{"id":2495,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail192-suw16-rsgsv-net\/"},"modified":"2021-12-30T11:41:27","modified_gmt":"2021-12-30T11:41:27","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail192-suw16-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail192-suw16-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail192.suw16.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* World Bank: Well-regulated FinTech boosts inclusion, fights cyber crime<br \/>\n* FERC Federal Energy Regulatory Commission : Issues Final Rule Directing NERC to Develop a New or Modified Reliability Standard For Supply Chain Risk Management<br \/>\n* 7 information security trends currently dominating the market<br \/>\n* 49,455 cyber crime incidents, just 302 convictions [India &#8211; Infographic]<br \/>\n* Cyber crime makes up 51% of fraud in England and Wales<br \/>\n* Cybersecurity: A vertical industry application?<br \/>\n* 3 ways phishing destroys marketing ROI<br \/>\n* When should push come to shove over cybersecurity?<br \/>\n* Here&#8217;s what your personal data is going for on the dark web<br \/>\n* Tools &#038; Training To \u2018Hack Yourself\u2019 Into Better Security<br \/>\n* Location, location, location: Does it really matter where your data is stored?<br \/>\n* Digital trust could be the key to ensure personal health data<br \/>\n* Why IT Service Desk Should be your First Line of Defence<br \/>\n* Data security and breach notification in China<br \/>\n* Data security and breach notification in Hong Kong<br \/>\n* NASA Taps Former Microsoft Director as IT Security Chief<\/p>\n<p>World Bank: Well-regulated FinTech boosts inclusion, fights cyber crime<br \/>\nFINANCIAL technology \u2014 or FinTech \u2014 is changing the financial sector on a global scale.<br \/>\nIt is also enabling the expansion of financial services to low-income families who have been unable to afford or access them.<br \/>\nThe possibilities and impact are vast, as is the potential to improve lives in developing countries.<br \/>\nThe financial sector is beginning to operate differently; there are new ways to collect, process, and use information, which is the main currency in this sector.<br \/>\nA completely new set of players is entering the business.<br \/>\nAll areas of finance \u2014 including payments and infrastructure, consumer and SME credit, and insurance \u2014 are thus changing.<br \/>\nWith FinTech, regulators must adapt to the fast-changing landscape and to a new class of entrants, while ensuring a level playing field, protecting consumers and privacy, and guarding against money laundering and the financing of terrorism.<br \/>\nNew questions arise, such as whether encrypted money transactions would promote financial inclusion while aiding anti-money laundering activities by reducing cash transactions and allowing greater traceability.<br \/>\nMexico\u2019s approach, of making the information required from account holders proportional to the size and frequency of their transactions, has proved an efficient way to supervise the financial system while keeping transaction costs low for low-risk clients.<br \/>\nThis new risk landscape requires new ways of thinking about regulation and financial supervision.<br \/>\nThis is particularly true with respect to cybersecurity risks, where banks and regulators have to depart from traditional supervision processes.<br \/>\nThe combination of supervisory functions with technology is also key to increase the detection of illicit money flows, fraud and theft.<br \/>\nThe imminent need to regulate FinTech effectively, as well as apply regulatory knowledge in news ways, is a stimulating challenge taken up by national and international institutions, often with the private sector.<br \/>\nThe technological changes we\u2019re seeing, together with regulatory support, will help accelerate billions more people to access finance to make their lives better and start tapping the benefits of development.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f160aabb3e&#038;e=20056c7556<\/p>\n<p>FERC Federal Energy Regulatory Commission : Issues Final Rule Directing NERC to Develop a New or Modified Reliability Standard For Supply Chain Risk Management<br \/>\nNorth American Electric Reliability Corporation to develop a new or modified Reliability Standard that addresses supply chain risk management for industrial control system hardware, software, and computing and networking services associated with bulk electric system operations.<br \/>\nThe new or modified Reliability Standard is intended to mitigate the risk of a cybersecurity incident affecting the reliable operation of the Bulk-Power System.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c7d890ffe1&#038;e=20056c7556<\/p>\n<p>7 information security trends currently dominating the market<br \/>\nIf you\u2019re concerned about your company\u2019s information security, you may be interested in learning about these seven different information security trends that are currently dominating the market.