{"id":2503,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl161-mcsv-net\/"},"modified":"2021-12-30T11:41:28","modified_gmt":"2021-12-30T11:41:28","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl161-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl161-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail55.atl161.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* France and Germany urge reform to access encrypted messages<br \/>\n* The 3 Biggest Mistakes In Cybersecurity<br \/>\n* What IT Pros Need To Know About Hiring Cyber-Security Hunt Teams<br \/>\n* Best Practices For Data Center&#8217;s Physical Security<br \/>\n* 19% of shoppers would abandon a retailer that\u2019s been hacked<br \/>\n* Lost and stolen devices account for 1 in 4 breaches in the financial services sector<br \/>\n* Cybercrime in India up 300% in 3 years: Study<br \/>\n* Onapsis : Releases SAP Security In-Depth Publication for SAP HANA<br \/>\n* BeyondTrust Survey Uncovers Growing Disparity Managing Privileged Access<br \/>\n* How do you measure success when it comes to stopping Phishing attacks?<br \/>\n* How to secure your remote workers<br \/>\n* New approach needed to IT, says NIST&#8217;s top cyber scientist<br \/>\n* Security Leadership &#038; The Art Of Decision Making<br \/>\n* FCC proposes 5G cybersecurity requirements, asks for industry advice<br \/>\n* Traffic, jammed: New report says DDoS attacks are up 211 percent<br \/>\n* New breed of IT professional<br \/>\n* \u200bAPAC unprepared for security breaches: FireEye&#8217;s Mandiant<br \/>\n* SA\u2019s new cybercrimes law explained<br \/>\n* Get the Security Budget You Need and Spend It Wisely<br \/>\n* Data breaches: Different regions, very different impacts<\/p>\n<p>France and Germany urge reform to access encrypted messages<br \/>\nFrench Interior Minister Bernard Cazeneuve met with his German counterpart, Thomas de Maiziere, on 23 August to discuss anti-terrorism proposals.<br \/>\nFollowing the meeting, Cazeneuve told the press in Paris that France and Germany will put forward a European initiative to tackle the problem of messaging encryption used by Islamist extremists, to be discussed at the EU summit taking place on 16 September.<br \/>\nIn particular, Cazeneuve said that messaging service operators such as Telegram, which has so far been reluctant to cooperate with the authorities, should be compelled to provide access to encrypted content to terrorism investigations.<br \/>\nThe French minister urged the European Commission to pass new legislation targeting encrypted messaging services provided by both EU and non-EU companies, creating the right legal framework to strengthen national security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=103f4ffac2&#038;e=20056c7556<\/p>\n<p>The 3 Biggest Mistakes In Cybersecurity<br \/>\nEveryone, from the small business owner, to senior executives in businesses of every shape and size are confronting a seemingly insurmountable problem: Constant and rising cyber security breaches.<br \/>\nIt seems no matter what we do, there is always someone that was hacked, a new vulnerability exploited, and millions of dollars lost.<br \/>\n1) They think cyber security is a technology problem.<br \/>\n2) They follow a cyber security check list once-and-done.<br \/>\n3) They don&#8217;t have a cyber security awareness training program in place.<br \/>\nNeither structure nor strategy will help if you ignore the most important element in cyber security: People.<br \/>\nIn 2016 ISACA published the top three cybersecurity threats facing organizations in that year.<br \/>\nThey were, in order: 52% Social Engineering; 40% Insider Threats; 39% Advanced Persistent Threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=50a2ab9578&#038;e=20056c7556<\/p>\n<p>What IT Pros Need To Know About Hiring Cyber-Security Hunt Teams<br \/>\nIf your organization doesn&#8217;t run its own threat analysis center, it may be worth hiring a hunt team to watch your back.<br \/>\nHere&#8217;s what you need to know.<br \/>\nAt the RSA Conference in 2015, Joshua Stevens, enterprise security architect for HP Security, gave a presentation on hunt team skill sets and on the ways analytics and visualization tools can be used to help identify cyber threats.<br \/>\nThe qualifications cited in the presentation suggest hunt team members should have advanced intrusion detection and malware analysis skills, data science and programming skills, and a creative, analytical mindset.<br \/>\nIf you try to assemble an in-house hunt team, your own personnel may have to work harder to benefit from external incidents.<br \/>\nA vendor handling many clients, however, can apply what it learned from one client to protect its other customers.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f94435798d&#038;e=20056c7556<\/p>\n<p>Best Practices For Data Center&#8217;s Physical Security<br \/>\nThere are several criteria that you need to look into and no wonder what we&#8217;ll be discussing here is be expensive, time-consuming and resource-intensive.