{"id":2486,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail61-atl31-mcdlv-net-3\/"},"modified":"2021-12-30T11:41:25","modified_gmt":"2021-12-30T11:41:25","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail61-atl31-mcdlv-net-3","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail61-atl31-mcdlv-net-3\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail61.atl31.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* 6 Scenarios That Increase Vendor Risk<br \/>\n* The Unstoppable Convergence of Physical Security and IT and What it Means for Your Role<br \/>\n* Mount St. Mary&#8217;s University plans to offer degrees in cybersecurity, forensic accounting<br \/>\n* Pakistan approves controversial Cyber Crime Bill<br \/>\n* Feds ask auto industry to help combat cyberattacks<br \/>\n* The best cyberdefence: Think like an attacker<br \/>\n* Optional Windows update aims to protect Microsoft wireless mice against hijacking<br \/>\n* How Airbus defends against 12 big cyber attacks each year<br \/>\n* Canada\u2019s top 10 most ransomware-infected cities [Malware map]<br \/>\n* Singapore cloud outage guidelines can help businesses manage data breaches, says expert<br \/>\n* Common Education Sector security misconceptions<br \/>\n* Members of the Board and C-Suite Have New Tools to Help Reduce Cyber Security Risk<br \/>\n* Appeals Court Agrees Health Solutions Provider\u2019s Insurance Requires Defense in Data Disclosure Class Action<br \/>\n* Slideshow 12 questions to assess your data breach response capability<br \/>\n* How to Plan and Execute Modern Security Incident Response \u2013 NEW<br \/>\n* POTUS taps Uber chief security officer to be a part of a cyber security commission<br \/>\n* Dominic Paluzzi named to Cybersecurity Docket&#8217;s Incident Response 30<br \/>\n* After 4 years, EU Parliament passes new data protection rules<br \/>\n* RAND Survey Shows Breaches Have Little Impact On Customer Loyalty<br \/>\n* U.S. government worse than all major industries on cyber security: report<br \/>\n* RSA survey: Not enough focus on cyber terrorism among U.S. organizations<br \/>\n* Cybersecurity Industry &#8220;Fighting the Wrong Battle for 20 Years&#8221;&#8211;New Research<br \/>\n* Software tools and services used to achieve ISO 27001<br \/>\n* Why ICS network attacks pose unique security challenges<br \/>\n* Threat hunting technique helps fend off cyber attacks<br \/>\n* Cybersecurity to help businesses deliver digital growth strategies: Cisco<br \/>\n* Insurance against cyber attacks \u2018vital\u2019 say businesses but only 41% covered for both security breaches and data loss<\/p>\n<p>6 Scenarios That Increase Vendor Risk<br \/>\n1. \u201cWe don\u2019t let our vendors know how important cybersecurity is to us.\u201d<br \/>\n2. \u201cWe\u2019ve hired a contractor to handle our sensitive data, but we haven\u2019t asked them which specific employees have access to it.\u201d<br \/>\n3. \u201cWe don\u2019t build out contractual requirements for our vendors to meet with respect to cybersecurity.\u201d<br \/>\n4. \u201cWe don\u2019t ask to review documentation and results of previous audits.\u201d<br \/>\n5. \u201cWE HIRED a third party without knowing how they manage their own third-party relationships.&#8221;<br \/>\n6. \u201cWe trust a snapshot in time instead of relying on continuous monitoring.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=163172f87c&#038;e=20056c7556<\/p>\n<p>The Unstoppable Convergence of Physical Security and IT and What it Means for Your Role<br \/>\nThe modern design of IP networks mean that they can encompass telephony and business critical systems, alongside CCTV and other security systems enabling physical access to the building.<br \/>\nEllie Hurst, marketing manager at Advent IM, says that while our physical and cyber threats have converged, physical systems may not have the oversight of IT security regiment for patching and antimalware. \u201cSystems are often networked and once you leave a geographical location and enter cyberspace, everything changes,\u201d she says.<br \/>\nAnother issue is around a potential skill gap, and not where you think it would be, according to Martin Grigg, senior security consultant at PTS Consulting and Lecturer in Integrated Systems for high-security facilities.<br \/>\nHe said that the convergence of information and security technology has not created a skills gap but the merging of management roles may do exactly that.<br \/>\nThe necessary skills to successfully deliver each role are usually held by people with different backgrounds.<br \/>\nHurst says that it is important to note that umbrella oversight is needed from a risk perspective, to reduce the chance of converged risks remaining lost in silos \u2013 \u201cso the oversight of a chief risk officer or senior information risk owner ensuring board ownership\u201d.<br \/>\nGillispie adds that oversight should be at board level and Risk assessments would be done on all systems to ensure any risk is mitigated and that it is within organisational risk tolerances and appetite.