01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Post-COVID-19 <strong>Cyber</strong>security Predictions<br />

<strong>Cyber</strong>security Strategies That Protect<br />

Business Operations Now and Tomorrow<br />

<strong>Cyber</strong>security Education and Practice:<br />

Never Stop Learning<br />

The Stats on <strong>Cyber</strong> Security Perception<br />

Heading into the COVID-19 Challenge<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CONTENTS<br />

Welcome to CDM’s <strong>June</strong> <strong>2020</strong> Issue ------------------------------------------------------------------------------------------------ 7<br />

Post-COVID-19 <strong>Cyber</strong>security Predictions -------------------------------------------------------------------------------- 23<br />

By Ilia Sotnikov, Vice President of Product Management, Netwrix<br />

<strong>Cyber</strong>security Strategies That Protect Business Operations Now and Tomorrow --------------------------- 26<br />

By Leo Taddeo,Chief Information Security Officer, Cyxtera Technologies and President, Cyxtera Federal<br />

Group<br />

<strong>Cyber</strong>security Education and Practice: Never Stop Learning ------------------------------------------------------- 29<br />

By Ken Sigler, Dan Shoemaker, and Anne Kohnke<br />

The Stats on <strong>Cyber</strong> Security Perception Heading into the COVID-19 Challenge ------------------------------ 33<br />

By Stephen Stott, Founder & CEO, Stott and May<br />

ISF: Behavioral Analytics Expected to Trigger a Consumer Backlash -------------------------------------------- 36<br />

BY Steve Durbin, Managing Director, Information Security Forum<br />

Mobile App Security in The Midst of a Pandemic---------------------------------------------------------------------- 39<br />

By Tom Tovar CEO and co-creator of Appdome<br />

Managing an Information Security Risk Program --------------------------------------------------------------------- 42<br />

By Adriano Novaes, Senior <strong>Cyber</strong>security Consultant<br />

Ensuring <strong>Cyber</strong>security in A Remote Workplace ----------------------------------------------------------------------- 48<br />

By Ryan Ayers, Freelance Writer & Tech Consultant<br />

GDPR Working from Home Checklist in The Light Of COVID-19 --------------------------------------------------- 51<br />

By Susan Alexandra, Contributing Writer<br />

<strong>Cyber</strong>-Secure Access Control Solutions for Workplaces -------------------------------------------------------------- 54<br />

By Imran Anwar<br />

Cleaning up “Dirty” Wi-Fi for Secure Work-from-Home Access --------------------------------------------------- 58<br />

By Matias Katz, CEO, Byos<br />

<strong>Cyber</strong> Crime is Paying ---------------------------------------------------------------------------------------------------------- 61<br />

By Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ditch Legacy Approaches – Reimagine Cloud Security Based on Virtualization ------------------------------ 64<br />

By Avi Shua, CEO and co-founder, Orca Security; former chief technologist at Check Point Software<br />

Technologies<br />

Building a “Culture of Caring” for Clients -------------------------------------------------------------------------------- 69<br />

By Jessica Smith, Senior Vice President, Crypsis Group<br />

Newsjacking COVID-19 and Other Common <strong>Cyber</strong>security PR Mistakes --------------------------------------- 72<br />

By Evan Goldberg, SVP and <strong>Cyber</strong>security Practice Group Director, ARPR<br />

New Expectations for the Network Perimeter -------------------------------------------------------------------------- 76<br />

By Barrett Lyon, Co-founder and CEO, Netography<br />

The Devil Inside ------------------------------------------------------------------------------------------------------------------ 79<br />

By Mary Roark, VP of Marketing, <strong>Cyber</strong>haven<br />

Digital Healthcare: How Secure Is the Care Data? -------------------------------------------------------------------- 84<br />

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India<br />

Women’s Health and Safety Amidst COVID-19 <strong>Cyber</strong>crime -------------------------------------------------------- 95<br />

By Sarah Katz, Senior <strong>Cyber</strong> Security Analyst, NASA Ames Research Center<br />

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure<br />

---------------------------------------------------------------------------------------------------------------------------------------- 97<br />

By Saloni Walimbe, Content Writer at Global Market Insights, Inc.<br />

Still Using Spreadsheets to Manage Your Digital Certificate Security? --------------------------------------- 100<br />

By Ryan Sanders, Product Manager, Keyfactor<br />

Introducing the Role of The Chief <strong>Cyber</strong>crime Officer -------------------------------------------------------------- 103<br />

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks<br />

Fighting Back Against Powerful New DDoS Attack Vectors ------------------------------------------------------ 106<br />

By Tom Bienkowski, Director of Product Marketing, NETSCOUT<br />

How to Secure IT And OT In Industrial and Manufacturing Environments ----------------------------------- 109<br />

By Christopher Dobrec, Vice President of Product Marketing at Armis<br />

Biggest Obstacles Frustrating <strong>Cyber</strong> Security Job Seekers and Employer ------------------------------------ 113<br />

By Matt Donato, Co-founder of Charlotte, NC-based HuntSource<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mitigating Against Ransomware: Don’t Let Backups Be the Back Door -------------------------------------- 119<br />

By Rick Vanover, Senior Director, Product Strategy, Veeam<br />

The Ransomware Age and How to Fight It ---------------------------------------------------------------------------- 122<br />

By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt<br />

Security in A Multi-Cloud Environment --------------------------------------------------------------------------------- 128<br />

By Paul Nicholson, Sr. Director of Product Marketing, A10 Networks<br />

<strong>Cyber</strong> Operations Could Cause Traumatic Experiences ------------------------------------------------------------ 131<br />

By Milica D. Djekic<br />

Hackers Are the Future of <strong>Cyber</strong>security… ----------------------------------------------------------------------------- 141<br />

By Keren Elazari , ASIS International<br />

<strong>Cyber</strong> Crimes Will Increase with Shift to Teleworking ------------------------------------------------------------- 143<br />

By Andy Sauer, Director of <strong>Cyber</strong>security, Steel Root<br />

<strong>Cyber</strong> Attacks at Sea: Blinding Warships. ------------------------------------------------------------------------------ 145<br />

By Julien Chesaux, <strong>Cyber</strong> Security Consultant, Kudelski Security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

New <strong>Cyber</strong><strong>Defense</strong>Magazine.com website, plus updates at <strong>Cyber</strong><strong>Defense</strong>TV.com & <strong>Cyber</strong><strong>Defense</strong>Radio.com<br />

Dear Friends,<br />

The sea change in the world of <strong>Cyber</strong> <strong>Defense</strong> is in full effect. The results of government<br />

actions to control the spread of COVID-19, intended and otherwise, have changed not only<br />

the players on the board, but the rules of the game and the board itself.<br />

We are now seeing the growing and persistent effects of social distancing and lockdown<br />

protocols in the national and international conduct of private and government activities, due<br />

to the battle against the spread of the Coronavirus.<br />

Even the modest "re-opening" of some public and private activities will not put Humpty-Dumpty together<br />

again. The continued fear of a "second wave" is being fuelled by many media and political forces, each with its<br />

own agenda. As a result, the lingering phenomenon of Work from Home ("WFH") still requires the attention of<br />

all those with access to any portion of the organization's electronic information. <strong>Cyber</strong> criminals have figured out<br />

in many situations how to exploit these vulnerabilities, and the ones growing out of the decentralization of<br />

information resources.<br />

We are pleased to report the growth and impact of CDM's initial webinar presentations, addressing in the most<br />

cogent manner the challenges and responses to these powerful threats, found<br />

at www.cyberdefensewebinars.com<br />

We are pleased to provide this powerful combination of monthly <strong>eMagazine</strong>s, daily updates and features on the<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine home page, and webinars featuring national and international experts on topics of<br />

immediate interest.<br />

Warmest regards,<br />

Gary S. Miliefsky<br />

Gary S.Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or information about CDM, please use #CDM and<br />

@<strong>Cyber</strong><strong>Defense</strong>Mag and @Miliefsky – it helps spread the word about our free resources even more<br />

quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook formats.<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec information.<br />

From the International<br />

Editor-in-Chief…<br />

Both the spread of the novel Coronavirus and its effects on national<br />

and international cyber vulnerabilities continue to grow with little<br />

abatement. While physical travel may be moving beyond draconian<br />

restrictions, cyber travel (both literally and figuratively) appears to<br />

be in the process of replacing “work in the workplace” in many<br />

situations.<br />

The international implications of these developments<br />

unfortunately have also resulted in more and deeper opportunities<br />

for exploitation by cyber criminals. There are apparent strains<br />

among national States which participate in international<br />

organizations. Trust, and its concomitant funding commitments,<br />

have eroded.<br />

This fragmentation operates to the disadvantage of the defenders<br />

of the integrity, confidentiality, and accessibility of vital information<br />

stored in data facilities all over the world. Our failure to work<br />

together in a cooperative fashion can only provide more<br />

opportunities for the abuse and misuse of sensitive information,<br />

even leading to the compromise of the command and control<br />

systems of our critical infrastructure.<br />

By means of this message, let me renew the call for all of the<br />

affected organizations and individuals to take the lead in creating<br />

cybersecurity defenses to protect all aspects of IT in our lives,<br />

including (but not limited to) medical, financial, social, and<br />

government functions.<br />

Once again, may I suggest, that in the days ahead, we agree to put<br />

our differences aside in favor of responding to our common<br />

enemies: the COVID-19 virus itself and those who would take<br />

advantage of this crisis to perpetrate criminal schemes.<br />

To our faithful readers, we thank you,<br />

Pierluigi Paganini<br />

International Editor-in-Chief<br />

PRESIDENT & CO-FOUNDER<br />

Stevin Miliefsky<br />

stevinv@cyberdefensemagazine.com<br />

INTERNATIONAL EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

US EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © 2019, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP (a Steven G. Samuels LLC d/b/a)<br />

276 Fifth Avenue, Suite 704, New York, NY 10001<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

8 YEARS OF EXCELLENCE!<br />

Providing free information, best practices, tips and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

magazine is your go-to-source for Information Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>June</strong> <strong>2020</strong> Issue<br />

From the U.S. Editor-in-Chief<br />

Although we don’t claim to have a crystal ball, we would like to replay a paragraph from our Welcome<br />

Message from only a few months ago, in the CDM January issue:<br />

“If we consider for a moment the increasing speed at which cyber developments occur, and place that in<br />

the perspective of 20-year increments, we must be prepared to deal with new and growing challenges to<br />

cybersecurity.<br />

Foremost among them will likely be based on Artificial Intelligence, Machine Learning, the 5G network,<br />

and no doubt more we have not yet seen or imagined.”<br />

At that time, there were few, if any, cybersecurity professionals who foresaw the advent of the<br />

Coronavirus and COVID-19 phenomenon. Fewer still would have predicted the Work From Home (WFH)<br />

implications or the vastly increased vulnerabilities accompanying this pseudo-migration.<br />

How will these developments affect our everyday lives? Consider this: Who would have predicted 20<br />

years ago the effects of TSA screenings on air travel?<br />

Readers will notice that this month’s topics include many which have a direct bearing on the response to<br />

these new and challenging threats arising out of the mass exodus of information workers from an office<br />

environment to a (usually less secure) home set-up.<br />

At <strong>Cyber</strong> <strong>Defense</strong> Magazine, we endeavor to keep our audience informed and ahead of the curve of<br />

these very developments.<br />

Wishing you all success in your cyber security endeavors,<br />

Yan Ross<br />

US Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & US Editor-in-Chief for<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine. He is an accredited author and educator and<br />

has provided editorial services for award-winning best-selling books on<br />

a variety of topics. He also serves as ICFE's Director of Special Projects,<br />

and the author of the Certified Identity Theft Risk Management Specialist<br />

® XV CITRMS® course. As an accredited educator for over 20 years, Yan addresses risk management<br />

in the areas of identity theft, privacy, and cyber security for consumers and organizations holding sensitive<br />

personal information. You can reach him via his e-mail address at<br />

yan.ross@cyberdefensemediagroup.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Your website could be vulnerable to outside attacks. Wouldn’t you like to know where those<br />

vulnerabilities lie? Sign up today for your free trial of WhiteHat Sentinel Dynamic and gain a deep<br />

understanding of your web application vulnerabilities, how to prioritize them, and what to do about<br />

them. With this trial you will get:<br />

An evaluation of the security of one of your organization’s websites<br />

Application security guidance from security engineers in WhiteHat’s Threat Research Center<br />

Full access to Sentinel’s web-based interface, offering the ability to review and generate reports as well<br />

as share findings with internal developers and security management<br />

A customized review and complimentary final executive and technical report<br />

Click here to sign up at this URL: https://www.whitehatsec.com/info/security-check/<br />

PLEASE NOTE: Trial participation is subject to qualification.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Post-COVID-19 <strong>Cyber</strong>security Predictions<br />

By Ilia Sotnikov, Vice President of Product Management, Netwrix<br />

Lots of pundits are speculating about what effects the COVID-19 pandemic will have on the economy,<br />

social behavior, politics and related topics. Today, however, let’s focus on how the IT threat landscape is<br />

likely to evolve. I don’t envision a dramatic shift in the makeup of cybersecurity threats; rather, I predict<br />

an acceleration of important trends we have already been battling. Here are the key threats I predict will<br />

increase during the global lockdown and beyond.<br />

More remote employees will mean more insider threats.<br />

Remote work is here to stay. Some organizations will stay fully remote while others will make it optional,<br />

but all IT teams will have to adapt to the new reality of a larger remote workforce and lack of control over<br />

more endpoints and network devices.<br />

From a cybersecurity standpoint, they will have to regard each remote worker as a potential threat,<br />

capable of both malicious actions of their own and negligence that opens the door to attackers getting<br />

inside the network. Therefore, organizations will have to develop new security strategies that reduce risk<br />

to an acceptable level, possibly using a zero trust model. They will need to pay special attention to the<br />

security and privacy of sensitive data, for example, by enforcing measures to prevent this data from<br />

spreading across employee endpoints and cloud collaboration tools.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Online scams will increase.<br />

Ecommerce and online services are experiencing massive growth today. Shops that weren’t selling online<br />

before were forced to change their business models, and consumers who weren’t shopping online had<br />

to learn new skills fast. When the lockdown is over, many consumers will keep this habit —along with<br />

their poor knowledge of (and attention to) cyber threats. Hackers will be ready and waiting, eager to<br />

commit fraud and steal personal and payment data.<br />

To reduce risk, organizations will have to simplify their cybersecurity practices. In particular, they will<br />

need to eliminate complex jargon and antiquated interfaces. The value of clearly communicating security<br />

risks to customers and building in as many safeguards as possible will be higher than ever, and<br />

organizations need to start working on this as soon as possible. Since solutions will have to be simple<br />

and clear about security settings, the value of UI/UX will grow. Online services — from retailers to social<br />

media sites to cloud storage providers — will be under more scrutiny to enable secure settings by default,<br />

and some vendors will use advanced security options as a market differentiator.<br />

Spoofing will go to the next level with deepfakes.<br />

Hackers are already experts at sending emails in which they impersonate C-level management and ask<br />

employees to transfer money or provide access to sensitive data, and we’ve even started to see voice<br />

spoofing. With organizations now relying on video conferencing extensively, we are likely to see more<br />

hackers using live deepfakes to spoof video calls. While this is not something that will happen to the<br />

majority of organizations tomorrow, AI and neural networks are making deepfake tech not just possible<br />

but more widely available and affordable. There are multiple ways this technology could used, including<br />

deception using face recognition technologies, and even video-spoofing-as-a-service.<br />

Organizations that will be using video conferencing for regular communication will be vulnerable to this<br />

new variant of cybercrime. To protect themselves, they will need to reshape their business processes,<br />

especially approval workflows for budget spending and data access. In addition, IT teams will need to<br />

increase the accountability of all employees, especially those with admin rights, to prevent illegitimate<br />

elevation of privileges.<br />

The number of data breaches will increase.<br />

Enabling employees to be productive from home and maintaining business operations has been a huge<br />

stressor for IT teams. The need for them to shift their focus to these priorities is giving hackers plenty of<br />

opportunities to hide their malicious activity long enough to cause serious damage. In addition, any AIor<br />

ML-based security monitoring solutions that organizations had in place became useless instantly, since<br />

the dramatic changes in user activity patterns generated vast numbers of false positive alerts. While this<br />

security intelligence and IT routines will adapt to the new normal in time, everything is likely to get crazy<br />

again when employees return to the office, and organizations will again be blind to suspicious activity<br />

that could lead to breaches until the solutions and IT teams can adapt again.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Indeed, almost all organizations are more vulnerable now than they were before mid-March. While, the<br />

full impact is hard to predict now, we should expect a large number of reports of breaches from the start<br />

of the work-from-home trend and potentially lasting through 2021. To avoid being among the victims,<br />

organizations need a solid plan for addressing data privacy and security risks both now and when the<br />

remote working situation shifts again.<br />

Organizations will move beyond passwords.<br />

Password authentication is perhaps the weakest link in cybersecurity. The increased use of online<br />

services is forcing users to create new accounts, each with its own password. Faced with the challenge<br />

of remembering more and more complex passwords, users resort to reusing one or two passwords. This<br />

increases the risk of data breaches, since credentials stolen from one organization become available on<br />

the dark web and hackers attempt to use them against other companies.<br />

As a result, organizations will likely start adopting non-password authentication methods, such as<br />

biometric data like fingerprints or eye scans. This trend could increase the amount of personal data<br />

transmitted and stored online, as more organizations will be collecting biometric data for authentication.<br />

And of course, attackers will be looking for techniques to circumvent or hack any new authentication<br />

strategies, and it’s impossible to predict what they will come up with. Therefore, organizations need to<br />

have an adaptive risk management program and have security in mind every time they implement new<br />

services and technologies.<br />

About the Author<br />

Ilia Sotnikov is an accomplished expert in cybersecurity and IT<br />

management. He is Vice President of Product Management at Netwrix,<br />

provider of a visibility platform for data security and risk mitigation in hybrid<br />

environments. Netwrix is based in Irvine, Calif.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Strategies That Protect Business<br />

Operations Now and Tomorrow<br />

Planning for the future means moving secure remote access toward the top of your list<br />

By Leo Taddeo,Chief Information Security Officer, Cyxtera Technologies and President, Cyxtera<br />

Federal Group<br />

In terms of a global cyber conflict, data centers are the modern-day equivalent to the ball bearing plants<br />

of WWII. Just as ball bearings were essential to the tools of mechanized warfare, data centers are key<br />

components of the infrastructure that supports the modern economy. The effects of a successful<br />

cyberattack on a few data centers would cascade across other critical sectors to cripple the country’s<br />

digital backbone. Protecting data centers from threats to continued and uninterrupted operations must be<br />

a top priority in any national or commercial cybersecurity strategy.<br />

To that end, the main pillar of information security for data centers, and other industrial control systems<br />

(ICS), is effective user access control. For many data center and ICS security plans, user access was<br />

partly secured by requiring the user to be on site. This made sense up until <strong>2020</strong> BC (“Before COVID”),<br />

when few CISOs thought about social distancing for ICS and data center operators. While keeping<br />

unauthorized users out has, and always will be, essential, the pandemic has added a new reason to<br />

focus on secure remote access. Beyond keeping unauthorized users out, effective remote access tools<br />

can keep authorized users apart.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Being Inside the Physical Perimeter Means Risk<br />

The response to COVID-19 forced businesses to scramble to keep employees productive as they<br />

transitioned from the office to home workstations. Fortunately, most office employees can remain<br />

productive by using videoconferencing and familiar applications that are highly scalable in cloud-based<br />

SaaS offerings. The security for these productivity suites is built into the application — easy.<br />

But what about highly skilled technical employees who need access to systems that run only on corporate<br />

networks? These include sensitive ICS like cooling, power, and humidity. How can a CISO ensure only<br />

the right people have access at the right time and for the right purpose? In the pre-COVID world, the<br />

employee had to be on-site to access the system. Keeping employees together on-site is no longer a net<br />

benefit to security. The potential for infection and loss of key personnel is too great.<br />

In addition, most data centers and other ICS facilities have been relying on an outdated contractor service<br />

model, where in the interest of efficiency, specialized technicians travel from facility to facility in an<br />

ongoing cycle of install, repair, and update. In a pandemic environment, each visit by a technician is an<br />

opportunity for the virus to spread. The visiting technician model creates real cross-contamination risk<br />

within campuses and across regions. One contagious technician could potentially visit multiple sites in<br />

the course of several days with the potential to knock out dozens of those sites before he knows he is<br />

contagious.<br />

This, in a nutshell, is why CISOs need to reprioritize remote access for as many users as possible. If an<br />

employee, especially a highly skilled technician, can operate off-site, the contamination risk goes down<br />

and resilience goes up.<br />

Rethinking Remote Access Tools<br />

As the foundation of our digital critical infrastructure, data center operations teams have so far met the<br />

pandemic’s immediate needs — scaling up clients to deal with shifting demand and a newly remote<br />

workforce, to name a few. But the fact is that geopolitical tensions are rising and cyber conflicts between<br />

rival powers are transitioning from a simmer to a low boil. Reports from reliable sources, including<br />

government agencies and private threat intelligence firms, reveal a disturbing uptick in activity from<br />

China, Russia and North Korea. As we grapple with the real health threats caused by the pandemic, we<br />

can’t forget that adversaries are lurking in the wings, waiting for us to look away so they can get inside<br />

our critical infrastructure and potentially do damage.<br />

In the past, practically the only option for CISOs was to allow remote access through a traditional VPN.<br />

Unfortunately, nation state actors are known to have exploited vulnerabilities in legacy VPN technologies<br />

to steal credentials and gain access to sensitive systems. In October 2019, the UK’s National <strong>Cyber</strong><br />

Security Center warned that Chinese intelligence agencies had used these tactics. The US Department<br />

of Homeland Security and National Security Agency issued similar warnings.<br />

Far too many data centers and ICS facilities are burdened with legacy VPN systems, which are simply<br />

not designed to meet today’s risks. They are incompatible with new technology, lack scalability, and<br />

expose the companies using them to regulatory and compliance risks. In addition to being vulnerable to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


several common attack vectors, VPNs limit operational flexibility in that they don’t allow for dynamic<br />

access based on conditions and user context.<br />

Make Secure Remote Access a Business Enabler<br />

For data center operators, maintaining building management systems is a non-negotiable requirement.<br />

Many data center operators are looking for an alternative to the VPN. The answer for many operators of<br />

sensitive industrial systems, including data centers, is the Software Defined Perimeter (SDP). One of the<br />

big advantages of SDP is the ability to enforce least privilege access to third-party support organizations.<br />

Unlike with a VPN, SDP can allow access to specific systems included in a contractor’s support<br />

agreement without giving them wide access to the network. As an example, the RF code wireless<br />

temp/humidity sensors in some data centers are supported by specialized service providers. Using SDP,<br />

CISOs can limit the contractor’s access to those servers without opening up our other BMS platforms.<br />

CISOs can also use SDP to ensure that the contractor’s machines meet security requirements before<br />

they connect. If the laptop is not sufficiently updated and protected by antivirus software, SDP will block<br />

the connection. These additional audit and security controls are a far superior solution than legacy VPNs.<br />

As data centers look to fortify their security posture, there is the realization that a full-scale overhaul isn’t<br />

economical. Incremental refreshes are, however, so as components and systems such as humidifiers or<br />

cooling systems are updated or replaced, cost, efficiency, and security must be paramount. Outmoded<br />

systems that require people onsite to run them open enterprises up to future vulnerabilities to threats that<br />

are known, unknown, or unforeseen — such as a pandemic.<br />

Designing ICS and data center systems that are naturally and organically configured for secure remote<br />

access produces a number of benefits. First, remote access can result in cost savings over on-site access<br />

requirements as the latter incur additional travel and head-count costs. Second, modern remote access<br />

tools improve security flexibility. Lastly, remote access allows for separation between operators and<br />

vendors that adds to resilience against operational interruptions caused by pandemics and natural<br />

disasters.<br />

Planning for the future means moving secure remote access toward the top of the list of criteria for IT<br />

investments. The world has changed dramatically. We must ensure our security solutions keep pace.<br />

About the Author<br />

Leo Taddeo, Chief Information Security Officer, Cyxtera Technologies and<br />

President, Cyxtera Federal Group, is responsible for oversight of Cyxtera's<br />

global security operations, investigations and intelligence programs, crisis<br />

management, and business continuity processes. He provides deep domain<br />

insight into the techniques, tactics and procedures used by cybercriminals, to<br />

help Cyxtera and federal agencies defend against advanced threats. Leo can<br />

be reached at @LeoTaddeoCZ? and at our company website<br />

https://www.cyxtera.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Education and Practice: Never Stop<br />

Learning<br />

By Ken Sigler, Dan Shoemaker, and Anne Kohnke<br />

As the number of industries, organizations, and educational institutions continue to recognize the<br />

scope and impact of cybersecurity, the means in which the crisis is approached cannot be made<br />

haphazardly. For many years cyber professionals have been able to apply consistency within<br />

practices aimed toward minimizing the effects of cyber-attacks by using international and<br />

domestically adopted standards, guidelines, and frameworks. These standards, guidelines, and<br />

frameworks aim to put into context how some facet of cybersecurity should be accomplished. While<br />

well-intentioned, this wide array of sometimes overlapping standards can be quite overwhelming to<br />

the practitioners and organizations that need them the most.<br />

Organizations tend to fit into one of two categories when considering their adherence to standards<br />

and guidelines. Many take the unsystematic (and sometimes chaotic) approach by either ignorantly<br />

or willfully neglecting the value of standards and guidelines or by ignoring them entirely and just doing<br />

their own thing. It is those organizations that find themselves strapped with the complexities and<br />

budgets of recovering from data breaches, much less understanding how the breach happened in<br />

the first place.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The second group of organizations successfully adopt applicable standards and guidelines and make<br />

valiant efforts to abide by them. The problem resides in the interpretation of those resources. These<br />

valuable resources are written by industry experts charged with providing detailed explanations of<br />

cybersecurity practices at a very concrete level. The organization is left to make their own<br />

interpretation that sometimes can lead them into a direction that will be more costly, compared to if<br />

they were not to have adopted the standard and guideline in the first place. Thankfully, recent books<br />

have been published that provide greater understanding into such cybersecurity areas as:<br />

understanding and applying the National Institute of Standards and Technologies (NIST)<br />

<strong>Cyber</strong>security Framework, standardized approaches for implementation of cybersecurity controls,<br />

understanding cybersecurity risk management and the implementation of risk practices using the<br />

NIST Risk Management Framework, implementing guidelines that support cybersecurity<br />

management throughout the entire supply chain, and how to make an organization truly cyberresilient.<br />

Similarly, educational Institutions have struggled to find the right fit for how to prepare students for<br />

careers in cybersecurity. Since the turn of the century many Information Technology programs saw<br />

cybersecurity as solely the need to implement technology aimed at protecting information; hence the<br />

reason for the old way of referring to the field as “Information Security”. Programs taking on that<br />

understanding of the field prepare students with a narrow scope of simply presenting the technologies<br />

that protect information. And in many cases those presentations are done through simulated<br />

approaches.<br />

However, as the field of cybersecurity has evolved, educators cannot take as narrow of an approach<br />

to preparing students. Realistically, the field has become much more than just securing information.<br />

Rather it is becoming a discipline in and of itself, which encompasses a complete body of knowledge<br />

that requires standardized approaches (with well-defined outcomes) to introducing the expanded<br />

areas that make up the entire field of cybersecurity. No longer can someone be prepared for work<br />

within the field simply by understanding the difference between a router, switch, and firewall.<br />

<strong>Cyber</strong>security has expanded to the extent that data security, software security, component security,<br />

connection security, system security, human security, organizational security, and societal security<br />

should all necessarily be included (from an interdisciplinary approach) within cybersecurity curriculum<br />

in order to adequately prepare individuals for work within the field. And to that extent, organizations<br />

should endeavor to understand the interdisciplinary knowledge of the individuals that they hire.<br />

To support the growing need for standardized and interdisciplinary approaches of educating future<br />

professionals in the entire cybersecurity body of knowledge, two standards have been developed to<br />

assist educational institutions in the development of their cybersecurity curriculum. NIST published<br />

the second version of the “National Initiative for <strong>Cyber</strong>security Education (NICE) <strong>Cyber</strong>security<br />

Workforce Framework” in 2017. NICE breaks the field of cybersecurity down into specialty areas and<br />

specifies what each areas of the workforce should be doing to ensure that security functions of<br />

identification, protection, defense, response, or recovery are being carried out properly.<br />

Similarly, later that same year, the Joint Task Force on <strong>Cyber</strong>security Education in association with the<br />

Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS), Association for<br />

Information Systems Special Interest Group on Information, Security and Privacy (AIS SIGSEC), and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


International Federation for Information Processing Technical Committee on Information Security<br />

Education (IFIP WG 11.8) was formed and published in December 2019 the Curriculum Guidelines for<br />

Post-Secondary Degree Programs in <strong>Cyber</strong>security Education (more commonly known as CSEC2017).<br />