<br \/>\n&#8211; Constructed for ensuring physical protection<br \/>\nconstruct the exterior (walls, windows, and doors) of materials that provide ballistic protection.<br \/>\nIn addition, it must also provide protection on physical grounds, which means that it should have all the physical equipment in place such as barriers to keep invaders from sneaking inside.<br \/>\n&#8211; 24&#215;7 backup powe<br \/>\n&#8211; Cages, cabinets and vaults<br \/>\nshould be strong and rigid, ensuring the safety of the equipments residing inside.<br \/>\n&#8211; Electronic access-control systems (ACSs)<br \/>\n&#8211; Provisioning process<br \/>\nanother practice to provide entry to the facility involves a process that requires providing structured and documented provisioning by the individual requesting to get inside the data center.<br \/>\n&#8211; Fire detection and fire suppression systems<br \/>\nThe structures must be hard-wired with alarms backed with fire suppression systems, assuring fire safety.<br \/>\n&#8211; Educate the entire team: Your staff must be educated about security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bedc189fed&#038;e=20056c7556<\/p>\n<p>19% of shoppers would abandon a retailer that\u2019s been hacked<br \/>\nThe 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack.<br \/>\nAnother 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.<br \/>\nThe study also looked at 100 cybersecurity executives and found that 55% said they haven&#8217;t spent money on cybersecurity in the past yearand 42% said their company didn&#8217;t have a leader in charge of information security.<br \/>\nThe survey results, posted Tuesday online, found that retail and automotive industries were laggards in appointing leaders to assess cyberthreats and opportunities.<br \/>\nThe financial services and tech industries were leaders.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4d0206c0fd&#038;e=20056c7556<\/p>\n<p>Lost and stolen devices account for 1 in 4 breaches in the financial services sector<br \/>\nBitglass is a vendor in the cloud access security broker (CASB) space.<br \/>\nWhat that means is that Bitglass is focused on ensuring organizations utilize strong security tools and processes to keep their data safe.<br \/>\nIt&#8217;s a busy space and one in which being seen as a thought leader is important; hence, Bitglass and its competitors invest lots of effort in creating content that is broadly useful to the industry.<br \/>\nthe report found that leaks within the financial services industry almost doubled between 2014 and 2015, with that increase looking set to continue through 2016.<br \/>\nAll of the U.S.&#8217;s largest banks have suffered recent leaks, and in the first half of this year alone, five of the top 20 banks in the U.S. disclosed breaches.<br \/>\nKey findings from the report include:<br \/>\n&#8211; 1 in 4 breaches in the financial services sector over the last several years were due to lost or stolen devices; 1 in 5 were the result of hacking.<br \/>\n&#8211; 14% of leaks can be attributed to unintended disclosures and 13% to malicious insiders.<br \/>\n&#8211; Five of the nation&#8217;s 20 largest banks have already suffered data breaches in the first half of 2016.<br \/>\n&#8211; In 2015, 87 breaches were reported in the financial services sector, up from 45 in 2014.<br \/>\n&#8211; In the first half of 2016, 37 banks have already disclosed breaches.<br \/>\n&#8211; Over 60 organizations suffered recurring breaches in the last decade, including most major banks.<br \/>\n&#8211; JP Morgan Chase, the nation&#8217;s largest bank, has suffered recurring breaches since 2007.<br \/>\nThe largest breach event, the result of a cyberattack, was widely publicized in 2014 and affected an estimated 76 million U.S. households.<br \/>\n&#8211; Of the three major credit bureaus, the 2015 Experian leak was the largest, affecting 15 million individuals.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=958db15de6&#038;e=20056c7556<\/p>\n<p>Cybercrime in India up 300% in 3 years: Study<br \/>\nThe study revealed that in the past, the attacks have been mostly initiated from countries like the US, Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE, adding with growing adoption of internet and smartphones India has emerged as one of the primary targets among cyber criminals.<br \/>\nAttackers can gain control of vital systems such as nuclear plants, railways, transportation or hospitals that can subsequently lead to dire consequences such as power failures, water pollution or floods, disruption of transportation systems and loss of life, noted the study.<br \/>\nIn the US alone, there has been an increase of nearly 50 per cent in reported cyber incidents against its critical infrastructure from 2012 to 2015, it said.