<br \/>\nPerhaps success best lies in making each team speak the language of the other to broaden understnadin of the issues at hand.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6d5792cb33&#038;e=20056c7556<\/p>\n<p>Mount St. Mary&#8217;s University plans to offer degrees in cybersecurity, forensic accounting<br \/>\nBoth programs have been in the works for at least a year now, Mount faculty members said.<br \/>\nThey\u2019re a component of the new strategic plan moving forward at the Mount, \u201cMount 2.0,\u201d which involves revamping the school\u2019s core curriculum and expanding course offerings.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b647525a86&#038;e=20056c7556<\/p>\n<p>Pakistan approves controversial Cyber Crime Bill<br \/>\nThe bill approved on Wednesday, must also be approved by Senate before it can be signed into law, Dawn online reported.<br \/>\nThe draconian bill &#8211; which has been criticised by the information technology (IT) industry as well as civil society for curbing human rights &#8211; was submitted to the NA for voting in January 2015 by the IT ministry.<br \/>\nAccording to critics, the proposed bill criminalises activities such as sending text messages without the receiver&#8217;s consent or criticising government actions on social media with fines and long-term imprisonment.<br \/>\nIndustry representatives have argued that the bill would harm business as well.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f22da19acd&#038;e=20056c7556<\/p>\n<p>Feds ask auto industry to help combat cyberattacks<br \/>\nThe U.S.<br \/>\nDepartment of Justice\u2019s top national security attorney Tuesday called on the private sector to work with the federal government and law enforcement agencies to fight cyber attacks.<br \/>\n\u201cSharing information and intelligence between law enforcement is not enough,\u201d said John Carlin, assistant U.S. attorney general for national security. \u201cWith the ingenuity and development taking place in your hands &#8230; the infrastructure of the internet in your hands, to combat threats against it, we\u2019re going to have to work together.<br \/>\n\u201cI think we forget when we design a system how vulnerabilities can be exploited,\u201d said the senior in mechanical engineering at the University of New Mexico. \u201cWe forget to look at how people could use the technology for ulterior motives.<br \/>\nIt was interesting to hear it from someone who deals with it.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=19dca98993&#038;e=20056c7556<\/p>\n<p>The best cyberdefence: Think like an attacker<br \/>\nIt&#8217;s a game of cat and mouse; in the ongoing battle between cyber criminals and cybersecurity professionals, it can sometimes be difficult to know what tactics attackers will employ next.<br \/>\nBut in fact cybersecurity professionals don&#8217;t always have to be playing catch-up, especially if they can get into the mindset of their opposition.<br \/>\nThis skill is making staff with experience working in IT security for the military particularly attractive to businesses.<br \/>\nAnother trait which separates military security types from your average cybersecurity pros is the ability to go on the offensive &#8212; because it makes them more effective defenders.<br \/>\n&#8220;As an attacker, you&#8217;ve really got to look at the whole environment; you&#8217;ve really got to be creative,&#8221; he continues, &#8220;You&#8217;re just so much more aware of what&#8217;s possible, rather than being on the defensive side the whole time and being reliant on how things currently work.&#8221;<br \/>\nHowever, there are only a limited number of cybersecurity professionals who have worked in government information warfare &#8212; and even fewer who have carried out offensive attacks &#8212; so the pool of potential employees with this experience is limited.<br \/>\nBut this can be overcome, Johnson suggests, by engaging in cyberwar games within an organisation, and taking turns to attack and defend.<br \/>\n&#8220;I&#8217;ll put our White Hat people up against Black Hats any day.<br \/>\nI&#8217;m not fearful that the Black Hats are any better than us; they may catch us unprepared, or at a bad moment in time &#8212; I don&#8217;t trivialise them &#8212; but I don&#8217;t feel in any way, shape, or form that they&#8217;re any better than the White Hat hackers.<br \/>\nSo I&#8217;d never stoop to hiring them,&#8221; Kelly says.<br \/>\nJohnson, however, takes a different view: &#8220;I&#8217;ve seen people with that kind of background grow up and still have that curiosity, that innovation mindset where they don&#8217;t just approach the problem in one way, they&#8217;re thinking in new ways.<br \/>\nThat&#8217;s hacking, trying to get systems to do things they weren&#8217;t designed to do, so if you start applying that to companies, that mindset is really valuable,&#8221; he says.