The purpose of CSEC2017 is to provide a summary of the underlying topics that encompass eight<br />

knowledge areas that define the boundaries of the discipline of cybersecurity. The premise of the<br />

guideline is to provide educators an understanding of what topics should be included in cybersecurity<br />

curriculum, a common set of outcomes, and provides adequate flexibility into how the topics are<br />

introduced and outcomes realized.<br />

Much like the earlier discussion related to whether organizations adopt cybersecurity industry standards,<br />

the same is true of educational institutions. It is a growing imperative that all cybersecurity curriculum<br />

provide greater scope of instruction into the entire body of knowledge, while providing hands-on<br />

approaches to introduce and dive deeper into each topic. While standards and guidelines provide the<br />

detail of what needs to be included in cybersecurity curriculum, books on NICE, such as A Guide to the<br />

National Initiative for <strong>Cyber</strong>security Education (NICE) <strong>Cyber</strong>security Workforce Framework (2.0) and<br />

CSEC2017 The <strong>Cyber</strong>security Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a<br />

Complete Curriculum in <strong>Cyber</strong>security, have been published that provide specific examples into how they<br />

can be implemented successfully.<br />

<strong>Cyber</strong>security is not a field that should be approached carelessly. Many organizations and educational<br />

institutions have taken that approach and failed to the extent of costing millions of dollars. In a time where<br />

many are being forced to rethink their cybersecurity strategies as a result of COVID-19, the use of<br />

standards and guidelines accompanied by numerous books that bring standardized topics into context,<br />

provide the capability of implementing cybersecurity instruction and practice in a manner that will<br />

circumvent the effect of attacks for years to come.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Authors<br />

Ken Sigler, is a faculty member of the Computer Information Systems (CIS)<br />

program at the Auburn Hills campus of Oakland Community College in<br />

Michigan. His primary research is in the areas of software management,<br />

software assurance, cybersecurity risk management, and cybersecurity<br />

education. He Has spoken nationally on numerous topics related to<br />

cybersecurity and has served as served as the liaison for the college to the<br />

International <strong>Cyber</strong>security Education Coalition (ICSEC), of which he is one of<br />

three founding members. Ken is a member of the University of Detroit Mercy<br />

Center of <strong>Cyber</strong>security and Intelligence Studies Board of Advisors.<br />

Daniel P Shoemaker, is principal investigator and senior research scientist<br />

at the University of Detroit Mercy’s Center for <strong>Cyber</strong> Security and Intelligence<br />

Studies. Dan has served 30 years as a professor at UDM with 25 of those<br />

years as department chair. He served as a co-chair for both the Workforce<br />

Training and Education and the Software and Supply Chain Assurance<br />

Initiatives for the Department of Homeland Security and was a subject matter<br />

expert for the NICE Workforce Framework 2.0. Dan has coauthored six<br />

books in the field of cybersecurity and has authored over one hundred<br />

journal publications. Dan earned his PhD from the University of Michigan.<br />

Anne Kohnke, is an Associate Professor of <strong>Cyber</strong>security and the PI for the<br />

Center of Academic Excellence in <strong>Cyber</strong> <strong>Defense</strong> at the University of Detroit<br />

Mercy. After a 25-year career in IT, Anne transitioned from a Vice President of<br />

IT and Chief Information Security Officer (CISO) position into full-time<br />

academia in 2011. Dr. Kohnke was also a tenured Associate Professor at<br />

Lawrence Technological University where she taught technical IT and<br />

cybersecurity courses.<br />

Dr. Kohnke’s research is focused in the area of cybersecurity, risk<br />

management, threat modeling, and mitigating attack vectors. Dr. Kohnke has<br />

recently coauthored six books and several peer-reviewed journal articles in this field of study. Dr. Kohnke<br />

earned her PhD from Benedictine University, an MBA from Lawrence Technological University, and<br />

courses in the Master of Science in Information Systems and Technology at the University of Michigan<br />

Dearborn.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Stats on <strong>Cyber</strong> Security Perception Heading into the<br />

COVID-19 Challenge<br />

By Stephen Stott, Founder & CEO, Stott and May<br />

There is a lot of debate currently around whether the cyber security profession is recession proof.<br />

Answering that question largely depends on board level perceptions around the strategic importance of<br />

the function and how that shifts over the coming months. Business is business, as they say, and ultimately<br />

for security functions to sail through largely unscathed they will need to be able to help the board deliver<br />

value for shareholders in the short, medium and long term.<br />

A recent Stott and May report suggests that 55% of security leaders believe that their business see cyber<br />

as a strategic priority, with a further 31% suggesting it’s a very real technical problem. In high growth midmarket<br />

firms that number is even more prominent, with 83% pointing towards its strategic significance.<br />

The overwhelming majority of respondents (69%) also outlined that the security function had a key role<br />

to play in enhancing the value proposition for customers.<br />

It’s fair to say that both B2B and B2C consumers have become far more educated on the issue of cyber<br />

security and see this as an important feature in purchasing decisions around products and services going<br />

forwards. This will be an important point for CISO’s to home in on in the months ahead.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This concept of making security features more prominent could also help to play an important role in<br />

building a stronger culture of security within an organization. A key challenge experienced by many<br />

CISO’s we interact with. Jim Rutt, CISO at the Dana Foundation, a participant in this research report and<br />

stated “CISO’s need to ensure that with every initiative, whether that be digital transformation or new<br />

applications being rolled out, they make the security features and ‘asks’ prominent within the project.<br />

Raise awareness of where the issues exist and where the gaps could be exposed.” To maintain a holistic<br />

security posture, it is going to be essential to create this level of collective commitment and focus.<br />

The carrot of an enhanced value proposition also needs to be balanced with the stick of protecting<br />

business operations as the attack surface increases in light of COVID-19 related events. CISO’s surveyed<br />

in the <strong>Cyber</strong> Security in Focus <strong>2020</strong> research suggested that they felt investment decisions would largely<br />

be driven by the stick (57%) and it’s important to keep this balance of risk and reward in mind when<br />

dealing with the board.<br />

Ultimately, strategy execution is going to be key. According to the research, the largest single barrier to<br />

delivering on cyber security initiatives is internal skills (39% of respondents felt this way). A significant<br />

percentage of CISO’s (76%) are still reporting a shortage of talent within their businesses with some 72%<br />

struggling to source cyber security candidates. Will candidate availability improve as a result of COVID-<br />

19? Certainly, there may be more candidates on the market, but we are seeing businesses be very<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


deliberate around retaining mid to senior security talent amid the layoffs in other areas. They have the<br />

battle scars to prove how challenging the cyber security recruitment market can be. Time to hire will<br />

remain a challenge for organizations seeking to address their skills shortage as hiring managers seek to<br />

acquire soft skills and cultural fit in conjunction with their technical requirements.<br />

The Stott and May <strong>Cyber</strong> Security in Focus Survey examines the key issues that have made an impact<br />

on the market over the course of this year. The research is based on the collective experience of 55 cyber<br />

security leaders sourced from Stott and May’s professional network. Respondents were asked to share<br />

their views across a wide range of issues including, but not limited to, the skills shortage, the boardroom<br />

perception of cyber security, talent attraction and the challenges associated with securing business in<br />

the cloud.<br />

The full report is available here.<br />

About the Author<br />

Stephen Stott is the Founder and CEO of Stott and May. He founded<br />

the business in December 2009. Stott and May are a talent<br />

acquisition agency that specialize in cyber security, data and<br />

analytics, tech sales and software engineering recruitment. Stephen<br />

divides his time between Stott and May’s UK and US locations with<br />

a clear mission; to connect the world’s professionals to make them<br />

more productive and successful than they ever believed imaginable.<br />

Stephen can be reached online at<br />

https://www.linkedin.com/in/stephen-stott-18a94219/ and at our<br />

company website http://www.stottandmay.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ISF: Behavioral Analytics Expected to Trigger a Consumer<br />

Backlash<br />

Organizations whose business model is dependent on behavioral analytics will be forced to backtrack<br />

on costly investments<br />

BY Steve Durbin, Managing Director, Information Security Forum<br />

In the coming years, organizations’ insatiable desire to understand consumers through behavioral<br />

analytics will result in an invasive deployment of cameras, sensors, and applications in public and private<br />

places. A consumer and regulatory backlash against this intrusive practice will follow as individuals begin<br />

to understand the consequences.<br />

Highly connected ecosystems of digital devices will enable organizations to harvest, repurpose and sell<br />

sensitive behavioral data about consumers without their consent, with attackers targeting and<br />

compromising poorly secured systems and databases at will. Impacts will be felt across industries such<br />

as retail, gaming, marketing, and insurance that are already dependent on behavioral analytics to sell<br />

products and services. There are also a growing number of sectors that will see an increased dependency<br />

on behavioral analytics, including finance, healthcare, and education.<br />

Organized criminal groups, hackers and competitors will begin stealing and compromising these treasure<br />

troves of sensitive data. Organizations whose business model is dependent on behavioral analytics will<br />

be forced to backtrack on costly investments as their practices are deemed to be based on mass<br />

surveillance and seen as a growing privacy concern by regulators and consumers alike.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What is the Justification for This Threat?<br />

Data gathered from sensors and cameras in the physical world will supplement data already captured by<br />

digital platforms to build consumer profiles of unprecedented detail. The gathering and monetization of<br />

data from social media has already faced widespread condemnation, with regulators determining that<br />

some organizations’ practices are unethical. For example, Facebook’s role in using behavioral data to<br />

affect political advertising for the European Referendum resulted in the UK's Information Commissioner’s<br />

Office fining the organization the maximum penalty in late 2019 – citing a lack of protection of personal<br />

information and privacy and failing to preserve a strong democracy.<br />

Many organizations and governments will become increasingly dependent on behavioral analytics to<br />

underpin business models, as well as for monitoring the workforce and citizens. The development of<br />

‘smart cities’ will only serve to amplify the production and gathering of behavioral data, with people<br />

interacting with digital ecosystems and technologies throughout the day in both private and public spaces.<br />

Data will be harvested, repurposed, and sold to third parties, while the analysis will provide insights about<br />

individuals that they didn’t even know themselves.<br />

An increasing number of individuals and consumer-rights groups are realizing how invasive behavioral<br />

analytics can be. An example of an associated backlash involved New York’s Hudson Yard in 2019,<br />

where the management required visitors to sign away the rights to their own photos taken of a specific<br />

building. However, this obligation was hidden within the small print of the contract signed by visitors upon<br />

entry. These visitors boycotted the building and sent thousands of complaints, resulting in the<br />

organization backtracking and rewriting the contracts. Another substantial backlash surrounding invasive<br />

data collection occurred in London when Argent, a biometrics vendor, used facial recognition software to<br />

track individuals across a 67-acre site surrounding King's Cross Station without consent.<br />

Attackers will also see this swathe of highly personal data as a key target. For example, data relating to<br />

individuals’ personal habits, medical and insurance details, will present an enticing prospect.<br />

Organizations that do not secure this information will face further scrutiny and potential fines from<br />

regulators.<br />

How Should Your Organization Prepare?<br />

Organizations that have invested in a range of sensors, cameras and applications for data gathering and<br />

behavioral analysis should ensure that current technical infrastructure is secure by design and is<br />

compliant with regulatory requirements.<br />

In the short term, organizations should build and incorporate data gathering principles into a corporate<br />

policy. Additionally, they need to create transparency over data gathering practices and use and fully<br />

understand the legal and contractual exposure on harvesting, repurposing and selling data.<br />

In the long term, implement privacy by design across the organization and identify the use of data in<br />

supply chain relationships. Finally, ensure that algorithms used in behavioral analytical systems are not<br />

skewed or biased towards particular demographics.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Steve Durbin is Managing Director of the Information Security Forum (ISF).<br />

His main areas of focus include strategy, information technology, cyber<br />

security, digitalization and the emerging security threat landscape across<br />

both the corporate and personal environments. Steve can be reached online<br />

at @stevedurbin and at our company website www.securityforum.org.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mobile App Security in The Midst of a Pandemic<br />

By Tom Tovar CEO and co-creator of Appdome<br />

In the “new normal” of COVID-19, businesses are relying on mobile apps to ensure business operations<br />

and revenue flowing.<br />

Restaurants, grocery stores and essential businesses, for example, now enable customers to order food<br />

via their phone for curbside pickup or delivery via apps like GrubHub, DoorDash and UberEats, increasing<br />

safety for consumers.<br />

Businesses face a two-pronged challenge. First is the need to rely on mobile apps to maintain sources<br />

of revenue. Second, and equally important, is a massive shift to work-at-home, which has dramatically<br />

increased the reliance on mobile apps for internally-focused enterprise processes vital for managing and<br />

executing day-to-day workflows.<br />

To cope, organizations are rushing to add new functionality and updates to both their consumer-facing<br />

and internal mobile apps, but in so doing, many are making security an afterthought. Indeed, the Verizon<br />

Mobile Security Index <strong>2020</strong> found that 43% of organizations knowingly cut corners on mobile security to<br />

“get the job done.” And that was before the additional pressure put on development teams by COVID-19.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Organizations that neglect security do so at their peril. Certainly, they may be able to get apps in the<br />

hands of end-users faster without adding security protections, but should an attacker compromise their<br />

app, the damage to their reputation and their revenue stream could far outweigh any advantage. Brands<br />

whose apps have suffered security breaches must often spend millions repairing their brand, fighting<br />

lawsuits and compensating consumers, not to mention the danger they face having their own data stolen<br />

or encrypted for ransom. In fact, attackers are already taking advantage of the pandemic and people’s<br />

increased reliance on mobility. For example, a recently released Covid-19 tracking app turned out to be<br />

ransomware.<br />

One of the big problems, of course, is knowing where to start. It can feel overwhelming. After all, a<br />

development group can spend months fixing hundreds of vulnerabilities, while a cybercriminal only needs<br />

to find one to mount a successful attack. But while you can’t necessarily anticipate every possible attack,<br />

you can address the most serious vulnerabilities, and the Open Web Application Security Project<br />

(OWASP) has already identified the most important vulnerabilities found in mobile apps. Protecting<br />

against these will significantly increase the security posture for your apps.<br />

Broadly speaking, here are the areas that require the most attention:<br />

Reverse engineering and app tampering protections: Most apps are not protected against attempts to<br />

probe them to discover exactly how they work. By tampering, debugging and reverse engineering apps,<br />

hackers can not only identify promising vectors for attack, but they can also create malware that closely<br />

resembles the real app, which they can then distribute to end-users. Using techniques such as app<br />

shielding, developers can prevent hackers from gaining access to the internal operations of their apps.<br />

It’s critical to make sure app shielding is properly implemented, however, because if it’s done poorly,<br />

hackers can turn off the protections it provides.<br />

App shielding is best implemented alongside code obfuscation, which makes an executable unintelligible<br />

so that hackers are unable to read the source code and glean useful information. Together, these two<br />

measures can prevent hackers from picking an app apart to recreate it or identify coding vulnerabilities.<br />

Securing data storage: End-users are very concerned about the security of their personally identifiable<br />

information (PII) such as passwords, bank accounts and credit card numbers … and they should be. In<br />

many apps, this information is stored on the device without any protection at all. As a result, anyone who<br />

can get into the phone — a trivial task for a sophisticated hacker in possession of the device — can read<br />

or export all the data it stores. For the most part, that’s what thieves are after when they steal a device.<br />

They can make much more money off financial fraud and credential theft than they could by simply selling<br />

the device on the black market.<br />

Data on the device must be encrypted, both at rest and in use, which means data will be completely<br />

unreadable to anyone who does not possess the encryption key to decode it. It’s important to use strong<br />

security, as older encryption algorithms may be vulnerable to cracking. The Advanced Encryption<br />

Standard using encryption keys that are 256 bits in length — known as AES-256 encryption — is the<br />

industry standard.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Secure communication: It’s not that much of an exaggeration to describe a mobile app as a connected<br />

bundle of APIs. Mobile apps must communicate via the Internet with other services in order to function,<br />

which means communications must be secured. If not, mobile users can fall victim to man-in-the-middle<br />

(MitM) attacks, where a hacker intercepts communications between a mobile user and the server they’re<br />

trying to reach. A successful MitM attack enables hackers to steal information and even change the data<br />

communicated to upload malware onto the end-user’s device.<br />

These attacks are more common than one might think. The Verizon Mobile Security Index <strong>2020</strong> shows<br />

that just under 1 in 10 of protected mobile devices detected an MitM attack attempt in 2019.<br />

To secure communications, developers must ensure that the app connects to the back-end server<br />

through an encrypted tunnel that uses the secure socket layer (SSL) as well as the transport layer security<br />

(TLS) protocols. In addition, developers can also choose to pin a static client certificate to the built app<br />

to prevent credential stuffing attacks on the back-end server. Without these protections, end-users’<br />

communications can be easily intercepted and compromised by any hackers.<br />

Of course, implementing these measures requires not only time, but also the right skills, and iOS and<br />

Android-specific security skill sets are in high demand. Thankfully, automated, AI-powered platforms now<br />

exist that can integrate all of these security measures into a mobile app binary in minutes without any<br />

coding at all.<br />

Even before the pandemic, the importance of mobile apps to commerce and day-to-day business was on<br />

the rise. During the lockdowns, this trend has accelerated, and it’s unlikely to slow down even once the<br />

disease finally recedes. In our new normal, mobile apps have become the primary way for people to do<br />

their banking, shopping, order food, transact business and work. It is paramount that, during the COVID-<br />

19 pandemic, the mobile apps people use are secure so that the people and businesses are protected.<br />

About the Author<br />

Tom Tovar is the CEO and co-creator of Appdome.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Managing an Information Security Risk Program<br />

A Managerial Approach<br />

By Adriano Novaes, Senior <strong>Cyber</strong>security Consultant<br />

Every organization should have an information security management program. The program consists of<br />

the totality of all activities and expenditures the organization takes to protect sensitive information. The<br />

program may be formal with a specific executive tasked with management responsibility, or it may be<br />

informal with activities and expenditures spent as needed. Formal or ad hoc, proactive or reactive,<br />

effective or not, every organization manages the security of its critical information.<br />

Set the goals<br />

The objective of an organization’s Information Security Management Program is to prudently and costeffectively<br />

manage the risk to critical organizational information assets.<br />

• The risk that critical information is compromised<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• The risk that critical information becomes unavailable<br />

• The risk that critical information is changed without authorization<br />

Associated with risk is cost. Security incidents cost money. So does preventing them. The cost, for<br />

example, of a computer virus is the loss in productivity of an organization’s personnel plus the time and<br />

expense for IT personnel to remove the virus and restore availability. The cost of a theft of a trade secret<br />

by a cyber-thief is the value of the trade secret. Implementing security also has costs. Firewalls and other<br />

security technology take capital away from other uses. Information security personnel come at the<br />

expense of personnel who can directly more contribute to the bottom line. And every hour management<br />

spends in a security meeting, or personnel spend on security awareness training, is an hour that could<br />

otherwise also contribute to the bottom line.<br />

Requirements for an Information Security Management Program<br />

The drivers behind an organization’s information security management program are the evolving<br />

landscape of laws, regulations, and competition, as well as evolving information security “best effective”<br />

practices. Organizations that hold personal, financial or health information of others are required to<br />

adhere to various federal and state laws and regulations. These include<br />

• HIPAA (electronic protected health information)<br />

• Sarbanes-Oxley<br />

• GDPR – General Data Protection Regulation<br />

Organizations may also have various contractual requirements for information or data security. Credit<br />

card processors, for example, must conform to the Payment Card Industry Data Security Standard.<br />

As organizations come to more deeply understand the competitive value of the information stored in their<br />

computer networks and the need to make that information securely available anytime and anywhere,<br />

they discern the need for a formal information security management program to assure that information<br />

is kept confidential, available, and correct.<br />

As organizations have increasing needs to share information with suppliers, customers, and other<br />

business relations they are increasingly becoming concerned with the information security capabilities of<br />

these third parties.<br />

An organization’s information security management program must be built upon current and emerging<br />

information security “effective best-practices.” As the information security industry has evolved, the<br />

industry has tended to settle on three distinct models as to what constitutes a set of “effective bestpractices”<br />

for managing the security of information:<br />

• ISO-27001 Specification for an Information Security Management System<br />

• ISO-27002: Code of Practice for Information Security Management<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• ISACA: Information Security “Management Maturity Model”<br />

Managing the Security of Critical Information Assets<br />

Information Security Control Objectives<br />

While the prevailing ‘consumer perspective” of information security is that it is concerned with protecting<br />

the confidentiality of sensitive information.<br />

The control objectives recognize that it is not enough to put all of one’s security resources on protecting<br />

information. Information is under stealth attack and it is only prudent to commit resources to detecting<br />

attacks and to be sure that one can recover from attacks. And while compliance is linked to protect, detect<br />

and recovery controls, it requires management oversight and corporate resources as well.<br />

Information Security Critical Success Factors<br />

Information security has seven Critical Success Factors which must be implemented if an organization is<br />

to meet its information security control objectives.<br />

1. Executive Management Responsibility: Senior management has responsibility for the firm’s information<br />

security program, and this program is managed in accordance with the enterprise’s information security<br />

policies.<br />

2. Information Security Policies: The enterprise has documented its management approach to security in<br />

a way that complies with its responsibilities and duties to protect information.<br />

3. User Awareness Training & Education: Information users receive regular training and education in the<br />

enterprise’s information security policies and their personal responsibilities for protecting information.<br />

4. Computer and Network Security: IT staff and IT vendors are securely managing the technology<br />

infrastructure in a defined and documented manner that adheres to effective industry information security<br />

practices.<br />

5. Physical and Personnel Security: The enterprise has appropriate physical access controls, guards,<br />

and surveillance systems to protect the work environment, server rooms, phone closets, and other areas<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


containing sensitive information assets. Background investigations and other personnel management<br />

controls are in place.<br />

6. Third-Party Information Security Assurance: The enterprise shares sensitive information with third<br />

parties only when it is assured that the 3rd-party appropriately protects that information.<br />

7. Periodic Independent Assessment: The enterprise has an independent assessment or review of its<br />

information security program, covering both technology and management, at least annually.<br />

Management Control Domains<br />

These seven critical success factors play themselves out across three fundamental management control<br />

domains:<br />

1. IT Infrastructure Security: Control elements in this domain identify specific point-in-time technical<br />

information security countermeasures. Examples include the security architecture; firewall rules;<br />

technical access controls; backup status; use of encryption; virus, worm, Trojan horse prevention; current<br />

patch levels; intrusion detection capabilities; etc.<br />

2. Secure IT Management: This control domain contains information security management controls<br />

specific to managing the Information Technology infrastructure. Control elements in this domain include<br />

documentation of IT systems, procedures, etc; management of systems development and maintenance<br />

processes, including change control; incident response and disaster recovery planning; IT staff<br />

education; IT vendor security; etc.<br />

3. Entity Security Management: This control domain contains management controls hierarchically “above”<br />

and outside of the management of the Information<br />

Technology infrastructure. Control elements in this<br />

domain include the chief information security<br />

officer, information security policies, employee<br />

education and awareness training, business<br />

process security, physical security, personnel<br />

security, etc.<br />

Managing an Information Security Structure<br />

CISO<br />

As an information security leader, It is expected to:<br />

• Take a systematic approach to IT security<br />

• Determine which risks have most impact on<br />

your organization and protect the assets<br />

that matter most<br />

• Proactively mitigate risks and minimize<br />

damage from cyber attacks and data breaches<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Ensure your organization can recover from security incidents faster and more easily<br />

• Justify investments in IT security to the board of directors<br />

Information Security Steering Committee<br />

The CISO is supported by a cross-functional Information Security Steering Committee. In order to make<br />

sure that information security leadership and management extends across the organization, Steering<br />

Committee members need to include senior representatives of marketing, sales, operations, HR, finance<br />

and IT. Formal appointment to the Information Security Steering Committee is made by the COO in<br />

consultation with the CISO.<br />

Stablishing an Information Security Culture<br />

The effectiveness of an information security program ultimately depends upon the behavior of people.<br />

Behavior, in turn, depends upon what people know, how they feel, and what their instincts tell them to<br />

do. While information security policies, an awareness training program and the other required information<br />

security practices can define, regulate and impart information security knowledge these rarely have<br />

significant impact on people’s feelings about their responsibility for securing information, or their deeper<br />

security instincts. The result is often a gap between the dictates of information security policy and the<br />

behaviors of our people.<br />

Develop a risk assessment process<br />

Risk assessment is an important part of any cybersecurity risk management plan. It is important have in<br />

mind the following points, as find as below:<br />

• Identify all your company's digital assets, including all stored data and intellectual property<br />

• Identify all potential cyber threats, both external (hacking, attacks, ransomware, etc.) and internal<br />

(accidental file deletion, data theft, malicious current or former employees, etc.)<br />

• Identify the impact (financial and otherwise) if any of your assets were to be stolen or damaged<br />

• Rank the likelihood of each potential risk occurring<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Speed as an action<br />

When a security breach or cyberattack occurs, an immediate response is required. The longer it takes to<br />

address the threat, the more damage may be done. Studies show that 56% of IT managers take more<br />

than 60 minutes to get information about an ongoing cyberattack. But a lot of damage can be done in an<br />

hour.<br />

Speedy reaction must be a part of your security-forward culture. That means you need to develop an<br />

early recognition of the potential risks, an immediate identification of the attacks and breaches, and a<br />

rapid response to security incidents. When it comes to risk containment, speed is of the essence<br />

Incident Response Plan<br />

Last but not least, It is required to develop an incident response plan, focusing on the priority of risks<br />

previously identified. You need to know what you need to do when a threat is detected—and who needs<br />

to do it. This plan should be codified so that even if an incident occurs after you've personally left the<br />

company, the team currently in place will have a roadmap for how to respond.<br />

About the Author<br />

Adriano Novaes is a senior cybersecurity consultant with more than 15<br />

years of experience in the <strong>Cyber</strong> security space. He is experienced in<br />

Governance, Risk and Compliance and strong expertise in the<br />

information security projects involving IT Risk Management, Network<br />

Security, IT vulnerability management besides providing security advice<br />

in information assets to Brazilian and international companies across the<br />

world. Adriano has worked in multiple projects from different clients in<br />

Brazil, Africa and The United States. He is graduated in Network<br />

Technology and certified as <strong>Cyber</strong>security specialist by Georgia Institute<br />

of Technology in the US. Adriano Novaes can be reached out online at<br />

adriano.novaes@yahoo.com.br or https://www.linkedin.com/in/adrianonovaes<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ensuring <strong>Cyber</strong>security in A Remote Workplace<br />

How to Make Sure your Remote Team is Secure<br />

By Ryan Ayers, Freelance Writer & Tech Consultant<br />

With ecommerce at an all time high in the wake of the COVID-19 lockdown, cybersecurity is even more<br />

important than it was in 2019 when the U.S. government, alone, spent $8.5 billion defending against<br />

hackers and other types of cyber criminals.<br />

The future of cybersecurity looks bright from a jobs standpoint, but that obviously means there is<br />

heightened anxiety regarding the threat of attacks. As the remote work trend will most likely continue<br />

after stand down, here are some tips on ensuring cybersecurity for your company.<br />

Educate Your Employees<br />

Self-education on hacking trends is paramount if you’re someone who is responsible for securing<br />

personal information shared on a website, and passing that information to any and all employees/thirdparty<br />

workers who may have access to parts of your website that have sensitive information is just as<br />

important.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Having a positive workplace culture in place is the first step, so your employees respect and listen to the<br />

information you pass down regarding the hacking trends. Additionally, simple but important reminders to<br />

change passwords and always logout need to be said, as old habits die hard and most people don’t do<br />

these things as regularly as they should.<br />

Educate Your Consumers<br />

A fairly new type of cyberattack is called “MITM” attacks, or “man in the middle.” Though an insensitive<br />

name in regards to female hackers, it’ a very sensitive issue in the world of cybersecurity. In MITM<br />

attacks, a hacker will create a network that mimics that of a local WiFi hotspot like a coffee shop. It’s<br />

already not great practice to do ecommerce over a public network, but it’s especially troublesome when<br />

the network is phony and someone is simply watching you input data and stealing what you input.<br />

Making sure customers stay aware of the threats without scaring them away, is a tough line to toe but<br />

one that should err on the side of protecting the consumers and your website.<br />

Protect the Money<br />

Any remote workplace that offers online monetary exchanges needs to triple up on security in a world<br />

where security breaches are expected to cost the global economy $6 trillion (with a “t”) in 2021 (some<br />

estimates are lower, but all well above the $3 trillion the economy lost to cyber criminals in 2015).<br />

Let Everyone Know About Your Security Measures<br />

One of the best ways to secure your ecommerce website is to subtly-but-noticeably display your security<br />

measures on your website. This is a three-fold measure when it comes to the protection and success of<br />

your ecommerce business. First, you do, indeed, have quality security measures in place to protect<br />

against hacking, including automated hacks which account for a large percentage of hacking. When it<br />

does come to human hackers, your advertised security measures will also play a part in deterring them<br />

from targeting your site and your customers’ information. Third, those same customers will see it and<br />

think, “Hey, this website is a secure, let’s buy some stuff,” and that’s the ultimate goal in ecommerce!<br />

Repeat Regularly<br />

All of these practices will help your remote company stay protected from cyber threats, but the world of<br />

hacking is as rapidly changing as any tech-related arena and it is paramount to the protection of your<br />

information to constantly bring yourself up to speed on trends and tribulations from the dark side of<br />

ecommerce.<br />

As the threats of hacking continue to increase, it’s also a good idea to look into third-party services that<br />

display expertise in defending against the ever-changing cyber criminals of the world. Just as with any<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


investment, it should certainly be weighed against the alternatives, but the weight of poor security has<br />

and can again be the beginning of the end for an ecommerce site that ends up in a hacker’s crosshairs.<br />