<br \/>\nThe Indian Computer Emergency Response Team has also reported a surge in the number of incidents handled by it with close to 50,000 security incidents in 2015, noted the study titled &#8216;Protecting interconnected systems in the cyber era,&#8217;.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9247435b60&#038;e=20056c7556<\/p>\n<p>Onapsis : Releases SAP Security In-Depth Publication for SAP HANA<br \/>\nOnapsis, the global experts in business-critical application security, today released SAP HANA System Security Review Part 2.<br \/>\nThis publication analyzes SAP HANA Internal Communication Channels, details associated risk, and identifies how to properly audit an SAP HANA system.<br \/>\nAs the 13th edition in the SAP Security In-Depth series, SAP HANA System Security Review Part 2 describes how to update the SAP HANA platform, noting new improvements in each Support Package.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8a473baa6e&#038;e=20056c7556<\/p>\n<p>BeyondTrust Survey Uncovers Growing Disparity Managing Privileged Access<br \/>\nPHOENIX&#8211;(BUSINESS WIRE)&#8211;BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today unveiled the results of its definitive Privilege Benchmarking Study based on a worldwide survey of IT professionals.<br \/>\nThe study demonstrates a widening gulf between organizations that adhere to best practices for privileged access management.<br \/>\n* Top-tier companies were much more likely to have a centralized password management policy \u2013 92 percent of them do, in contrast with just 25 percent of bottom-tier organizations.<br \/>\n* Password cycling is also much more common among top-tier businesses; 76 percent of top-tiers frequently have passwords changed, whereas only 14 percent of bottom-tiers do.<br \/>\n* Credential management formed another point of distinction, with nearly three-quarters (73 percent) identifying themselves as efficient in this area, compared to 36 percent of the bottom-tier companies.<br \/>\n* More than two-thirds of top-tier companies (71 percent) can monitor privileged user sessions, and 88 percent can restrict access with a measure of granularity.<br \/>\n* Among bottom-tiers, fewer than half (49 percent) can monitor sessions, and only 37 percent have granular capabilities to restrict access.<br \/>\n* Among top-tier organizations, fully 9 out of 10 grant privileges to apps rather than users.<br \/>\n* Among bottom-tier companies, this falls to 46 percent.<\/p>\n<p>While it\u2019s vital to evaluate the risks posed by individual apps and systems, only 6 percent of bottom-tier companies have tools that provide this capability \u2013 and, shockingly, 52 percent \u201cjust know\u201d what the risks are.<br \/>\nMeanwhile, more than half of top-tier companies (57 percent) can make these assessments.<\/p>\n<p>Top-tier companies are also more likely to actually conduct vulnerability assessments; 91 percent do, compared to just 20 percent of bottom-tier organizations.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c31430cc64&#038;e=20056c7556<\/p>\n<p>How do you measure success when it comes to stopping Phishing attacks?<br \/>\nSome measured success based on clicks.<br \/>\nAs such, if the employees avoid 80-percent of the Phishing emails delivered during an assessment, they see that as a win.<br \/>\nFrom there, the assessment moves to focusing on the 20-percent that did click links.<br \/>\nNo two Phishing attacks (simulated or real) are alike.<br \/>\nIf an employee avoids an obvious scam based on delivery notifications, but later falls for a scam related to financial documents, that&#8217;s a problem.<br \/>\nYet, some organizations stop testing those who are successful during a given round of assessment.<br \/>\nThis has the potential to create defensive gridlock.<br \/>\nThe general feeling among defenders was that an anti-Phishing &#8220;win&#8221; was a 10 to 20-percent click rate, meaning that 80 to 90-percent of the Phishing emails that went to the organization (testing or otherwise) were unsuccessful attempts.<br \/>\nIn this case, clicks were inclusive of both links and attachments.<br \/>\nMany also agreed that a layered defensive posture, as well as continuous assessment and training will help lower the impact of Phishing, but it wouldn&#8217;t prevent it entirely.<br \/>\nInstead, better compromise detection, and improved response times should be part of any anti-Phishing program.<br \/>\n&#8220;The average failure rate (of the client) of a Phishing\/spear-Phishing campaign is usually between 60 to 80-percent &#8211; a pretty astronomical number.<br \/>\nHowever, if we carry those metrics through six months down the road after further security awareness training and tuning of technologies (spam filters, etc.); I&#8217;ve seen this number drop by as much as 30-percent,&#8221; Blow said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=814c8e88d6&#038;e=20056c7556<\/p>\n<p>How to secure your remote workers<br \/>\nPublic wifi is insecure by nature\u2014it requires no authentication to connect to the network, allowing cybercriminals to easily intercept the connection and distribute malware.