{"id":2494,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-atl71-mcdlv-net\/"},"modified":"2021-12-30T11:41:27","modified_gmt":"2021-12-30T11:41:27","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-atl71-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-atl71-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail25.atl71.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* Size Doesn\u2019t Matter: Cyber Security and the SME<br \/>\n* Cybersecurity Due Diligence Critical Amid Rise In Data Breaches<br \/>\n* Mobile Security Research Uncovers Gap Between Perception and Reality of Vulnerabilities<br \/>\n* Four ways S\u2019pore is stepping up its fight against cybercrime<br \/>\n* Major cyber security threat underscored by congressional Homeland Security chairman<br \/>\n* Browser study aims to stop hackers in their tracks<br \/>\n* Why the U.S. is behind the curve on cyberwarfare<br \/>\n* 9 Critical Responsibilities Of The Cybersecurity Manager<br \/>\n* SEC Prepares for More Cybersecurity Oversight<br \/>\n* Firefox sets kill-Flash schedule<br \/>\n* How exposed is trucking data to theft?<br \/>\n* Call for Australia to appoint cyber ambassador<br \/>\n* The changing face of data breaches<br \/>\n* Automotive Cybersecurity Best Practices<br \/>\n* Regulators&#8217; IM Crackdown May Increase Cyber Risk<br \/>\n* Cyber Security Quarterly Round-Up &#8211; July 2016<br \/>\n* MS-ISAC official: Ransomware is top malware of concern for states, counties<br \/>\n* CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro<br \/>\n* RSA Research Shows 74% of APJ Organizations Face Significant Risk of Cyber Incidents<br \/>\n* DHS looking for industry expertise in protecting \u2018mobile ecosystem\u2019<\/p>\n<p>Size Doesn\u2019t Matter: Cyber Security and the SME<br \/>\nThe research, which forms part of NJR\u2019s cyber security report: how real is the threat and how can you reduce your risk, shows that 23 per cent of employees use the same password for different work applications and 17 per cent write down their passwords, 16 per cent work while connected to public wifi networks and 15 per cent access social media sites on their work PCs.<br \/>\nSuch bad habits and a lack of awareness about security mean that employees are inadvertently leaving companies\u2019 cyber doors wide open to attack.<br \/>\nTarun Samtani considers the areas that SMEs are weakest when it comes to maturing in cyber security:<br \/>\na) Information governance<br \/>\nOnce the crown jewels have been identified, the next step is to understand and map the different paths an adversary could take to get to them.<br \/>\nThis is called Attack Path mapping.<br \/>\nb) Enterprise Risk Management<br \/>\nCyber and information security risk management needs to be part of the enterprise risk management framework as a separate entity not under IT risk.<br \/>\nc) Cyber security Awareness<br \/>\nTo reduce the risk of cyber threats, the human OS needs to be patched in such a way that staff not only understand their responsibility for security but also take an active role in improving the cyber security of the organisation by using best safe practices.<br \/>\nd) Enterprise Architecture<br \/>\nt is crucial for a business to have a single entity\/function that sits across the business to oversee all the different projects in the organisation and aligns them to the business strategy.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=55b666fe4e&#038;e=20056c7556<\/p>\n<p>Cybersecurity Due Diligence Critical Amid Rise In Data Breaches<br \/>\nIn response to the growing cybersecurity challenges facing corporate mergers and acquisitions (M&#038;A), West Monroe Partners, a Chicago based management and technology consulting firm, recently released a report providing insight into the complexities and challenges of cybersecurity due diligence in the acquisition process.<br \/>\nThe 28 page report, \u201cTesting the Defenses: Cybersecurity Due Diligence in M&#038;A,\u201d revealed that the potential costs of cybersecurity problems are enormous.<br \/>\nIn 2015, the Identity Theft Resource Center reported 781 data breaches at companies in the United States, with the average cost of a data breach being $3.79 million, according to a survey commissioned by the International Business Machines Corporation (IBM).<br \/>\nThe report also found that in the majority of cases, cybersecurity issues alone are not enough to cause a buyer to abandon an acquisition with 77 percent of respondents saying that they have never walked away from a deal for that reason.<br \/>\nThe study\u2019s findings led to five main findings:<br \/>\n&#8211; Cybersecurity diligence is no longer optional.<br \/>\n&#8211; Knowledgeable personnel is key.<br \/>\n&#8211; Good governance trumps bells and whistles.<br \/>\n&#8211; Be practical when assessing risks.<br \/>\n&#8211; Remember to implement deal protections.