About the Author<br />

Ryan Ayers is a researcher and consultant within multiple<br />

industries including information technology, blockchain and<br />

business development. Always up for a challenge, Ayers enjoys<br />

working with startups as well as Fortune 500 companies. When<br />

not at work, Ayers loves reading science fiction novels and<br />

watching the LA Clippers. Ryan can be reached online at<br />

@biztechguru.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


GDPR Working from Home Checklist in The Light Of<br />

COVID-19<br />

Working from home in this pandemic period? Check some risk associated with it and Follow this step<br />

by step checklist that organizations need to take...<br />

By Susan Alexandra, Contributing Writer<br />

EU General Data Protection Regulation (GDPR) imposes strict check and balance for any mishandling<br />

or accidental leakage of personal data. Companies and businesses have to take some mandatory<br />

measures to maintain GDPR compliance. The responsibility of the organizations for protecting data turns<br />

multifold in the current situation of work from home.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Risks of Working from Home<br />

COVID-19 has forced the corporate industry to opt for remote working in place of an office setting. This<br />

has increased the risk of a data breach. The major causes of this increase in risk are:<br />

● Work from home means that several devices are connected to the company's database. This<br />

increases the chances of data theft and leakage.<br />

● The flow of data to and fro the company's system is carried out through multiple networks with<br />

varying security levels. This eases the work of predators and cybercriminals.<br />

● Most of the employees working in a traditional setting are not familiar with the usage of online<br />

tools. This increases the chances of human error and mishandling of data.<br />

● Unprotected devices are always an easy target for phishing emails and malware. Just one risky<br />

device or a single random click by any employee can risk the whole system.<br />

Checklist for GDPR Compliance<br />

Here are some necessary measures that your company or organization must take, especially in this<br />

current situation of remote working, to maintain their compliance with GDPR.<br />

● The company must update its privacy policy for employees working from home.<br />

● New agreements must be made with third parties and outside vendors to maintain compliance<br />

with GDPR.<br />

● All the employees should be provided with secured devices by the company.<br />

● If employees are using their own devices, they must be well protected with an up to date version<br />

of antimalware and firewall.<br />

● The encrypted network is a must for data security. Therefore, the company should provide VPN<br />

protected Wi-Fi devices to all the employees working from home.<br />

● If the employees are using their own Wi-Fi, they must be restricted to use password-protected<br />

Wi-Fi only. They must avoid using shared or public Wi-Fi for accessing and sharing the company's<br />

data.<br />

● Limit access to important files and data.<br />

● Two-factor authentication must be used for allowing access to the company's database.<br />

● All the tools and software used for communicating and data transfer must be encrypted.<br />

● Employees must be asked to limit their online activities on the devices that are used for accessing<br />

the company's database.<br />

● Employees must be restricted from sharing any details and passwords with unauthorized people.<br />

Company's data should not be shared with anyone, not even with the family members.<br />

● Employees must be trained for the usage of online tools and software to decrease the chances<br />

of human error.<br />

● Employees must also be educated about online safety and how to stay safe from phishing emails<br />

and invading malware.<br />

● Companies should have a proper IT infrastructure to monitor remote devices connected with their<br />

system.<br />

● Notifications must be set to get an alert in case of any security risk from any device connected<br />

with the system. This device should be immediately removed from the system and denied access<br />

for the time being.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


● Companies must have taken Data Processing Impact Assessment (DPIA) to detect any issue in<br />

the security system.<br />

● If there are any loopholes in security, they must be dealt on an urgent basis.<br />

● Companies must have prepared an alternate plan in case of a data breach.<br />

● Employees must also be trained to urgently deal with any security issue at their end.<br />

These are some crucial steps that every organization must take to maintain GDPR compliance and avoid<br />

any fines by GDPR. According to a report by PrivacyAffairs, “the total number of GDPR fines are 256<br />

yet”.<br />

Maintaining GDPR compliance has become challenging for organizations in this work from home<br />

situation. GDPR is detecting more data breaches than ever and is actively imposing fines on the<br />

companies not following a proper data security regime. The time demands companies to be extra vigilant<br />

about their data security. They must revise their policies and devise new strategies for safer handling and<br />

storage of confidential and crucial data.<br />

About the Author<br />

Susan Alexandra is an independent contributing author at SecurityToday<br />

and Tripwire. She is a small business owner, traveler and investor in<br />

cryptocurrencies.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>-Secure Access Control Solutions for Workplaces<br />

By Imran Anwar<br />

FBI has reported a 400% increase in cybercrime reports during the COVID-19 pandemic. <strong>Cyber</strong>security<br />

has become a big challenge for business owners while they try to keep their business running amidst the<br />

lockdown. The access control system is your first and final line of defense against cyber attacks carried<br />

out with the intent of gaining unauthorized access to the workplace.<br />

Access Control and <strong>Cyber</strong>security<br />

Right now, most organizations are working remotely or in shifts. <strong>Cyber</strong>criminals or disgruntled employees<br />

can take advantage of such times. Someone may try to steal your company’s vital information through<br />

MITM (Man in the Middle) attacks, a hacking technique in which the attacker secretly relays and possibly<br />

alters the communications between two data end points such as a card reader and key card.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>criminals can also send phishing emails and malware to hack into your company server from where<br />

they can break into your on-premise access control system, enter the workplace, and walk away with<br />

physical or digital assets without you knowing it.<br />

Are Key Cards <strong>Cyber</strong>-Secure?<br />

A couple of years ago, a couple of scientists discovered a major vulnerability in hotel key cards that could<br />

have been exploited by intelligence agencies, thieves and other criminals to gain access to rooms and<br />

cause further damage.<br />

It is estimated that 80% of all key cards being used to control access to workplaces can be hacked or<br />

copied. All card readers run on Wiegand interfaces, a 1980s technology that even a complete idiot can<br />

easily hack by following commonly available online tutorials.<br />

Electronic locks that need no wiring and only an internet connection to grant access can become the<br />

target of a cyber attack when the data communication is not secured by end-to-end encryption.<br />

How Secure is Smartphone Access?<br />

Smartphone based access control solutions that run on company networks should be a cause of concern<br />

for cyber security teams. These systems make use of Bluetooth HID or NFC channels to relay data, which<br />

can be hacked unless secured with encryption.<br />

Your network is only as secure as the devices attached to it. To be cyber secure, your access control<br />

system should offer endpoint security to prevent hackers from sneaking into the network by hacking<br />

someone’s phone and manipulating access control.<br />

Requirements of a <strong>Cyber</strong>-Secure Access Control Solution<br />

A cyber-secure access control system should provide protection against threats at all vulnerable points,<br />

which include data and application storage, access control devices, and the channel through which data<br />

is transmitted.<br />

Data and Application Storage<br />

Access control systems that store information on-site and work on your organization's internal network<br />

are a big hassle to manage and a looming security risk. Thanks to cloud computing, modern access<br />

control systems are virtually impregnable and effortless to maintain. The backend is fully secured and<br />

managed through Google, Amazon, or other reputed cloud servers, so you can sit back and relax.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Using a simple mobile or desktop interface, the security team can grant or revoke access to any user to<br />

any particular section of the building or office. The cloud offers enterprise grade security and trouble free<br />

management and mitigates the risk of data loss, hacking, malware, and physical threats.<br />

Access Control Devices<br />

Key Cards: Most RFID cards can be duplicated in a matter of minutes using $10 devices easily available<br />

on the market. HID and NFC cards can be copied to phones. There are access control companies that<br />

claim their cards are cyber secure because they use 128 bit AER encryption, TLS and PKI security.<br />

However, cards or fob access looks outdated with the advent of mobile and face recognition access<br />

control.<br />

Smartphones: Smartphone access is a better choice from the cyber security standpoint. However, bad<br />

guys can steal or hack smartphones by using malware or even USB charging cables at public phone<br />

charging points. Theoretically speaking, someone can steal user credentials and clone them into another<br />

device to illegally enter the workplace.<br />

Face Recognition: Facial recognition based access control systems provide a better solution to cyber<br />

threats. Fraudsters may still be able to beat the system by wearing masks, but it would be like Mission<br />

Impossible.<br />

Smart Locks: Cnet reports that out of 16 different Bluetooth enabled locks were tested at the Las Vegas<br />

based hackers convention, 12 had inadequate BLE security. So, yeah, they can be hacked unless your<br />

access control solution provider has done a really good job at encryption.<br />

Communication Channels<br />

Bluetooth, NFC and HID: Bluetooth has several known vulnerabilities that make it as secure as a<br />

padlock made from pizza dough. NFC and HID are no better—they are just channels that you have to<br />

make secure by encrypting the data stream.<br />

LAN/WAN: Access control systems that run on internal networks are not cyber- secure at all. WiFi<br />

networks are easy to hack. There’s always a risk of data theft or the server crashing or network glitches<br />

that make the system unusable.<br />

Internet: Cloud based systems with robust transitory and endpoint encryption make the data stream<br />

impossible to crack. However, users should make sure their internet connection is secure.<br />

Face recognition based access control systems offer better protection against cyber security threats; not<br />

only because they use cyber-secure components and encryption, but also because they allow you to<br />

monitor and record everyone who’s entering the workplace or accessing its different sections. Moreover,<br />

you can implement two-factor authentication based on face and mobile credential to eliminate the risk of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


unauthorized access. Face recognition access control also adds video surveillance and video intercom<br />

functionality to the workplace without incurring extra expenditure. And speaking of expenses, the most<br />

cyber-secure access control systems are available for a pay as you go pricing model and require minimal<br />

upfront investment.<br />

Author the Author<br />

Imran Anwar, Staff Writer.Imran Anwar has 10+ years of professional<br />

writing experience about technology-related topics including digital<br />

marketing, cloud computing, SaaS, mobile apps, artificial intelligence,<br />

IoT, face recognition, and building access control systems. As a Staff<br />

Writer at Swiftlane, Imran focuses on creating useful content pieces for<br />

blogs, case studies, white papers, and user guides. An outdoor<br />

enthusiast, Imran likes to garden and spend time with his family when he<br />

isn’t writing about access control and touchless technology.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Cleaning up “Dirty” Wi-Fi for Secure Work-from-Home<br />

Access<br />

By Matias Katz, CEO, Byos<br />

A great deal of emphasis has been placed on the use of VPNs to help provide safe, secure connectivity<br />

during this historic COVID-19 crisis and the massive move to working from home that has resulted.<br />

However, VPNs are not a definitive answer for secure connectivity; the major problem lies with the nature<br />

of home Wi-Fi, and with threat vectors that VPNs can’t address. VPNs encrypt data in transit, but they<br />

don’t isolate the device from the network. This means that corporate devices are still exposed to threats,<br />

even when using a VPN.<br />

The Risks of Home Wi-Fi Networks<br />

Wi-Fi networks, whether in public or private, are by their very nature dirty, and home Wi-Fi networks are<br />

no different.<br />

There are often 10 or more unmanaged devices connecting to the average home Wi-Fi network, such as<br />

personal laptops, cellphones, gaming consoles, and home IoT devices. Home internet usage compounds<br />

the risk because family members often unwittingly helping bad actors: gamers may download malicious<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


executables, teens are known to visit risky sites, and many family members don’t understand the risks of<br />

spam, unable to spot the difference between real and fake apps and emails.<br />

Each of these devices represents an entry point for attackers, and threat actors know this. They<br />

understand that WFH employees are unprotected by centralized enterprise security stacks. Once a bad<br />

actor has gained access to an edge device on the home network, they can go undetected, moving<br />

laterally across the network to the end goal: the company’s corporate devices and data.<br />

With the millions of additional points of remote access now in use, threat actors will be scanning more<br />

often, leading to more brute force attacks and more lateral movement. Security teams quickly need to<br />

find an alternative method for securing WFH Wi-Fi connections.<br />

Shoring Up Home <strong>Defense</strong>s:<br />

Work from Home (WFH) is a viable alternative for many companies, but unfortunately, IT teams weren’t<br />

ready for the inherent risks and implications that home Wi-Fi networks pose.<br />

Organizations have no visibility or control over these home Wi-Fi networks, and therefore cannot trust<br />

them.<br />

Home Wi-Fi hygiene can be improved by regularly changing passwords for Wi-Fi networks, changing the<br />

default router password, creating a guest network, and keeping router's firmware up to date. However,<br />

even with those steps, risks persist for organizations with WFH employees because enforcement is<br />

impossible, meaning the organization will never achieve full compliance. These steps also don’t solve<br />

the gap in protection left by VPNs<br />

Organizations need to find an easier, enforceable way for securing WFH employees.<br />

Extending Zero Trust Access to Any Remote Wi-Fi Connection<br />

The assumption that all networks are dirty is fundamental to any effective remote work security strategy<br />

such as Zero Trust. The best way to ensure that a home worker doesn’t corrupt the corporate network or<br />

otherwise expose key assets is to isolate their devices from their untrusted home Wi-Fi networks. In<br />

essence, this means micro-segmenting the remote device and creating a network of one. This step<br />

extends Zero Trust access to any remote Wi-Fi network connection.<br />

The Center for Internet Security's Wireless Access Controls recommends users “Create a separate<br />

wireless network for personal or untrusted devices. Enterprise access from this network should be treated<br />

as untrusted and filtered and audited accordingly.”<br />

That’s what endpoint micro-segmentation achieves: the employee’s device is physically isolated from the<br />

rest of the home Wi-Fi network, with plug and play USB hardware that delivers a “micro-segment of one.”<br />

This approach protects the individual’s device and the organization’s network from the various home Wi-<br />

Fi borne threats that security software doesn’t address.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Compliance Assurance: Endpoint micro-segmentation gives security administrators real-time security<br />

policy enforcement capabilities and proof of compliance over devices connected to uncontrollable Wi-Fi<br />

networks.<br />

This new approach is easy to deploy, provision and manage security in WFH environments. The only<br />

other fully secure current alternative – installing network security gateways and cloud controllers on every<br />

remote employee’s home Wi-Fi network for traditional network segmentation – is impractical and<br />

unrealistic.<br />

Now more than ever before, organizations must make working from home frictionless and secure.<br />

Endpoint micro-segmentation is a practical, painless, plug and play way to home Wi-Fi security gaps.<br />

About the author<br />

Matias Katz is the founder and CEO of Byos. Matias has 15+ years of<br />

experience in Information Security. He founded his first company (Mkit)<br />

in 2008, which provided defensive and offensive security solutions.<br />

Matias is an official CISSP instructor. He has presented his research at<br />

<strong>Cyber</strong>security conferences around the world, and has a TEDx talk. He<br />

is a published author - “Redes y Seguridad” (Networking and Security)<br />

and founded an international Hacking conference, Andsec, hosting<br />

1500 attendees during its final edition in 2017.<br />

Media Contact:<br />

Maureen MacGregor<br />

Madison Alexander PR<br />

(978) 473-1016<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Crime is Paying<br />

What the Evolution of Ransomware Means for the Security Industry<br />

By Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies<br />

If you were talk to a retired police officer or FBI agent about kidnappings, they will tell you not to pay the<br />

ransom. Criminals are not bound by any sort of honor requiring them to stick to the deal. Many times,<br />

threats to the lives of the kidnapped are still carried out in spite of the ransom being paid. Paying the<br />

ransom also emboldens the criminal kidnap more often. In some countries, kidnappings are so lucrative,<br />

it's become a big business. The last 18 months of ransomware incidents have shown an escalation that<br />

mirrors that of kidnapping enterprises.<br />

While ransomware is not about kidnapping real<br />

people, it is about holding something almost as<br />

important for ransom, your information. Today,<br />

we spend a majority of our working and<br />

recreation time on the internet. We play games<br />

online, we video call online, we work online and<br />

we shop online. We even bank online. All this<br />

requires us to confirm we are who we are and<br />

allowing our personal information or company<br />

proprietary data to be held by a criminal means<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


they can pose as you, open credit, and even steal your money. This is why ransomware is so dangerous,<br />

it is a prime gateway towards stealing your identity, all while convincing you to pay a ransom to keep it.<br />

When a piece of ransomware lands on your computer and is executed, it starts restricting access to<br />

important parts of your computer. Early on it would simply encrypt documents on your system, restricting<br />

access to the data you need to do your job. Eventually, newer types of ransomware restricted access to<br />

the computer itself, either by blocking access to your desktop or rebooting your computer into a locked<br />

state. Lately, some more recent pieces of ransomware will copy your important data off of your computer.<br />

In all cases a message is flashed on the screen instructing you to pay a ransom in some sort of<br />

cryptocurrency.<br />

In the first wave of ransomware (2016-2017), the model was<br />

to ask for a small ransom, sometimes as low as $100, while<br />

infecting as many people as possible. Starting in 2019,<br />

ransomware’s second wave shifted in operating model.<br />

Instead of widespread infection, newer campaigns started<br />

targeting specific companies. Attackers worked for weeks or<br />

months to get access to a specific company and would<br />

deploy the ransomware on many internal computers once<br />

they got access. The ransoms for these attacks grew to<br />

thousands of dollars. The increase in ransom becomes viable<br />

because the ransomware scare has increased the demand<br />

for cyber insurance. If a ransomware event happens to a victim with cyber insurance, the insurance<br />

company will assist in recuperating the ransom paid. This means the company is more likely to pay the<br />

ransom.<br />

As if all of this weren't bad enough, in January <strong>2020</strong> the<br />

Maze ransomware campaign made a major escalation. In<br />

addition to restricting access to the computer and/or<br />

documents, this ransomware transmitted some of that data<br />

off the computer to some sort of command and control<br />

system. This bridges ransomware into the other major<br />

business model of cybercrime, selling stolen data. Until<br />

2016 the major source of revenue for cyber criminals was to<br />

sell the data they stole to anyone willing to pay. Put it all<br />

together and attackers can now turn hacked access to a<br />

company into two separate revenue streams.<br />

What's even more worrisome about these new ransomware<br />

campaigns is that victims now must assume the<br />

ransomware can and will transmit their confidential data over<br />

the internet. These incidents suddenly fall into the realm of<br />

mandatory data loss laws in California and Europe. The<br />

burden suddenly doubles on the victim, since they were<br />

ultimately responsible with safely storing personal data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


With all of this doom and gloom from ransomware, is there anything we can do? Luckily, the security<br />

basics still apply. Layered security is still important. Companies should secure their gateways with nextgen<br />

antivirus, intrusion prevention, DNS and URL filtering, and deep packet inspection. Credentials<br />

should be secured with multifactor authentication and endpoints should have up to date EPP and EDR<br />

solutions and be fully patched. To address ransomware directly, EPP or EDR solutions should have<br />

capabilities targeted at preventing ransomware, and organizations should also back up their critical files<br />

frequent. Lastly, the scare of having your data actually stolen, while nothing new, should be addresses.<br />

An old but effective solution, if you have the infrastructure to support it, is Data Loss Protection (DLP). If<br />

you have gateway or endpoint security solutions that support DLP, you might consider activating them to<br />

prevent your precious PII from being transmitted to the criminals.<br />

About the Author<br />

Ricardo Arroyo is the senior technical product manager and<br />

ThreatSync guru at WatchGuard Technologies, where is<br />

responsible for guiding the design and implementation of threat<br />

detection and response. Following a 15-year career at the NSA,<br />

where he worked as an analyst and cyber operator, Ricardo now<br />

uses his extensive offensive cyber security experience to solve<br />

complex security problems and develop the latest defenses for<br />

small and midsized enterprises. Ricardo can be reached online at<br />

https://www.linkedin.com/in/arroyoricardo/ and at our company<br />

website http://www.watchguard.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ditch Legacy Approaches – Reimagine Cloud Security<br />

Based on Virtualization<br />

By Avi Shua, CEO and co-founder, Orca Security; former chief technologist at Check Point<br />

Software Technologies<br />

Abstract: Humans are used to thinking in metaphors. While convenient, this limits our ability to innovate.<br />

Most cloud security solutions suffer from the same problem because they carry biases from the physical<br />

world. For cloud security to truly succeed, we need to stop iterating on tools designed for on-prem<br />

environments.<br />

Look at your keyboard. That odd QWERTY layout dates back to the invention of the manual typewriter<br />

over 150 years ago. The keys were positioned in such a way to prevent the type bars from jamming on<br />

their way to striking the paper.<br />

As technology advanced to computers, tablets, and smartphones, manufacturers continued to use the<br />

QWERTY keyboard layout. It’s crazy to think that 21st-century devices still carry the vestiges of a design<br />

from the mid-1800s.<br />

The problem is that we tend to think in metaphors (e.g., “the PC is the new typewriter”). This limits the<br />

ability to truly innovate and leverage new capabilities as technology evolves. It happens all the time.<br />

Unfortunately, the limitations of old tools can influence and constrain how we approach new problems.<br />

For software, this can lead to biased and suboptimal solutions for security, architecture, and performance.<br />

The consequences can be especially harsh when it comes to cybersecurity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Lifting Physical Security Measures to the Cloud Is a Failed Strategy<br />

Consider the days when on-premise datacenters were full of physical servers. To verify the security state<br />

of those machines, administrators had two options: run code on each via a software agent, or scan every<br />

system from the network to look for vulnerabilities, misconfigurations, and other risks. When businesses<br />

began to move their workloads to the cloud, these same security technologies were merely lifted and<br />

shifted.<br />

Organizations ended up having both an agent – the same agent from the on-prem days bolted on to the<br />

cloud – as well as the same scanners. But those tools weren’t reimagined to support the unique<br />

characteristics of cloud computing, thus the limitations of agents and scanners were magnified on the<br />

new platform.<br />

While agents can see everything that happens, they have to be installed on every machine to be scanned.<br />

This simply isn’t practical in a cloud environment that uses ephemeral servers, containers, and serverless<br />

workloads that burst into existence for a short time and then disappear just as quickly. No human—and<br />

perhaps not even automation tools—can keep track of software agents and ensure they’re consistently<br />

installed in such a dynamic environment. What’s more, the high cost and complexity of agent deployment<br />

and maintenance, as well as friction with DevOps teams, make agent-based scanning totally unsuitable<br />

for the cloud.<br />

As for network scanners—which are essentially whitelisted hacking tools—visibility is critically limited to<br />

just those assets that are already known and accessible. Moreover, scans put data integrity at risk, use<br />

significant system resources during test procedures, and completely miss some assets and risks because<br />

they simply aren’t visible or accessible.<br />

New Tools Address (Some) Cloud Security Needs<br />

With legacy security tools leaving gaps, new cloud-native tools attempt to fill the need to assess risk in<br />

cloud estates. For example, Cloud Security Posture Managers (CSPMs) verify that cloud configurations<br />

are following security best practices and compliance standards such as the CIS framework, Azure and<br />

GCP benchmarks, and PCI DSS or HIPAA guidelines. While CSPMs do look at configurations unique to<br />

cloud environments, at best they provide shallow coverage because they don’t go inside machines, but<br />

rather view them from the outside.<br />

Cloud platform hosts provide a number of security tools exclusive to their own environments. Amazon,<br />

Google, and Microsoft all offer tools/services to detect threats, analyze application security, investigate<br />

potential security issues, discover unprotected keys and sensitive data, identify non-compliance with<br />

security frameworks and regulations, and more. Third-party vendors also provide tools—many of them<br />

retreads from the on-premise environment—in each of these areas.<br />

The key issue with such tools is that they only provide a partial view into your cloud estate’s risks and<br />

vulnerabilities. An organization must deploy multiple tools or services to get the full picture, and even<br />

then it’s not a holistic view. Each tool performs its own vulnerability detection and getting them all to<br />

communicate with one another and provide clear context regarding each finding is nearly impossible.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The onus is on you to establish the context before beginning to understand and prioritize the risk, then<br />

ultimately address the vulnerabilities.<br />

In the network diagram below, two identical web servers that have the same vulnerability. Without context,<br />

how would you know which alert is an imminent threat and which is just informational?<br />

Cloud security is far too important to cobble together solutions and hope there aren’t any gaps. Clearly a<br />

new approach is needed.<br />

The Characteristics of the Ideal Cloud Security Solution<br />

A different mindset is required—one in which there are no assumptions regarding existing approaches<br />

as the only possible solutions. In completely reimagining how to discover and manage all possible risks<br />

across AWS, Azure, and GCP, the following characteristics of the ideal solution emerge:<br />

● Detect all important risks in an organization’s cloud environment—both workload and control<br />

plane—whether it’s a piece of vulnerable software, an infected workload, a misconfigured S3 bucket,<br />

a lateral movement risk, improperly secured keys, or unsecured PII—whatever the issue may be.<br />

● Integrate with any cloud environment in minutes—without any side effects on performance and<br />

availability, thereby eliminating organizational (e.g. DevOps) friction. It should do so without running<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


a single opcode on the customer environment and without sending a single packet—all while<br />

guaranteeing 100% coverage.<br />

● Prioritize alerts based on all available data, while presenting a manageable number of alerts.<br />

It makes no sense to 1) have a vulnerability management agent notify about 1,000 workloads at risk<br />

due to vulnerabilities, then 2) have to go to a CSPM to assess whether there is a real attack vector<br />

involved, followed by 3) having to install another distinct agent-based antivirus solution to detect<br />

existing compromises. That approach doesn’t work. The ideal solution must deliver the functionality<br />

of multiple tools out of the box and provide context-based actionable alerts—not “security concerns<br />

by the kilo.”<br />

A Breakthrough Technique for Deeper Cloud Inspection Across 100% of AWS, Azure, and GCP<br />

Assets<br />

Any solution based on these characteristics must leverage the cloud computing paradigm and abandon<br />

the biases of the physical computing world. It can be achieved by embracing virtualization instead of<br />

devices as the premise of inspection.<br />

Today’s cloud datacenter separates storage devices and compute devices, connecting them via highspeed<br />

fiber optics. This enables a unique approach to deep cloud asset inspection. Through the proper<br />

configuration of privileges and roles, it’s possible to take a “snapshot” of an organization’s bits and bytes<br />

of block storage, rebuild a read-only image of the full environment on the side (i.e., out of band), then<br />

scan through the resulting image to look for risks and vulnerabilities.<br />

This approach can see everything without the hassle of installing agents. It can scan the cloud<br />

configuration, network layout, and security configuration while reading into virtual machines’ disks,<br />

databases, and datastores, as well as logs for all of the cloud assets. It can analyze the data, build a fullstack<br />

inventory, and assess the security state of every discovered asset throughout the stack. All this,<br />

without impacting performance or availability.<br />

Here is the real value of this approach: All of this information can be combined with contextual information<br />

from the cloud infrastructure to gain a context-aware view of the findings—the true level of risk. Context<br />

is important because it helps alleviate alert fatigue on behalf of the security team. Actionable findings can<br />

be immediately prioritized and assigned to security engineers or DevOps developers for mitigation or<br />

follow-up.<br />

Upon completion of data analysis and reporting, the snapshot can simply be deleted without a trace.<br />

There is nothing to maintain or deprovision.<br />

Legacy approaches to security have no place in the cloud. It takes a new mindset that is free from the<br />

past to envision innovative solutions for complete cloud security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Avi Shua is the CEO and co-founder of Orca Security. He invented<br />

the patent-pending SideScanning technology upon which Orca<br />

Security is built. SideScanning uses novel, out of band, zero<br />

impact integration with the cloud virtualization layer to gain full<br />

visibility into those risks that matter most—vulnerabilities,<br />

malware, misconfigurations, weak and leaked passwords, lateral<br />

movement risk and improperly secured customer data. Learn<br />

more at<br />

Company Website: - https://orca.security/<br />

LinkedIn - https://www.linkedin.com/in/avishua/<br />

Twitter - https://twitter.com/orcasec?s=20<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Building a “Culture of Caring” for Clients<br />

By Jessica Smith, Senior Vice President, Crypsis Group<br />

When you work in a services industry, it’s natural to become frustrated when clients don’t do the<br />

fundamentals that could prevent significant problems down the line. In cybersecurity, we see it<br />

frequently—much of our business involves helping clients after they have had a significant cybersecurity<br />

incident. It’s possible that a doorway may have been left open for an attacker to enter, and in some cases,<br />

we may learn the root cause of the incident and know the issue could have been prevented.<br />