<br \/>\n1) Legislation and Information<br \/>\nThis is an ongoing discussion in the information security industry, and so far, there has been no clear indication of how legislation, which is often trying to put rules on past situations, can keep up with the always-changing world of data security.<br \/>\n2) Big Data will result in Big Problems<br \/>\nBusiness owners need to question the validity of their data, their code, and all other information to make certain that the information they\u2019re using is correct and current.<br \/>\n3) The Cloud<br \/>\nYou should have full visibility of your data, including knowing where it\u2019s physically being stored, what the provider\u2019s security system is, and how they address vulnerabilities.<br \/>\n4) Ransomware<br \/>\nEither way, IT departments and data security companies have to step up to deal with this type of threat.<br \/>\nOne way they are doing so is by using real-time network intrusion protection to see what unauthorized accounts are logged into the system and removing their access before they can do any damage.<br \/>\n5) Phishing<br \/>\nMany cyber-terrorists prefer phishing because it\u2019s much easier than creating a virus or malware.<br \/>\n6) Known System Vulnerabilities<br \/>\nMake certain your systems have been fully patched and that you replace security systems that have known security issues and no available fixes for them.<br \/>\n7) The Internet of Things<br \/>\nAll of these new internet-connected devices will have to have some kind of security in place to prevent unauthorized access.<br \/>\nUnfortunately, with so many new entry points to your system, it can be all but impossible to monitor every single one of them.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=59b54c38e1&#038;e=20056c7556<\/p>\n<p>49,455 cyber crime incidents, just 302 convictions [India &#8211; Infographic]<br \/>\nWhile there has been a steady increase in the number of cases registered to curb cyber crime, convictions are still slow.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1a55b06e60&#038;e=20056c7556<\/p>\n<p>Cyber crime makes up 51% of fraud in England and Wales<br \/>\nOf an estimated 3.8 million incidences of fraud in England and Wales over the year to end-March 2016, 1.9 million or 51 percent were cyber-related, affecting one in ten adults, according to experimental statistics published by the UK Office of National Statistics (ONS).<br \/>\nThis is the first time the ONS has published official estimates of fraud and computer misuse and the independent statistics body claims the new questions, which were added to the Crime Survey in October 2015 represent a world first.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e1efbd0deb&#038;e=20056c7556<\/p>\n<p>Cybersecurity: A vertical industry application?<br \/>\nCybersecurity has always been a horizontal technology practice that\u2019s roughly the same across all industry sectors.<br \/>\nYes, some industries have different regulations, use cases or business processes that demand specific security controls, but overall every company needs things like firewalls, IDS\/IPS, threat management gateways and antivirus software regardless.<br \/>\nGeneric security requirements will remain forever, but I see a burgeoning trend transforming cybersecurity from a set of horizontal technologies to a vertical industry application.<br \/>\nThese drivers include:<br \/>\n* Increasing business focus on cybersecurity<br \/>\n* CISO progression<br \/>\n* Advancing regulations<br \/>\n* Industry-focused threats<br \/>\n* IoT<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5e1fb85b55&#038;e=20056c7556<\/p>\n<p>3 ways phishing destroys marketing ROI<br \/>\nMarketers rely on key performance indicators (KPIs) to prove their value to the business.<br \/>\nAnd email is a key driver of those metrics, generating more leads, conversions and revenue than any other distribution channel.<br \/>\nUnfortunately, the most valuable marketing channel is also the least secure.<br \/>\nIn the first quarter of 2016, the Anti-Phishing Working Group (APWG) observed more phishing attacks than at any other time in history.<br \/>\nAnd this trend has big consequences.<br \/>\nBelow, we explore three ways phishing destroys your marketing ROI \u2014 and what you can do about it.<br \/>\n1) Phishing destroys brand trust<br \/>\n2) Phishing reduces email marketing performance<br \/>\n3) Phishing erodes email marketing revenue<br \/>\nThe reality is, no matter how sophisticated email authentication protocols become, some bad email will always reach the inbox.<br \/>\nEducating customers is a great way to mitigate the impact of those fraudulent messages.<br \/>\nCreate a customer education portal, or remind customers that you\u2019ll never ask them for certain information over email.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1d84986009&#038;e=20056c7556<\/p>\n<p>When should push come to shove over cybersecurity?