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3cfb16a373&#038;e=20056c7556<\/p>\n<p>Optional Windows update aims to protect Microsoft wireless mice against hijacking<br \/>\nMouseJack exploits several vulnerabilities in the communications protocols between the USB dongles plugged into computers and the wireless mice and keyboards that are paired with them.<br \/>\nThese flaws allow attackers to spoof a wireless mouse from up to 100 meters away and send rogue keystrokes instead of clicks to a computer.<br \/>\nThe new KB3152550 update blocks this type of attack through a driver that filters input from affected Microsoft wireless mice to make sure that there are no QWERTY key frames that normally indicate keyboard traffic.<br \/>\nThe update is available for Windows 7, 8.1 and 10, but not Windows Server.<br \/>\nIt only protects standalone wireless mice and not those that are bundled together with a keyboard as part of Microsoft&#8217;s desktop set products.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a28370152&#038;e=20056c7556<\/p>\n<p>How Airbus defends against 12 big cyber attacks each year<br \/>\nCivil aircraft manufacturer Airbus Group is hit by up to 12 major systems attacks each year, its chief information security officer has revealed, mostly through ransomware and state-sponsored hackers.<br \/>\nStephane Lenco told the Australian Cyber Security Centre conference that defence was particularly difficult against state-sponsored attackers who &#8220;will try everything&#8221; to break in, and if successful, &#8220;will go after everything&#8221;.<br \/>\nAs a response, Lenco took a strategy to his board outlining his plan to &#8220;deter, delay, delete and detect&#8221;.<br \/>\nLuckily, Lenco said, the infosec team still had the support of the executive for the four D&#8217;s approach, so the next step was about benchmarking.<br \/>\nWhat resulted was 47 streams containing around 350 individual projects.<br \/>\nThe security team will also soon start red-teaming &#8211; adopting an attacker&#8217;s mindset to detect vulnerabilities in networks and systems &#8211; and blue-teaming (the defenders) to better catch and mitigate threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d8204133ae&#038;e=20056c7556<\/p>\n<p>Canada\u2019s top 10 most ransomware-infected cities [Malware map]<br \/>\nMalware infections across Canada spiked almost 15 per cent in March and the country\u2019s problem with ransomware was made evident when an Ottawa-based hospital was hit.<br \/>\nOverall malware was on the rise, increasing 14.7 per cent in March compared to February, according to tracking by EnigmaSoftware.com.<br \/>\nSee our map below to see the new rates in individual cities.<br \/>\nTrois-Rivieres, Que. remains at the top of the list as we\u2019re used to.<br \/>\nThere wasn\u2019t too much of a shake up in terms of city standings, except that we say Burnaby, B.C. enter the top 20 list by moving up from 27th spot to 15th.<br \/>\nWe\u2019ve updated our cybercrime map of Canada with a new layer of data, showing the police-reported cybercrime from 2013, the most recent data available from Statistics Canada.<br \/>\nThe range of cybercrime reported by police services in Canada range from types of fraud to threats to crimes of a sexual nature.<br \/>\nIn 2013, more than half of all cybercrime reported was described as a fraud violation, with 6,203 offenses out of a total of 11,124 offenses across all categories.<br \/>\nAlso new to our map is a layer representing an IDC Canada survey conducted earlier this year.<br \/>\nIt shows how much different regions in Canada are spending on IT security and how much they\u2019d like to spend.<br \/>\nWhich region do you think is spending the most on security.<br \/>\nFind out and read more analysis over on IT World Canada.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=02574f8da8&#038;e=20056c7556<\/p>\n<p>Singapore cloud outage guidelines can help businesses manage data breaches, says expert<br \/>\nAlthough the guidelines issued by the Infocomm Development Authority of Singapore (IDA) (58-page \/ 786KB PDF) state that they are &#8220;not meant to resolve issues due to cyber security, malicious act or breach of personal data protection laws&#8221;, they are built upon recognised Singapore and international standards for cloud security, SS 584: 2015.<br \/>\nThe guidelines help explain how those standards interface with the country&#8217;s Personal Data Protection Act (PDPA) in event an outage is coupled with a data breach.<br \/>\nBusinesses subject to the PDPA are obliged to employ reasonable security arrangements to protect personal data in their possession or under their control from unauthorised access, collection, use, disclosure, copying, modification or disposal.<br \/>\nPenalties for non-compliance with can include fines of up to SIN$1 million ($740,000)<br \/>\nThe COIR guidelines also incorporate a framework of self-disclosure by cloud providers to help inform cloud users about the reliability and resilience of the cloud services they offer, as well as the &#8220;accountability, change management procedures and incident management procedures&#8221; cloud providers have in place.