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=206c82f8a3&#038;e=20056c7556<\/p>\n<p>Mobile Security Research Uncovers Gap Between Perception and Reality of Vulnerabilities<br \/>\n\/EINPresswire.com\/ &#8212; NEW YORK, NEW YORK &#8212; (Marketwired) &#8212; 07\/19\/16 &#8212; BLACKBERRY SECURITY SUMMIT &#8211; A new global research initiative conducted by BlackBerry Limited (NASDAQ: BBRY)(TSX: BB), a global leader in secure mobile communications, finds that despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist.<br \/>\nThe study surveyed 1,000 executives from seven countries across a wide range of vertical industries, including financial services, government and healthcare.<br \/>\nThe survey reveals that 73 percent of organizations have a mobile security strategy in place, but only three percent say they have implemented the highest levels of security possible.<br \/>\nThis is in part because of user attitudes &#8211; 82 percent of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity.<br \/>\nOverall, 44 percent fear that too much mobile security will prevent employees from doing their job.<br \/>\nThis fear of implementing a stronger mobile environment led to a startling majority, 86 percent, of executives who said they are worried about the level of protection for their organization with half saying they will experience more security breaches through mobile devices.<br \/>\nA critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerization.<br \/>\nHowever, nearly 45 percent have no containerization technology in place.<br \/>\nThe research also uncovered that nearly half of organizations do not have a Security Incident Response Team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches.<br \/>\nIT decision-makers also want and seek outside help when it comes to securing their mobile environments.<br \/>\nOf those surveyed, 59 percent report that external expertise is the best option for reviewing mobile practices.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7e9123fec1&#038;e=20056c7556<\/p>\n<p>Four ways S\u2019pore is stepping up its fight against cybercrime<br \/>\nSINGAPORE \u2014 Law and Home Affairs Minister K Shanmugam on Wednesday (July 20) unveiled the National Cybercrime Action Plan, which sets out the Government\u2019s future and ongoing efforts against cybercriminal activity.<br \/>\nHere are the four key priorities in the plan.<br \/>\n1) EDUCATING THE PUBLIC<br \/>\nAmong efforts to help the public to stay safe online, there will be a special focus on vulnerable groups, such as students and senior citizens.<br \/>\n2) ENHANCING GOVT\u2019S CAPABILITY TO FIGHT CYBERCRIME<br \/>\nThe Cybercrime Command, set up in December last year to improve coordination in the police\u2019s response to cybercrime, will analyse new methods used by cybercriminals.<br \/>\n3) STRENGTHENING LEGISLATION AND CRIMINAL JUSTICE FRAMEWORK<br \/>\nThe Computer Misuse and Cybersecurity Act will be amended so it is effective in responding to the transnational nature of cybercrimes and the evolving tactics of cybercriminals.<br \/>\n4) PARTNERSHIPS<br \/>\nThe Government will build partnerships with industry and academia, locally and overseas, so as to share knowledge and build capabilities in areas such as cyber-forensics and cyber-investigations.<br \/>\nThe MHA has also set up a new Institute of Safety and Security Studies that will promote thought leadership and build expertise in different areas, including cybercrime.<br \/>\nThe institute\u2019s training courses will be offered to Home Team officers and partners from Asean member states.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a8ddcab1a0&#038;e=20056c7556<\/p>\n<p>Major cyber security threat underscored by congressional Homeland Security chairman<br \/>\nCLEVELAND &#8211; The Chairman of the House Committee on Homeland Security says the nation is &#8220;not ready&#8221; for serious cyber security threats.<br \/>\nTexas Congressman Michael T.<br \/>\nMcCaul, whose committee oversees the U.S.<br \/>\nDepartment of Homeland Security, made the remarks during an RNC Cyber security Forum meeting in Cleveland Tuesday to draw attention to the nation&#8217;s vulnerabilities regarding cyber attacks.<br \/>\nThe forum presented views by ten of the nation&#8217;s leading experts on internet technology and was sponsored by the Center for CyberSecurity and Privacy Protection at Cleveland Marshall College of Law.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=57bcdf5571&#038;e=20056c7556<\/p>\n<p>Browser study aims to stop hackers in their tracks<br \/>\nDeveloping an anti-tracking computer program to protect users against hackers is at the heart of a new study into browsing habits.<br \/>\nBrowser fingerprinting is an increasingly common tracking technique that collects contextual data from a person\u2019s computer without their knowledge.<br \/>\nResearchers at the University of Adelaide in South Australia are conducting a study to discover the weaknesses in contemporary \u201cbrowserprinting\u201d methods to build an adequate defence program.