<br \/>\nSo how can business respond to their slick phishing emails and social engineering ruses?<br \/>\nOne school of thought within cybersecurity circles argues for an aggressive stance, urging companies to force their employees to regularly change their passwords.<br \/>\nThey argue that letting passwords go stale only raises the odds that hackers, given more opportunity to guess the right combination, will eventually hit pay dirt.<br \/>\nFTC Chief Technologist\u2014and Carnegie Mellon computer science professor\u2014Lorrie Cranor, argued recently that it\u2019s time to rethink mandatory password changes.<br \/>\nShe noted that when organizations force employees to frequently change their passwords, people \u201ctended to create passwords that followed predictable patterns.\u201d<br \/>\nIn the end, however, the onus falls on the backend systems.<br \/>\nIt\u2019s up to the organization to equip administrators with tools to monitor the network for anomalies, which might suggest someone has attempted to access a legitimate user account.<br \/>\nWith a window into the system, security monitors can discern the last time that users logged in to determine whether they are responsible for failed attempts at logging in.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=82cb45f97e&#038;e=20056c7556<\/p>\n<p>Here&#8217;s what your personal data is going for on the dark web<br \/>\nHere is what security software company Trend Micro claims this type of data is commanding today:<\/p>\n<p>Credit card credentials: $15-$22<br \/>\nSpotify account: $2.75<br \/>\nHulu account: $2.75<br \/>\nNetflix account: $1\u2013$3<br \/>\nNOAA.gov account (FTP or SFTP access): $476<br \/>\nUSPS.gov account (FTP or SFTP access): $680<br \/>\nCDC.gov account (FTP or SFTP access): $340<br \/>\nWestern Union account: $6.80<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=610e106211&#038;e=20056c7556<\/p>\n<p>Tools &#038; Training To \u2018Hack Yourself\u2019 Into Better Security<br \/>\nIf you can implement a \u201chack-yourself\u201d program effectively, you can improve the effectiveness of your defense-in-depth strategies by having a blue team capable of carrying out red team exercises to gain a better awareness of how attackers might approach certain network vulnerabilities.<br \/>\nWhen your network is under attack, your most valuable asset is time.<br \/>\nThe faster you understand you\u2019re being attacked and the quicker you understand what\u2019s happening, the faster you can identify where the attackers are and what they\u2019re doing.<br \/>\nResponding to attacks quickly and efficiently requires an advanced level of preparation that many security teams haven\u2019t yet achieved.<br \/>\nThe first step in improving preparation is theoretical training in the latest tools, techniques and procedures.<br \/>\nCybersecurity conferences such as Black Hat, DefCon, BSides and the Chaos Communication Conference can provide the higher-level, theoretical learning to get your security team moving toward proper awareness and preparation.<br \/>\nThe next step is to introduce red team exercises.<br \/>\nRed team exercises with third-party consultants can help large enterprises spot critical vulnerabilities in their networks.<br \/>\nHowever, many companies rely on these red team exercises to the point that they don\u2019t maintain the proper level of internal cybersecurity awareness.<br \/>\nExternal red team exercises offer a level of expertise that most organization don\u2019t have internally.<br \/>\nBut there is also real value in implementing a \u201chack-yourself\u201d program to build your security posture from the inside &#8212; and arm your blue team with the necessary skills to think like the red team and improve your security posture.<br \/>\nOne way to ensure your security team has the proper training to carry out an advanced \u201chack-yourself\u201d program is to invest in the Cyber Guardians program from the SANS Institute.<br \/>\nThe Cyber Guardians program consists of four core courses and corresponding certificates.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ffc116efea&#038;e=20056c7556<\/p>\n<p>Location, location, location: Does it really matter where your data is stored?<br \/>\nAccording to a recent study conducted by Red Brick Research on behalf of Volta Data Centres, 87 per cent of UK consumers would feel more confident if they knew their data was stored in the UK.<br \/>\nThe survey clearly indicates that customers care about where their data is stored.<br \/>\nDespite clear concerns regarding companies\u2019 data policies, the majority of consumers are still unaware of how their personal data is stored \u2013 81 per cent fail to check how a company stores their personal data or for how long that data is held.<br \/>\nThis is in stark contrast to the 49 per cent that actively check that security status of the website.