This frustration is common across many services-based businesses: The dentist treating gum disease<br />

on patients who neglect regular oral hygiene; the IT firm brought in to fix poorly maintained systems;<br />

plumbers called in to do thousands of dollars in repairs when a $100 fix a year ago would have averted<br />

the issue; law firms serving clients who made bad choices; auto mechanics repairing high-end vehicles<br />

that ran dry of oil.<br />

As experts in our field, we may know the steps that could have/should have been taken, and it can seem<br />

on the surface that clients can be their own worst enemies. But it’s important to remember that, no matter<br />

how passionate we may be about our business, our clients have many other concerns beyond<br />

cybersecurity, or dentistry, or plumbing, etc. What may be our core purpose in life is not theirs—and they<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


have budget and time constraints, knowledge gaps, competing priorities, even personal life challenges<br />

we know nothing about. Naturally, we know our field better than they do—that is why they come to us in<br />

the first place.<br />

In my field of cybersecurity, victims of breaches are often blamed (very visibly so, as large breaches can<br />

impact many thousands of people and end up in the news). As experts, however, we realize what they<br />

are up against: even with heavy financial investments, it is nearly impossible to mitigate every risk across<br />

the IT landscape, especially given their competing fiscal priorities. They have to make tough choices. In<br />

other fields, clients may be similarly challenged or lacking fundamental knowledge to address the basics<br />

needed to avert issues, both large and small.<br />

But, even if we know and understand some degree of client neglect may have been the source of their<br />

own woes, we must resist judgement and focus instead on helping them and caring about their current<br />

problem at hand. When companies come to us, they are often afraid—for their jobs, health, finances,<br />

business solvency, etc. What they need from their services professionals is knowledgeable assistance—<br />

and a healthy dose of empathy.<br />

Building a Culture of Caring: It Starts from the Top<br />

To be successful in creating a “culture of caring” for clients, it has to be driven from the leadership on<br />

down and cultivated throughout the employee base. It must become part of the company DNA, ingrained<br />

in how we hire, train, lead, communicate, and reinforce through the company culture. As leaders, we<br />

must ensure our employees across the business remember that “blaming” is not a company value, and<br />

that caring about people—both clients and coworkers—is. Even if it weren’t a simple human value to<br />

demonstrate caring, it certainly is a fiscal one: clients will return to companies that demonstrate<br />

compassion and shun those that make them feel judged for the problems for which they seek assistance.<br />

A Step-by-Step Approach<br />

Below are some concrete steps you can take to build a more compassionate culture:<br />

Lead by Example: Be a caring leader. By demonstrating that the company cares about their employees’<br />

overall wellbeing—beyond just their revenue-generating potential—you set an example of how you<br />

expect employees to treat each other. This includes soliciting feedback; demonstrating humility (we don’t<br />

have all the answers and should be willing to listen to better ideas); understanding that employees have<br />

personal lives; getting to know your employees on a personal level.<br />

Hire the Right People: Go beyond the resume to find people that fit your desired culture of caring. Hiring<br />

the smartest people won’t yield the best results if they are arrogant, disruptive, or harmful to employee<br />

dynamics and service orientation. Don’t be afraid to let the wrong people go if issues cannot be addressed<br />

with an adequate investment in coaching.<br />

Empathetic Coaching: Few employees enter the workplace without areas for improvement, and leaders<br />

aren’t exempt, either. When you see opportunities for employees to improve in their interactions with<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


clients and employees, guide them on better methods, but do so with empathy (and not punitively). By<br />

setting this example even in coaching scenarios, they will get the message of what is expected.<br />

Invest in Your Culture: In my experience, happy employees do, in fact, make happy customers. Focus<br />

on building a culture that includes rich offsite experiences not focused on work, volunteering events, a<br />

strong total rewards package, and employees from diverse backgrounds. However, having a strong<br />

culture has to go beyond the obvious benefits and team building events—it means creating a place where<br />

employees feel heard and can safely voice their opinions, ideas, and frustrations, and know that valid<br />

input will be acted upon.<br />

Employ Customer Satisfaction Programs: If you haven’t operationalized a Customer Satisfaction<br />

feedback program, it is highly recommended to gain feedback directly from clients on their interactions<br />

with staff. Share this feedback with all customer-facing personnel regularly, set goals around these areas,<br />

and track progress with the whole team.<br />

At the end of the day, services staff are people too. Frustration is understandable, especially when<br />

common mistakes with serious, preventable consequences are seen frequently. But it’s important to stay<br />

focused on the mission—helping clients and driving revenue. Demonstrating empathy helps accomplish<br />

both goals while improving the overall culture of the organization.<br />

About the Author<br />

Jessica Smith is the Senior Vice President of The Crypsis Group. Jessica<br />

is a veteran practitioner of digital forensics with an extensive record of<br />

involvement in complex civil and criminal cases, Jessica brings her<br />

experience and know-how to The Crypsis Group’s client engagements<br />

as well as helping direct the daily operations of the firm, focusing on<br />

professional service projects that allow Crypsis to continue to scale. She<br />

previously was Managing Director of Digital Forensics in Stroz<br />

Friedberg’s Washington, DC office, where she was responsible for comanaging<br />

the firm’s technical operations in the areas of computer<br />

forensics, cybercrime response, and incident handling. Over the course<br />

of her career, Jessica has provided expert testimony and performed<br />

forensic analysis of digital media in many challenging and high-profile<br />

cases. She has evaluated obstructive deletion activity in securities fraud<br />

cases, covertly acquired and analyzed media in cases involving theft of intellectual property, and<br />

identified and reconstructed deleted, fragmented digital DNA files relevant to a multiple homicide<br />

investigation and death penalty trial. A member of the American Academy of Forensic Sciences, she has<br />

presented at the group’s Annual Meeting and received its 2008 General Section Achievement<br />

Award.Jessica can be reached at our company website https://www.crypsisgroup.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Newsjacking COVID-19 and Other Common <strong>Cyber</strong>security<br />

PR Mistakes<br />

By Evan Goldberg, SVP and <strong>Cyber</strong>security Practice Group Director, ARPR<br />

If you were to reflect back to the beginning of the previous decade, you’d be hard pressed to remember<br />

more than a handful of cybersecurity stories per month outside of the industry trades. Aside from Stuxnet,<br />

there were relatively few cyber incidents that media deemed significant enough to warrant mainstream<br />

attention. And to be frank, the media’s interest in Stuxnet was probably less about cybersecurity and<br />

more about the national security implications of the U.S. and Israel conducting an intelligence operation<br />

within Iran’s borders.<br />

Fast forward to <strong>2020</strong> and there is absolutely no shortage of cybersecurity hacks, breaches, threats and<br />

vulnerability discoveries in the mainstream news on a daily basis. The evolution of press coverage has<br />

directly coincided with the rather dramatic increase in cyberattacks of consequence to the critical mass.<br />

From a cybersecurity perspective, it’s certainly an interesting time to be alive.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To rapid response or not to rapid response - that is the question<br />

To unearth cybersecurity stories, reporters are tipped off by security analysts, white hat hackers,<br />

penetration testers, government agencies, PR flacks and yes, even cybersecurity vendors like you.<br />

Over the years, cybersecurity PR professionals have developed a reputation for overly aggressive media<br />

relations efforts that are sometimes void of the best practices proven to build and sustain journalist<br />

relationships. This is particularly true with newsjacking, a rapid response media relations technique in<br />

which brands attempt to insert their key messages and thought leadership into the narratives that are<br />

consuming the news cycle at a specific point in time.<br />

The appeal of newsjacking is understandable. When successful, newsjacking can bestow brands with<br />

invaluable third-party validation and heightened perception during times when people are focused intently<br />

on an issue of relevance.<br />

However, the misapplication of newsjacking by a vocal minority has stigmatized the cybersecurity<br />

industry as a whole. Currently, there are far too many examples of prominent cybersecurity reporters<br />

showcasing frustration by the continuance of overtly promotional, unfitting and off-topic pitches<br />

penetrating their inboxes. For context, it is not uncommon for influential journalists to receive 50-100<br />

pitches each day and only have use for one.<br />

COVID-19 epitomizes cybersecurity’s newsjacking predicament perfectly. While some cyber companies<br />

have found success in penetrating the coronavirus narratives via strategic rapid response, many others<br />

have drafted pitches that have fallen on deaf ears. Why? While I don’t have all of the answers, I can<br />

surmise that far too many brands likely pursued journalists with subjective speculation and unproven<br />

claims about the origins of pandemic-themed phishing attacks and advertorial points of view about how<br />

to mitigate the increasing risk.<br />

For media, such pitches often trigger an immediate delete, as the messages’ contents lack the objective<br />

intel and information that add credibility and uniqueness to stories that are shaping the news cycle.<br />

Inadvertent missteps linked to cybersecurity’s competitiveness and growth<br />

There is undoubtably the potential for long-term reputational impacts to cybersecurity brands that<br />

continuously newsjack inappropriately. Hopefully, those at fault will soon realize that it’s often more<br />

advantageous to withhold from engaging in rapid response except for instances when your company is<br />

uniquely positioned to respond objectively.<br />

But the misuse of rapid response isn’t the only PR mistake that can negatively impact a brand’s equity,<br />

perception and pipeline.<br />

Today’s cyber marketers are frequently tasked with accelerating brand awareness and lead generation -<br />

often at a clip much faster than what they are accustomed to. This is especially true for marketers new<br />

to cybersecurity, since the industry’s intense pace and variability cannot be simulated in a classroom or<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


during an onboarding session. For cyber marketers, the need to act quickly and with conviction can cause<br />

unfortunate mistakes to be made, misconceptions to flourish and high ROI tactics to be overlooked.<br />

These are some of the most common mistakes in cybersecurity PR, along with an objective<br />

explanation as to why each misstep should no longer be overlooked:<br />

• Over-pitching products - Most cybersecurity reporters cannot or do not want to write about a<br />

company’s self-described “revolutionary” product. In fact, more than 90% of today’s<br />

cybersecurity news spans just four topics: 1) zero days and threat discoveries, 2) surveys and<br />

proprietary data, 3) transaction news (funding, M&A, partnerships, etc.), and 4) national<br />

security.<br />

• Forgetting SEO - Sometimes cybersecurity marketers get persuaded by product teams and<br />

other decision makers to message and position products using terminology that is not consistent<br />

with what buyers are actually searching for. This is counterintuitive to demand generation and<br />

can damage a brand’s searchability among competitors.<br />

• Category hopping - The temptation to hop from category to category in cybersecurity is<br />

compelling, and perhaps there is an argument for doing so that does make sense. But from a<br />

media, analyst and buyer’s perspective, nothing looks more suspicious than a perceived knee<br />

jerk reaction to switch sectors and subject matter with the change of the news cycle.<br />

• Presuming customers and partners are a “No” - As cyberattacks become more mainstream,<br />

companies are beginning to find it advantageous – both from a reputational and competitive<br />

standpoint - to be more forthcoming with their threat mitigation strategies. So, the next time you<br />

need third-party validation, don’t let the perils of presumption prevent you from making the ask.<br />

• Devaluing awards - It can be harder to track the overall business impact of industry awards,<br />

which is why this budget line item is usually the first to be cut. However, research reveals that<br />

award winners have 37% more sales growth compared to others. Aside from the positive impact<br />

on revenue, awards are also very important to help recruit top talent, provide competitive<br />

intelligence, and bolster SEO.<br />

• Underrating executive social media - In such a competitive industry, the lack of executive<br />

social media is a significant missed opportunity. Not only does the authenticity of executive<br />

visibility lead to greater engagement, but it can be the competitive differentiator needed to<br />

propel your brand from a prospect’s consideration phase to purchase. In fact, 83% of executives<br />

that chose a vendor in 2018 used social media in their decision-making process.<br />

• Undervaluing thought leadership - Demand for thought leadership is high, and vendor neutral<br />

articles present realistic opportunities for brands to insert themselves into publications that are<br />

otherwise difficult to penetrate. More importantly, 82% of c-suite and business decision makers<br />

say that thought leadership increases their trust in an organization.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In a highly competitive industry such as cybersecurity, marketers must understand how to optimize all<br />

public relations opportunities to their advantage. But to successfully do so requires debunking lingering<br />

misconceptions, embracing important best practices and challenging conventional ways of thinking. And<br />

after reflecting on this article, it is my hope that all cybersecurity marketers feel empowered to do just<br />

that.<br />

About the Author<br />

Evan Goldberg is the senior vice president of client service at ARPR and<br />

the director of its cybersecurity practice group, which in 2019 was named<br />

the Best Overall PR Firm for InfoSec Companies.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


New Expectations for the Network Perimeter<br />

Patchwork network of legacy solutions won't keep bad actors out<br />

By Barrett Lyon, Co-founder and CEO, Netography<br />

U.S. government agencies are placing increased importance on cross-network visibility for cloud and onprem<br />

environments and, with that, the significance of having shared visibility and traffic analysis across<br />

networks for real-time detection and remediation is moving to the forefront.<br />

Help or hindrance?<br />

No one can accuse the government of rushing into anything, and security is no exception. In recent years,<br />

however, there has been a noticeable acceleration of security initiatives as the import of a robust cyber<br />

defense plays out on a global stage. Dating back to the establishment of the American Technology<br />

Council in 2017 to the creation the following year of the <strong>Cyber</strong>security and Infrastructure Security Agency<br />

(CISA), government entities have been moving at relative warp speed (note, I said relative) to safeguard<br />

those assets that are deemed essential by the Federal government.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Over the course of this journey, the one thing that has become apparent is that a patchwork network of<br />

legacy solutions isn’t up to the task of keeping the bad actors out. What passed for high tech 15 years<br />

ago is now acting as a hindrance rather than a help. Reliance on legacy systems comes with a list of<br />

disadvantages as long as your arm – everything from unpatched vulnerabilities and point products no<br />

longer suited to today’s environment to cost inefficiencies and a lack of personnel trained to use the<br />

products. These impediments translate into security vulnerabilities that turn government agencies into<br />

sitting ducks from a cybersecurity standpoint. Moreover, legacy solutions are incapable of protecting<br />

dynamically and are limited in the kinds of attacks they can detect and stop.<br />

Unfortunately, the government has lagged behind in adopting new and innovative technologies due, in<br />

part, to a lengthy approval process before a vendor can be sanctioned to work with the Federal<br />

government. Luckily, that’s starting to change. The Department of <strong>Defense</strong> (DoD) has come to recognize<br />

the importance of utilizing pioneering technologies from private-sector companies, as have various<br />

branches of the military. To that end, a grant program through AFWERX and the Small Business<br />

Innovation Research has been developed to foster innovation and speed the vetting process, in effect<br />

giving grant recipients the green light to partner with entities from within the DoD.<br />

Novel times, novel measures<br />

Today’s novel Work from Home (WFH) situation calls for novel security solutions. Thanks to a massive<br />

exodus of workers from the walls of their office buildings to the walls of their homes, the network perimeter<br />

has all but vanished. Remote workers, the use of unsanctioned equipment (that’s also likely to be running<br />

an outdated security solution, assuming it has one at all), data scattered across different locations, and<br />

a variety of cloud services mean but one thing: Shared, cross-network visibility is a must.<br />

Lacking shared visibility and traffic analysis across your network means you are foregoing the chance for<br />

real-time detection and remediation. And while some cloud solutions may bill themselves as offering<br />

“real-time” analytics, if you want to detect and remediate as events happen rather than hours or days,<br />

out-of-the box solutions aren’t going to cut it.<br />

Like enterprises, government entities need real-time protection against millions of network-based threats<br />

across their entire infrastructure, whether it’s on-premises, in the cloud, or a hybrid environment. Today’s<br />

WFH challenges mean an unprecedented number of end-users in remote locations. This makes it even<br />

more critical that network systems utilizing Virtual Private Networks (VPNs) — which by all accounts<br />

come with their own set of security issues — are monitored for any anomalies or known threats that might<br />

be present on the network as a result of using the VPN.<br />

To be truly effective, a system needs to offer network and security teams shared visibility into their<br />

security posture at any — and every — point in time. As government agencies begin to take advantage<br />

of enterprise solutions, they need to ensure that they aren’t simply patching a one legacy solution with<br />

yet another only to cause more problems down the road. Solutions should break down the silos rather<br />

than establish new ones.<br />

Because of the highly sensitive nature of government data, it’s especially important that a security solution<br />

also offers high-performance processing power. This allows complex algorithms to run in real-time, and<br />

means automatic remediation translates into a significant reduction in mean-time-to-repair. Another<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


feature to look for is single-pane view of traffic flow, whereby agencies get full network visibility of cloud<br />

and on-premises devices with minimal effort.<br />

There are new expectations for the network perimeter. Isn’t it time your network security solution provides<br />

them?<br />

About the Author<br />

Barrett Lyon is the co-founder and CEO of Netography, whose Security<br />

Platform provides cross-network visibility, encompassing cloud and onpremises<br />

environments. His experience and successes have led to<br />

collaboration with Tier 1 and Tier 2 carriers, as well as national security<br />

agencies in North America and Europe to mitigate and track hundreds of<br />

DDoS attacks. He holds multiple technology patents and is a pivotal<br />

subject in the best-selling cybersecurity book, Fatal System Error. Barrett<br />

can be reached online at @BarrettLyon and at our company website<br />

https://netography.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Devil Inside<br />

Insider Threats on the rise<br />

By Mary Roark, VP of Marketing, <strong>Cyber</strong>haven<br />

With growing economic uncertainty all indicators point to a sharp increase in insider threats across all<br />

industries. There has been mounting pressure on security and IT teams who are overwhelmed with alerts<br />

and lack the appropriate tools to combat insider threats. The situation has worsened with the COVID<br />

crisis requiring more employees to work from home, many from unsecured devices, as organizations and<br />

their employees adapt to the new normal. The economic uncertainty adds fuel to the fire.<br />

58% of organizations consider themselves only somewhat effective or worse at combating insider threats.<br />

The <strong>2020</strong> Insider Threat Report by <strong>Cyber</strong>haven and <strong>Cyber</strong>security Insiders reveals the latest trends and<br />

challenges facing organizations in this new environment and how IT and security professionals are<br />

tackling insiders. Only 12% thought their organizations were extremely effective at monitoring, detecting<br />

and responding to insider threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The devil is inside<br />

60% of respondents believe detecting and preventing insider attacks is more difficult than external<br />

attacks. Why is it more difficult? It is more difficult because employees can easily hide behind their normal<br />

tasks. Accidental and careless leaks are the hardest to detect. While 53% are worried about contractors,<br />

an almost equal 50% is worried about employees. Many users have access to more sensitive information<br />

in a world of new collaboration apps and cheap cloud storage.<br />

The devil collaborates<br />

42% of organizations consider collaboration and communication applications (email, messaging, etc) to<br />

be a root cause of insider threats. Employees readily share information in the spirit of collaboration but<br />

sometimes are not careful and data is exposed via applications that are not secured. Productivity is king,<br />

especially in today’s world so any tool that improves productivity is quickly adopted. IT and Security are<br />

not able to vet platforms or educate users on best practices.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The devil lives the cloud<br />

39% consider cloud storage and file sharing apps (Dropbox, OneDrive, Office365, etc), most vulnerable<br />

to insider attacks. These apps enable easy transfer of sensitive data in bulk so it is not surprising that<br />

they can quickly expose sensitive data.<br />

The devil is an employee<br />

Employees who are nervous about job security start to gather and stockpile examples of their work, a<br />

valuable report, a presentation template they hope to reuse - but in many cases they are putting valuable<br />

company information at risk by sending it to their personal email or putting information on public cloud<br />

shares. The majority of insider threat tools rely on monitoring employees. Companies rely on tools to<br />

record every action taken by an employee while using company resources. For many this feels like an<br />

invasion of privacy. But for many who work in call centers, help desks, and industries like banking with<br />

heavy regulation this is the new norm.<br />

UEBA which monitors user behavior try to establish a baseline of user behavior and highlight anything<br />

that is out of the norm. 36% of organizations are exploring UEBA solutions to tackle insider threats.<br />

Unfortunately, UEBA solutions require time to establish a baseline which reflects normal behavior. What<br />

is the normal now? Without a strong baseline, security teams are overwhelmed by false positives.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The devil wants your data<br />

Organizations are flying blind to how much data is leaving the perimeter. Many enterprises continue to<br />

struggle with DLP for insider threat scenarios. DLP challenges include: difficulty keeping policies up to<br />

date at the rate of business needs (27%), limited data/file visibility (25%), and too many false positives<br />

(23%). Further, DLP tools are cost-prohibitive for 37% of organizations, while many lack the necessary<br />

staff to implement (42%) and maintain (32%) them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


36% of organizations are looking at Data Behavior Analytics (DaBA) to gain visibility into data movement<br />

without cumbersome policies and a large security team. With <strong>Cyber</strong>haven, an innovator of DaBA, security<br />

teams get real-time visibility into the movement of intellectual property as it travels across cloud and onpremises<br />

environments — revealing intent of data exfiltration and exposing both careless and malicious<br />

insider threats.<br />

About the Author<br />

Mary Roark is VP of Marketing at <strong>Cyber</strong>haven. She has extensive<br />

security experience at RSA, Sophos, and Veridium across network,<br />

mobile and identity management. She has an Electrical Engineering<br />

degree and an MBA from Stern.<br />

Reach out to Mary at https://www.linkedin.com/in/maryroark or our<br />

company website http://www.cyberhaven.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Digital Healthcare: How Secure Is the Care Data?<br />

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India<br />

Abstract<br />

Digital revolution has changed the way organizations work; the healthcare industry is no exception.<br />

Technologies like cloud computing, big data, analytics, Artificial intelligence has transformed the way<br />

data is stored and analysed. Healthcare data contain sensitive information about an individual making it<br />

a unique situation as compared to other industry. Thus, the security of this care data becomes critical<br />

and needs consideration. The objective of this paper is to understand the information systems used by<br />

the healthcare industry and the kind of threats they face. Finally, what kind of steps organizations should<br />

take to ensure the security of carte data.<br />

Introduction<br />

From paper-based medical records to wearable medical devices, technology has played a crucial role in<br />

changing the healthcare landscape drastically over the past few years. Introduction of technologies such<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


as cloud computing, big data, Internet of Things (IoT), mobile applications, and analytics are the force<br />

behind this digital revolution in healthcare. On one hand it has changed the way patients receive care<br />

be it tracking doctor’s appointment online, monitoring vitals through mobile-based health applications, or<br />

consulting doctors through telemedicine. While on the other hand availability of electronic health records<br />

(e.g. patient’s medical history, lab reports, etc.) has also helped doctors in making better and informed<br />

medical decisions. Thus, making it a win-win situation for two key stakeholders in the healthcare industry.<br />

As we can see whether it is providing or receiving care every decision requires one crucial component<br />

i.e. data. This is where technology comes into the picture. The exact role of technology in healthcare is<br />

to provide solutions where data is stored in a structured form, as well as it should be available anytime,<br />

anywhere through various devices either for quick reference or for decision making. Technology which is<br />

providing strength to the data in healthcare is also the one which is making it more vulnerable. Let’s look<br />

at one of the headline<br />

“HIV status of over 14,000 people leaked online, Singapore authorities say” 1 (CNN, Jan 29, 2019)<br />

Scary, right!<br />

Healthcare industry has witnessed a surge in the cyberattacks in the past few years. According to Statista<br />

medical/healthcare organizations has been the second-most attacked industry with 366 data breaches<br />

after businesses with the majority (571) breaches out of total 1244 data breaches reported during 2018 2 .<br />

Healthcare is attracting more cybercriminals for being more lucrative than any other industry.<br />

Interestingly, personal health information is 50 times more valuable on the black market than financial<br />

information, and stolen patient health records can fetch upwards of $60 per record (which is 10-20 times<br />

more than credit card information) 3 . Further, the weekly or daily frequency of cyberattacks on healthcare<br />

organizations is 39 percent as compared to financial organizations which stand at 34 percent 4 .<br />

The kind of cyberattacks faced by healthcare organizations varies from ransomware, malware, phishing,<br />

to insider errors. What makes this situation unique is that the impact of these cyberattacks not only put<br />

patient data at risk but also disrupt the healthcare service provider’s ability to provide care to the patients.<br />

Thus, leading to situations where the loss may not be limited only to money or data but a life.<br />

1<br />

https://edition.cnn.com/2019/01/28/health/hiv-status-data-leak-singapore-intl/index.html<br />

2<br />

https://www.statista.com/statistics/273572/number-of-data-breaches-in-the-united-states-by-business/<br />

3<br />

https://cybersecurityventures.com/cybersecurity-almanac-2019/<br />

4<br />

https://www.radware.com/ert-report-2018/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Looking at these statistics we can see that there is an urgent need for designing and implementing<br />

efficient data security controls in healthcare. To understand these issues, we first need to look at the<br />

landscape of healthcare and what makes it vulnerable. Why hackers want health data? And what can be<br />

done to ensure the security of data.<br />

Healthcare industry and information technology<br />

Last decade has witnessed a drastic change in the fundamental business processes in the healthcare<br />

industry. Global health care expenditures are expected to continue to rise as spending is projected to<br />

increase at an annual rate of 5.4 percent between 2017-2022, from USD $7.724 trillion to USD $10.059<br />

trillion 5 .Key stakeholders of healthcare i.e. patients, providers, payors, and policymakers (4P’s) 6 are now<br />

looking for innovative patient care services which are cost-effective, technology-enabled, easy to access<br />

and avail anywhere breaking the boundary of hospital walls. The healthcare environment is becoming<br />

more and more complex wherein patient care service are now not limited to hospitals but also at their<br />

home which may be in a different city or even a different country. Healthcare service providers such as:<br />

doctors, nurses, pharmacists, administrative staff, technologists and technicians, therapists work in<br />

different locations and use different information systems to manage healthcare data at their end. Payors<br />

in healthcare are entities (e.g. insurance providers) that take care of the financial aspect of health<br />

services which involves processing of patient eligibility, services, claims, enrollment, or payment 7 . Finally,<br />

policymakers are the one who establishes the framework within which health care is provided to the<br />

country's citizens. It is evident that there is a strong relationship between these key stakeholders which<br />

entirely depends on the collaboration of data which in turn is becoming a driving force behind the adoption<br />

of healthcare information systems (HIS).<br />

Technologies such as cloud computing, Big data, virtual reality, artificial Intelligence and analytics have<br />

played a significant role in the evolution of healthcare information systems (HIS). These technologies are<br />

used to provide a networked HIS wherein data from each stakeholder of the healthcare industry can be<br />

stored and shared for compilation, analysis and synthesis, and communication and use 8 . The global<br />

healthcare information systems market size is expected to reach USD 169.2 billion by 2025, registering<br />

a 7.7% CAGR during the forecast period 9 .<br />

5<br />

https://www2.deloitte.com/global/en/pages/life-sciences-and-healthcare/articles/global-health-care-sector-outlook.html<br />

6<br />

https://jln1.pressbooks.com/chapter/3-introducing-the-key-stakeholders-patients-providers-payors-and-policymakersthe-four-ps/<br />

7<br />

https://blog.definitivehc.com/top-healthcare-payers<br />

8<br />

https://www.who.int/healthinfo/statistics/toolkit_hss/EN_PDF_Toolkit_HSS_InformationSystems.pdf<br />

9<br />

https://www.researchandmarkets.com/research/jvdvpz/the_global?w=5<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Healthcare information systems market comprises of various healthcare solutions targeting different<br />

stakeholders. It can range from Practice Management systems (PMS), Electronic Health Record (HER),<br />

Electronic Medical Record (EMR), Patient Engagement solutions, Revenue cycle management,<br />

Pharmacy information system, Laboratory information system, to the medical imaging system. Table 1<br />

presents a summary of these tools and key players. With the advance technologies cloud computing it is<br />

possible to integrate these systems to provide care services which are more efficient in terms of<br />

collaboration, operations and cost.<br />

Table 1. Types of healthcare information systems<br />

System Application Examples<br />

Practice Management<br />

Systems (PMS)<br />

PMS are used to streamline the<br />

administrative workflow of practice<br />

(e.g. hospital).<br />

AdvancedMD,<br />

Advanced Data<br />

Systems<br />

Electronic Medical Records<br />

(EMR)<br />

Electronic Health Records<br />

(EHR)<br />

An electronic medical record (EMR) is<br />

a single practice’s digital version of a<br />

patient’s chart. An EMR contains the<br />

patient’s medical history, diagnoses<br />

and treatments by a physician, nurse<br />

practitioner, specialist, dentist,<br />

surgeon or clinic.<br />

EHRs are built to share information<br />

with other health care providers and<br />

organizations – such as laboratories,<br />

specialists, medical imaging facilities,<br />

pharmacies, emergency facilities, and<br />

school and workplace clinics – so they<br />

contain information from all clinicians<br />

involved in a patient’s care.<br />

Epic, Allscripts<br />

eClinicalWorks,<br />

Cerner<br />

Patient<br />

solutions<br />

engagement<br />

Patient engagement software is an<br />

electronic system designed to<br />

communicate with patients, provide<br />

educational resources, or manage the<br />

patient-provider relationship.<br />

NextGen<br />

Healthcare,<br />

AdvancedMD<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Revenue<br />

management<br />

cycle<br />

Revenue cycle management (RCM) is<br />

the financial process, utilizing medical<br />

billing software, that healthcare<br />

facilities use to track patient care<br />

episodes from registration and<br />

appointment scheduling to the final<br />

payment of a balance.<br />

Athenahealth,<br />

Convergent<br />

Pharmacy<br />

System<br />

Information<br />

Assists pharmacists to manage the<br />

medication process.<br />

Laboratory<br />

Systems<br />

Information<br />

A laboratory information system (LIS)<br />

is a software system that records,<br />

manages, and stores data for clinical<br />

laboratories.<br />

Sunquest<br />

Information<br />

Systems, SSC Soft<br />

Computer<br />

Medical<br />

Imaging<br />

Information System<br />

Tracking billing information and<br />

radiology imaging.<br />

Softneta, eMedica<br />

Security issues in healthcare<br />

Today healthcare industry relies a lot on technology solutions that are connected and accessible through<br />

the internet. These networks aide providers and payors in making a quick and efficient decision so the<br />

care can be provided with better efficiency. But we cannot oversee the fact that these technologies or<br />

networks are also making the healthcare industry a soft target for cybercriminals and hackers for wrong<br />

motives.<br />

What is at risk?<br />

Yes, you guessed it right, data. As mentioned in Table 1 there are various types of healthcare information<br />

systems that can be used by providers or payors to manage data of different entities. First, the key data<br />

in healthcare is of the patient which will include personal information such as name, address, social<br />

security number, contact details, date of birth and health data like illnesses and hospitalizations, allergies<br />

and adverse drug reactions, medications and dosing, surgeries, clinical data etc. Second, financial data<br />

i.e. bank account number, credit card details etc, which patients may have used to make payments using<br />

their credit cards or online banking etc. Third data regarding claims settlement with payors. Finally, it can<br />

be the Intellectual healthcare data regarding medical research, patents, etc.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What is the motive?<br />