<br \/>\nUniversity of Adelaide PhD student Lachlan Kang said browser fingerprinting could affect anyone, even those who used the anonymous aspects of VPNs to protect their privacy.<br \/>\nIn an Oxford and MIT joint study earlier this year, it was discovered that the social media site Twitter used location tags to determine real-world addresses, hobbies, and medical histories.<br \/>\nTo join the study, visit: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8aec1e1df9&#038;e=20056c7556.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=42e586ebfb&#038;e=20056c7556<\/p>\n<p>Why the U.S. is behind the curve on cyberwarfare<br \/>\nThere are three reasons for this, and they are easy to understand.<br \/>\nFirst, we populate our cyberwarfare capability with officers whose training and experience are in kinetic, not digital, warfare.<br \/>\nWe would be better off with a group of hackers or by elevating civilians, who would stay in place over a long enough period of time to acquire the requisite skills.<br \/>\nSecond, we do not have people in key positions or in sufficient numbers who are fluent in either Arabic or Pashto or in grasping cultural nuances.<br \/>\nIf you can\u2019t understand the language or culture, it is pretty hard to figure out what is going on and respond to it on either a technical or psychological level.<br \/>\nAnd third, the complex web of organizational relationships in U.S. cyberwarfare precludes quick and dynamic decision-making when time is of the essence.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e1c41e182f&#038;e=20056c7556<\/p>\n<p>9 Critical Responsibilities Of The Cybersecurity Manager<br \/>\nThe larger the organization, the more narrow the focus becomes.<br \/>\nFor instance, if you were the only one running the show in the cybersecurity department for your organization, you would be tasked with everything from the technical aspects of security to security policy (and everything in between).<br \/>\nIn a larger organization, cybersecurity managers often play one of two roles:<br \/>\n&#8211; A technical security manager<br \/>\n&#8211; A program security manager<br \/>\n9 Critical Responsibilities Of The Cybersecurity Manager<br \/>\n* Monitor all operations and infrastructure.<br \/>\n* Maintain all security tools and technology.<br \/>\n* Monitor internal and external policy compliance.<br \/>\n* Monitor regulation compliance.<br \/>\n* Work with different departments in the organization to reduce risk.<br \/>\n* Implement new technology.<br \/>\n* Audit policies and controls continuously.<br \/>\n* Ensure cybersecurity stays on the organizational radar.<br \/>\n* Detail out the security incident response program.<\/p>\n<p>In many large organizations, the chief information security officer is involved in briefing the board members on cybersecurity\u2014but depending on the size and maturity of the security program in your organization, this may fall on cybersecurity manager.<br \/>\nIf this falls within your scope of work, you should focus on communicating the state of your information security program, including your successes and failures.<br \/>\nThe free ebook below gives you a deeper look at how to do so effectively.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=195eb0cad5&#038;e=20056c7556<\/p>\n<p>SEC Prepares for More Cybersecurity Oversight<br \/>\nLeading U.S. banks, and other publicly traded companies, should expect increased cybersecurity scrutiny from the Securities and Exchange Commission.<br \/>\nThis week, during a meeting of the Treasury Department&#8217;s Financial and Banking Information Infrastructure Committee, leaders of the SEC and the Commodity Futures Trading Commission, which aims to protect consumers from fraud, shared updates about their agencies&#8217; approaches to cybersecurity, as well as an overview of their examination processes, rules and other actions.<br \/>\nThe Treasury committee focuses on improving information sharing among financial regulators, promoting public-private partnerships and enhancing the resiliency of the financial sector.<br \/>\nAnd its membership reads like a who&#8217;s who of regulatory authority, including Sarah Bloom Raskin, deputy secretary at the Treasury Department; Mark Gruenberg, chairman of the Federal Deposit Insurance Corp.; and Thomas J.<br \/>\nCurrey, comptroller of the Office of the Comptroller of the Currency.<br \/>\nThe FBI also played a role at the meeting, noting the need for more information sharing with the financial sector.<br \/>\nWe can expect in coming weeks to see more from the SEC and the CFTC about their plans to be more proactive about cybersecurity oversight, risk assessment and cyber examination.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c6ff92ea9d&#038;e=20056c7556<\/p>\n<p>Firefox sets kill-Flash schedule<br \/>\nMozilla yesterday said it will follow other browser markers by curtailing use of Flash in Firefox next month.