<br \/>\n72 per cent specifically more confident about data being stored in London compared to other cities.<br \/>\nThe primary concern is privacy laws \u2013 with 69 per cent admitting they would worry if they knew that their personal information was being held in countries that had different data protection laws to the UK.<br \/>\nOf these, 44 per cent would be most worried about their personal data if stored in Africa, followed by Asia (18 per cent) and Eastern Europe (17 per cent).<br \/>\nIn addition, 67 per cent would worry if they knew that their personal information was being held in countries that had different security requirements to the UK.<br \/>\nThe good news for businesses is that this level of awareness is driving demands for more information about a company\u2019s data storage policies \u2013 and the younger generation is even more likely to be swayed by an organisation\u2019s data location strategy. 72 per cent of 25 to 54 year olds confirm they would have more trust in an organisation that provided information about where it stored data \u2013 this rises to 87.8 per cent of 18 to 24 year olds.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=03ffbabc9d&#038;e=20056c7556<\/p>\n<p>Digital trust could be the key to ensure personal health data<br \/>\nRachel Delphin, Tanium&#8217;s new head of product communications, joined the company from Twitter and joined us to discuss why the &#8216;broken system&#8217; of cybersecurity lured her in, and why education is key to stopping threats.<br \/>\nSo who is Tanium&#8217;s audience?<br \/>\nThere are the obvious audiences, the people who cover engineering and innovation, and of course it&#8217;s people who will become customers of Tanium.<br \/>\nBut it&#8217;s also engaged citizens and the companies they trust keep their information.<br \/>\nYou came from Twitter (NYSE: TWTR), itself an influential platform that&#8217;s also had its share of product challenges.<br \/>\nWhat did you take away from that experience?<br \/>\nProduct communications, generally speaking, is launching new products and features and communicating that to end audiences.<br \/>\nHere, the audience is different and obviously the products are different.<br \/>\nHow would you describe that goal at Tanium?<br \/>\nIt&#8217;s very much about the need to educate people on the state of the industry: that the system is broken, and the tools we\u2019re using are out of date.<br \/>\nThe transition into the era of electronic health records and health wearables has resulted in a plethora of electronic patient information including dates of birth, home addresses, social security records, insurance details and medical data.<br \/>\nThis data is highly desirable on the black market.<br \/>\nBut there are ways to prevent the risk for fraud.<br \/>\nI recently spoke to Brian Kalis, managing director of digital health at Accenture, to learn more.<br \/>\nKalis and many others place great credence in the notion of \u201cdigital trust,\u201d a combination of cybersecurity, privacy and \u201cdata ethics.\u201d It extends beyond the notion of data security to an ethical viewpoint about \u201cthe handling, control and providence of data. about making sure data is accurate and handled effectively.<br \/>\nDigital ethics expands data security beyond pure safety to the decisions and actions you take to ensure that you are using that information responsibly for the people you serve as a steward of that information.\u201d<br \/>\n\u201cWhat we\u2019re seeing is the raising of security up to the board level, executive level response, so a lot of the ways of protecting it start with the leadership and overall aspect of making security of data a priority and then extend this philosophy to all the employees in practice.<br \/>\nThen companies can move into more advanced ways of protecting the information internally, whether through using advanced analytics to detect both internal threats or misuses of information or external threats coming in.\u201d<br \/>\nKalis also believes the blockchain can be part of the solution, as it shifts the model from centralized control to decentralized power that\u2019s ultimately controlled by the individual.<br \/>\nHe cities the example of Estonia where blockchain technology is utilized to secure over a million healthcare records.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d93ad6d880&#038;e=20056c7556<\/p>\n<p>Why IT Service Desk Should be your First Line of Defence<br \/>\nThe best defense against cyber-crime is knowledge, namely, knowing exactly what is going on inside an organizations\u2019 network.<br \/>\nThat\u2019s why the IT Service Desk plays such a crucial role in identifying strange behaviors and meaningful trends.<br \/>\nAfter all, if a number of users\u2019 PCs are running slowly, or a business application is frequently crashing, it could easily be a symptom of a wider cyber-attack.<br \/>\nYet, users are unlikely to go running straight to the IT security department.