First and foremost, the main reason for data breaches is to make a lot of money by selling patient health<br />

data. In deep web marketplaces medical health record is expected to be worth hundreds or even<br />

thousand dollars as compared to the credit card or social security number which are around 25 cents and<br />

10 cents respectively 10 . Further data can be used to make money by creating duplicate credit cards and<br />

conducting frauds. Another scenario may be medical identity theft wherein patient’s data can be used by<br />

someone else for receiving medical treatment, drugs or submitting false claims for medical services.<br />

Finally, the motive can be to damage the healthcare provider’s brand or business by hacking the<br />

intellectual property and selling it to the competitors.<br />

What type of security threats are there?<br />

Hackers and cybercriminals have been keeping the IT security companies on toes. It will not be wrong to<br />

say that as compared to organizations they are the ones using new technologies for devising new ways<br />

to do the crime.<br />

a) Ransomware and other malware<br />

In Nov 2018, two hospitals owned by Ohio Valley Health Services & Education Corporation (Ohio Valley<br />

Medical Center in Wheeling and East Ohio Regional Hospital in Martins Ferry, Ohio) became the victim<br />

of ransomware attack. This attack impacted the emergency functions of medical care as they were forced<br />

to shut down their IT systems.<br />

“At the moment, our emergency rooms are unable to take patients by E-squads, but we can take patients<br />

by walk-in 11 ,” (Karin Janiszewski, director of marketing and public relations for EORH and OVMC, 25 Nov<br />

2018)<br />

Ransomware attack in healthcare has serious implications as they can be used to hijack information<br />

systems as well as the medical devices connected through the network or even shut down the entire<br />

medical facility until the ransom is paid. Out of all the industries healthcare is one of the top industries<br />

targeted by ransomware attack i . Moreover, 18 percent of medical devices have been the target of<br />

malware attacks in last year ii .<br />

10<br />

https://www.forbes.com/sites/mariyayao/2017/04/14/your-electronic-medical-records-can-be-worth-1000-tohackers/#3c11158050cf<br />

11<br />

http://www.timesleaderonline.com/news/local-news/2018/11/hospitals-patient-information-safe-in-eorh-ovmccomputer-attack/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


) Phishing<br />

On August 20, 2018, Portland, Oregon-based Legacy Health notified 38,000 patients that a phishing<br />

attack might have breached their data iii . Further their investigation revealed that unauthorized third party<br />

gained access to some of the email accounts of employees that may have contained some patient<br />

information e.g. patients’ name, dates of birth, health insurance information, billing information, medical<br />

information regarding care received at Legacy Health and, in some cases, social security numbers and<br />

driver’s license numbers.<br />

In a phishing campaign, an attacker poses as a legitimate person or entity in an email to get the target to<br />

provide valuable information, such as credentials, or click on a link that results in ransomware being<br />

downloaded on the victim’s machine. Employees who are not careful may click on the link or provide<br />

confidential details which may lead to fraud. According to the study conducted by Cofense “Payment<br />

Notification” emerged as the top healthcare phishing attack Subject iv .The 2018 Verizon data breach<br />

report revealed that phishing attacks are not only prominent, they’re also on the rise, with 43% of data<br />

breaches stemming from such incidents v .<br />

c) Insider threats<br />

On Jan 20, 2016, Wall street journal reported that five people, including two former research scientists of<br />

the pharmaceutical giant GlaxoSmithKline (GSK), were charged in the U.S. with scheming to steal trade<br />

secrets and sold them to the organizations operating in China vi . The stolen data included intellectual<br />

property such as information regarding the research development of multiple biopharmaceutical products.<br />

In 2018, both scientists pleaded guilty to committing intellectual property theft, but the exact amount of<br />

financial damage has yet to be calculated. Additionally, insider threats not only include employee stealing<br />

data but vary from incidents happening due to error or carelessness to theft of employee laptop containing<br />

confidential data vii .<br />

d) Technology management issues<br />

On Dec. 26, 2018, UW Medicine reported that misconfigured database lead to the exposer of patient data<br />

on the internet for several weeks. The exciting part is that breach was discovered by a patient looking for<br />

his own name on google and ended up finding the data related to UW medicine files containing patients’<br />

names, medical record numbers, and a description and purpose of the information viii . Other than<br />

misconfigured databases or servers, lack of appropriate IT security implementation in the organization or<br />

IT vendors who are providing or managing IT solution on your behalf may be the reason for a data breach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In addition to that usage of cloud platform by the HIS providers is also increasing the risk of security of<br />

data.<br />

e) Risks of using Internet-enabled connected healthcare devices<br />

With the introduction of the Internet of Medical Things (IoMT) has made it possible to provide real-time<br />

care to the patients can save lives in emergency situations like heart-failure, asthma attacks, or diabetes.<br />

IoMT devices can collect real-time data regarding blood sugar levels, blood pressure, heartbeat etc.<br />

which can be monitored by the care provider to make decisions regarding medication. Continuous<br />

Glucose Monitor, Closed-loop (automated) insulin delivery system, smart inhaler, Bluetooth-enabled<br />

coagulation system are a few examples of IoMT systems in healthcare. The market of IoMT is growing<br />

and is expected to drive nearly $47 billion in revenues in healthcare revenue by <strong>2020</strong> ix . With convenience<br />

comes the cost. The cost here is the risk of loss of very personal health data captured by these devices<br />

which are stored using cloud platforms. In one of the cases in 2018, a fitness tracking application Strava<br />

which is used to track and share daily exercise routes by individuals revealed the sensitive information<br />

about the location of US army bases x .<br />

In sum, security risks faced by healthcare information systems range from ransomware, malware attacks,<br />

phishing, a threat from inside actors such as employees, HIS solution providers or maybe the technology<br />

mismanagement. Table 2 lists some of the significant breaches to understand that these attacks are not<br />

just limited to a specific type of attack, specific geography or a variety of healthcare information system.<br />

Table 2: Major attacks faced by the Healthcare industry<br />

S.N<br />

o.<br />

Year Organizatio<br />

n<br />

Type of breach Impact Reference<br />

1 Mar<br />

ch<br />

201<br />

9<br />

Meditab,<br />

California<br />

Fax server wasn’t<br />

properly secured i.e.<br />

no password, giving<br />

access to anyone<br />

who could read the<br />

transmitted faxes in<br />

real-time.<br />

Thousands of records<br />

leaked including<br />

medical records,<br />

doctor’s notes,<br />

prescription amounts<br />

and quantities, as well<br />

as illness information,<br />

such as blood test<br />

results etc. The faxes<br />

also included names,<br />

addresses, dates of<br />

https://techcru<br />

nch.com/2019/<br />

03/17/medicalhealth-dataleak/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


irth, and in some<br />

cases Social Security<br />

numbers and health<br />

insurance information<br />

and payment data.<br />

2 May<br />

201<br />

8<br />

Rush<br />

University<br />

Medical<br />

Center,<br />

Chicago,<br />

USA<br />

An employee from<br />

billing department<br />

disclosed a file to an<br />

unauthorized party<br />

Names, addresses,<br />

birth dates and Social<br />

Security numbers of<br />

45,000 patients were<br />

exposed<br />

https://www.go<br />

vtech.com/sec<br />

urity/Medical-<br />

Center-Data-<br />

Leak-May-<br />

Have-<br />

Exposed-45K-<br />

Patients.html<br />

3 Oct<br />

201<br />

8-<br />

Mar<br />

201<br />

9<br />

Secur<br />

Solutions<br />

Group<br />

(SSG), a<br />

vendor of<br />

the Health<br />

Sciences<br />

Authority<br />

(HSA),<br />

Singapore<br />

Accessed<br />

from<br />

system<br />

illegally<br />

vendors<br />

Personal information of<br />

more than 800,000<br />

blood donors exposed<br />

online<br />

https://www.ch<br />

annelnewsasia<br />

.com/news/sin<br />

gapore/blooddonorsinformationexposedonline-hsa-<br />

11349308<br />

4 Dec<br />

201<br />

8<br />

UW<br />

Medicine,<br />

Washington<br />

A misconfigured<br />

database which was<br />

the result of a coding<br />

error<br />

Data of around<br />

974,000 individuals<br />

was exposed on the<br />

internet<br />

https://www.ba<br />

nkinfosecurity.<br />

com/misconfig<br />

uration-leadsto-majorhealth-databreach-a-<br />

12042<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Steps to be taken to ensure the security of data<br />

Looking at the increasing number of data breaches in healthcare over the years raise the alarm for<br />

healthcare organizations to take strong measures to deal with the situation and ensure that they should<br />

be ready to deal with these threats. They need to change their approach from being reactive to proactive<br />

in their approach to deal with the situation. Some of the actions they may take are as follows:<br />

a) Raising awareness of vulnerabilities and threats among users<br />

Users are the one posing major threat to any information systems. Users in case of healthcare information<br />

systems include patients, hospital staff, doctors, nurses, therapist etc. who are using the systems to store,<br />

retrieve or analyse care data. Any human error or carelessness in using a system may lead to data<br />

breach. Thus, healthcare organizations should ensure that they provide training to the employees with<br />

respect to the usage of HIS as well as what are the risks associated with them. Users should have a clear<br />

understanding of what kind of data they are dealing with and how sensitive the data is and what steps<br />

they should take to ensure that none of their actions should cause the breach. It may be as simple as<br />

ensuring that they log off from the system after using it, don’t share their login credentials even with peers<br />

and keep their laptop safe. The awareness regarding the security should not be one-time activity, users<br />

should be reminded again and again over a period for better results.<br />

b) IT Compliance<br />

Organizations that follow security compliance are always at lower risk and better prepared to deal with<br />

security threats. NIST, HITRUST, Critical Security Controls, ISO, COBIT are few examples of the IT<br />

security frameworks followed by organizations all over the world. In a 2018 HIMSS <strong>Cyber</strong>security Survey,<br />

NIST was identified as the most popular framework adopted by 57.9 percent of the healthcare<br />

organizations. The guidelines for security standards differ from country to country for example ISO 27001<br />

is applicable internationally while HIPAA is applicable in the United States.<br />

The benefit of compliance to any security standard ensures that proper measure has been taken by the<br />

organization to safeguard the data. In addition to that they also have well-defined procedures for risk<br />

management and business continuity in the organisation.<br />

c) Using Artificial intelligence-based security solutions<br />

Latest trends in IT security is the use of artificial intelligence-based security solutions. The benefit of using<br />

AI-based solutions is that they have the capability of identifying any unusual activity or behaviour in the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


organizational network and raise the alarm. This can help IS security managers in taking preventive steps<br />

to stop the breach. In addition to that there are automatic AI-based response systems are available that<br />

can handle any incident and act without human intervention. In case of healthcare organizations need to<br />

invest in AI-based solutions because it can help them in saving a lot of cost due to the data breach.<br />

Conclusion<br />

Though data is an important asset for any industry but in case of healthcare it poses unique challenges<br />

as discussed. Ensuring the security of data in healthcare is not the responsibility of just one stakeholder<br />

but everyone must do their part to make it work be it patient, provider, payor or policymaker. Healthcare<br />

information systems can’t operate in isolation they need an integrated approach to provide efficient<br />

collaboration and communication between information systems used by different providers. In case any<br />

one of the links in the network is weak the ball will be in the court of criminals which may lead to a breach<br />

leading to severe damages. Research studies suggest that the healthcare industry is becoming one of<br />

the prime targets by criminals, therefore, there is an urgent need to take preventive measures by the<br />

industry stakeholders to ensure the security of care data.<br />

About the Author<br />

Prerna Lal is an Assistant Professor in Information Management at<br />

International Management Institute New Delhi, India and a published<br />

writer in journals and publications, both Indian and international. She<br />

is an engineer with an MBA degree (IIT-Roorkee). She is a SAPcertified<br />

consultant and has ITIL® V3 Foundation-level certificate in<br />

IT Service Management. She has more than 16 years of experience<br />

in academics and research with areas of interest being Data<br />

Warehousing and Data Mining, Business Analytics, Management<br />

Information System, Software Project Management, IT Service<br />

Management, <strong>Cyber</strong> Law, and Cloud Computing. She earned her<br />

Ph.D. in the area of Cloud Computing from Banasthali University,<br />

Rajasthan, India. She can be reached at prernalal@yahoo.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Women’s Health and Safety Amidst COVID-19 <strong>Cyber</strong>crime<br />

By Sarah Katz, Senior <strong>Cyber</strong> Security Analyst, NASA Ames Research Center<br />

As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has<br />

spiked across multiple continents. Forced to stay indoors, many individuals are encountering partner<br />

struggles, some of which have turned abusive. In particular, many women in Asia, Europe and the United<br />

States have reported feeling unsafe and wonting for reliable access to safety resources. 12<br />

Adding to the global increase in domestic abuse, abundance of cybercrime has surged since the start of<br />

the COVID outbreak. With particularly enhanced rates of phishing campaigns, the healthcare industry<br />

has born a significant brunt in struggling to balance resource provision for patient care with cybercrime<br />

prevention. 13<br />

12<br />

Taub, Amanda. “A New Covid-19 Crisis: Domestic Abuse Rises Worldwide.” The New York Times,<br />

The<br />

New York Times, 6 Apr. <strong>2020</strong>, www.nytimes.com/<strong>2020</strong>/04/06/world/coronavirus-domesticviolence.html.<br />

13<br />

“WHO Reports Fivefold Increase in <strong>Cyber</strong> Attacks, Urges Vigilance.” World Health Organization,<br />

World<br />

Health Organization, 23 Apr. <strong>2020</strong>, www.who.int/news-room/detail/23-04-<strong>2020</strong>-who-reports-fivefold<br />

increase-in-cyber-attacks-urges-vigilance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


When coupled with the heightened frequency of domestic violence due to close quarters in quarantine,<br />

the threat of cyber attacks such as phishing rendering healthcare resources inaccessible poses immense<br />

risk for abuse victims. In particular, phishing campaigns or Trojans that lead to ransomware threaten<br />

women’s health facilities to the point where if a ransom is not paid on time and physicians are unable to<br />

access patient records in time, victims with critical injuries could lose their lives.<br />

This clear correlation between COVID-19 and ensuing rise of cybercrime has spurred the development<br />

of many initiatives to combat the potential devastating effects of threat actors taking advantage of the<br />

pandemic. Along with UN efforts and the volunteer-based COVID-19 CTI, which focus on healthcare in<br />

general, Cysec Health emerges as a nonprofit that specifically connects women’s medical providers with<br />

cyber security professionals to help protect patient health information. Founded by a female cyber<br />

security professional, this initiative aims to support all global providers dedicated to the medical care of<br />

women and girls both during and after the COVID-19 crisis has passed.<br />

About the Author<br />

Sarah Katz is a cyber security analyst at NASA Ames Research<br />

Center, author and Berkeley alum. In addition to information security,<br />

her passions include medicine and caving. Sarah can be reached on<br />

Twitter @authorsarahkatz.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Network Monitoring Solutions and Their Contribution<br />

Towards Developing A Robust IT Infrastructure<br />

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities<br />

in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the<br />

global technology landscape, the vulnerability of IoT devices to malware will keep increasing.<br />

Increasing malware attacks, network outages, and more have an adverse impact on enterprise<br />

infrastructure, prompting the implementation of efficient network monitoring solutions. The proliferation<br />

of smart cities will also lead to the demand for a highly sophisticated infrastructure equipped with<br />

advanced technologies, making the entire urban ecosystem susceptible to performance problem and<br />

discrepancies. This will increase the demand for network monitoring solutions and emphasize their<br />

significance in the global technology spectrum, a gist of which has been given in this post.<br />

By Saloni Walimbe, Content Writer at Global Market Insights, Inc.<br />

In order to facilitate smooth operations in the increasingly technology-driven industry space, businesses<br />

are becoming more and more reliant on their network to accommodate client demands. In short, networks<br />

are the lifeline for any modern enterprise. This means that even the slightest slowdown or discrepancy<br />

in network performance can create significant disruptions in the IT infrastructure of a business.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Considering the impact of network outages and performance issues, in terms of both productivity as well<br />

as cost, it is essential for enterprise of all sizes to have an efficient network management solution in<br />

place, to enable proactive measures towards resolving performance problems and gaining valuable<br />

network insights. One of the most essential network management tools is network monitoring.<br />

For IT professionals, network monitoring is a vital discipline. Network monitoring tools are designed to be<br />

proactive as well as reactive, which means they can preemptively detect discrepancies in the system,<br />

helping to avoid system crashes before they occur.<br />

Essentially, network monitoring solutions are tools that allow IT administrators to monitor networks more<br />

efficiently. Solutions across the network monitoring market are vast and varied, depending on myriad<br />

factors including system specifics, automation, as well as business size & scale.<br />

Burgeoning requirement for IoT security solutions<br />

The emergence of advanced technologies, from connected devices to cloud computing to IoT (Internet<br />

of Things) has added great impetus to the adoption of network monitoring tools across the industrial<br />

landscape.<br />

Studies suggest that IoT could become a multi-trillion-dollar industrial sphere by <strong>2020</strong>. As such, IoT is<br />

already making its mark across several industries, including transportation, healthcare, utilities,<br />

manufacturing, etc. The technology is anticipated to assert a significant influence on professional and<br />

consumer lives across the globe, in addition to transforming perceptions regarding networks in general.<br />

Despite its revolutionary nature, however, IoT does have one major area of concern, security. Lack of<br />

efficient IoT security solutions has posed a considerable challenge for IoT adoption. For instance, IoT<br />

devices are highly susceptible to malware attacks. One of the most notable malware strains to affect IoT<br />

devices was Mirai, in 2016. The malware, which affected security cameras and wireless routers, led to a<br />

massive DDoS attack on Dyn, the internet provider for prominent sites including Spotify, Twitter and<br />

more.<br />

Given this vulnerability of IoT devices, network monitoring is an ideal solution to detect abnormalities in<br />

their performance and prevent attacks before they take place.<br />

Key players in the network monitoring industry are taking stock of this and developing innovative solutions<br />

that offer robust IoT security. For example, PathSolutions, a network performance management firm, has<br />

recently introduced its TotalView 10 solution, which can offer network security policy monitoring, IP<br />

address management, device monitoring, among other benefits to IoT devices. The technology helps<br />

monitor the network for unauthorized access and identifies any suspicious activities which could indicate<br />

potential security breaches.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Emergence of smart cities and the subsequent requirement for a strong network infrastructure<br />

In an effort to become more technology-driven and smart, many local municipalities have adopted<br />

technologies like IoT enabled devices, used across myriad applications including traffic systems, smart<br />

street lighting, CCTV cameras, public security systems, etc., through smart networks and data collection.<br />

For example, Boston and Baltimore municipalities have deployed smart garbage cans which can<br />

communicate their existing capacities, making it easier for municipal systems to plan suitable routing for<br />

disposal services.<br />

With the development of smart cities expected to make such a prolific impact on efficiencies and resource<br />

management, a robust infrastructure becomes paramount. The ideal smart infrastructure is a network of<br />

networks, using sophisticated technologies alongside integrated network management solutions,<br />

allowing for higher visibility, cost reductions and enhanced reliability of network infrastructures, operations<br />

and services.<br />

Considering the prevalence of such IT infrastructures in smart city development, one of the most essential<br />

components of these cities is a network monitoring solution that can connect with distinct network<br />

elements and facilitate a smooth flow of information between systems.<br />

One such network monitoring tool is Montdata’s log management & network management solution. This<br />

tool allows smart city IT administrators to manage and supervise the entire smart city infrastructure<br />

including servers, firewall, network traffic, sensors, CCTV, and other network elements, using a single<br />

dashboard.<br />

About the Author<br />

Saloni Walimbe. An avid reader since childhood, Saloni is currently<br />

following her passion for content creation by penning down insightful<br />

articles relating to global industry trends, business, and trade &<br />

finance. With an MBA-Marketing qualification under her belt, she has<br />

spent two years as a content writer in the advertising field. Aside from<br />

her professional work, she is an ardent animal lover and enjoys<br />

movies, music and books in her spare time.<br />

Company Website: - https://www.gminsights.com/<br />

LinkedIn - https://www.linkedin.com/in/saloni-walimbe-5929b99b/<br />

Twitter - https://twitter.com/WalimbeSaloni<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Still Using Spreadsheets to Manage Your Digital<br />

Certificate Security?<br />

Here are 5 reasons to stop.<br />

By Ryan Sanders, Product Manager, Keyfactor<br />

The proliferation of devices and applications like IoT, DevOps and cloud has dramatically increased the<br />

number of digital certificates in any given organization. Most of the applications and systems we rely on<br />

today use digital certificates to authenticate and secure connections, which makes the task of managing<br />

certificate requests, issuance and renewal much more challenging.<br />

For years, InfoSec teams have relied on basic tools like Excel spreadsheets to track and log certificates,<br />

but today’s certificate volumes, combined with its certain rise as more devices are added to the network,<br />

make spreadsheets an archaic and error-prone system. From a security perspective, consider that even<br />

just one missed device or server certificate can shut down your entire network or worse – lead to potential<br />

breach.<br />

InfoSec teams have options when it comes to certificate management tools. Most of those options have<br />

the ability to discover and automate the lifecycle of X.509 certificates, yet many teams still use<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


spreadsheet-based tracking and manual processes. While well-meaning, the combination of complex<br />

ecosystems and manual processes almost always lead to undocumented installations and risk exposure.<br />

Like any IT security initiative, the best place to start is with an updated system audit to help you assess<br />

where your tools and processes rank in terms of efficacy and security. Regardless of the program you’ve<br />

got in place Gartner suggests program managers conduct a periodic evaluation of certificate usages,<br />

volume and expected use-case expansion. Inevitably more use cases mean more risk - security and risk<br />

managers should consider a certificate management solution over spreadsheet-based methods.<br />

Still think spreadsheets are the right tool for your organization? Here are five reasons to reconsider<br />

spreadsheets as your primary certificate management tool:<br />

By 2022, organizations that leverage X.509 certificate management tools will suffer 90% fewer certificaterelated<br />

issues and will spend half the time managing these issues, compared with organizations that use<br />

spreadsheet-based management methods. ~ Gartner<br />

Gartner cited a certificate management tool vendor who recently pointed out that when it observes clients<br />

executing on a discovery process, clients typically see five to 10 times more certificates in their<br />

environment than expected.<br />

Reason #1: Spreadsheets don’t scale<br />

Spreadsheets can’t natively scale alongside your Public Key Infrastructure (PKI) program and its growing<br />

number of digital certificates. The manual effort required to maintain spreadsheets never decreases,<br />

especially as new certificates are regularly deployed on the network. Growing certificate counts and<br />

shorter validity periods make spreadsheet-based tracking infeasible for most organizations today.<br />

Reason #2: Spreadsheets aren’t audit-ready<br />

To prove compliance, you need to be able to demonstrate that you have complete visibility to all digital<br />

certificates, detailed information about the algorithms they use, where they were issued from, where<br />

they’re installed, who owns them and what applications rely on them. It’s next to impossible to capture<br />

that level of detail and updates with a manual spreadsheet.<br />

Reason #3: Spreadsheets lack automation<br />

Many organizations underestimate the care and feeding required to continuously manage their<br />

certificates. The issuance process alone typically takes three to six hours which includes generating a<br />

key pair on a server, exporting the public key, ensuring certificate authority certification (thereby<br />

converting it into X.509 certificate format), installing it, verifying that it’s active and finally returning the<br />

server to live operation. That doesn’t account for time spent continually tracking down assets with<br />

certificates, general maintenance and updates.<br />

Reason #4: Spreadsheets create visibility gaps<br />

It’s not the certificates you track that will cause your next outage - it’s the one’s you haven’t yet discovered.<br />

Spreadsheets only allow you to account for and track the certificates you know about. The reality is that<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


most organizations don’t actually know how many keys and certificates they have. Known certificates<br />

account for a small percentage of an organization’s overall inventory. As a result, unknown or rogue<br />

certificates create significant exposure to unexpected outages and downtime.<br />

Reason #5: Spreadsheets are a time-suck<br />

Organizations who have roughly 100 or more X.509 certificates and use manual processes typically need<br />

a full-time, dedicated resource to manage certificates within their business. In most organizations<br />

responsibility is juggled between several team members. This isn’t only a time-suck, it’s a budget drain,<br />

too - the reality is that IT and security resources are already spread thin. InfoSec teams juggle multiple<br />

responsibilities at any given time, which creates more room for error and oversight when it comes to<br />

certificate management.<br />

If you’re starting to reconsider the way you manage your digital certificates, consider these criteria:<br />

● Scale – do you have more than 100 digital certificates?<br />

● Complexity - do you use multiple certificate authorities (CAs), network devices and cloud<br />

platforms?<br />

● Resources – does your staff spend too much time on certificate-related tasks rather than IT<br />

priorities?<br />

● Outages – have you experienced certificate-related outages over the last two years?<br />

If you answered yes to any one of these criteria, you may want to consider certificate lifecycle automation<br />

to lessen the burden on your in-house team. An automated platform not only streamlines your certificate<br />

management process, it also monitors and reports on certificate status for compliance, saves time and<br />

mitigates security risks posed by manual processes. And with the number of choices available,<br />

onboarding an automated platform is a lot easier than managing your digital certificate spreadsheets.<br />

About the Author<br />

Ryan Sanders is a Toronto-based product lead with Keyfactor, a<br />

leader in providing secure digital identity solutions for the Global<br />

2000 Enterprises. Ryan has a passion for cybersecurity and<br />

actively analyzes the latest in compliance mandates, market<br />

trends, and industry best practices related to public key<br />

infrastructure (PKI) and digital certificates. For more information<br />

visit: www.keyfactor.com or follow @Keyfactor on Twitter and<br />

LinkedIn.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Introducing the Role of The Chief <strong>Cyber</strong>crime Officer<br />

Can the CISO and CCO work in harmony?<br />

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks<br />

The TalkTalk data breach in 2015 had big repercussions. With the personal details of 157,000 customers<br />

accessed, including bank account numbers and sort codes of over 15,000 customers, it certainly was not<br />

the largest the industry had seen. However, it resulted in government recommendations that a specific<br />

officer should be appointed with day-to-day responsibility for protecting computer systems from cyber<br />

attack.<br />

In most organizations, this responsibility fell to the Chief Information Security Officer (CISO), supported<br />

by the CEO, with the main task of strengthening the organization’s cyber security capabilities. While the<br />

role of the CISO is certainly not new, it has evolved over recent years to keep up with the advancements<br />

in the threat landscape. A CISO’s job description is now extremely varied, including managing security<br />

operations, cyber risk and cyber intelligence, security architecture, data loss and fraud prevention,<br />

program management, identity and access management and compliance and governance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As well as adding to the CISO’s job description, the rise of cyber crime has also put the role under<br />

increasing scrutiny. It’s easy to see why, as research shows that most CISOs and the entire C-Suite<br />

believe the CISO is ultimately responsible for responding to a data breach on behalf of the organization.<br />

With numerous day-to-day responsibilities, many organizations have decided to add another role into the<br />

mix to give the CISO a helping hand. This is where the Chief <strong>Cyber</strong>crime Officer (CCO) comes in.<br />

Say hello to the CCO<br />

The CCO’s role involves ensuring the organization is cyber-ready. They bear the responsibility of<br />

mitigating breaches, taking the lead if a breach does occur and providing the necessary link between the<br />

Board and the rest of the company to reduce risk and work cohesively to resolve problems<br />

instantaneously. This role should ease the load on the CISO and ensure the organization can get one<br />

step ahead of hackers in the cyber crime race. However, organizations must take into account the need<br />

for both the CISO and CCO to work in tandem, which involves ensuring each role is clearly defined and<br />

has full support from the Board.<br />

CISO and CCO working together<br />

The CISO and CCO share a common goal of keeping the company’s data safe from cyber threats. Yet,<br />

the definition of what each role entails might be different for each organization. While the CCO will be<br />

focused on the system architecture, the CISO will be focused on the security of the information within the<br />

organization. With this defined, there should be no reason that both roles can’t work collaboratively<br />

towards keeping the organization and its data safe.<br />

With both roles working in harmony, the next step that organizations need to take is ensuring the CISO<br />

and the CCO have enough influence with the Board to make critical decisions and resolve issues<br />

immediately. To do this, the Board should have full visibility of the entire cyber security strategy, which<br />

should be regularly reviewed and updated in line with new threats and intelligence. From this, the CCO<br />

and CISO can be given the responsibility to report and respond to incidents and make rapid decisions on<br />

behalf of the business. This is essential as, in the event of a data breach, removing unnecessary<br />

authorization steps ensures that the organization can respond quickly and put remediating measures in<br />

place to minimize potentially catastrophic repercussions.<br />

<strong>Cyber</strong> security threats are increasing day by day and these threats can’t be ignored. Organizations must<br />

consider what the most effective structure is that will enable decisions to be made quickly and that will<br />

leave space for both the CISO and CCO to work in tandem.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Matt Cable is VP Solutions Architect and MD<br />