<br \/>\nThe open-source developer added that in 2017 it will dramatically expand the anti-Flash restrictions: Firefox will require users to explicitly approve the use of Flash for any reason by any website.<br \/>\nFirefox is late to the dump-Flash party.<br \/>\nOther browser developers &#8212; Apple, Google and Microsoft &#8212; have been more active in limiting Flash.<br \/>\nSafari has frozen some Flash content since 2013, while Chrome did the same in September 2015.<br \/>\nEdge will follow suit with the release of the Aug. 2 upgrade, Windows 10 Anniversary Update.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=013350d98d&#038;e=20056c7556<\/p>\n<p>How exposed is trucking data to theft?<br \/>\nSean KilcarrThere\u2019s this new term being bandied about in corporate circles these days called \u201cknowledge assets,\u201d which means \u201cconfidential information\u201d critical to a company&#8217;s core business operations other than personal information.<br \/>\nSuch \u201cknowledge assets\u201d include things like: trade secrets; information regarding product design, development or pricing; non-public information company internal structure, plans or relationships; and \u201ccrucial\u201d customer information, which in trucking\u2019s case can mean everything from billing numbers to data regarding specific cargoes.<br \/>\n&#8220;Companies face a serious challenge in the protection of their knowledge assets.<br \/>\nThe good news is there are steps to take to reduce the risk,&#8221; noted Dr.<br \/>\nLarry Ponemon, chairman and founder of the Ponemon Institute.<br \/>\n&#8220;First of all, understand the knowledge assets critical to your company and ensure they are secured,\u201d he said. \u201cMake sure the protection of knowledge assets, especially when sharing with third parties, is an integral part of your security strategy, including incident response plans.<br \/>\nTo address the employee negligence problem, ensure training programs specifically address employee negligence when handling sensitive and high value data.&#8221;<br \/>\nThat\u2019s especially true for many areas in trucking, where cargo theft remains a major problem \u2013 while data breaches only amplify the issue.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8a4069c3fd&#038;e=20056c7556<\/p>\n<p>Call for Australia to appoint cyber ambassador<br \/>\nA senior official from the security services company Forcepoint has welcomed the appointment of Dan Tehan as the minister assisting Prime Minister Malcolm Turnbull for cyber security, but says that, given Tehan&#8217;s numerous roles, the appointment of a &#8220;cyber ambassador&#8221; will be key to co-ordinating Australia&#8217;s efforts in this direction.<br \/>\nBut, at the same time, he added, that given Tehan was appointed to fulfil cyber strategy it raised questions of whether he would be able to critically evaluate and amend the programme with growing cyber security threats.<br \/>\nTehan wears a number of hats in Turnbull&#8217;s ministry: he is minister for defence personnel, minister assisting the prime minister for the centenary of ANZAC, minister for veteran&#8217;s affairs and minister assisting the prime minister for cyber security.<br \/>\nEilon said right now, Australian government agencies were operating with small budgets and could be hesitant to take steps needed to protect citizens, networks and sensitive data. &#8220;However, given the cost of fraud and cyber-attacks will reach $70 billion by 2020, as forecast by the Australian Computer Society, security across government should be more of a focus.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=00cc605fbc&#038;e=20056c7556<\/p>\n<p>The changing face of data breaches<br \/>\nHOW THE CLOUD COMPLICATES THE BREACH BUSINESS \u2014 Benjamin Powell, an attorney at WilmerHale who has handled some of the biggest data breach cases you can think of, says he\u2019s noticing a distinct trend: As companies move to the cloud and increasingly rely on cloud service providers, they\u2019re encountering different sets of problems when there\u2019s a breach.<br \/>\n\u201cIt is interesting: If you have an incident, now you have a third party involved,\u201d Powell, the former longtime general counsel for the Office of the Director of National Intelligence, told MC in a recent interview. \u201cEverything before was your own world.<br \/>\nYou now have multiple parties and players.<br \/>\nIt\u2019s just been something that as the cloud moves, it\u2019s a different kind of world as opposed to, \u2018Our servers are over there.\u2019 And you see this in the government with what they\u2019re doing in the cloud and even the intelligence community.\u201d<br \/>\nThe motive for moving to the cloud for most businesses, in Powell\u2019s anecdotal experience, is \u201cimmense computing power at a very good price point.\u201d But that raises a natural question. \u201cIs that bad for security.