datasets, communication with non-IT executives and departments, and security certifications as skills they expect to be more important in the next five years.<br \/>\nBut it\u2019s not enough to invest in your skills, you also need visible projects to demonstrate your value within the organization.<br \/>\nThis article covers five such projects.<br \/>\n1) Use Real-Time Coaching to Improve Security Awareness<br \/>\n2) Proactively Enable (Not Block) Cloud Usage<br \/>\n3) Complete Your Incident Response Plan<br \/>\n4) Create a Cross-Functional Governance Committee<br \/>\n5) Drive a Data-Centric Security Initiative<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=76654e1fc2&#038;e=20056c7556<\/p>\n<p>Private Cloud Security<br \/>\nAlong with the benefits, private clouds do bring some new risks.<br \/>\nFor example, there tends to be a big increase in traffic between virtual services, which is not inspected or secured by traditional security systems.<br \/>\nTo increase the confidence of CISOs and business leaders, your cloud data center needs a security strategy and architecture that are designed in and built in, not bolted on.<br \/>\nVisibility and protection need to extend wherever the processes and data are.<br \/>\nThis should include heterogeneous cloud environments, both private and hybrid, to support future needs.<br \/>\nIntegrated security solutions are essential to securing this new cloud architecture in order to effectively and efficiently support security operations.<br \/>\nIntrusion-prevention and anti-malware systems, optimized for virtual environments, need to share threat intelligence to combat emerging threats.<br \/>\nPolicies need to be applied to applications and servers as soon as they are provisioned.<br \/>\nThe best match for an SDDC is software-defined security, matching the agility of server, storage, and network virtualization with dynamic security provisioning and policy management.<br \/>\nUsing security controllers that are designed for virtual environments, you get the same cost efficiencies and flexibility for security operations.<br \/>\nPolicies and protections are tied to each virtual machine (VM), and will remain with that VM throughout its life, regardless of where it moves.<br \/>\nSecurity processes can scale up and down as needed, matching demand.<br \/>\nAutomation is a fundamental component of software-defined security, keeping up with the rapid moves and changes of virtual processes and reducing the risk inherent in manual processes.<br \/>\nPrivate clouds are a critical turning point as IT transitions to a services model, and attackers are responding to this shift.<br \/>\nLegacy security technologies do not afford sufficient or appropriate protection, leaving too many gaps for attackers to exploit.<br \/>\nWith the best private cloud security, designed for your architecture, attackers may run, but they cannot hide.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bf0365d826&#038;e=20056c7556<\/p>\n<p>White House Announces the First Federal Chief Information Security Officer<br \/>\nAn ongoing effort from the Obama administration to shore up the nation&#8217;s digital defenses was punctuated Sept. 8 by the creation of the first federal Chief Information Security Officer (CISO).<br \/>\nThe first to fill the role will be Gregory Touhill, a retired brigadier general and deputy assistant secretary of cybersecurity and communications for the U.S.<br \/>\nDepartment of Homeland Security.<br \/>\nAs is typical for a CISO, Touhill will lead cybersecurity policy, planning and implementation across the organization, which in this case includes the federated offices of the U.S. government.<br \/>\nThis new office, which was created by the Cybersecurity National Action Plan (CNAP) announced by President Obama in February, will follow in the spirit of the White House&#8217;s vision for short- and long-term cybersecurity planning, according to an official release.<br \/>\nGrant Schneider, director for cybersecurity policy on the National Security Council staff at the White House, will fill the acting deputy CISO role.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4c8bb3787d&#038;e=20056c7556<\/p>\n<p>In Information Security, the Only Constant is Change<br \/>\nAs the Greek philosopher Heraclitus famously noted, \u201cthe only constant is change\u201d.<br \/>\nThis statement was as accurate 2,500 years ago as it is now.<br \/>\nThe world around us changes constantly, often times at a somewhat frenetic pace.<br \/>\nThe field of information security is no different.<br \/>\nBoth the organizations we support and the threat landscape we face are changing and evolving constantly.<br \/>\nWhile this is certainly not an exhaustive list, here are my top five ways that organizations can stay grounded and focused amidst a sea of distractions:<br \/>\n1. Stick to the plan: As I and many others have previously noted, if you don\u2019t already have an incident response plan, you should.