<br \/>\nHackers can also spoof public wifis by creating fake access points and mimicking the names of legitimate connections.<br \/>\nIf you\u2019re in a coffee shop and the shop\u2019s wifi name is COFFEE_SHOP-WIFI, they might call theirs COFFEE_SHOP_FREE_WIFI.<br \/>\nUsers would have no idea they had connected to the wrong one, since they\u2019d be able to browse the Internet with no apparent interference.<br \/>\nThose connecting to rogue access points can have all of their traffic harvested in plain text, including passwords and other sensitive company data.<br \/>\nWith the onus on remote workers to keep their machines updated, there\u2019s a lot of room for error.<br \/>\nOut-of-date software, plugins, and browsers, plus unpatched and unprotected systems leave remote employees even more vulnerable to attack.<br \/>\nRemote workers with unpatched systems are especially vulnerable to malvertising campaigns and their associated exploit kits, an estimated 70 percent of which drop ransomware payloads these days.<br \/>\nAccording to a recent survey by Osterman Research, nearly 40 percent of businesses have been victims of a ransomware attack in the last year\u2014and unprotected endpoints are part of the problem. \u201cPart of the reason [that there are so many attacks] is that we have people that are using their own devices, they\u2019re using corporate devices, and also privacy regulations in the U.S. aren\u2019t as strict as in other countries,\u201d says Mike Osterman, President of Osterman Research. \u201cSo there\u2019s a lot of information that\u2019s not as protected as it needs to be, a lot of endpoints that aren\u2019t as protected.\u201d<br \/>\nHere are eight ways that businesses can better secure their remote workers.<br \/>\n&#8211; Switch to cloud-based storage.<br \/>\n&#8211; Encrypt devices, when possible.<br \/>\n&#8211; Create secure connections to the company network.<br \/>\n&#8211; Roll out automatic updates.<br \/>\n&#8211; Use an encrypted email program.<br \/>\n&#8211; Implement good password hygiene.<br \/>\n&#8211; Increase user awareness.<br \/>\n&#8211; Deploy an endpoint security program.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=66fa9428d1&#038;e=20056c7556<\/p>\n<p>New approach needed to IT, says NIST&#8217;s top cyber scientist<br \/>\nNo amount of security software, firewalls or anomaly detection systems can protect an IT infrastructure that&#8217;s fundamentally insecure and a new approach to computer architecture is required to deal with the looming cybersecurity crisis, the National Institute of Standards and Technology&#8217;s top computer security scientist told the president&#8217;s commission on long-term cybersecurity.<br \/>\nThe &#8220;only way&#8221; to address the looming cybersecurity crisis is &#8220;to build more trustworthy secure components and systems,&#8221; Ron Ross told the Commission on Enhancing National Cybersecurity during a Tuesday meeting in Minneapolis.<br \/>\nSecurity, he observed, &#8220;does not happen by accident.&#8221; Things like safety and reliability needs to be engineered in from the beginning, he argued, comparing the process to the &#8220;disciplined and structured approach&#8221; used to design structurally sound bridges and safe aircraft.<br \/>\nThis new approach &#8220;will require a significant investment of resources and the involvement of essential partnership including government, industry, and the academic community,&#8221; said Ross, comparing it to the moonshot of the 1960&#8217;s.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=814b6763a7&#038;e=20056c7556<\/p>\n<p>Security Leadership &#038; The Art Of Decision Making<br \/>\nWhat a classically-trained guitarist with a Master&#8217;s Degree in counseling brings to the table as head of cybersecurity and privacy at one of the world&#8217;s major healthcare organizations.<br \/>\nBishop Fox\u2019s Vincent Liu sat down recently with GE Healthcare Cybersecurity and Privacy General Manager Richard Seiersen in a wide-ranging chat about security decision making, how useful threat intelligence is, critical infrastructure, the Internet of Things, and his new book on measuring cybersecurity risk.<br \/>\nWe excerpt highlights below.<br \/>\nYou can read the full text here.<br \/>\nVincent Liu: How has decision making played a part in your role as a security leader?<br \/>\nRichard Seiersen: Most prominently, it\u2019s led me to the realization that we have more data than we think and need less than we think when managing risk.<br \/>\nIn fact, you can manage risk with nearly zero empirical data.<br \/>\nIn my new book \u201cHow to Measure Anything in Cybersecurity Risk,\u201d we call this \u201csparse data analytics.