<br \/>\nThe answer is, it\u2019s not a \u2018good\u2019 or \u2018bad,\u2019\u201d according to Powell. \u201cThere are a lot of advantages to using providers who have security expertise you won\u2019t have as a company unless you\u2019re a really high-end company.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cb9afc48c9&#038;e=20056c7556<\/p>\n<p>Automotive Cybersecurity Best Practices<br \/>\nEXECUTIVE SUMMARY \u2013 JULY 2016<br \/>\nAs vehicles become increasingly connected and autonomous, the security and integrity of automotive systems is a top priority for the automotive industry.<br \/>\nThe Proactive Safety Principles released in January 2016 demonstrate the automotive industry\u2019s commitment to collaboratively enhance the safety of the traveling public.<br \/>\nThe objective of the fourth Principle, \u201cEnhance Automotive Cybersecurity,\u201d is to explore and employ ways to collectively address cyber threats that could present unreasonable safety or security risks.<br \/>\nThis includes the development of best practices to secure the motor vehicle ecosystem.<br \/>\nTo further this objective, the Automotive Information Sharing and Analysis Center (\u201cAuto-ISAC\u201d) has undertaken the task of creating and maintaining a series of Automotive Cybersecurity Best Practices (\u201cBest Practices\u201d).<br \/>\nThe Best Practices cover organizational and technical aspects of vehicle cybersecurity, including governance, risk management, security by design, threat detection, incident response, training, and collaboration with appropriate third parties.<br \/>\nThe Best Practices expand on the Framework for Automotive Cybersecurity Best Practices (\u201cFramework\u201d) published in January 2016 by the Alliance of Automobile Manufacturers (\u201cAuto Alliance\u201d) and the Association of Global Automakers (\u201cGlobal Automakers\u201d).<br \/>\nThe Auto-ISAC closely collaborated with the two industry associations throughout Best Practices development.<br \/>\nThese Best Practices follow a precedent set by other ISACs and similar organizations that have developed best practices for their respective industries.<br \/>\nThe Best Practices provide guidance on how individual companies can implement the \u201cEnhance Automotive Cybersecurity\u201d Principle within their respective organizations.<br \/>\nThis document is an Executive Summary of the Best Practices content.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0a83d8f018&#038;e=20056c7556<\/p>\n<p>Regulators&#8217; IM Crackdown May Increase Cyber Risk<br \/>\nIn April, the Office of the Comptroller of the Currency issued a bulletin specifically aimed at banks&#8217; use of internal messaging software.<br \/>\nThe bulletin was issued to &#8220;remind&#8221; banks of their obligations related to the maintenance of records, records retention and examiner access to records.<br \/>\nIn the bulletin, the OCC said it is entitled to complete access to records of bank&#8217;s internal correspondence.<br \/>\nThe agency warned that data deletion and encryption features in IM software should not be &#8220;used to prevent or impede OCC access to a bank&#8217;s books and records&#8221; and &#8220;may result in enforcement action.&#8221;<br \/>\nBut given the heavy reliance by bank personnel on IM as a communication tool for everything from back office operations to trading, the OCC&#8217;s recent guidance could impose significant hardships.<br \/>\nMoreover, the guidance runs contrary to prevailing guidance on cybersecurity, which counsels against retention of data that could be accessible to hackers but that serves no current business purpose or need.<br \/>\nWhile it is rather obvious that IMs relevant to any current litigation and regulatory action or review should be retained, banks and their counsel are pretty much left scratching their heads for the time being concerning retention of IM data that would be deemed appropriate by the OCC.<br \/>\nUntil more specific guidance comes from the OCC, bankers and their counsel should exercise informed discretion through dialogue with their OCC representative before deleting en masse IM data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8d10682d56&#038;e=20056c7556<\/p>\n<p>Cyber Security Quarterly Round-Up &#8211; July 2016<br \/>\n* The EU General Data Protection Regulation has finally been approved and published in the Official Journal. The countdown to its application date of 25 May 2018 has therefore begun.<br \/>\n* The EU Network and Information Security Directive (otherwise known as the Cyber Security Directive) has finally been published in the Official Journal. Member States will now have until 9 May 2018 to adopt appropriate national legislation to comply with the Directive, with such legislation to apply from 10 May 2018.