<br \/>\nFor this reason, the Service Desk is best placed to notice if any trends begin to appear which could warrant further investigation.<br \/>\nThere are several measures that organizations can take to equip their Service Desk against cyber-crime.<br \/>\nAutomated patching should proactively manage operating systems and application vulnerabilities and endpoint protections should ensure that only authorized applications run.<br \/>\nTaking the time to arm your Service Desk with these sorts of defenses will result in efficiency and, consequently, a well-secured operating system that blocks the majority of incoming threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7f1c3ebb40&#038;e=20056c7556<\/p>\n<p>Data security and breach notification in China<br \/>\nArticle 13 of the Provisions on Protecting the Personal Information of Telecommunications and Internet Users imposes the following security requirements on telecommunications operators and internet service providers<br \/>\nThe Provisions on Protecting the Personal Information of Telecommunications and Internet Users also require that telecommunications operators and internet service providers provide staff members with training in the relevant skills and responsibilities relating to the protection of personal information.<br \/>\nThey must also conduct at least one self-audit of their data protection measures, record the results and promptly eliminate any security risks discovered during the audit.<br \/>\nThere are no national-level requirements regarding notification of breaches.<br \/>\nHowever, under certain local consumer protection regulations, such as those in Shanghai, security breaches must be reported to the data subjects.<br \/>\nIn the telecommunications and internet sector, if personal information is disclosed or may potentially be disclosed, service providers must take remedial measures immediately.<br \/>\nIf the incident has or may have serious consequences, the service provider must report it immediately to the relevant telecommunications administrations and cooperate in the investigation carried out by the telecommunications administrations pursuant to the Provisions on Protecting the Personal Information of Telecommunications and Internet Users.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a3c2a2ee8c&#038;e=20056c7556<\/p>\n<p>Data security and breach notification in Hong Kong<br \/>\nData users must take all practicable steps to ensure that personal data held by them is protected against unauthorised or accidental access, processing, deletion, loss or use.<br \/>\nIf any personal data is transferred to a data processor, the data user must adopt contractual or other means to ensure that the data processor protects the personal data from any unauthorised or accidental access, processing, deletion, loss or use.<br \/>\nWhile there is no statutory requirement to do so, voluntary notification is generally recommended by the privacy commissioner.<br \/>\nIndustry-specific regulators may also require companies in such regulated industries (eg, financial institutions) to notify individuals of any unauthorised access, use or loss of their personal data.<br \/>\nWhile there is no statutory requirement to do so, voluntary notification is generally recommended by the privacy commissioner.<br \/>\nIndustry-specific regulators may also require companies in such regulated industries (eg, financial institutions) to notify them in the event of any unauthorised access, use or loss of personal data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2b7467089b&#038;e=20056c7556<\/p>\n<p>NASA Taps Former Microsoft Director as IT Security Chief<br \/>\nThe National Aeronautics and Space Administration has named a former Microsoft Corp. director as its associate chief information officer for IT security, the federal space agency said this week.<br \/>\nJeanette Hanna-Ruiz, who for the past three and a half years led teams at Microsoft\u2019s consulting services business, takes over the post early next month, the agency said.<br \/>\nMs.<br \/>\nHanna-Ruiz, who was also named as a senior agency information security official, has more than 20 years of experience in cybersecurity, at both public and private sector organizations, according to her LinkedIn profile.<br \/>\nAt Microsoft, she led the company\u2019s identity management team and was its \u201cpublic sector civilian\u201d lead for cybersecurity, among other roles, the agency said.<br \/>\nPrior to that, she was a director of cyber forensics and information assurance at Computer Sciences Corp., from March 2011 until December 2012.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a7e2ee2a4&#038;e=20056c7556<\/p>\n<p>* Best practices in cyber vulnerability assessment<br \/>\n* Are Healthcare CISOs Suffering from Cybersecurity Solution Fatigue? An Expert Probes Some of the Issues<br \/>\n* Will Faster Payments Mean Faster Fraud?