Europe, Certes Networks. Matt is a <strong>Cyber</strong>-Security and<br />

Cryptography expert with more than 20 years of consultancy<br />

experience that covers IT Strategy and Enterprise. Matt can<br />

be reached on LinkedIn here -<br />

https://www.linkedin.com/in/mattcable72/ - and at our<br />

company website www.certesnetworks.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Fighting Back Against Powerful New DDoS Attack Vectors<br />

By Tom Bienkowski, Director of Product Marketing, NETSCOUT<br />

Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more<br />

quickly, which presents many risks for enterprises. Research shows there were 8.4 million DDoS attacks<br />

globally over the last year alone. That’s 23,000 hacks every day and 16 each minute.<br />

These sophisticated attacks can easily breach enterprise defenses and wreak havoc because bad actors<br />

are relentlessly uncovering and exploiting dangerous new vectors–especially on IoT devices. Service<br />

providers need to defend themselves and protect their customers by getting greater insight and visibility<br />

into these threats.<br />

The Modern DDoS Attack Landscape<br />

The Internet of Things (IoT) has changed everything about DDoS attacks. Before IoT, hackers would<br />

scan the web for vulnerable network hosts with lax security, weak passwords, or neglected systems that<br />

they could compromise.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Not only do IoT devices share some of these vulnerabilities, but they also have a much weaker security<br />

posture overall. They are often far less secure out of the box because that makes deployment easier.<br />

Many use default or weak passwords and rely on older protocols without built-in firewalls, direct user<br />

interfaces, or automated patching. Finally, manufacturers usually sell these items at low margins, so they<br />

have little incentive to enhance security or fix issues.<br />

Since the Mirai malware went live in 2016, hackers have developed many different IoT-based DDoS<br />

attack strains. These botnets discover newly connected devices within 60 seconds of them going online<br />

and weaponize everything from smartphones to smart homes. Even worse, hackers can now target entire<br />

IP address ranges by combining multiple vectors or overwhelming systems through short, sustained<br />

DDoS attacks.<br />

These budding Mr. Robots and Lisbeth Salanders also have a much larger pool of victims to choose<br />

from, along with seemingly unlimited resources. That allows them to change tactics on the fly while<br />

accessing more attack surfaces through cloud services and mobile networks.<br />

Hackers who use these sophisticated methods make it harder to contain damage. <strong>Cyber</strong>criminals deploy<br />

attacks as a smokescreen while they invade systems and access massive amounts of sensitive data.<br />

They then distribute it widely, which can lead to severe financial losses.<br />

Enterprise IT teams must employ advanced defense strategies to analyze and fight back against these<br />

threats. Telecommunications carriers and processing centers specifically are subject to more hacks,<br />

which can target both the providers themselves and their customers. Because of this, all parties need to<br />

plan for the worst by using smart data to optimize security.<br />

Organizations Can Update, Innovate, and Evolve<br />

Even the most well-prepared companies should maintain constant vigilance against formidable online<br />

threats. The digital world has changed rapidly in recent years, so organizations need to protect all their<br />

distributed environments, on-premises and in the cloud, by employing DDoS prevention solutions.<br />

IT teams will increase their chances of successfully countering opponents if they connect and collaborate<br />

while simplifying workflows and staying resilient. These professionals should routinely secure vulnerable<br />

hardware and software to ensure only legitimate users can access those services. They also need to<br />

monitor all traffic and respond immediately if suspicious vectors appear.<br />

Enterprises should further conduct regular attack mitigation drills and employ automated detection tools<br />

during normal operations. That way, staff can evolve internal processes to defend networks and respond<br />

swiftly to cyberthreats using the proper protocols.<br />

Business leaders also need to ensure they don’t put a lid on staff innovation after hacks occur. When<br />

companies suffer lengthy outages following cyberattacks, some C-suite leaders think twice about<br />

adopting any new technologies.<br />

That’s a dangerous proposition, since businesses end up trailing the competition. Organizations need to<br />

encourage the use of modern tools that protect industries while decreasing risk.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Today’s hackers have more dangerous vectors in their arsenals than ever before, and they know how to<br />

deploy them for maximum impact. The good news is that when enterprises deploy the right tools, they<br />

can fight back. By using innovative solutions that keep assets safe, cybersecurity teams will defend their<br />

systems from DDoS attacks for years to come.<br />

About the Author<br />

Tom Bienkowski has been in the network and security field for over 20<br />

years. During this time, he worked for large enterprises as a Network<br />

Engineer and for multiple network management and security vendors<br />

where he has had roles in Sales Engineering/Management, Technical<br />

Field Marketing and Product Management. He currently serves as<br />

Director of Product Marketing focusing on NETSCOUT's industryleading<br />

DDoS protection solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How to Secure IT And OT In Industrial and Manufacturing<br />

Environments<br />

By Christopher Dobrec, Vice President of Product Marketing at Armis<br />

Operational Technology (OT) systems, which include critical infrastructure, are increasingly becoming<br />

more exposed to cyber attacks. The control and telemetry systems used in industrial plants and<br />

manufacturing environments are being connected to traditional enterprise IT networks like Ethernet or<br />

Wi-Fi. Meanwhile, device manufacturers are building OT devices and control systems on top of common<br />

operating systems such as Windows, Linux, Android, and VxWorks.<br />

Compounding this issue is the fact that traditional consumer-centric connected devices are being brought<br />

into industrial and manufacturing environments. For example, as Ford starts to consider how<br />

manufacturing workers can return to plants following the COVID-19 impact, it’s testing wearable devices<br />

that would buzz when employees are closer than 6 feet apart.<br />

These developments make control systems vulnerable to the same kind of attacks used to compromise<br />

devices on corporate IT networks. Recent attacks on industrial control systems (ICS) and OT<br />

environments illustrate the damage that these threats are already having. WannaCry and NotPetya<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


malware had major impacts on manufacturing companies like Merck, causing hundreds of millions of<br />

dollars in quarterly losses due to production downtime, in addition to loss of customer satisfaction due to<br />

missed shipments. After suffering a WannaCry attack across its worldwide network, A.P. Moller - Maersk,<br />

one of the world’s largest shipping conglomerates, lost communication with its OT network, shutting down<br />

entire ports.<br />

In another example, the digital systems at the smelting plants of Norsk Hydro, one of the world’s largest<br />

aluminum producers, were shut down after the firm was attacked by LockerGoga. Norsk Hydro reportedly<br />

lost $40 million because of the incident, and aluminum prices were driven to a three-month high.<br />

In order to mitigate these new threats, organizations must understand two major challenges to securing<br />

these environments and evolve their security strategies to secure and manage connected devices across<br />

both industrial and IT environments.<br />

Connected OT Devices are Un-Agentable<br />

The growing trend in manufacturing and industrial<br />

plants is to connect OT devices directly to the<br />

enterprise network. But one of the main challenges is<br />

that these devices often have no built-in security and<br />

cannot be protected with traditional security tools like<br />

agents used by enterprise security teams. These<br />

devices were not initially designed to be installed on<br />

the enterprise network, however, the convergence of<br />

IT and OT networks has made this a reality. Because<br />

these devices can’t run agent software, security<br />

teams have no visibility into whether device behavior<br />

is abnormal or malicious and could indicate a risk.<br />

OT Device Vulnerabilities Are Increasing<br />

While OT devices become more accessible to cyber attackers, they’re also increasingly vulnerable to<br />

attack. Based on ICS-CERT’s advisory page, which lists a large number of vendors that have disclosed<br />

vulnerabilities, public vulnerability advisories continue to increase year over year. There were 204<br />

advisories in 2018, an increase of 25% compared to 2017. Over half of the ICS-related vulnerabilities<br />

reported in 2018 rated high in terms of severity level. These vulnerabilities exist in field devices, humanmachine<br />

interface systems, and engineering workstation software.<br />

In 2019, a set of 11 zero-day vulnerabilities was discovered, dubbed Urgent11, that impact seven<br />

common real-time operating systems, including VxWorks® by Wind River. These systems are widely<br />

used by SCADA systems, industrial controllers, firewalls, routers, satellite modems, VoIP phones,<br />

printers, and many other devices. Urgent11 could allow attackers to remotely exploit and take over<br />

mission-critical industrial devices, resulting in costly disruption of essential processes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


It’s clear that as these vulnerabilities grow, manufacturing and industrial leaders must devote greater<br />

attention to securing their environments.<br />

A Different Approach to OT Security<br />

Industrial and manufacturing organizations need a security strategy that is specifically tailored to all<br />

devices across OT and IT environments. This approach could better protect essential tools and<br />

processes with the following focus areas:<br />

• Agentless. Most OT enterprise IoT devices, such as SCADA systems, PLC’s, RTU’s, HMI’s and<br />

engineering workstations, cannot accommodate security agents, so a security strategy should be<br />

able to function without relying on these agents. <br />

• Passive. A security strategy that uses network scans or probes can disrupt or even crash OT<br />

devices, which would interfere with important industrial control operations like plant operations. A<br />

strong system should be able to function using only passive technologies. <br />

• Comprehensive security controls. A security strategy designed to mitigate risks in an OT<br />

environment should have the same outcomes as one designed for IT devices. These outcomes<br />

are listed in security frameworks such as the NIST <strong>Cyber</strong>security Framework (CSF) or the Center<br />

for Internet Security Critical Security Controls (CSC). In the IT world, this typically requires the<br />

use of several different security tools. For the OT environment, it would be desirable to obtain<br />

comprehensive coverage of the required security controls using as few tools as possible.<br />

• Comprehensive device coverage. A comprehensive security strategy will encompass all<br />

managed, unmanaged or industrial IoT devices in the enterprise—from the manufacturing floor to<br />

the executive suite—because in an interconnected environment, you can’t secure OT unless you<br />

secure IT along with it. The security platform should work for all types and brands of industrial<br />

control systems, along with other kinds of devices common to the enterprise such as HVAC<br />

systems, IP security cameras, fire alarm systems, building access management systems,<br />

switches, firewalls, wireless access points, printers, and more.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Comprehensive communication coverage. The strategy should be able to directly monitor all<br />

communication pathways that could be used in a cyber attack, including Ethernet, Wi-Fi,<br />

Bluetooth, BLE, and possibly other wireless protocols such as Zigbee. Wireless coverage is<br />

important because attackers can exploit vulnerabilities such as BlueBorne, KRACK and<br />

Broadpwn to compromise OT devices wirelessly, without any user interaction.<br />

Protecting OT devices from a growing list of cyber attacks and vulnerabilities brings many challenges,<br />

but can be achieved with the right focus, backed by the right tools. What’s clear is that industrial and<br />

manufacturing organizations cannot use traditional methods to secure OT devices being used in nontraditional<br />

ways. As these essential devices continue to be integrated into enterprise networks, a new<br />

approach must be used to keep them from being exploited and, ultimately, leaving valuable processes at<br />

risk of disruption.<br />

About the Author<br />

Chris Dobrec, Vice President of Product Marketing, Armis.As Vice<br />

President of Product Marketing, Chris is responsible for Armis’ product<br />

marketing strategy and vision. He is a seasoned product and business<br />

development executive leading teams through development and<br />

marketing of exceptional products and cutting-edge technologies<br />

across enterprise and consumer market segments. Prior to Armis,<br />

Chris held executive management roles in product management,<br />

product marketing and business development at MobileIron, Cisco,<br />

Nokia, Ipsilon Networks and Kalpana. Chris’ journey to Silicon Valley<br />

started after leaving college early to pursue his passion for building<br />

great products. He can be reached by Armis’ company website at<br />

www.armis.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Biggest Obstacles Frustrating <strong>Cyber</strong> Security Job Seekers<br />

and Employer<br />

By Matt Donato, Co-founder of Charlotte, NC-based HuntSource<br />

You’re a cyber security engineer and want to find an exciting career opportunity in this arena.<br />

But several obstacles are preventing you from making this happen. For example, you may get offered a<br />

big salary, say $200,000 per year. The fact that someone is willing to pay you that much strokes your<br />

ego.<br />

Yet you take that job and find out the work itself doesn’t appeal to you. Or the corporate culture doesn’t<br />

align with your values.<br />

You saw the big dollar signs and took the position but now you realize you made a big mistake. You now<br />

have to start over finding another job or stay in a place where you are not happy.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


You lack skills in a key area<br />

Or here’s another problem you might have. You know a lot about cyber security but the position you’re<br />

applying for requires that you also understand and have skills using machine learning, for example – a<br />

hot new trend. You haven’t had time to learn about it because your current job eats up 80-100 hours a<br />

week of your time.<br />

With this technology industry changing so fast, and the demands of your current job so all-encompassing,<br />

you haven’t had time to keep get your head around what machine learning is all about or how to get<br />

caught up in your free time.<br />

You don’t know what certifications to get<br />

Or you have a related problem. You need web application security knowledge to land a dream job, but<br />

you don’t know what certification to get that employers will want before hiring you.<br />

Some employers want you to take one type of certification course and another specifies that you pass<br />

another course. Which one do you take? And which job do you want more? It’s all complicated and<br />

uncertain, a crapshoot.<br />

You believe employers will come after you<br />

Or you may have more fundamental obstacles to overcome. You believe you can send out your resume<br />

and employers will come chasing you because there’s a shortage of cyber security professionals. You’re<br />

a hot commodity. They’ll come chasing you.<br />

All you have to do is make them aware you’re looking around. But you find out that’s not nearly enough<br />

effort and unrealistic. You have to do much more. Even when demand for your skills is intense.<br />

You have LinkedIn fatigue<br />

Or you find that every day you get at least five messages on LinkedIn from employers wanting to know if<br />

you’re interested in a new cyber security position. But the notices are poorly targeted for positions far<br />

below your experience level.<br />

Worn out by “LinkedIn fatigue,” you stop going to that page in your job hunt because so much of the<br />

information wastes your time. But that’s where so many opportunities for you await. It’s a conundrum.<br />

How to overcome these obstacles<br />

There are several actions you take to overcome these hurdles. One of the most important is to stay<br />

current and keep your skills relevant and fine-tuned in the cyber security market.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


You must be current<br />

Your knowledge has to be up-to-speed with what’s going on right now and where the market is headed.<br />

Three-year-old information and skills won’t cut it in the ultra-high-speed cyber security arena. One-yearold<br />

information doesn’t amount to much either. It’s all about now and what you know and what value you<br />

can offer today and tomorrow.<br />

Next, focus on improving your written and verbal communications skills. Yes, technical knowledge<br />

remains important, but plenty of strong competitors have that.<br />

You will separate yourself from competitors if you show you can handle the technical aspects of the work<br />

and communicate well. This would mean, for instance, simply and clearly explaining to upper<br />

management why the cyber security projects you and your team are working on are important to the<br />

financial growth of the business.<br />

Be authentic<br />

Want to enchant employers? Be authentic. Employers can tell when someone is faking who they are or<br />

what they can do. Be candid with employers about what you can and cannot do, what your passions are,<br />

why you want to work specifically for them, why you believe cyber security is important, and show them<br />

you understand the cyber security problems they need solved.<br />

Obstacles from Employer’s Perspective<br />

Employers struggle to find and hire cyber security professionals. They often don’t understand well what<br />

cyber security is, why their company needs it, and how it can help their businesses grow or prevent<br />

losses. They have a general sense that they need to have better cyber security so they seek to hire<br />

people who do know about it.<br />

But these employers often cannot communicate who they want to hire because they don’t know what<br />

they want the cyber security person to do.<br />

Be more flexible with job requirements<br />

Another problem: Written job descriptions for cyber security jobs are too lofty, demanding, and stringent.<br />

If a candidate meets six of the eight requirements, for example, but the corporate policy stipulates that<br />

they need to meet all of them, the application won’t move any further in the process.<br />

Companies often miss on what could have been a great hire. Inflexible hiring practices blocked the<br />

process. This is a huge problem.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Shorten the job hunt process<br />

The problems don’t end there. Companies often take far too long to hire anyone. The process tends to<br />

be overly laborious – even when searching for employees in a high-demand market such as cyber<br />

security.<br />

Positions can stay open for nine months and often longer. Corporate recruiters often are asked to fill 50<br />

or more jobs at once. Even when hundreds of people apply to one position, few people have time to<br />

review them, or at least not for several months.<br />

<strong>Cyber</strong>security affects finances<br />

Companies also wrestle with cyber security hiring because cyber security does not generate revenue.<br />

It’s an expense. Naturally, the company wants to keep the revenue-generating engine humming. They<br />

are therefore more inclined to hire salespeople and others who can affect the bottom line.<br />

The flaw in this logic, of course, is that if the company’s cyber security stays weak, fraudsters are more<br />

likely to steal millions of dollars and valuable information from the company. But until that happens,<br />

companies de-prioritize cyber security hiring in favor of people who bring in the cash.<br />

Overreliance on certifications<br />

<strong>Cyber</strong>security professionals rely too much on certifications and are not familiar enough with the<br />

certification programs to assess whether they show that an applicant is competent in a discipline just<br />

because they gained the certification. Some certifications are easy to get and don’t require much skill.<br />

Too often companies place too much value on one applicant who has a certification when another<br />

applicant who does not is better qualified for the position.<br />

It’s not all about the money for employees<br />

Employers also underestimate how much job applicants value doing meaningful work. They frequently<br />

assume the salary constitutes the overriding force for luring candidates. But actually the work they will do<br />

and how valuable it is to the employer means a great deal to employees.<br />

How to overcome these obstacles<br />

To be more successful hiring cyber security professionals, companies need to become much more<br />

knowledgeable about what cyber security is and pinpoint exactly why they need to hire people to help<br />

them with this important program.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


There are no perfect candidates<br />

Companies also need to be much more flexible in ascertaining who fulfills enough of their job<br />

requirements to deserve an interview. There just aren’t that many people anywhere who know everything<br />

there is to know and have all skills needed to do a cyber security job.<br />

The technology is too new, the skills take too long to refine, the specific niches are too numerous and<br />

disparate. There are no perfect applicants. Applicants who show they can do most of what the job requires<br />

should be given more consideration.<br />

Weak cyber security weakens businesses<br />

Companies also need to be careful not to underestimate the financial impacts of not hiring cyber security<br />

professionals. Granted, this is not a revenue-generating discipline. But it does help reduce revenue<br />

losses, which can be huge when cyber breaches occur.<br />

Don’t overestimate value of certifications<br />

Companies should also not overestimate the value of cyber security certifications. Some people might<br />

take an easy course while others may not. It’s important to figure out which certifications show a job<br />

applicant’s mastery of a skill or subject matter.<br />

Final thoughts<br />

Professionals seeking jobs in cyber security have their hands full. It’s a market moving at blazing speeds.<br />

The dynamics are complicated and tough to synthesize. Above all else, the key is to stay current on the<br />

latest news in cyber security, track market dynamics, and keep taking courses that help you develop<br />

skills valued right now by employers.<br />

Employers need to do their part to really get their minds around what cyber security is all about so they<br />

can hire people to do meaningful cyber security work. They can’t rely on the people they hire to figure all<br />

this out.<br />

And they need to move much faster and get more aligned on their corporate storyline when they interview<br />

candidates. A quick way to turn off a job candidate is to have that person interview four different people<br />

within your company who give the person four different stories about what’s important to the business.<br />

Get your story straight. The applicant will be more inclined to work for you if you are all singing the same<br />

tune. It eases their minds and shows them your company has its act together. Additionally, even if the<br />

role you discuss is not the right match, you’ll earn tremendous credibility and trust with the candidate as<br />

someone who may want to revisit joining your team.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Matt Donato is the co-founder of Charlotte, NC-based HuntSource.<br />

He can be reached at mdonato@huntsource.io. HuntSource<br />

provides comprehensive talent recruiting services for companies<br />

and professionals in the cyber security, data intelligence, and<br />

analytics markets. The company accelerates, streamlines, and<br />

simplifies the hiring process for companies and professionals in all<br />

three of these industries. The company’s capabilities include<br />

performing direct hires and executive searches, retained searches,<br />

and various staffing solutions. www.huntsource.io.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mitigating Against Ransomware: Don’t Let Backups Be<br />

the Back Door<br />

By Rick Vanover, Senior Director, Product Strategy, Veeam<br />

The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no<br />

choice but to pay cybercriminals in order to unlock their files, they not only put their money at risk, but<br />

also put their reputation at stake. According to a report produced by <strong>Cyber</strong>security Ventures, global<br />

ransomware damage costs are predicted to cost upwards of $20 billion in in 2021.<br />

While the best remedy for a ransomware attack is prevention, in the prevailing threat landscape that isn’t<br />

always possible. The same <strong>Cyber</strong>security Ventures study forecasts that an organization will fall victim to<br />

a ransomware attack every 11 seconds in 2021. Ultimately, almost all computer systems are fallible to<br />

breach. So, businesses must be prepared for the reality of relentless cyber-attacks and have a<br />

contingency plan in place should the worst happen.<br />

Having offsite and offline backups and robust disaster recovery capabilities can help businesses restore<br />

data that has been encrypted by attackers. However, the risks and possibilities of ransomware are varied.<br />

So, businesses need a plan for prevention and ensure their backup data cannot be used against them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The threat landscape is evolving<br />

There is a growing amount of fragmentation in the types of ransomware attacks in play today. Chief<br />

Security Officers (CSOs) mainly associate ransomware with data encryption. This involves malicious<br />

agents gaining access to sensitive or mission-critical data and encrypting it. The ‘deal’ in this scenario is<br />

the business pays a ransom in exchange for files to be decrypted and returned to their original, usable<br />

form. This is by no means the only threat for CSOs to consider. In other cases, cyber-attackers will upload<br />

data instead of encrypting it. This means the ransom is to prevent a public leak of potentially sensitive<br />

data.<br />

These disguises and behaviours make it very difficult to consistently defend against the widening<br />

landscape of threats. The golden rule for organizations to follow is to maintain a clear view of what is<br />

normal behaviour within their own IT infrastructure. This can be achieved through continuously monitoring<br />

data and cloud storage, as well as leverage analytics on networks, operating systems and applications.<br />

This increased awareness of what a secure state of play looks like can make suspicious and malicious<br />

activity easier to spot, crucially accelerating time to response.<br />

Making good use of encryption is also key for organizations. If malicious threats cannot ‘see’ your data,<br />

it’s more difficult for them to use it against you. According to Duo’s Privacy in the Internet Trends report,<br />

87% of web traffic is encrypted – a number that is rising all the time. However, it is less clear what<br />

percentage of enterprises’ data is encrypted. Zscaler’s IoT in the Enterprise found that 91.5% of traffic<br />

on enterprise IoT networks is non-SSL encrypted. These contrasting figures suggest there is a sizable<br />

gap between how enterprises generally are leveraging encryption versus major web platforms and<br />

service providers.<br />

Are backups cyber-crime’s high-value target?<br />

One area where encryption is vital to bolster organizations’ defences against ransomware and insider<br />

threats is implementing ‘nearline’ encryption on data backups. The Veeam 2019 Cloud Data Management<br />

report found that over two thirds of organizations are producing backups of their data. While this is, of<br />

course, a good thing, imagine the blackmail potential for a cyber-attacker of gaining access to a backup<br />

of an organization’s entire digital infrastructure?<br />

Given that cyber-criminals using ransomware to blackmail businesses are looking for data, in theory they<br />

can find whatever they need in an organization’s backed up files. These could be in all manner of forms:<br />

from system disks and removable hard drives, to offline tape devices and cloud backups. Whichever<br />

option a business chooses, the backup repository itself must be protected against attack with an ultraresilient<br />

media type. Otherwise, there’s a chance that in attempting to protect business continuity,<br />

businesses may be creating a trove of poorly protected data that could be used against them.<br />

For some threat behaviours, this can be mitigated by encrypting backups every step of the way – from<br />

the first disk resource on-premises. Encrypting backups historically is a great idea when tapes leave the<br />

IT facility or if data is transmitted over the Internet. Given the prevalence of modern cyber-threats,<br />

encryption must take place nearer to the backing up process. The most effective technique however is<br />

resiliency in the backup data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Securing data backups<br />

This brings us to a conversation around ultra-resilient backup storage – the single most effective form of<br />

storage to be resilient against ransomware. There are a number of ways organizations can achieve this<br />

level of protection to ensure their data backups do not resemble a back door for cyber-attackers.<br />

The first is utilising offline tapes, which are a very effective air-gapped form of backup media. While tape<br />

is often purported to be an old-fashioned and inefficient storage technology, it cannot be beaten when it<br />

comes to producing highly portable, secure and reliable backups at low-cost. Much like tape, removable<br />

drives have an offline element in that they are not online unless being read-from or written-to. This makes<br />

them a preferable option when it comes to reducing the visibility of backed up files to malicious agents.<br />

Immutable backups in the cloud, such as AWS S3 storage’s compliance mode for object lock, supported<br />

by Veeam, mean backup data stored in the cloud cannot be deleted by ransomware, malicious<br />

administrators or even accidentally. This is available in the public AWS S3 offering as well as a number<br />

of S3-Compatible storage systems (both on-premises and as a public offering). Furthermore, Veeam<br />

Cloud Connect offers protection through a capability where copies of backup data can be kept completely<br />

out of bounds for customers. This is delivered through a service provider and helps end-users protect<br />

against ransomware, insider threats and accidental deletion.<br />

CSOs are constantly weighing up a trade-off between convenience and security. While enterprises<br />

undergoing digital transformation have multiple investment needs, protecting against ransomware is<br />

critical to ensuring business continuity. Offsite and offline backups can help mitigate the effects<br />

of ransomware. Combined with the right security solutions and employee training, ultra-resilient backup<br />

for Cloud Data Management can give organizations peace of mind that they are as protected as they can<br />

possibly be even in this evolving threat landscape.<br />

About the Author<br />

Rick Vanover (MVP, vExpert, Cisco Champion) is<br />

the director of Technical Product Marketing &<br />

Evangelism for Veeam Software based in Columbus,<br />

Ohio. Rick’s IT experience includes system<br />

administration and IT management; with<br />

virtualization being the central theme of his career<br />

recently.Rick can be reached online at<br />

(rick.vanover@veeam.com) and at our company<br />

website https://www.veeam.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Ransomware Age and How to Fight It<br />

By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt<br />

We are living in an age where ransomware continues to grow and the number of attacks has increased<br />

especially during the COVID-19 pandemic. Data encryption malware is an emergent threat evolving and<br />

changing its Tactics, Techniques, and Procedures (TTPs) along the time.<br />

In general, data encryption malware so-called ransomware is a type of malware that prevents victims<br />

from accessing their systems and demands ransom payments in order to regain access to the data. The<br />

affected systems include network assets, servers, backups, personal data, and so on.<br />

In early ransomware versions - the 1980s, the ransom paid was paid via snail mail. Today the schema<br />

evolves an order sent via cryptocurrency (bitcoin) and credit card.<br />

These kinds of attacks generally start via email, with social engineering campaigns in place, namely<br />

malspam, malvertising and phishing schemas sent to a huge group of users every day.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ransomware can be grouped into some categories, namely:<br />

● Scareware: includes rogue security software and tech support scams.<br />

● Screen lockers: freeze the system and a window is presented after login with payment details.<br />

● Encrypting ransomware: the files are encrypted and a ransom must be paid to recover the data.<br />

● Destructive ransomware: less common, it only aims to destroy systems.<br />

Mediatic Ransomware<br />

There is a collection of mediatic ransomware that have been made headlines due to their damage.<br />

GoldenEye: One of the most well-known ransomware in the world is GoldenEye, which was responsible<br />

for a complete shutdown, crashing Ukrainian systems. The impact of this attack hit the banking networks,<br />

the system of the largest airport in the country, and the main electricity company. Three crucial points for<br />

society, which proved to be extremely vulnerable.<br />

Wannacry: A cryptographic malware that hijacks and blocks files and folders promising to return them<br />

only by paying a ransom in bitcoins (virtual currency). This ransomware was based on a security breach<br />

and was largely responsible for an internet blackout. Criminals asked for $600 to unlock the content on<br />

each computer.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Locky: it encrypts files and holds them hostage for ransom. Locky was first discovered at the beginning<br />

of 2016 and immediately became one of the most significant malware threats in the wild. This<br />

ransomware was developed by the same hackers in charge of Dridex botnet, considered one of the<br />

largest botnet networks in the world.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Jigsaw: it was inspired by the protagonist of the “Mortal Games” movie franchise. This attack begins with<br />

a salute, followed by a request for ransom. The malware encrypts computer files and gradually deletes<br />

them unless a ransom is paid to decrypt the files.<br />

Ryuk: it’s specifically used to target enterprise environments. Ryuk is a modified version of Hermes<br />

ransomware. Ryuk ransomware is more lucrative than its predecessor. It targets large organizations and<br />

government agencies that end up paying up large amounts based on the exfiltrated information.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ragnar Locker: This is one of the most recent piece of ransomware. Ragnar Locker is a ransomwaretype,<br />

designed not only to encrypt data but also to terminate installed programs (like ConnectWise and<br />