<br \/>\n* The &#8220;in-out&#8221; Referendum on the question of the UK&#8217;s membership of the EU has resulted in a majority of voters (on a turnout of approximately 72%) preferring the UK to leave the EU. The vote was 51.9% in favour of leaving, with 48.1% voting to remain. Under the terms of Article 50 of the Treaty on European Union, which governs the process, the UK must first inform the European Council of its intention to leave the EU. This notification triggers the two-year period specified by the Treaty for the negotiation of the terms of a Member State&#8217;s withdrawal.<br \/>\n* The European Commission adopted an adequacy decision on 12 July 2016 allowing for the transatlantic transfer of personal data from the EU to the US in accordance with the framework and principles of the EU-US Privacy Shield (the &#8220;Privacy Shield&#8221;).<br \/>\n* The Culture, Media and Sport Committee (the &#8220;Committee&#8221;) of the House of Commons has published a report in the wake of the TalkTalk cyber attack of 21 October 2015, recommending, amongst other things, that a part of CEO compensation be linked to effective cyber security.<br \/>\n* The UK government has recently confirmed that its National Cyber Security Centre (&#8220;NCSC&#8221;) will begin operations in October 2016. This newest body to be established as part of the UK&#8217;s continuing fight against Cybercrime will be headquartered in London and is to be &#8220;the authoritative voice on information security in the UK&#8221;.<br \/>\n* The European Banking Federation (&#8220;EBF&#8221;), the Global Financial Markets Association (&#8220;GFMA&#8221;) and the International Swaps and Derivatives Association (&#8220;ISDA&#8221;) have announced their intention to begin negotiations on common global cyber security, data and technology policies through a new set of common principles (the &#8220;Principles&#8221;).<br \/>\n* On 11 April 2016, the High Court of England and Wales issued its judgment in the case of Axon v Ministry of Defence [2016] EWHC 787 (QB), finding that an employer could be held vicariously liable for data protection breaches by its employees.<br \/>\n* One of the big challenges for the cyber insurance industry is assessing systemic aggregation risks. But the market is not standing still.<br \/>\n* Decentralised Autonomous Organisation (&#8220;DAO&#8221;) is an investment fund based on the Ethereum blockchain technology. DAO enables people to buy in to the fund by exchanging paper currency for virtual currency, known as Ether.<br \/>\n* The Hong Kong Monetary Authority (&#8220;HKMA&#8221;) issued a press release on 18 May 2016 on the launch of a &#8220;Cyber Security Fortification Initiative&#8221; (&#8220;CFI&#8221;), which is aimed at raising the level of cyber security of banks in Hong Kong. The HKMA also released a formal circular on 24 May 2016 setting out that it is a supervisory requirement for banks to implement the CFI.<br \/>\n* The Singapore government is expected to table legislation in Parliament in 2017 for a new, standalone Cyber Security Act.<br \/>\n* On 21 April 2016, Australia\u2019s federal government released its Cyber Security Strategy (&#8220;CSS&#8221;).<br \/>\n* In July 2015 we reported that the Australian Companies and Securities Commission (&#8220;ASIC&#8221;) had released \u201cReport 429: Cyber Resilience: Health Check\u201d which recommended that businesses manage their cyber security by ensuring they are able to adapt to change, reduce exposure to risks and learn from incidents when they occur.<br \/>\n* A US federal appeals court handed a major win to Microsoft when it ruled that US authorities cannot compel US tech companies to disclose email content they store on servers located outside the United States.<br \/>\n* In a case that potentially could alter the way US law enforcement seeks to obtain stored electronic data, Microsoft has challenged the constitutionality of a provision of US federal law that authorises US courts to issue gag orders forbidding it, and similar companies, from advising their customers about search warrants, court orders or subpoenas that the government employs to obtain the stored electronic communications of those customers.<br \/>\n* Proposed legislation that would have required tech companies and cloud providers to provide stored electronic data to US government investigators in an unencrypted form appears unlikely to receive formal legislative consideration this year.<br \/>\n* Herbert Smith Freehills has published the first edition of its global cross-border M&#038;A report, carried out in association with FT Remark, the research division of the FT. The report showed that anxieties over data protection and cyber security rules are rising up the agenda.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a9d875f71&#038;e=20056c7556<\/p>\n<p>MS-ISAC official: Ransomware is top malware of concern for states, counties<br \/>\nSpeaking during a Chief Information Officer Forum at the National Association of Counties\u2019 annual conference, Gina Chapman, the senior director of operations for MS-ISAC, said ransomware attacks on the networks they monitor were on a \u201ccontinuous incline\u201d from October 2015 through May 2016.