<br \/>\nA dedicated self-disclosure form has been created for cloud providers to fill out and post on their websites.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=33f2a167c0&#038;e=20056c7556<\/p>\n<p>Common Education Sector security misconceptions<br \/>\n2016 hasn\u2019t begun in a very positive way for education institutions.<br \/>\nJanuary 2016 saw data on 80,000 students, faculty, and staff at UC Berkeley compromised in the University\u2019s third data breach disclosure of the past 15 months.<br \/>\nThis was followed by a breach of 63,000 names and social security numbers of current and former students and staff at the University of Central Florida in early February 2016 obtained when hackers attacked the school\u2019s computer system.<br \/>\nMisconception 1: I can have an open IT environment, or secure IT environment, but not both open and secure<br \/>\nMisconception 2: Breach protection and detection policies are enough to keep the hackers at bay<br \/>\nMisconception 3: I know which users and applications can be trusted<br \/>\nIt\u2019s clear that something needs to change.<br \/>\nThe education sector recognises that an issue exists; yet many are still not putting the proper measures in place.<br \/>\nIt has never been clearer that now is the time to act, and by thinking of security in a different way and overcoming the common misconceptions outlined above, education institutions can quickly begin the journey from security chaos to security harmony.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ff2ad7ab30&#038;e=20056c7556<\/p>\n<p>Members of the Board and C-Suite Have New Tools to Help Reduce Cyber Security Risk<br \/>\nHERNDON, Va.&#8211;(BUSINESS WIRE)&#8211;Learning Tree International (OTCQX: LTRE), a leading provider of IT and management training to business and government organizations worldwide, has launched a new course that covers cyber security from the perspective of senior executives and members of the board.<br \/>\nThis course prepares members of the board and the C-Suite to understand, assess, and take a proactive posture in security through:<br \/>\nEffectively positioning their organizations to address cyber security threats<br \/>\nSupporting cyber security planning with management frameworks<br \/>\nThe use of governance policy and cyber insurance to minimize risk<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e29c75cdf9&#038;e=20056c7556<\/p>\n<p>Appeals Court Agrees Health Solutions Provider\u2019s Insurance Requires Defense in Data Disclosure Class Action<br \/>\nAvailability of insurance is often among the first questions that arises when a company encounters a data breach or other Internet-related problem involving company records, even where the company lacks a cyberinsurance policy.<br \/>\nThe federal Fourth Circuit Court of Appeals recently affirmed a ruling by a District Court that required insurance coverage for an inadvertent disclosure of private healthcare information under the policy\u2019s provisions regarding the publication of material that may give \u201cunreasonable publicity\u201d to, or disclose information about, a person\u2019s private life.<br \/>\nTravelers Indem. Co. v. Portal Healthcare Solutions, LLC, Case No. 14-1944 (4th Cir. April 11, 2016) (unpublished).<br \/>\nTwo patients of Portal Healthcare who found their medical information through a Google search filed a class action suit against the hospital for allegedly having inadvertently made hospital medical records available and unprotected on the Internet.<br \/>\nPortal then sought coverage against its insurer, Travelers Indemnity Company.<br \/>\nTravelers, in turn, sought a declaratory judgment that it was not obliged to defend Portal under the traditional policies that Portal had purchased.<br \/>\nThe trial court found coverage under policy language covering an injury arising from the \u201celectronic publication of material\u201d that discloses information about a person\u2019s private life.<br \/>\nSee Travelers Indem. Co. v. Portal Healthcare Solutions, LLC, 35 F. Supp. 3d 765 (E.D. Va. 2014).<br \/>\nThis type of traditional invasion of privacy claim has historically been covered by this type of policy.<br \/>\nAccording to the trial court, the private medical information was \u201cpublished\u201d because it was available to everyone on the Internet\u2014even though it was unclear whether anyone besides the two plaintiffs had ever accessed it\u2014and because the information clearly related to the patient\u2019s private life.<br \/>\nThe appellate court agreed with the trial court\u2019s reasoning and affirmed the finding that Travelers had a duty to defend Portal in the suit.