Kaseya) that are commonly used by managed service providers and various Windows services.<br />

How to Prevent a Ransomware Attack<br />

There is no perfect solution to prevent attacks of this nature, however, there is a set of good practices<br />

that can be applied in order to minimize the impact of data encryption malware. I can enumerate some<br />

of them below.<br />

● Use live, active anti-virus which are regularly updated.<br />

● Patch updates regularly. Update all software including operating systems, network devices,<br />

applications, mobile phones, and other software.<br />

● Maintain a proper backup mechanism and made it mandatory.<br />

● Regularly test the recovery function of backup and restore procedure and also test the data<br />

integrity of backups.<br />

● Conduct simulated ransomware preparedness test.<br />

● Install Microsoft Office viewers and always keep macros disabled.<br />

● Limit end-user access to mapped drives and don’t enable file sharing.<br />

● Don’t enable remote services. The organizations with RDP, VPN, proxies, and servers are to be<br />

provided with better IT Security standards.<br />

Take home message: Implement effective security awareness training to improve cyber education and<br />

don’t download anything from unknown sources.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Pedro Tavares is a cybersecurity professional and a<br />

founding member of CSIRT.UBI and Editor-in-Chief<br />

of seguranca-informatica.pt. In recent years he has<br />

invested in the field of information security, exploring<br />

and analyzing a wide range of topics, malware, ethical<br />

hacking (OSCP-certified), cybersecurity, IoT and<br />

security in computer networks. He is also a Freelance<br />

Writer.<br />

Segurança Informática blog: www.seguranca-informatica.pt<br />

LinkedIn: https://www.linkedin.com/in/sirpedrotavares<br />

Twitter: https://twitter.com/sirpedrotavares<br />

Contact me: ptavares@seguranca-informatica.pt<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security in A Multi-Cloud Environment<br />

By Paul Nicholson, Sr. Director of Product Marketing, A10 Networks<br />

As companies leverage a multi-cloud strategy to improve IT operations and provide better services to<br />

their customers, they can’t afford to overlook the implications for security. This is especially true with the<br />

emergence of a new paradigm to run multiple disparate compute environments for application delivery.<br />

In fact, while issues like creeping complexity, non-existent cross-platform visibility, and multiple vendor<br />

standards all compete for IT focus in a multi-cloud environment, enterprise leaders cite security as the<br />

top challenge of all.<br />

This trend was illustrated in a global survey of IT and business executives conducted by A10 Networks<br />

in partnership with the Business Performance Innovation (BPI) Network. In the survey, respondents<br />

reported that ensuring strong security across clouds, networks, applications and data will be critical for<br />

realising the advantages of multi-cloud IT. This is clearly a work in progress; to date, only 11 percent<br />

believe they have been highly successful in seeing the full value of their multi-cloud strategy, while a<br />

majority (51 percent) rate themselves as only somewhat successful or unsuccessful so far.<br />

A quick web search will uncover many cases of vulnerabilities and real-life incidents. In one blog post by<br />

VMware, it is noted that it’s the job of IT and security teams, not just cloud providers, to take care of many<br />

aspects of security. To stop sophisticated bots, frequent data exfiltration of personally identifiable<br />

information (PII), application attacks, and other threats, it’s essential to implement a security strategy<br />

across all your clouds, private or public that is as stringent as the one used for your on-premises solutions,<br />

if not more so.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Deterministic or Accidental Multi-cloud Complexity – It All Needs to be Secured<br />

It’s easy to understand why the proliferation of multi-cloud environments has tended to outpace the<br />

evolution of multi-cloud security. While the move to multi-cloud is often part of a clearly defined and<br />

intentional strategy, this isn’t always the case. For many organisations, the shift happens on a more ad<br />

hoc basis. For example, it may happen when a company with a single-vendor cloud strategy acquires or<br />

merges with another organisation using a different cloud platform. Business units and development teams<br />

may source their own cloud resources, with or without IT’s blessing as shadow IT. New requirements for<br />

specific services, data sovereignty (such as GDPR), or integration lead IT to add new vendors to the<br />

environment. As a result, most companies end up in a more complex multi-cloud setup than they had<br />

envisaged.<br />

Intentional or not, the evolution to multi-cloud environments typically focuses on the business and IT<br />

factors driving it. As with many technologies in IT operations, organisations first provision the services<br />

they need to address various requirements, and only then turn their attention to how best to control,<br />

govern, and manage the resulting environment. This often proves more difficult than anticipated, as<br />

shown in the results of the survey. Nearly two-thirds of respondents (63 percent) said that ensuring<br />

security across all clouds, networks, applications and data was the top challenge of multi-cloud IT, which<br />

is good news, as it is top-of-mind, even if the solutions are not ubiquitous today. Management skills and<br />

expertise (37 percent) and centralised visibility and management (33 percent) were also cited—both key<br />

concerns for effective multi-cloud security.<br />

Essential Security Capabilities and Practices<br />

As IT, security teams, and business leaders have worked to close the security gap in their multi-cloud<br />

environment, a clear sense of the most relevant technologies to leverage is needed. In the BPI report a<br />

majority named centralised visibility and analytics into security and performance (56 percent), automated<br />

tools to speed response times and reduce costs (54 percent), and centralised management from a single<br />

point of control (50 percent) as the top capabilities for improving multi-cloud security, reliability, and<br />

performance. With the volume of digital business data and transactions constantly rising, 38 percent of<br />

respondents also pointed to the need for more scalable, higher-performing security solutions. This will<br />

only be exacerbated over time, especially with the rise of IoT and the emerging 5G connectivity.<br />

Looking at the most important considerations in protecting the security and reliability of multi-cloud<br />

environments, 62 percent of survey respondents agreed on the importance of centralised authentication<br />

or pre-authentication to help maintain effective control over the users, admins, and systems allowed to<br />

access various resources across multiple clouds. One respondent, Raja Mohan, senior strategic architect<br />

for cloud and platform services at Franklin Templeton, explained the reasoning behind this emphasis:<br />

“How do we deliver highly secure applications in a way in which it doesn’t matter where they reside? How<br />

do we provide seamless, secure services? That’s the goal.”<br />

An answer to this question is seen in the high ranking of centralised security policies as a critical practice<br />

for multi-cloud IT (46 percent). Among defensive technologies, many respondents called out specific high<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


value defences such as robust web application firewalls (WAFs) (40 percent) and DDoS protection (33<br />

percent).<br />

IT Operations Need to Partner with the Security Teams for Cross-Cloud Security<br />

Organisations have been doing their best with the security tools available to them, but they’re far from<br />

satisfied with the results. “At this juncture, we’re taking advantage of security solutions from our public<br />

cloud providers augmented with our existing toolset, but we are continuing to evolve in that space,” said<br />

Mohan.<br />

Indeed, IT organisations are continually reassessing their solutions and vendors and identifying areas<br />

where change is needed. Only nine percent of survey respondent are extremely satisfied with their current<br />

security solutions for multi-cloud environments—while 38 percent see a need for significant<br />

improvements. Only 18 percent believe they do not need to re-evaluate their suppliers. Figures like these<br />

are a wake-up call for everyone in the multi-cloud security space.<br />

This evidence shows the need to adopt a Polynimbus secure application services approach to give the<br />

power back to IT and security teams so they can provide a secure and consistent secure application<br />

services environment across their clouds. Powered by application delivery controller (ADC) solutions,<br />

Polynimbus mindsets and practices will be the most effective way to ensure that multi-cloud compliance,<br />

security policies, functionality, and expectations are met, while easing the burden of over worked and<br />

stressed IT and security teams. Ultimately, this approach will make vigilance easier to enact and<br />

responsibility easier to fulfil.<br />

You can learn more about the security challenges that come with multi-cloud IT and how they’re being<br />

addressed in the complete report, “Mapping the Multi-Cloud Enterprise: Next Steps in Optimising<br />

Business & IT Agility, Efficiency & Security.”<br />

About the Author<br />

Paul Nicholson is Head of Product Marketing, Technical Marketing, and<br />

Analyst Relations teams. He has responsibility for all enterprise and<br />

service provider GTM activities for all A10 products.Paul can be reached<br />

online at (pnicholson@a10networks.com) and at our company website<br />

https://www.a10networks.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Operations Could Cause Traumatic Experiences<br />

By Milica D. Djekic<br />

It's quite risky spending your time in cyberspace. This environment could deal with so many traps, holes<br />

and weird openings. In other words, it’s possible only to make a simple click on your screen and arrive at<br />

an very inconvenient location downloading to your IT system the content that could be frightening and<br />

damaging. The cybercrime masterminds would be well-familiar with these scenarios and, indeed, they<br />

would create so sophisticated traps that would not make you get you are already in trouble once you<br />

choose such a path.<br />

Any cybercrime and cyber terrorism operation has a background and it’s important to go deeply into the<br />

past of the offense in order to discover its root. Before they make any move the hackers must know who<br />

would be interested to pay for their services, so they would not touch anyone without the certain need.<br />

The law enforcement cyber crime investigation is not only about arresting the cyber criminals or terrorists,<br />

but rather it’s about understanding the entire scheme and getting who got correlated with whom and what<br />

the higher goals of those campaigns are. So, let’s go deep into the past of any illegal activity because<br />

the hackers would conduct their operation from some location, but they would not sit there and wait for<br />

you to come and catch them. The experience would suggest that within 24 hours after the successful<br />

attack they could get many miles away from their initial base.<br />

On the other hand, the cyber terrorists could operate from some distant region and there is no chance to<br />

find them, so what you only can do is to utilize some kind of cyber warfare operation that would give you<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


an option to destroy their equipment for a period of time. They would repair their resources and keep<br />

attacking again and again. That could be quite unpleasant, could it not? In other words, always keep in<br />

mind that some mommy with the baby would be stuck at her home while not getting important web<br />

connectivity for her smart kitchen and her baby would undoubtedly be scared from not getting warm milk<br />

for a dinner.<br />

A similar scenario could happen in any office or factory if your IT infrastructure gets overwhelmed with<br />

viruses, spyware, malware and advanced persistent threats. In these cases, you would definitely deal<br />

with the business discontinuity and ineffectiveness, so your IT support team would need some time to fix<br />

everything for you. If such a situation proceeds – the things could get a bit of annoying to everyone, of<br />

course. The fact is you would not suffer the stressful condition if these situations were rare, but if it’s<br />

happening day by day, week by week and if you are losing so confidential information frequently – you<br />

would definitely get frustrated with your everyday routine for a reason the majority of your hard work<br />

would just go to waste. So, you are losing your effort just in the middle of your business day and your<br />

boss has required you to resolve your task by the end of that working week. Indeed, you are frustrated<br />

and by the bad situation – you did not expect that cyber attack at that moment – so you did not cope with<br />

your regular daily backup procedures and nothing has been saved for just in case.<br />

The bad situation could be even worse if someone has compromised your IT system from the outside<br />

and inexperienced IT security professional could blame you for dealing with the high risk cyberspace<br />

content. You would try to explain what you have done and if the law enforcement cyber team is that naive<br />

as well they could believe that you are the potential insider threat, so your firing would simply smile on<br />

you. Being the insider threat is so criminal stuff and there could be a lot of those to explain to the Police<br />

officers. Well, if you put all these into account – you would get that any cyber operation with the possible<br />

complications at work could cause real drama and trauma in your everyday life. So many people getting<br />

the skill to obtain something on the computer with internet connectivity could just get less productive and<br />

somehow paralyzed if they try to imagine what can happen if anyone seeks from them any sort of answers<br />

getting provided to the critical questions. If anyone would report about you as the possible trouble maker<br />

at least you would get suspended from your work waiting for the justice to come. The people would make<br />

the mistakes and anything that can go wrong will go wrong, so for such a reason it’s not surprising at all<br />

that you can feel a sense of fear, doubts and pessimism waiting for the IT security team and authorities<br />

to estimate what happened within the entire network.<br />

On the other hand, if your IP address is not compromised you can expect that someone could play with<br />

your network traffic and shut down your business for the several working shifts. Losing the information<br />

and especially the time is like a losing the money and so many businesses would simply collapse in front<br />

of so untactful hackers and terrorists. As it is so well-known, the cyber crime would cost the global<br />

economy a lot and no one would get avoided, so far. Well, that’s why we say it’s so significant to put your<br />

accent on the background of the cyber campaigns for a reason the masterminds of those actions would<br />

see the much bigger picture and carefully choose the time and moment to accomplish what they want to<br />

obtain.<br />

In this effort, we would go step by step through the main questions being so obvious here and we hope<br />

our contribution would find some practical applications in the world of investigative procedures and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


policies. Apparently, there is still the huge shortage for the cyber defense staffs, so what we need right<br />

here is to suggest how such a need for the skill could get overcome in reality.<br />

Assumption #1. The honest workforce would always try to make an advantage to the good<br />

employer.<br />

Explanation #1. If the people are happy at their work, they would push harder and harder in order to make<br />

their organization getting beneficial from their effort. No honest person would do anything against the<br />

good employer and if there are the cloudy days to the entire business – the loyal staffs would not leave<br />

and they would commonly get organized to save what they can save. If the relations between the<br />

employer and employees are fair, those two parties would attempt to develop the relationship full of trust,<br />

confidence and solidarity. The business is so dynamic area and there could be a plenty of ups and downs<br />

through every working day and if your mangers are kind and supportive about your effort – you would<br />

always want to remain the part of such a successful team. The solidarity between co-workers is from the<br />

crucial importance to the majority of people and only together the folks could obtain a lot. The big<br />

challenge to any organization is the insider threat and anyone being aware of the possible consequences<br />

of such a choice would never try to ruin its organization from the inside. The both – small and large<br />

businesses – are equally vulnerable to the insider threats and the employer should try to confirm all of its<br />

staffs from time to time. The honest guy if satisfied at work would always try to improve his effort and<br />

make the advantage for the entire team. On the other hand, if the relations at work are fuzzy – no honest<br />

person would attempt to go against anything and that individual would simply leave such an unhealthy<br />

surrounding. In addition, let’s say that everything inside would work perfectly and in such a situation<br />

everyone would be so pleased with everyone. The reason why we believe that any good employer would<br />

undoubtedly cope with the deep loyalty of its staffs is that if you make people feeling like the part of the<br />

healthy team, if you make them gain confidence and if you give them the chance to rise and grow as the<br />

whole – they would always remain grateful to such an organization and try to return all the received and<br />

given support coming from their principles. Anyone with the deep approach would try to develop his skills<br />

in details and that’s feasible only if your employer offers you an opportunity for such a progress. The<br />

marketplace could be the big dilemma to many business actors and no one knows what tomorrow can<br />

bring, so it’s not easy to take the right course through such a challenging journey and what you need the<br />

most in order to succeed in such a mission is the honest workforce that would not cheat on you or trick<br />

you in any sense. The people would know that and they would always be nice and helpful about anyone<br />

providing them the good conditions at work for a reason the employment is something that is needed to<br />

progress, learn and at least feed your family. No honest staff would try to be disappointing to anyone<br />

offering the fair treatment and healthy business environment to all, so far.<br />

Assumption #2. <strong>Cyber</strong> operations could be so annoying and cause the business discontinuity<br />

and ineffectiveness.<br />

Explanation #2. Imagine yourself at the work doing something in the digital environment and trying to<br />

make some backups of your efforts on a daily basis. You would know all necessary procedures and<br />

policies how to cope in the well-organized environment and it could appear that everything would go so<br />

smoothly from hour to hour. Suddenly, your machine would get some malware and the entire effort would<br />

go to waste. That’s quite annoying, right? What would that mean in practice? Basically, you would lose<br />

everything you have done that day and once you fix your system – you would need to start from the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


eginning which can be somehow embarrassing, so far. Also, your curves of productivity and<br />

effectiveness would show you are dealing with the declining trend and that could seriously impact the<br />

entire business continuity of the entire team as the entire IT network to your office would get infected with<br />

the same malware or exposed to the similar attack. Anyhow, as a professional who would get resilient to<br />

many external factors – you would yet remain somehow annoyed. The worst possible thing is you would<br />

never know when the bad guys could attack again, so you could feel some sort of frustration if such a<br />

situation gets repeated again and again. The main problem here is the business discontinuity and<br />

ineffectiveness that could dramatically impact your finances on a weekly, monthly or even annual basis.<br />

In the business world, the time is money, so if you are spending your time repairing something that should<br />

not even happen – you would affect your budget so comprehensively. Such a condition could lead to the<br />

smaller incomes to the entire organizations and once that business gets pushed into the crisis – everyone<br />

including the staffs would feel the negative impacts. From such a point of view, it’s important to take into<br />

account the cyber security and any investment in such a way could be only the advantage to everyone.<br />

The people in business could be under the pressure for working hard and getting constrained with so<br />

short deadlines, so they can manage some level of the stress – but if you put them on the fire every single<br />

day and if they begin suffering the hacking attacks periodically – they would definitely get overannoyed<br />

and need some time to overcome such a given obstacle. The major point in this case could be that the<br />

business would cope with so many marketplace challenges and demands, so any sort of loss coming<br />

from the lack of safety and security procedures as well as policies should get avoided or if happens –<br />

fixed as soon as possible. The good managers would deal with the strong leadership capacities and they<br />

would always try to encourage and motivate the people to work hard and go beyond their limits. In other<br />

words, if there is any issue regarding your operating system crashes or DDoS campaigns – that’s<br />

something the great leader at work should need to know to mange as well – as that could be from the<br />

critical significance to the entire team and its productivity and effectiveness.<br />

Assumption #3. The repeated IT anomalies at work could impact stress and anxiety with<br />

employees.<br />

Explanation #3. It’s the beginning of your working day and you would cope with the brief catch up meeting<br />

with your supreme and the rest of the colleagues in order to try to figure out how to make your daily<br />

schedule and the listing of tasks. It could appear as quite advantaging to do some brainstorming at the<br />

beginning of your business day because the good team would encourage you to go beyond your limits<br />

giving you the chance to feel the deep thankfulness to everyone for making you provide the best out of<br />

your own performances. In the healthy team, everything is about who would motivate whom to give his<br />

maximum every single day and become the meaningful member of the group. So, if you woke up with<br />

the thought that you could never accomplish something and at the end of that working day you even gave<br />

more, you would definitely get proud of yourself and truly grateful to the guys in your workplace for letting<br />

you obtain so. Well, your business day would begin in the quite constructive manner and you would be<br />

full of confidence about the coming obligations and challenges you should face up tomorrow. The next<br />

day would come and you would start it with the same routine being so excited that even then you would<br />

be better than yourself. And suddenly – the collapse! The entire IT infrastructure would shut down and<br />

you would lose a lot of your current effort. It’s OK! You are the professional and you can manage the<br />

stress. Well, someone would fix everything and you would proceed with your hard work and probably get<br />

chosen for the employee of the month for such a season. New month, new expectations! You would feel<br />

like a boxer in the ring getting ready to knock down all your tasks for such a tournament. And then – the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


new collapse! Your entire IT asset would go down. That’s the quite annoying condition, right? It would<br />

appear that you would need to kick off not only your tasks, but rather the entire hacker’s community. You<br />

are the champ and you know that, but if those anomalies keep repeating you could develop some kind<br />

of stress as well as anxiety. No champ wants to lose, but those annoying bad guys could make you lose<br />

your patience. The champ with the mental health concern is not the champ and that’s literally the<br />

message that the cyber criminals send to you. If you are upset, you cannot win the tournament and they<br />

know that – so, in such a sense you would get knocked down by them and that’s seriously what you did<br />

not want at all. Well, if you notice that someone in your company is moving your cursor in front of your<br />

nose – you would if anxious need to break your workstation in pieces. That’s what we call the violence at<br />

the workplace! So, few months ago you were the champ in your office and now you are only someone<br />

getting so impatient about everything that is happening around you. The obvious reasons for that are<br />

those so crazy anomalies in your IT environment. So, the point is clear! Even the best performance<br />

workers could feel like losers if they got no appropriate condition to operate. The bad guys would know<br />

that and they would so lucidly exploit such a weakness and make even the best employees feel like<br />

dummies. That’s quite discouraging, is not so? As time goes on everyone would become resilient to that<br />

amount of stress, but the first reaction could be quite irrational and that’s something no one would need<br />

at all.<br />

Assumption #4. The state of readiness could turn into a waiting condition if the common worker<br />

got insufficient abilities in the cyberspace.<br />

Explanation #4. So, maybe you lost your temper with the first IT anomalies occurring in your network, but<br />

sooner or later you would build on your resilience to cope with those incidents. In other words, you would<br />

get in the state of preparedness regarding the possible hacking attacks. The state of readiness is so<br />

positive attribute, but if you have developed the fear that everything could go wrong – you are definitely<br />

dealing with the waiting condition. That’s could be quite distracting for a reason it would lower your<br />

concentration as well as focus on your tasks. So, if your inner voice is telling you to watch out from the<br />

possible cyber operations happening at your work, your entire business performances would decrease<br />

and you would easily get upset about anything you do. It can happen that you would sooner or later<br />

develop the scary emotions about your work and that’s something that should get prevented if possible.<br />

As there is the suggestion to many employers to invest into the cyber defense – we could add it’s<br />

significant to care about the staffs’ mental health and provide them the training how to cope with their<br />

anxiety level. The fact is some workforce would not be that brilliant in the cyberspace, so they would<br />

undoubtedly develop the waiting condition if they face on several cyber campaigns and lose some of their<br />

valuable data. In other words, these guys would be less confident with the company and they would<br />

easily get bullied by such skillful cybercrime actors. The waiting condition could get manifested with so<br />

obsessive thoughts and sometimes emotions about some event. If your mind is preoccupied with so<br />

many repeating thinking patterns about some pessimistic ideas – you would obviously get less effective<br />

regarding your usual routine. The cybercrime can occur at any time and any place and the experienced<br />

IT security professionals would sit in front of their screens and tackle those concerns applying so<br />

sophisticated cyber defense tools on. You should always get that in mind before you let your overobsessive<br />

fears taking control over your ratio. If you really cope with the insufficient IT skill – you could<br />

get annoyed with anything happening in the cyberspace. Your subconscious mind would accumulate so<br />

many doubts, questions and ugly memories and that’s why you would feel the frustration about any new<br />

working hour waiting for something bad to happen again and again. In other words, it’s quite clear that<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


carefully prepared and conducted cyber operations could cause some kind of drama and trauma in the<br />

business arena. Even the most experienced IT security professionals are not fully immune to these<br />

scenarios as they need the huge concentration to take control over their irrational drives and let their<br />

rational thoughts get their place in their awareness. So, the question is what the chances of the common<br />

employee to handle all those are. Practically, any competitive employer would try to offer the suitable<br />

working conditions to all its staffs, but the bad guys simply must keep us in fear – so, if anyone wants to<br />

use anyone in the business sense, he should provide some kind of support to all about all unwanted and<br />

unpredictable situations and events coming on.<br />

Assumption #5. The traumatic syndrome is a manifestation of the negative emotions about some<br />

event, person or relation from the survived experiences.<br />

Explanation #5. Dealing with the crime scene could be the quite unpleasant experience. Even the law<br />

enforcement professionals tackling some crime in the physical environment could not be fully resilient to<br />

those insights. Apparently, they need to get developed the stress management skills at some level, but<br />

sometimes it’s so hard to cope with all the challenges of such a career. The cyberspace itself could also<br />

get correlated with the crime scene and indeed, so many high tech offenses have been committed there.<br />

The cyber defense specialists who would assure the digital devices being in the network would cope with<br />

some amount of the stress management capacities, but the common employees not being that familiar<br />

with the IT world would easily become the victims of the cybercrime and hacker’s attacks, so they could<br />

develop the quite inconvenient condition, so far. The traumatic syndromes are frequently linked with the<br />

victims of the crime and those persons could struggle about some survived experiences from their past<br />

getting correlated with the persons, events or relations on. The masterminds of the cybercrime and high<br />

tech terrorism are so dangerous guys providing so harmful strategies and tactics in order to make the<br />

psychological impact on their victims. In addition, these malicious actors would see the ordinary people<br />

as their targets and especially in the sense of the terrorism – there would be a lot of offenses that should<br />

push the victims into the crisis. The cybercrime groups would commonly work for the profit, but as the<br />

armed robbery could be the nightmare to anyone being present on the crime scene – the similar case is<br />

with the cybercrime victims. They could stay deeply frustrated about what happened in their virtual<br />

environment. On the other hand, the cyber terrorists are far more frightening for a reason they would try<br />

to conduct the cyber operation in order to shake someone’s confidence or leave so deep impact on his<br />

mental health condition. In other words, it’s not only about who would annoy whom – in the case of the<br />

terrorism, the bad guys would go far more beyond the typical bullying and they would literally attempt to<br />

intimidate their victims, so far. In such a case, the fear could go deeply into your bones and if you choose<br />

to attend your doctor, he could diagnose you with some traumatic syndrome. These sorts of attacks are<br />

happening every single day at so many places and it’s important to build on the adequate response<br />

techniques and methodologies to these kinds of crimes. The cyberspace is never safe enough and does<br />

not matter how hard the IT security professionals would work to assure all of us – the bad guys would<br />

always find the holes in the system to approach us. So, if we talk about the traumatic experiences, we<br />

could mention so obvious case of losing data and passing through so requiring procedure in order to<br />

prove that you have done something that day, but you remained without such an effort due to the hacker’s<br />

operations. In the business sector, we all would cope with some rules and follow the strict behavioral<br />

codex that would not let us getting so personal with our co-workers, so sometimes it’s so complicated<br />

explaining your boss that you have worked so hard to produce something and all of it just vanished in the<br />

sub-second period of time. The cybercrime investigation would probably find the clues for your story, but<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


so many inexperienced staffs would not know that and they would pass through the real hell being so<br />

scared that no one would trust them or they could cope with some restrictions for not dealing with the<br />

enough evidence at that moment. So, in our opinion – such a situation could get prevented and the entire<br />

traumatic impact could get reduced if the employees would know how to handle such a case. For<br />

instance, it’s important to teach your staffs to respond so appropriately to that occurrence and it’s needed<br />

to suggest to everyone that there must exist the certain level of the trust amongst the team’s members.<br />

Well, if your heavy work has been destroyed in any sense while you were operating in the cyberspace,<br />

you are definitely the victim of the illegal activity and only that could be quite traumatic to your mental<br />

health state. In other words, it would seem that we are still on the search to the accurate responses to<br />

these occurrences, so at this stage, it’s crucial to understand that we need to protect our assets as well<br />

as people the best we can.<br />

Assumption #6. <strong>Cyber</strong> operations need skillful hackers.<br />

Explanation #6. Hacking is easy if you have someone’s IP address and the rest of the access details.<br />

There are so many professional tracking tools that could support you to track anyone’s accounts on.<br />

Simply the black market would get in possession of these effective applications and the bad guys would<br />

so massively exploit these gadgets. The reasons why the black market has become overwhelmed with<br />

such software is the never ending insider threat challenge. In other words, someone from the legal system<br />

would sell those products to the malicious actors not caring at all about the possible consequences to<br />

the community. Also, we would notice that there are a lot of email address hunting tools that could serve<br />

for discovering someone business account details and once you get someone’s email address you would<br />

not need his password as the professional security tool would give you the tracking permissions. In<br />

addition, if you are playing with someone’s email detail – it’s quite clear that you can easily conduct the<br />

phishing campaign that would offer you much more access information. So, once you get enough data<br />

to make a breach to someone’s device – you would be in position to expose the entire network and make<br />

some changes regarding those IT assets. The experience would show that the hackers are so skillful<br />

guys and they can do a lot in order to offer the access to any digital environment. Indeed, there are a<br />

plenty of the social engineering techniques that could get applied in order to threaten everything –<br />

including the both – physical and virtual security. If anyone believes being the hacker is easy task, he is<br />

purely mistaken. The practice would suggest that those guys are outstandingly intelligent and quite quick<br />

in the cyberspace. Maybe someone would formulate the strategy on what is needed to get done in sense<br />

of either psychological or profit making operations and those cyber criminals would just find the way to<br />

accomplish such a requirement. So, as it is quite well-known there is the entire black market on the<br />

Darknet that would offer you a plenty of services beginning with the narcotics distribution, over contract<br />

murder, until the rent-a-hacker services. In other words, anyone getting the capacity to make the strategy<br />

could pay to the member of the cybercrime underworld to conduct some cyber operation that could cope<br />

with the wide spectrum of feasible applications and usages. Some studies would show that those hacker’s<br />

groups would function as the enterprises that would get capable to make the billions of dollars per an<br />

annum. In other words, if the terrorists or any transnational crime groups make a decision to attack<br />

anyone in order to do some sort of intimidation or cyber warfare – they would rent so skillful professional<br />

hackers that would so smoothly deliver those campaigns. Apparently, so many cyber terrorists would<br />

have the capabilities to provide the cyber operations in order to intimidate as many people as they can<br />

and in such a case – it’s clear that even those bad guys could deal with the exceptional hacking skills.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