\u201d I also like to refer to it as \u201csmall data.\u201d Sparse analytics are the foundation of our security analytics maturity model.<br \/>\nVL: If you\u2019re starting out as a leader, and you want to be more \u201cdecision\u201d or \u201cmeasurement\u201d oriented, what would be a few first steps down this road?<br \/>\nRS: Remove the junk that prevents you from answering key questions.<br \/>\nI prefer to circumvent highs, mediums, or lows of any sort, what we call in the book \u201cuseless decompositions.\u201d Instead, I try to keep decisions to on-and-off choices.<br \/>\nWhen you have too much variation, risk can be amplified.<br \/>\nMost readers have probably heard of threat actor capability.<br \/>\nThis can be decomposed into things like nation-state, organized crime, etc.<br \/>\nWe label these \u201cuseless decomposition\u201d when used out of context.<br \/>\nVL: How useful is threat intelligence, then?<br \/>\nRS: We have to ask\u2014and not to be mystical here\u2014what threat intelligence means.<br \/>\nIf you\u2019re telling me it is an early warning system that lets me know a bad guy is trying to steal my shorts, that\u2019s fine.<br \/>\nIt allows me to prepare myself and fortify my defenses (e.g., wear a belt) at a relatively sustainable cost.<br \/>\nWhat I fear is that most threat intelligence data is probably very expensive, and oftentimes redundant noise.<br \/>\nVL: Where would you focus your energy then?<br \/>\nRS: For my money, I would focus on how I design, develop, and deploy products that persist and transmit or manage treasure.<br \/>\nConcentrate on the treasure; the bad guys have their eyes on it, and you should have your eyes directed there, too.<br \/>\nThis starts in design, and not enough of us who make products focus enough on design.<br \/>\nOf course, if you are dealing with the integration of legacy \u201ccritical infrastructure\u201d-based technology, you don\u2019t always have the tabula rasa of design from scratch.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c816ec88ca&#038;e=20056c7556<\/p>\n<p>FCC proposes 5G cybersecurity requirements, asks for industry advice<br \/>\nThe FCC published a request Wednesday for comment on a new set of proposed 5G rules to the Federal Register focused on adding specific \u201cperformance requirements\u201d for developers of example internet-connected devices.<br \/>\n\u201cCybersecurity issues must be addressed during the design phase for the entire 5G ecosystem, including devices.<br \/>\nThis will place a premium on collaboration among all stakeholders,&#8221; said FCC Chairman Tom Wheeler during a National Press Club event on June 20. &#8220;We continue to prefer an approach that emphasizes that industry develop cybersecurity standards just as we have done in wired networks.&#8221;<br \/>\nIn addition to a structured security strategy, the FCC\u2019s 5G application process will require organizations to share their ongoing participation in threat intelligence and other data sharing programs \u2014 such initiatives include the likes of the Cyber Threat Alliance.<br \/>\nA quick review of the FCC\u2019s proposed 5G cybersecurity plan shows a six category split, organized by a companies&#8217; security approach, coordination efforts, standards and best practices, participation with standards bodies, other security approaches and plans with information sharing organizations.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5e9734d81b&#038;e=20056c7556<\/p>\n<p>Traffic, jammed: New report says DDoS attacks are up 211 percent<br \/>\nDistributed denial of service attacks are on the rise across the globe, as opportunistic Dark Web dealers increasingly sell hacking-as-a-service products, according to a new threat intelligence report compiled by Imperva, a California-based cybersecurity firm.<br \/>\nThe company measured threats faced by its customers during a roughly one-year time period, seeing a 211 percent year-over-year increase in attacks.<br \/>\nThe firm largely attributed this apparent growth to the establishment of several botnet operations \u2014 which serve as a platform to automate and increase attack volume \u2014 and malicious actors\u2019 ability to access greater bandwidth to help generate and use such weapons.<br \/>\nDark Web dealers are using these botnets, according to Imperva, to offer more effective cyber tools to would-be customers.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e6c3a8efd4&#038;e=20056c7556<\/p>\n<p>New breed of IT professional<br \/>\nT professionals are now integral to business decisions and have a much more visible role in protecting sensitive data.<br \/>\nThey\u2019re also increasingly expected to manage information privacy when key privacy positions aren\u2019t filled or simply don\u2019t exist.<br \/>\nT professionals today must translate what they\u2019re seeing in their threat-intelligence and risk-management efforts into business impact.