<br \/>\n* Accenture : Data theft, malware infection big threat to digital businesses<br \/>\n* Ponemon Institute: External Cyber Attacks Cost Enterprises $3.5M\/year, 79% of Businesses Lack Comprehensive Strategies to Manage these Risks<br \/>\n* 2016 Malware Levels Now Stand at Nearly Four Times 2015 Totals<br \/>\n* Twitter Hacking and Social Media\u2019s Risk to Executive Security<br \/>\n* Beyond Data: Why CISOs Must Pay Attention To Physical Security<br \/>\n* $2.7 Million HIPAA Penalty for Two Smaller Breaches<br \/>\n* Using compliance as a tool for change<br \/>\n* In the Breach War, File Protection Is Just as Important as Data<br \/>\n* Data security and breach notification in Finland<br \/>\n* ISO compliance in the cloud: Why should you care, and what do you need to know?<br \/>\n* Federal Privacy Commissioner Provides Submission on New Data Breach Notification and Reporting Regulations<br \/>\n* Breach notification reporting can be complicated without proper skills, tools<br \/>\n* Banks must do better on cyber security: KPMG<br \/>\n* Australia gets one-quarter of a minister for national infosec<br \/>\n* The Case for Continuous Security Monitoring<br \/>\n* Arbor Networks Releases Global DDoS Attack Data for 1H 2016<br \/>\n* 5 Best Practices for Outsourcing Cybersecurity<br \/>\n* Most CISOs and CIOs need better resources to mitigate threats<\/p>\n<p>Best practices in cyber vulnerability assessment<br \/>\nHere are the best practices for cyber vulnerability assessment.<br \/>\nFirst and foremost you should have a very clear understanding of why you need a cyber vulnerability assessment.<br \/>\nResearch other companies in your industry.<br \/>\nTo know exactly which parts of your business structure need an assessment, you need to research your company\u2019s processes with a focus on the systems that are critical to keeping your business running.<br \/>\nOnce you\u2019ve identified the systems that need an assessment, you should rank them according to both their importance to your overall business model and to the sensitivity of the information they contain.<br \/>\nNow that you know exactly which systems and software need an assessment and how they rank in terms of priority, you should make sure you\u2019re aware of the security systems you already have in place.<br \/>\nf you\u2019ve completely mapped out both your vulnerabilities and your already-in-place security, and your inter-departmental security task force is in agreement on what\u2019s needed, you\u2019re ready to perform your vulnerability scans.<br \/>\nf you did your homework on what you needed to assess and also on the vulnerability assessment tool you chose, then you should fully trust the results of your cyber vulnerability assessment and act on them.<br \/>\nDon\u2019t wait.<br \/>\nDon\u2019t second guess.<br \/>\nThe assessment will produce recommendations for remediation that you should act on right now.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=602ae81b4f&#038;e=20056c7556<\/p>\n<p>Are Healthcare CISOs Suffering from Cybersecurity Solution Fatigue? An Expert Probes Some of the Issues<br \/>\nA recent Institute for Critical Infrastructure Technology report provided some intriguing thoughts about the pressure facing chief information security officers (CISOs) to keep their organizations secure and how they are combating information and vendor solution overload.<br \/>\n\u201cDue to the plague of APTs, malware, ransomware and other malicious initiatives by invisible adversaries, few C-level executive positions are as critical as the CISO,\u201d Scott writes.<br \/>\nIn a recent report, James Scott, a senior fellow at the Institute for Critical Infrastructure Technology (ICIT), a Washington, D.C.-based cybersecurity think tank, points out that a well-informed CISO can improve the engagement of the C-suite and improve the cyber posture of the organization.<br \/>\nWhile the report offers a cross-industry perspective of the CISO role and the challenge of vendor solution overload, the report author does spend moments focusing on healthcare organizations, specifically in a section detailing how CISOs can assess the return on investment of cybersecurity solutions.<br \/>\nThe report provides an interesting perspective about the need for CISOs to ignore the hype surrounding \u201csilver bullet\u201d solutions in order find the most effective cybersecurity solutions and strategies for their particular organizations, but at the same time, the report author also highlights the part that the vendor community plays in this problem.<br \/>\n\u201cIn many cases, CISOs operate under the unrealistic expectation that they should be able to prevent every breach with a finite budget.<br \/>\nThey are expected to have enough technical expertise to develop a strategy to protect the business and enough business acumen to convince the board to adopt that strategy because it aligns with the goals of the organization,\u201d he writes.<br \/>\nAnd, he asserts that modern CISOs tend to function more as Chief Information Risk Officers, managing the risk to data and technology.