<br \/>\nDuring the October through May period, MS-ISAC observed 450 infections per month at its highest point.<br \/>\nRansomware attacks on governments declined slightly in June, Chapman said, but governments should not let their guard down \u2014 cyberattacks traditionally decrease during the summer months.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=41814afc34&#038;e=20056c7556<\/p>\n<p>CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro<br \/>\nCompanies may not fully understand the nature of modern threats, and simply placing a higher priority on security may not lead to improved measures, according to a CompTIA survey.<br \/>\nWhen it comes to the essential steps for strengthening and refining cybersecurity strategy in a large organization, Cabrera believes that a framework really comes first.<br \/>\nUnsurprisingly, he\u2019s a big fan of the NIST Cybersecurity Framework, which consists of standards, guidelines and practices that help organizations address cyber risks by aligning policy, business and technological approaches.<br \/>\nIt was created by the National Institute of Standards and Technology (NIST) in partnership with the US Department of Homeland Security and the private sector.<br \/>\nWhile 63% of companies have IoT devices already deployed, only 34% have security measures in place, indicating that the IoT is opening up new threat vectors but too few organizations are focused on preventing connected devices from being compromised.<br \/>\n\u201cA layered connected threat defense using Big Data analytics and machine learning will be required to bring together often disparate and overlapping security stacks where visibility and control are the biggest challenges.<br \/>\nIt is needed today but will be essential in the coming years for CISOs and their teams,\u201d explains Cabrera.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e88f82d71c&#038;e=20056c7556<\/p>\n<p>RSA Research Shows 74% of APJ Organizations Face Significant Risk of Cyber Incidents<br \/>\nSINGAPORE, July 20, 2016 \/PRNewswire\/ &#8212; RSA CONFERENCE &#8212; RSA, The Security Division of EMC (NYSE: EMC), has announced the results of research that demonstrates organizations in Asia Pacific &#038; Japan (APJ) investing in detection and response technologies are better poised to defend against today&#8217;s advanced threats, in comparison to those primarily utilizing perimeter-based solutions.<br \/>\nThe results of the second annual RSA Cybersecurity Poverty Index found that 74% of survey respondents in the APJ region face a significant risk of cyber incidents \u2013 closely aligned to the global average of 75%.<br \/>\nMore than 200 respondents from the APJ region participated in the 2016 RSA Cybersecurity Poverty Index.<br \/>\nThe survey gave participants the chance to self-assess the maturity of their cybersecurity programs by leveraging the NIST Cybersecurity Framework (CSF) as the measuring stick.<br \/>\nThe findings showed that organizations continue to struggle with their ability to take proactive steps to improve their cybersecurity and risk posture.<br \/>\nIn fact, 70% of APJ-based respondents had experienced cyber incidents that negatively impacted their business operations in the past year.<br \/>\nNot surprisingly, only 23% of those organizations considered their cybersecurity strategy mature.<br \/>\nThe results also showed that organizations often delay investing in cybersecurity until they&#8217;ve undergone a major incident \u2013 typically one that impacts critical business assets.<br \/>\nThe inability of organizations to quantify their Cyber Risk Appetite (the risks they face and the potential impacts on their organizations) makes it difficult to prioritize mitigation and investment, a foundational activity for any organization looking to improve their security and risk posture.<br \/>\nThe strongest reported maturity levels were in the area of Protection.<br \/>\nHowever, perimeter-based defense solutions are proving to be increasingly ineffective over time as cyber threats become more advanced.<br \/>\nThe categories of Response and Detection were ranked least mature in the region.<br \/>\nOrganizations must focus on executing preventative strategies and improving capabilities that offer complete visibility to detect and respond to advanced threats before they can impact the business.<br \/>\nLink: http:\/\/paulgdavis.us3.lis<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * Size Doesn\u2019t Matter: Cyber Security and the SME * Cybersecurity Due Diligence Critical Amid Rise In Data Breaches * Mobile Security Research&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2494","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2494"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2494\/revisions"}],"predecessor-version":[{"id":4981,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2494\/revisions\/4981"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}