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d7d61691e8&#038;e=20056c7556<\/p>\n<p>Slideshow 12 questions to assess your data breach response capability<br \/>\nA new Data Breach Response Guide from Experian walks through myriad processes for putting together an enterprisewide plan to prepare for and respond to a breach, and then put the plan into motion when an incident occurs.<br \/>\nThe guide covers communicating with the C-Suite, creating a plan, practicing the plan, responding to a breach, auditing the plan, and a quiz with core questions to assess preparedness. \u201cIf you answer &#8216;no&#8217; more than once or twice, you and your team should immediately address the gaps,\u201d according to Experian, which offers breach recovery services.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f4b8c241fe&#038;e=20056c7556<\/p>\n<p>How to Plan and Execute Modern Security Incident Response \u2013 NEW<br \/>\nI had the opportunity to work with Anton on updating one of his best documents, \u201cHow to Plan and Execute Modern Security Incident Response\u201d, which was published today on Gartner.com (GTP Access required).<br \/>\nThe document is a nice assessment of what organizations should be doing in terms of incident response today.<br \/>\nIt covers some of the basics, but also the changes we\u2019ve been seeing in those practices in the past couple of years, especially the move to continuous IR.<br \/>\nAs we say there,<\/p>\n<p>\u201cThe traditional route of detecting incidents using security monitoring technologies is not the whole answer to today\u2019s threat landscape, which is laden with skilled and persistent threat actors.<br \/>\nLeading organizations don\u2019t just develop excellent security monitoring capabilities that operate in near-real time (such as mature SOC capabilities based on SIEM tools).<br \/>\nThey also seek to explore the data they collect in order to discover \u2014 rather than detect in real time \u2014 incidents that their own detection controls missed.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=68e78359b7&#038;e=20056c7556<\/p>\n<p>POTUS taps Uber chief security officer to be a part of a cyber security commission<br \/>\nIn looking to leverage that wealth of knowledge of and experience with cyber security attacks, President Barack Obama appointed a number of former and current tech executives to a 12-person Commission on Enhancing National Security.<br \/>\nAmong those pulled from the tech world, including former IBM CEO Sam Palmisano, is Uber\u2019s Chief Security Officer Joe Sullivan.<br \/>\nSullivan, who joined Uber in 2015, handled security at Facebook prior to that for five years and at eBay before that.<br \/>\nHere are the rest of the appointed members:<br \/>\nTom Donilon, former Assistant to the President and National Security Advisor (Chair)<br \/>\nSam Palmisano, former CEO of IBM (Vice Chair)<br \/>\nGeneral Keith Alexander, CEO of IronNet Cybersecurity, former Director of the National Security Agency and former Commander of U.S.<br \/>\nCyber Command<br \/>\nAnnie Ant\u00f3n, Professor and Chair of the School of Interactive Computing at Georgia Tech.<br \/>\nAjay Banga, President and CEO of MasterCard<br \/>\nSteven Chabinsky, General Counsel and Chief Risk Officer of CrowdStrike<br \/>\nPatrick Gallagher, Chancellor of the University of Pittsburgh and former Director of the National Institute of Standards and Technology<br \/>\nPeter Lee, Corporate Vice President, Microsoft Research<br \/>\nHerbert Lin, Senior Research Scholar for Cyber Policy and Security at the Stanford Center for International Security and Cooperation and Research Fellow at the Hoover Institution<br \/>\nHeather Murren, former member of the Financial Crisis Inquiry Commission and co-founder of the Nevada Cancer Institute<br \/>\nJoe Sullivan, Chief Security Officer of Uber and former Chief Security Officer of Facebook<br \/>\nMaggie Wilderotter, Executive Chairman of Frontier Communications<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=990eeda051&#038;e=20056c7556<\/p>\n<p>Dominic Paluzzi named to Cybersecurity Docket&#8217;s Incident Response 30<br \/>\nCLEVELAND, April 14, 2016 \/PRNewswire\/ &#8212; Dominic Paluzzi, member at McDonald Hopkins, has been named to Cybersecurity Docket&#8217;s inaugural Incident Response 30, a list of the &#8220;best and brightest&#8221; data breach response attorneys and compliance professionals in the industry &#8220;who not only have the right stuff to manage a data breach response, but are also the kind of professionals critical to have on speed-dial when the inevitable data breach occurs.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=797550a419&#038;e=20056c7556<\/p>\n<p>After 4 years, EU Parliament passes new data protection rules<br \/>\nIt\u2019s been almost four years since proceedings began to agree new data protection rules within the EU, but the European Parliament has now passed new rules to help develop the digital single market.<br \/>\nAccording to the announcement made by the European Parliament, these new data protection rules will replace the older data protection legislation that has for years now been considered unfit for purpose.