<br \/>\nAccording to the ICIT report, there is rapid burnout among CISOs, as the average turnover rate is 17 months.<br \/>\n\u201cVendor attempts to offer silver bullet solutions undermine the community at large and poisons the vendor-customer relationship.<br \/>\nThe culture promoting these inadequate solutions distracts CISOs, technical personnel and solution developers from the risks and threats in the threat landscape and it distracts them from designing the right solutions to address the market needs.\u201d<br \/>\nIn the report, the author offers strategic recommendations for calculating a cybersecurity solution\u2019s ROI and uses a healthcare organization as an example.<br \/>\nThe ROI of security solutions can be equated to the fiscal component of the impact that the organization would assume if an adversary exploited the vulnerability that the solution addresses, the author writes.<br \/>\nThe report concludes with statistics sourced from the Economist Intelligence Unit that indicates proactive CISO-led strategies can cut the success rate of cyber-breaches by more than 50 percent, hacking successes by 60 percent and ransomware infections by 47 percent.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=55c4946589&#038;e=20056c7556<\/p>\n<p>Will Faster Payments Mean Faster Fraud?<br \/>\nCrowe contends that to ensure global payments interoperability, faster payments are a necessity.<br \/>\nThe U.S. will soon be at a competitive disadvantage if it does not enable faster payments, she argues.<br \/>\nParry says the most fundamental risk to payments is poor identity management.<br \/>\nAnd it&#8217;s a legitimate concern.<br \/>\nAfter all, poor identity management apparently enabled hackers to steal $81 million from the central bank of Bangladesh in February, as part of a fraudulent transaction that was approved by the Federal Reserve Bank of New York.<br \/>\nAnd in a real-time or near-real-time environment, once the money is gone, it&#8217;s gone.<br \/>\nUnlike in the United Kingdom, Australia and other economically advanced parts of the world, faster payments are not the norm in the U.S.<br \/>\nCrowe declined to touch the interchange issue. &#8220;Cost is not the No. 1 worry for the Fed when it comes to faster payments,&#8221; she noted during the summit.<br \/>\nThe top concern, she says, is &#8220;a faster process that is still secure for business.&#8221;<br \/>\nThe Secure Payments Task Force&#8217;s goals differ from the goals of the Faster Payments Task Force.<br \/>\nAnd the Secure Payments Task Force has identified four areas that must be addressed to ensure the ongoing security of the payments system in the U.S. going forward.<br \/>\nFaster payments will be part of that, but not all.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=543bd979d5&#038;e=20056c7556<\/p>\n<p>Accenture : Data theft, malware infection big threat to digital businesses<br \/>\nThe new report from Accenture and HfS Research say that 69 percent of respondents experienced an attempted or successful theft or corruption of data by insiders during the prior 12 months, with media and technology organizations reporting the highest rate (77 percent).<br \/>\nThis insider risk will continue to be an issue, with security professionals&#8217; concerns over insider theft of corporate information alone rising by nearly two-thirds over the coming 12 to 18 months.<br \/>\nThe survey, &#8220;The State of Cyber security and Digital Trust 2016&#8242;&#8221;, was conducted by HfS Research on behalf of Accenture.<br \/>\nMore than 200 C-level security executives and other IT professionals were polled across a range of geographies and vertical industry sectors.<br \/>\nThe survey examined the current and future state of cyber security within the enterprise and the recommended steps to enable digital trust throughout the extended ecosystem.<br \/>\nThe findings indicate that there are significant gaps between talent supply and demand, a disconnect between security teams and management expectations, and considerable disparity between budget needs and actual budget realities.<br \/>\nDespite having advanced technology solutions, nearly half of all respondents (48 percent) indicate they are either strongly or critically concerned about insider data theft and malware infections (42 percent) in the next 12 to 18 months.<br \/>\nWhen asked about current funding and staffing levels some42 pe<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * World Bank: Well-regulated FinTech boosts inclusion, fights cyber crime * FERC Federal Energy Regulatory Commission : Issues Final Rule Directing NERC to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2495","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2495"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2495\/revisions"}],"predecessor-version":[{"id":4982,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2495\/revisions\/4982"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}