<br \/>\nIf you do already have a plan, then you are already one step ahead of the game.<br \/>\n2. Focus on risk: The best security organizations use a variety of techniques to understand the unique threat landscape they face.<br \/>\nThose same organizations use this knowledge to help them prioritize the risks and threats that they wish to mitigate.<br \/>\n3. Prioritize holes to plug:<br \/>\nBut if today\u2019s distraction poses a minor risk to our organization, does it make sense to divert resources from mitigating risks or plugging holes that we know pose serious risk to the organization.<br \/>\nNot particularly, although without a quantitative handle on risk that includes a robust risk register, it can be hard to justify that stance in the heat of the moment.<br \/>\n4. Go beyond the buzz:<br \/>\nHaving insight beyond the buzz allows an organization to more efficiently and effectively apply people, process, and technology to solve real world problems and challenges.<br \/>\nOtherwise, solutions that are purchased and implemented wind up looking for a problem to solve.<br \/>\nNot a great place to be, particularly when looking to justify expenditures and show return on investment.<br \/>\n5. Measure what matters:<br \/>\nMeasuring what matters allows an organization to produce metrics that actually help it assess its progress against its strategic objectives.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f7532ffb45&#038;e=20056c7556<\/p>\n<p>The evolution of data breach prevention practices<br \/>\nA new SANS Institute survey looks at the preventive aspect of breaches \u2013 and what security and IT practitioners actually are, or are not, implementing for prevention.<br \/>\nThe findings illustrates an apparent disconnect between what is considered preventive by the majority of respondents and the measures that have been implemented for prevention:<br \/>\n&#8211; 85 percent of respondents consider blocking known malware as a preventive measure, yet less than half (40 percent) have implemented these methods<br \/>\n&#8211; 63 percent consider robust testing is preventive, while only 39 percent have implemented robust testing<br \/>\n&#8211; Nearly 60 percent consider metrics-based evaluation and reporting preventive but only 40 percent are using evaluation and reporting.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1efc416d2d&#038;e=20056c7556<\/p>\n<p>Berkeley Research Group Releases Cybersecurity Preparedness Benchmarking Study<br \/>\nEMERYVILLE, CA&#8211;(Marketwired &#8211; September 08, 2016) &#8211; Berkeley Research Group released today its Cybersecurity Preparedness Benchmarking Study, detailing findings about cybersecurity practices from a survey of leading global organizations.<br \/>\nThe study focuses on six primary topics: Leadership, Information Governance, Risk Management, Essential Protection, Incident Response and Security Culture.<br \/>\nBRG teamed with the Institute of Operational Risk to conduct the survey in the first two quarters of 2016.<br \/>\nKey findings include:<br \/>\n&#8211; Despite a strong focus on cybersecurity culture, many organizations do not believe their cybersecurity programs are fully effective.<br \/>\n&#8211; Current employees are the likely cause behind most cybersecurity breaches.<br \/>\n&#8211; Viruses and malicious software are the most common breaches.<br \/>\n&#8211; Organizations mainly rely on cybersecurity assurances from external service providers and vendors.<br \/>\nMost organizations do not have strategies for the emerging fields of the &#8220;Internet of Things&#8221; or &#8220;Big Data.&#8221;<br \/>\n&#8211; Organizations lack confidence in their cybersecurity incident response capability.<br \/>\n&#8211; Organizations anticipate an increase in information security budgets.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dc7edab969&#038;e=20056c7556<\/p>\n<p>Feedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   Subscribe to this list (http:\/\/paulgdavis.us3.list-manage2.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=40f0b3d6f9)<br \/>\nUpdate subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<br \/>\n============================================================<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * Cyber crime \u2018evolving\u2019 ahead of Police Scotland * Boards don&#8217;t understand maturity of cybercrime model, warns Trend Micro * Going \u2018disposable\u2019 could&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1260","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1260"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1260\/revisions"}],"predecessor-version":[{"id":3747,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1260\/revisions\/3747"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}