<br \/>\nIT professionals who think they can fight security and privacy battles alone have already lost the war.<br \/>\nAn open mind and flexible approach can go a long way in helping keep IT professionals relevant in today\u2019s organization.<br \/>\nAn open mind and flexible approach can go a long way in helping keep IT professionals relevant in today\u2019s organization.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0b125470c2&#038;e=20056c7556<\/p>\n<p>\u200bAPAC unprepared for security breaches: FireEye&#8217;s Mandiant<br \/>\nIn its latest report, Mandiant M-Trends Asia Pacific, the cyberforensics firm found that organisations across APAC allowed attackers to dwell in their environments for a median period of 520 days before discovering them &#8212; three times the global median of 146 days.<br \/>\nMandiant said APAC organisations cannot defend their networks from attackers because they frequently lack basic response processes and plans, threat intelligence, technology, and expertise.<br \/>\nThe report found that APAC was almost exclusively targeted by some attacker tools, with one suspected Chinese threat group, APT30, targeting highly sensitive political, economic, and military information for at least a decade.<br \/>\nMandiant said that during its investigations, it found that most organisations depended only on antivirus software to detect malicious persistence mechanisms.<br \/>\n&#8220;Antivirus software is a signature-based technology that cannot detect every malicious event across an entire estate,&#8221; the company said.<br \/>\n&#8220;To significantly improve, organisations must bring together the technology, threat intelligence, and expertise necessary to quickly detect and respond to cyber attacks.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=07fd455137&#038;e=20056c7556<\/p>\n<p>SA\u2019s new cybercrimes law explained<br \/>\nA new Cybersecurity Bill is coming into effect later this year which aims to stop cybercrime and improve security for South Africans.<br \/>\nSEAN DUFFY, Security Executive at Dimension Data Middle East &#038; Africa, explains the basics of the bill.<br \/>\nThe Cybercrimes Bill affects everyone using a computer or the Internet, or anyone who owns an information infrastructure that could be declared critical.<br \/>\nAmong others, the following individuals and organisations should take note: ordinary South African citizens or employees using the Internet, network service providers, providers of software and hardware tools, financial services providers (the Bill includes prohibited financial transactions), representatives from government departments, those involved with IT regulatory compliance, as well as information security experts.<br \/>\nThe Cybercrimes Bill consolidates South Africa\u2019s cybercrime laws, which makes successful prosecution of criminals more likely.<br \/>\nUp until now, cyber offences were charged under various acts, among others the Prevention of Organised Crime Act, and the Electronic Communications and Transactions (ECT) Act of 2002.<br \/>\nThe ECT Act seemed to govern most online crime, but only included three cybercrime offences.<br \/>\nPenalties on conviction are quite severe.<br \/>\nPenalties include fines of R 1 \u2013 R 10 million and imprisonment of one to ten years, depending on the severity of the offence.<br \/>\nThe nature of the crime determines the penalty.<br \/>\nIncidents will happen, but it\u2019s how an organisation responds that matters.<br \/>\nGovernment is working on establishing a legal mechanism for anyone to defend themselves against cybercrime.<br \/>\nHowever, organisations need to be more proactive in their security through the use of services such incident response plans, real-time threat management, vulnerability management and managed security services.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=09999adb35&#038;e=20056c7556<\/p>\n<p>Get the Security Budget You Need and Spend It Wisely<br \/>\nIt\u2019s challenging for a CISO to get budget for cybersecurity.<br \/>\nYour board of directors really wants to spend that IT money on projects and solutions that will expand the business and bring in more revenue.<br \/>\nThat\u2019s what your shareholders value.<br \/>\nAs breaches become more commonplace, your colleagues and customers become desensitized to the potential impact of a breach, which can downgrade their sense of urgency to protect assets in advance.<br \/>\nNew CISOs sometimes report being given no security budget at all.<br \/>\nSo how do you show that there is value in investing in cybersecurity and justify a proper security budget.<br \/>\nThere isn\u2019t an ROI in the way that most company accountants understand it.