<br \/>\n72 hours to report a data breach<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0c542abb61&#038;e=20056c7556<\/p>\n<p>RAND Survey Shows Breaches Have Little Impact On Customer Loyalty<br \/>\nOnly 11% of US adults who received a breach notification were likely to quit doing business with the hacked company, study finds.<br \/>\nNew research from RAND Corp reveals that over 25% of American adults were notified in the past twelve months that their personal information had been breached.<br \/>\nAnd only 11% of them say they are unlikely to do business with the breached company again.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bbb307311c&#038;e=20056c7556<\/p>\n<p>U.S. government worse than all major industries on cyber security: report<br \/>\nU.S. federal, state and local government agencies rank in last place in cyber security when compared against 17 major private industries, including transportation, retail and healthcare, according to a new report released Thursday.<br \/>\nThe analysis, from venture-backed security risk benchmarking startup SecurityScorecard, measured the relative security health of government and industries across 10 categories, including vulnerability to malware infections, exposure rates of passwords and susceptibility to social engineering, such as an employee using corporate account information on a public social network.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1dde22cbc6&#038;e=20056c7556<\/p>\n<p>RSA survey: Not enough focus on cyber terrorism among U.S. organizations<br \/>\nAccording to the survey of over 200 security executives attending RSA, 92 percent think most U.S. organizations need more security against cyber terrorism or are behind the curve when it comes to protecting against such attacks.<br \/>\nThycotic said 89 percent said businesses and the military must make developing capabilities to fight against cyber terrorism more of a priority.<br \/>\nA blog posted by Thycotic also revealed that 80 percent of respondents said such an attack could occur within the next 24 months.<br \/>\nThe survey also showed that half of respondents think private companies in the U.S. are more at risk than government organizations, while 42 percent said the government is more vulnerable than private companies.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b928ba4dff&#038;e=20056c7556<\/p>\n<p>Cybersecurity Industry &#8220;Fighting the Wrong Battle for 20 Years&#8221;&#8211;New Research<br \/>\nHERNDON, Va., April 12, 2016 \/PRNewswire-USNewswire\/ &#8212; Global technology company Nuix has published a provocative white paper by cybersecurity veteran Chris Pogue arguing that the technology industry has been &#8220;fighting the wrong battle with the wrong weapons&#8221; against cybercrime for the past two decades.<br \/>\nThe paper contends that for technology to fight cybercrime and insider threats effectively, it must solve human vulnerabilities.<br \/>\nThe white paper examines five cognitive biases\u2014&#8221;bugs in our brain software&#8221;\u2014that cause people to make poor decisions.<br \/>\nIt examines how other industries have learned to deal with these biases by concentrating on changing human behavior, and applies these lessons to the fight against cybercrime.<br \/>\nThe white paper includes a strategic battle plan and practical action plan for organizations to focus on using technology, people, and processes to address the people problems of cybersecurity.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ad03c76264&#038;e=20056c7556<\/p>\n<p>Software tools and services used to achieve ISO 27001<br \/>\nMany organizations are unsure of what\u2019s available to help them implement and get certified in quick time, so CertiKit summarized the most common areas of the ISO 27001 standard where software tools and services come in handy.<br \/>\nHow many of these software tools and services you decide to use depends on your budget, timescales and how secure you want to be.<br \/>\nThe infographic below will help you to choose wisely in order to achieve ISO 27001.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=896206623f&#038;e=20056c7556<\/p>\n<p>Why ICS network attacks pose unique security challenges<br \/>\nUntil recently, industrial networks were separated from the rest of the world by \u2018Air Gaps\u2019.<br \/>\nIn theory, this technique sounds great \u2013 disconnecting the industrial network from the business network and the Internet makes it very difficult for attacks to reach it.<br \/>\nHowever, an \u2018Air Gap\u2019 is no longer a functional or operationally feasible solution in today\u2019s connected world.<br \/>\nWith trends like IIoT (Industrial Internet of Things), industrial networks can\u2019t remain stand-alone environments.<br \/>\nFor efficiency and competitive advantage reasons, they are being connected to corporate systems and cloud applications.<br \/>\nIn the process, they are being exposed to cyber-threats.