<br \/>\nMuch of the time you have to rely on your experience and judgment, as well as the competing claims of security vendors \u2014 none of which helps you build a compelling case when you are being asked to assess the return on the investment and tell the board members why they should spend their money on your security budget.<br \/>\nA team of researchers at the Robert H.<br \/>\nSmith Business School at the University of Maryland developed and refined an economics-based model to help businesses with this exact problem.<br \/>\nThe researchers produced an informative video to show the basics of the model and their research findings.<br \/>\nThe video distills years of research into a four-step process to help you determine where your security budget is best spent.<br \/>\nThe basic principles are similar to those proposed by many experienced security consultants \u2014 with some key refinements.<br \/>\nFirst, classify your assets by value in terms of cost of a potential breach as well as vulnerability to a breach.<br \/>\nThen, estimate the degree to which the solution in question will reduce the likelihood of a breach.<br \/>\nSome simple statistics then show you how to maximize the return on your cybersecurity investment.<br \/>\nSurprisingly, it\u2019s not always best to set out to protect your most obvious assets.<br \/>\nSometimes the costs of fully protecting the most vulnerable assets are impractically high.<br \/>\nFrom a business return standpoint, you may be better off protecting a larger number of less vulnerable assets.<br \/>\nThe researchers used their model against real-life scenarios and found that, for most use cases, your cybersecurity budget should not exceed 37 percent of the expected losses due to a security breach.<br \/>\nThis is the point at which the costs usually (but not always) start to outweigh the expected benefits.<br \/>\nThe beauty of the Gordon-Loeb model is that it gives you a framework to derive costs versus benefits for different levels of investment.<br \/>\nThey are clear that there are use cases where it does not apply, however: For example, in a case where the breach of an asset would lead to catastrophic loss.<br \/>\nNo model should be relied upon prescriptively, but going through the modeling exercise when you assess your security risk should at least help you review and refine your thinking.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=daa6f3cfd4&#038;e=20056c7556<\/p>\n<p>Data breaches: Different regions, very different impacts<br \/>\nA Deloitte report on the business impact of a cyber attack recently showed that 89% of the impact of a breach comes from three factors:<\/p>\n<p>Value of lost contract revenue;<br \/>\nDevaluation of trade name; and<br \/>\nLost value of customer relationships.<br \/>\nIt is important to note that these factors look quite different from an EU perspective.<br \/>\nMost EU companies are not currently required to notify regulators or customers after a data breach, as opposed to the US, where 47 out of 50 states have mandatory notification laws.<br \/>\nAs a result, several main impacts (which are felt heavily in the US) are either non-existent or less visible in the EU, including:<br \/>\n&#8211; Cost<br \/>\n&#8211; Scrutiny<br \/>\n&#8211; Pressure<br \/>\nAs a result of these differences, EU companies are less incentivised to improve cyber security.<br \/>\nThe EU market for cyber insurance is consequently less mature than in the US \u2013 where products have been developed to transfer the costs of business disruption, customer notification, and identity theft protection.<br \/>\nHowever, this situation will change over the next two years, as the EU General Data Protection Regulation (GDPR) and Network and the Information Security (NIS) directives come into force in mid-2018.<br \/>\nBoth pieces of legislation will increase the number of companies and sectors that will have to report breaches to their national regulator \u2013 and possibly to customers \u2013 within 72 hours (GDPR) or without \u201cundue delay\u201d (NIS Directive) depending on the severity of the breach.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fa8c9d7ba0&#038;e=20056c7556<br \/>\nFeedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   Subscribe to this list (http:\/\/paulgdavis.us3.list-manage2.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=f1a3c807cc)<br \/>\nUpdate subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<br \/>\n============================================================<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * France and Germany urge reform to access encrypted messages * The 3 Biggest Mistakes In Cybersecurity * What IT Pros Need To&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2503","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2503"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2503\/revisions"}],"predecessor-version":[{"id":4990,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2503\/revisions\/4990"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}