<br \/>\nPatching PLCs is difficult, can cause disruptions or downtime, and can lead to reliability issues and other operational problems.<br \/>\nIt is also common to find unpatched Windows-based workstations still running legacy operating systems like Windows NT and XP in operational environments due to the same concerns regarding operational stability and reliability.<br \/>\nOne of the biggest technical challenges faced when trying to secure ICS networks is that several different communication protocols are used by components in process automation systems.<br \/>\nFor example, the data-layer and control-layer use separate communication protocols.<br \/>\nMeanwhile, control-layer operations that manage the entire life-cycle of industrial processes use a different set of protocols altogether.<br \/>\nTo make matters worse, each OT vendor uses a proprietary implementation of the IEC-61131 standard for making changes to PLC logic, PLC code updates, firmware downloads and configuration changes.<br \/>\nSince these implementations are rarely documented, it is very difficult to monitor these critical activities.<br \/>\nThe emergence of cyber-threats is forcing the industrial sector to take a long, hard look at how ICS networks, and specifically, industrial controllers, are protected.<br \/>\nThe current lack of visibility and security controls combined with the presence of unpatched vulnerabilities in OT networks is placing facilities at risk.<br \/>\nIn order to prevent unintended changes by insiders and protect systems from external attacks, ICS-native monitoring and control technologies are required.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d41e964d1d&#038;e=20056c7556<\/p>\n<p>Threat hunting technique helps fend off cyber attacks<br \/>\nCyber threat intelligence company DomainTools has released the results of a new survey conducted by the SANS Institute on the effectiveness of using threat hunting to aggressively track and eliminate cyber adversaries as early as possible.<br \/>\nAccording to the survey, adopters of this model reported positive results, with 74 percent citing reduced attack surfaces, 59 percent experiencing faster speed and accuracy of responses, and 52 percent finding previously undetected threats in their networks.<br \/>\nThough it&#8217;s a relatively new approach to the early identification of cyber threats, 85 percent of enterprises say they are currently involved with some level of threat hunting.<br \/>\nThere are barriers to using the technique effectively though, 40 percent cite the need for a formal program and 52 percent a lack of skilled staff.<br \/>\nThe top seven data sets that support threat hunting are IP addresses, network artifacts and patterns, DNS activity, host artifacts and patterns, file monitoring, user behavior and analytics, and software baseline monitoring.<br \/>\nThe most common trigger for launching a hunt is an anomaly or anything that deviates from normal network behavior according to 86 percent of respondents.<br \/>\nHowever, the survey also reveals that only 23 percent of businesses have hunting processes that are invisible to attackers, meaning that the majority of organizations are at risk from exposing internal hunting procedures in a way that benefits the attacker.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=78e4586355&#038;e=20056c7556<\/p>\n<p>Cybersecurity to help businesses deliver digital growth strategies: Cisco<br \/>\nThe Cybersecurity as a Growth Advantage report shows that 64 percent of executives recognise that cybersecurity is fundamental to their digital growth strategy, with nearly one third believing the primary purpose of cybersecurity is to be a growth enabler, while another 44 percent of executives believe cybersecurity is a competitive advantage.<br \/>\nChina, India, and Canada were countries where growth enablement sentiment was strongest, with the report suggesting the views from these countries reflect the sharp rise in digital adoption.<br \/>\nAccording to John N Stewart, Cisco Chief Security and Trust Officer senior vice president, finance teams have solidified the beliefs executives have about cybersecurity, saying they also agree there are business benefits to be gained.<br \/>\nThe research also revealed that inadequate cybersecurity can hinder a business&#8217; growth.<br \/>\nNearly 40 percent of respondents admitted they have halted their mission-<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * 6 Scenarios That Increase Vendor Risk * The Unstoppable Convergence of Physical Security and IT and What it Means for Your Role * Mount St. Mary&#8217;s University plans to offer degrees&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2486","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2486"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2486\/revisions"}],"predecessor-version":[{"id":4973,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2486\/revisions\/4973"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}