No threat is naive and the members of the cyber defense community should get aware of so before they<br />

run any kind of the counter-offensive operation on.<br />

Assumption #7. Some cyber campaigns could be prevented.<br />

Explanation #7. In the majority of cases, so many business assets worldwide would cope with quite poor<br />

cyber defense. The samples of well-equipped security operating centers are so rare and it would seem<br />

that the small enterprise area would still be unprotected branch of human activity. So many legal<br />

businesses would need the better IT skill to all their staffs including the entire management as only some<br />

of them could get assumed as knowledgeable in the field of emerging technologies. So, if they would<br />

cope with the stronger IT security capacities – they could prevent so many of the incoming cyber attacks<br />

and operations, so far. From such a point of view, it would appear that the cyber skill shortage is still so<br />

deep and the smart management should think hard how to improve all it can advance in order to avoid<br />

so serious incidents as we mentioned before. The majority of businesses on the marketplace are small<br />

or medium sized and it’s quite obvious even if they are the key pillar of any economy – they cannot handle<br />

such a challenging situation on their own. In other words, they need the support from the government<br />

agencies in order to get some instructions how to improve and strengthen their IT infrastructure. The<br />

need for the qualified IT security staffs is bigger than ever as we would cope with so hard time in the<br />

history that would bring us the real worries and concerns. On the other hand, the crime is mainly the<br />

international business and for such a reason the international collaboration between the defense and<br />

intelligence services is more than necessary at the present time. In addition, everyone with the vision<br />

would know that the present is only the moment and it’s needed to think about the coming days that<br />

would seek from us to develop so deep and trustworthy connections between the national, regional and<br />

international security agencies. Next, let’s return to the ordinary office belonging to some firm that would<br />

have its own IT network, but not enough qualified cyber employees at all. If we keep developing our story<br />

we would figure out that so many common people would not even know that there are the quite suitable<br />

IT security tools that can prevent us from so basic hacking campaigns. In other words, it would be useful<br />

to install some anti-malware software on your device in order to prevent your system from any malware<br />

being matched with your application’s database. Also, there are a plenty of options for the relatively safe<br />

website usages and those gadgets should get applied in order to offer to yourself the quite convenient<br />

internet experience. It would not cost you a lot, but it would serve some purpose! On the other hand,<br />

there is no absolute security and it’s only the matter of time and effort when some system would get<br />

broken. That’s why the majority of software would need the patches and updates at the periodical level<br />

and if we take all those into the consideration – we would realize once well-equipped with the gadgets<br />

and skills we can expect that some of the incoming cyber operations could get prevented or at least<br />

reported to the law enforcement officers who would find the methods to tackle such a concern.<br />

Assumption #8. Experienced IT security professionals should rely on skills, not irrationalities.<br />

Explanation #8. If your IT asset is often exposed to cyber attacks, it could be quite tricky even to the most<br />

experienced IT security staffs to cope with such a task. The IT defense needs the huge concentration<br />

and ability to think fast as well as cope with the brilliant linkage capacities. So, if you are not capable to<br />

correlate the stuffs quickly and accurately or in other words – if you do not have the great reflexes, you<br />

could be quite useless for the role of the IT security support. It’s about the good defense, right? As the<br />

other security officers would be good in shooting and accurately hit all the moving aims the IT security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


manager should get capable to terminate all the external connections trying to log to his network. In such<br />

a case, maybe you would not be the excellent target shooter, but you would definitely get recognized as<br />

the outstanding trouble shooter for the cyberspace. Sometimes the web traffic is so busy and there are<br />

so many breach attempts, so our troubleshooter should demonstrate the strong focus and good patient<br />

in order to remain calm and rationally resolve any trouble being active in the asset’s network. The fact is<br />

even the well-trained police officer carrying on the gun could lose the control over the situation and cope<br />

with some kind of irrationality, so it’s not surprisingly at all for the experienced IT security professional to<br />

lose the battle with his impatience and push aside all his skill and logical reasoning. That can happen<br />

even to the most experienced cyber staff and the secret of how to stay away from such a scenario is to<br />

practice your mind to remain concentrated even when the things are so hard. Sometimes the hackers<br />

could be so annoying and you can lose your temper getting the real cyber warfare with the bad guys.<br />

Does not matter how hard you try to terminate them from your IT infrastructure – they would persist and<br />

persist. The first things you would want to do in such a case is to send everything to the hell, but that<br />

would lead you nowhere. You need to remain with your workstation and continue combating against<br />

those annoying folks that would simply want you lose control over the entire situation. In so many cases,<br />

if you are protecting the critical infrastructure – you would know that there is no place for the mistake.<br />

You just must win that war! So, your mind needs to be in the peace and you need to rule over your<br />

irrationalities in order to make the rational, prompt and accurate decisions on. No space for any mistake!<br />

You know that and at latest you are paid to be flawless. On the other hand, if situation goes outside of<br />

the control – the responsibility could be yours, yours and only yours. You do not want that, right?<br />

Additionally, the IT security role would seek from you to be the good team player and if there is no<br />

accurate communications between the team’s members the bigger is change to the bad guys to obtain<br />

what they wanted to do.<br />

Assumption #9. It’s inconvenient losing your IT resources frequently.<br />

Explanation #9. The IT resources could be your data, software, operating system or the entire hardware<br />

devices. The trouble with the new generation cyber threats is that they could make your gadget getting<br />

broken or fully damaged. So, it’s not only about spending your time to fix your software irregularities – it’s<br />

more about losing your money for the entire IT infrastructure replacements. That’s so expensive and if<br />

it’s happening from time to time – you would figure out you would deal with the real financial losses. No<br />

organization would want that happens to so, right? That’s why there are some guidelines and<br />

recommendations to invest into the cyber defense within your facilities. So, the need for the competitive<br />

cyber security is so big and if you do not want to repair, re-install or replace all your resources and the<br />

other IT capacities – you should know how to prevent those occurrences even appear. Simply, it’s the<br />

stress to everyone in the organization to cope with such a loss and business discontinuity. There are<br />

some suggestions that some advanced persistent threats could make your hardware getting<br />

malfunctioned. The fact is there are so many malware that could break your processor’s unit and in such<br />

a case – there is no way to fix anything – you just need to throw everything into the rubbish and buy the<br />

new hardware configuration on. It’s so inconvenient, right?<br />

Assumption #10. <strong>Cyber</strong> operations could have a psychological effect.<br />

Explanation #10. The greatest fear to any business is not only to lose its sensitive information, but rather<br />

the entire IT infrastructure. In other words, if you cope with the fear about anything you could go under<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the psychological effect that could get used by the bad guys who would want you to give up from your<br />

routine and activities. It would get the sense of sabotage, right – and basically, that’s the case! The aim<br />

of any psychological operation is to disable its enemy and make it getting so powerless in front of the<br />

offenders. Next, if the people are dealing with the irrationalities, that could fully decrease their focus on<br />

the work and make them getting less productive and effective about their tasks. Finally, if you are preoccupied<br />

with the thoughts that everything could go to the waste with the only one your click – it’s<br />

seriously something that can push you into the deep mental health crisis and probably personal<br />

frustration. If only one team’s member feels bad about anything that condition could get reflected to the<br />

entire team and that’s something any competitive employer is scared about. So, cyber operations could<br />

cause such traumatic experiences and there is the realistic need to think hard how to overcome such a<br />

condition. Sooner we get how – better we would cope with the coming perspectives!<br />

Comments<br />

In this effort, we would provide a deep insight into the certain topic in order to explain some of its<br />

perspectives in more detail. In our opinion, such a review could be used as the starting point to the<br />

development of some security and safety procedures and policies. Also, it could help to the law<br />

enforcement and intelligence agencies to navigate some investigative process as well as create the law<br />

enforcement and intelligence knowledge bases. Next, this effort could support the forensic detectives<br />

and investigators in their need to clarify some aspects of their work. In addition, those could be the helpful<br />

updates to the law makers to cover on and respond to all the security challenges through the appropriate<br />

legal frameworks and regulations. In our belief, some suggestions to the best practice in the criminal<br />

justice environment have been made as well. Finally, this review would cope with some business ideas<br />

and it could serve as the encouragement to an emerging marketplace economy, so far.<br />

About the Author<br />

Milica D. Djekic is an Independent Researcher from Subotica,<br />

Republic of Serbia. She received her engineering background<br />

from the Faculty of Mechanical Engineering, University of<br />

Belgrade. She writes for some domestic and overseas presses<br />

and she is also the author of the book “The Internet of Things:<br />

Concept, Applications and Security” being published in 2017<br />

with the Lambert Academic Publishing. Milica is also a<br />

speaker with the BrightTALK expert’s channel. She is the<br />

member of an ASIS International since 2017 and contributor to<br />

the Australian <strong>Cyber</strong> Security Magazine since 2018. Milica's<br />

research efforts are recognized with Computer Emergency<br />

Response Team for the European Union (CERT-EU), Censys<br />

Press and EASA European Centre for <strong>Cyber</strong>security in<br />

Aviation (ECCSA). Her fields of interests are cyber defense,<br />

technology and business. Milica is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Hackers Are the Future of <strong>Cyber</strong>security…<br />

By Keren Elazari , ASIS International<br />

Even before the age of the internet, you could always tell which young girls and boys were going to grow<br />

up to be engineers. They were the ones disassembling all the clocks, radios, and other electrical gadgets<br />

in their houses, vexing their parents. They were the ones building the earliest computers in their<br />

basements, with no other goal than to see if they could make the thing work – and then see if they could<br />

make it work faster.<br />

In the current technology era, you can identify many future cybersecurity experts in much the same way.<br />

They are the ones who are figuring out how to disrupt traditional systems, to slip unnoticed into networks<br />

or to create new pathways for information. In other words, they are hackers.<br />

Obviously not all hackers choose to use their craft for positive purposes. However, those who do provide<br />

a set of cybersecurity skills that are unmatched for their ability to solve problems, eliminate vulnerabilities,<br />

and prevent threats from becoming catastrophes.<br />

Keren Elazari understands this perspective much better than most. From a young age she saw herself<br />

as a hacker who uses her role to create better systems and improve outcomes. Throughout her career<br />

she has brought her hacker point of view to bear on strengthening network security for dozens of<br />

organizations, based on the premise that hackers can identify vulnerabilities and solve tech problems<br />

better than anyone else.<br />

Today, as a cyber security analyst, author, and researcher, Elazari has built an impressive roster of<br />

accomplishments. In her 2014 TED talk, "Hackers are the Immune System of the Internet", she shares<br />

her point of view about the vital necessity of working with hackers to build up the strongest possible cyber<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


defenses. One of the most-watched TED talks on the subject, it helped shape the global conversation<br />

about the role of hackers and the evolution of cybersecurity in the information age.<br />

In September, Elazari will deliver a keynote address during a General Session at Global Security<br />

Exchange (GSX). This event brings together professionals from cyber, operational, and physical security<br />

– three disciplines which have merged to become inseparable. In her session, Elazari will present the<br />

hacker’s point of view in making a compelling case for why cybersecurity is now fundamental to our way<br />

of life.<br />

While hackers are typically thought of and depicted in the media as breaking into a network from a remote<br />

location, in fact the reality is quite different. Today, very often a network breach begins with a physical<br />

breach. Using social engineering, picking a lock, or otherwise breaking into a facility can be the fastest<br />

and easiest way for a cyber criminal to get easy access to the network. Once inside, they can steal a<br />

laptop or other device, or slip into a server room and simply plug in.<br />

For this reason, physical security has become more important than ever before. While this discipline has<br />

always been fundamental to protecting an organization and its people from workplace violence, theft,<br />

vandalism, and other risk, now it is also a critical cybersecurity measure.<br />

The opposite perspective is also true; a cyber breach can be the first step in engineering a physical breakin.<br />

Using a vulnerable entry point – which in the IoT world could be a Wi-Fi camera or something as<br />

esoteric as a smart fish tank or a gas pump – criminals can disarm alarm systems and electronic locks,<br />

making it easy to walk into a facility and commit theft or other crimes. Worse, all these IoT devices can<br />

be hijacked to become digital assets in wide-scale criminal activity.<br />

ASIS International, who produces GSX, has been a pioneer in recognizing the merging of physical and<br />

cybersecurity. Bringing speakers like Keren Elazari to the forefront each year has helped both physical<br />

security professionals and cybersecurity experts better understand how neither can properly function<br />

without the other. It is the responsibility of every citizen, consumer, and business owner to ensure that<br />

correct security protocols are in place at all times. As every hacker knows, it takes only the slightest crack<br />

in the cyber armor to enable a devastating attack. Read more details about Elazari’s GSX session as<br />

well as other cybersecurity education and training available at GSX.org/CDM_Hacker.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Crimes Will Increase with Shift to Teleworking<br />

By Andy Sauer, Director of <strong>Cyber</strong>security, Steel Root<br />

With the sudden shift to work-from-home operations, businesses are now forced to deal with increased<br />

activity from both independent and nation-state cyber criminals. Unfortunately, malicious actors view any<br />

potential security weakness as an opportunity to access and steal your data. In fact, according to this<br />

story from The Hill, The <strong>Cyber</strong>security and Infrastructure Security Agency (CISA), the Department of<br />

Homeland Security’s cyber agency, recently issued an alert “pointing to specific cyber vulnerabilities<br />

around working from home versus the office. CISA zeroes in on potential cyberattacks on virtual private<br />

networks (VPNs), which enable employees to access an organization’s files remotely.”<br />

With entire companies teleworking from home, security can be compromised; companies need to be<br />

more vigilant and implement new processes and procedures to ensure that cybercriminals are not<br />

successful.<br />

Why the increased threat? There are a number of reasons why the sudden move to a remote workforce<br />

can lead to cybersecurity breaches. These include:<br />

• Behavioral changes: Working off site, employees tend to be more relaxed and more likely to let<br />

their guard down – perhaps even answering emails designed to provide data access to hackers.<br />

Also, with stress levels increased, staff might be more inclined to be reactive and less strategic in<br />

their actions. Malicious actors typically apply high pressure and quick turnaround.<br />

• Situational changes: Working in disparate locations, security instructions and access rules can<br />

fall through the cracks. This can result in less stringent oversight of transactions and other key<br />

workflows.<br />

• Technological changes: Suddenly companies are forced to extend their firewalls beyond the<br />

physical boundaries of their office. Company systems are being accessed from a wide range of<br />

devices, even personal devices. These changes can lead to compromise, data sprawl and other<br />

challenges.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What businesses can do. There are practices companies can adopt to shore up their cybersecurity to<br />

prevent potential attacks and data breaches. Here are a few things companies can and should do.<br />

• Organize your response to this crisis in advance of a problem. Get communication, incident<br />

response and business continuity plans in place, and share with all personnel.<br />

• Adapt and set organizational expectations and rules of engagement for communications.<br />

• Make sure you have a Disaster Recovery plan, with Backup and Restore of all systems. Test your<br />

recovery plan regularly.<br />

• Establish approvals for key workflows, such as transactions or security permissions – and ensure<br />

that you have a process for verifying these critical activities (ex. wiring money).<br />

• Prioritize the use of multifactor authentication or other conditional rules for accessing company<br />

systems remotely.<br />

• Make sure your employees are only using approved devices to access company data – set strict<br />

guidelines for the use of personal devices.<br />

• Check to see that you are appropriately licensed – some VPN solutions will not allow users over<br />

the maximum license count.<br />

• Ensure your now critical remote access infrastructure is monitored and patched regularly.<br />

• Business must go on. Workflows must continue. Make sure you have the tools and infrastructure<br />

in place to support normal working conditions remotely.<br />

• With what may be months away from the office and from each other, keeping your teams engaged<br />

could become a challenge. As someone who generally works remotely, I recommend you use<br />

video liberally, even for quick conversations. This usually results in consistent engagement.<br />

• Enlist the assistance of your IT/security team/outsourced providers to support your business<br />

through this temporary but substantial change.<br />

There are actions every company can and should take to safeguard their systems and data in the new<br />

business landscape. When you plan for cyber criminals to give it their worst, you’ll be better prepared to<br />

survive, maintain connectivity and security, and even thrive during this time of disparate home offices<br />

and telework.<br />

About the Author<br />

Andy Sauer is Director of <strong>Cyber</strong>security at Steel Root in Salem, MA. In this<br />

role, he specializes in helping defense and federal contractors meet their<br />

compliance obligations and build their cybersecurity capability to meet the<br />

modern threat landscape head-on. Prior to joining Steel Root, Andy<br />

managed IT operations and cybersecurity in the defense industry, internally<br />

and as a consultant. He currently holds the following certifications: CISSP<br />

(Certified Information Systems Security Professional) from ISC2 and a<br />

CISM (Certified Information Security Manager) from ISACA.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Attacks at Sea: Blinding Warships.<br />

Are GPS completely vulnerable to cyberattacks?<br />

By Julien Chesaux, <strong>Cyber</strong> Security Consultant, Kudelski Security<br />

Who Controls the Sea, Controls the World<br />

The annual multilateral exercise between the U.S. and Thai army, named “Cobra Gold” 14 sees the<br />

deployment of the latest navy warships as a proof of military domination in a contested region and<br />

reminds us the fragility of technologies at sea as a chain of incidents demonstrated in 2017.<br />

The world’s oceans can be beautiful and awe-inspiring, but also very dangerous. Most importantly, they<br />

are strategic for the global economy and, consequently, countries compete to control them. Statistics<br />

reveal the high value of the high seas: 70% of the globe is covered by water and over 90% of the world’s<br />

trade is carried by sea. Moreover, the global merchant fleet totals 50,000 ships that move 9 billion tons<br />

of merchandise annually, representing a turnover of $2,000 billion. 15<br />

Human history is punctuated with many regional or global exchanges that happened through decisive<br />

battles at sea. The battle of Salamin saw the Athenians saving the concept of democracy against the<br />

14<br />

WILLIAMS Zachary. “Cobra Gold <strong>2020</strong>: America’s Strategic Shift in Southeast Asia”, The Diplomat, Mar 6, <strong>2020</strong><br />

https://thediplomat.com/<strong>2020</strong>/03/cobra-gold-<strong>2020</strong>-americas-strategic-shift-in-southeast-asia/<br />

15<br />

Sea Europe. “2017 Market Forecast Report”, Sea Europe, 2016<br />

https://maritimetechnology.nl/media/2017-Market-Forecast-Report-finaal.pdf<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Persians. The battle of Actium allowed the Roman Republic to become an Empire. The battle of Trafalgar<br />

destroyed Napoleon’s aspiration to invade Britain.<br />

At the beginning of the 20 th century, in 1905, the battle of Tsushima humiliated the Russian Empire and<br />

opened the pathway for an Imperial Japan. During WWI, the battle of Jutland contained the Imperial<br />

German Navy and WWII witnessed the battle of Midway that established the U.S. as the new navy<br />

superpower after the destruction of Japanese’s aircraft carriers fleet in the Pacific. More recently, the<br />

Crimea annexation by Russia was, even if triggered by different causes, a geopolitical move to avoid the<br />

loss of access to the Mediterranean Sea.<br />

The current hawkish posture and the “gunboat diplomacy” followed by China is not a surprise regarding<br />

its ambitions to play a greater global leadership role, to protect its shores where most of its economic<br />

activity occurs (its “strategic belt”), and to defend its natural resources and sea lines to supply them from<br />

the South and East China Seas (represented by the Nine-Dash) to the Indian Ocean (currently projected<br />

as the “String of Pearls” 16 ).<br />

A Global Rivalry with Multiple Bottlenecks<br />

Because globalization increases global trade, sea roads are busy and multiple bottlenecks are under the<br />

spotlight, including many straits and canals. For instance, the Strait of Malacca represents 40 % of global<br />

trade, 50% of energy trade, and is indispensable for regional hegemons like China and Japan.<br />

Another geostrategic path is the Strait of Hormuz, between Oman and Iran, through which all the Gulf oil<br />

trade moves. In this region, the U.S. Navy is face-to-face with the Iranian one. The USS Harry S. Truman<br />

aircraft carrier is presently deployed in the Arabian Sea (near Oman) as part of the U.S. 5 th fleet, which<br />

covers the Middle East, a crucial region for the U.S. as 18% of its imported oil comes from the Persian<br />

Gulf countries. 17 In 1967, the blockade of the Strait of Tiran by Egypt was used as casus belli by Israel<br />

and started the Six-Day War. Indeed, the Strait is the only way to leave the Gulf of Aqaba and gain access<br />

to Iran’s oil. Other important passages such as the Bab El-Mandab Strait, the Danish Straits, or the<br />

Bosporus are well-known narrow gullies.<br />

Canals are equally critical for international trade, especially the Suez and the Panama ones. The former<br />

was the theater of a war in 1956 between Egypt and a French, British and Israeli alliance (encompassed<br />

in the secretive Protocol of Sèvres) to regain control after being nationalized by the infamous Egyptian<br />

President Nasser. The latter, under U.S. control for almost 100 years, was retroceded to Panama and<br />

recently enlarged to accommodate the new bigger ships and ensure revenue to Panama as it represents<br />

5.5 % of its GDP.<br />

16<br />

HUGHES Lindsay. “String of Pearls Redux: Increased Concern for India”, Future Directions International, Nov 13, 2018<br />

http://www.futuredirections.org.au/publication/string-of-pearls-redux-increased-concern-for-india/<br />

17<br />

U.S. Energy Information Administration (EIA). “How much petroleum the United States import and export?”, EIA, Apr 4, 2017<br />

https://www.eia.gov/tools/faqs/faq.php?id=727&t=6<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Art of Hacking Navigation Systems<br />

In 2017, some incidents at sea have sparked interrogations as hundreds of South Korean fishing vessels<br />

returned earlier to port after their GPS (Global Positioning System) signals were jammed, allegedly by<br />

North Korean hackers. 18 Later this year, a ship in the Black Sea reported to the U.S. Coast Guard<br />

Navigation Center that its GPS system had been disrupted and that over 20 ships in the same area had<br />

been similarly affected. 19 In Asian waters, deadly collisions happened twice in two months; In <strong>June</strong> 2017,<br />

the USS Fitzgerald was struck by a container ship off the coast of Japan, killing 7 sailors. Later during<br />

the year, an oil tanker smashed the USS John S. McCain near Malaysian coast and 10 sailors died. 20<br />

There were also two other lesser-known incidents in 2017: in January, the USS Antietam ran aground<br />

near its base in Japan and in May the USS Lake Champlain collided with a South Korean fishing vessel. 21<br />

Consequently, Vice Admiral Joseph Aucoin was relieved of his duty as commander of the U.S. 7 th Fleet,<br />

the largest forward-deployed U.S. fleet based in Japan and covering Asia. 22<br />

The causes of all these incidents are not clear. Some experts blame the weather, the heavily reliance on<br />

technology, the feeble signal of GPS, cyberattacks, the diminution of crew members or the high pace of<br />

deployment lacking training and maintenance. Regarding the number of incidents in a less-than-one-year<br />

period and the highly disputed regions where incidents happened (South East Asia and East Asia), the<br />

theory of a deliberated influence on navigation systems through cyberattacks is legitimate, especially<br />

when the navigation system used is analyzed.<br />

Ships orientate themselves through Global Navigation Satellite System (GNSS) with many countries<br />

using their own: GPS for the U.S., GLONASS for Russia, GALILEO for the E.U., QZSS for Japan, BeiDou<br />

for China, and NAVIC for India. Although precise to a few meters, this technology is not highly secure<br />

because the message is feeble and can be hacked. The same year of these incidents, a security<br />

researcher based in France was able to enter the satellite communications system of a ship: Through<br />

Shodan, a specific search engine that can reveal connected devices, and by entering a simple username<br />

(admin) and password (1234), he accessed the communication center of a commercial ship and posted<br />

his performance on Twitter: “I’m connected to a mother****ing ship as admin right now. Hacking ships is<br />

easy”. 23<br />

18<br />

SAUL Jonathan. “<strong>Cyber</strong> threats prompt return of radio for ship navigation”, Reuters, Aug 7, 2017<br />

https://in.reuters.com/article/us-shipping-gps-cyber-idINKBN1AN0HT<br />

19<br />

Ibid.<br />

20<br />

FIFIELD Anna. “Bodies of all 10 sailors missing on USS John S. McCain have been recovered”, The Washington Post, Aug 27, 2017<br />

https://www.washingtonpost.com/world/bodies-of-all-10-sailors-missing-on-uss-john-s-mccain-have-been-recovered/2017/08/27/a2af6c4a-8b8c-11e7-<br />

a2b0-e68cbf0b1f19_story.html<br />

21<br />

BARANIUK Chris. “Why it’s not surprising that ship collisions still happen”, BBC, Aug 22, 2017<br />

http://www.bbc.com/future/story/20170822-why-its-not-surprising-that-ship-collisions-still-happen<br />

22<br />

AFP. “U.S. Warship Collisions Raise <strong>Cyber</strong>attack Fears”, Security Week, Aug 23, 2017<br />

http://www.securityweek.com/us-warship-collisions-raise-cyberattack-fears<br />

23<br />

CHAMBERS Sam. “Ship’s satellite communication system hacked with ease”, Splash 24/7, Jul 19, 2017<br />

http://splash247.com/ships-satellite-communication-system-hacked-ease/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


New Alternatives<br />

To prevent this over-dependency on GNSS for Positioning, Navigation and Timing (PNT), some states<br />

are developing alternatives that rely on radio frequency, an old technology used since WWII. One of<br />

these systems is called eLoran (Enhanced LOnge-RAnge Navigation) and although it is less accurate,<br />

regional, and only two-dimensional, it offers a powerful signal that deters jamming or spoofing. 24 The cost<br />

and the political inertia thwarted this technology, but this is likely to change given these events. South<br />

Korea is currently testing this technology and Russia is developing its own eLoran named eChayka. 25 In<br />

the U.S., the Director of National Intelligence told a Senate committee that the global threat of electronic<br />

warfare attacks against space systems would rise in coming years and the U.S. Navy launched a Hack-<br />

Our-Ship event to assess cyber threats at sea, such as hacking a complex system software system<br />

simulating the ones used to control the U.S. Navy fleets. 26,27<br />

Military and Economic Implications<br />

In network-centric warfare, the military relies on information gathering to Observe, Orient, Decide, Act<br />

(the OODA loop) and GNSS are part of the tools to collect it. In the battlefield, it is the capacity to make<br />

the right decision as quickly as possible, and most specifically quicker than your enemy, that makes the<br />

difference between victory/life or defeat/death. Therefore, an army relying too much on one technology<br />

could be “blinded” during a conflict and unable to allocate forces efficiently.<br />

Following 19 th Century American Navy Strategist Alfred T. Mahan, the U.S. developed a great power<br />

projection capability after WWII that enables it to rapidly deploy military means to defend any interest<br />

whether political, economic, military or humanitarian. Power projection is a mix of hard and soft power,<br />

depending on the situation. This approach is materialized by aircraft carriers and the separation of fleets<br />

allocated to specific regions of the globe (7 for the U.S. Navy).<br />

Aircraft carriers are not travelling the sea alone and an entire structure of ships and submarines escort<br />

them, known as a carrier strike group (CSG), with a total crew of more than 7,500. 28 The total acquisition<br />

cost of a CSG exceeds $25 billion, an air wing (the aircrafts on the aircraft carrier) another $10 billion and<br />

estimated annual operating costs are around $1 billion. 29 Currently, the U.S. has 10 Nimitz-class nuclear-<br />

24<br />

SAUL Jonathan. “<strong>Cyber</strong> threats prompt return of radio for ship navigation”, Reuters, Aug 7, 2017<br />

https://in.reuters.com/article/us-shipping-gps-cyber-idINKBN1AN0HT<br />

25<br />

DUNN John E. “<strong>Cyber</strong>attacks on GPS leave ships sailing in dangerous waters”, Naked Security, Aug 7, 2017<br />

https://nakedsecurity.sophos.com/2017/08/07/cyberattacks-on-gps-leave-ships-sailing-in-dangerous-waters/<br />

26<br />

SAUL Jonathan. “<strong>Cyber</strong> threats prompt return of radio for ship navigation”, Reuters, Aug 7, 2017<br />

https://in.reuters.com/article/us-shipping-gps-cyber-idINKBN1AN0HT<br />

27<br />

OWENS Katherine. “Navy conducts ‘Hack-Our-Ship’ cybersecurity event”, <strong>Defense</strong> Systems, Mar 13, 2017<br />

https://defensesystems.com/articles/2017/03/13/hacknavy.aspx<br />

28<br />

WISE David W. “The U.S. Navy’s Big Mistake – Building Tons of Supercarriers”, War Is Boring, Dec 25, 2016<br />

https://warisboring.com/the-u-s-navys-big-mistake-building-tons-of-supercarriers/<br />

29<br />

Ibid.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 148<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


powered supercarriers. Therefore, a major cyberattack on navigation systems, for example, could<br />

paralyze an entire CSG and considerably diminish the U.S. ability to maneuver.<br />

On the economic side, the world’s largest container ship and supply vessel company, Moller-Maersk,<br />

suffered from the wiper malware attack named NotPetya and the company reported a loss between USD<br />

200-300 million for Q3 2017. 30 More specifically, navigation systems such as the Electronic Chart Display<br />

(ECDIS) are very vulnerable and have also been hit with different attacks being reported in Asia.<br />

According to the maritime technical lead at cyber security firm NCC Group, "Ecdis systems pretty much<br />

never have anti-virus". 31<br />

Pyongyang Hackers are Smart<br />

Both of the military vessels involved in collisions, the USS Fitzgerald and the USS John S. McCain, are<br />

guided missile destroyers equipped with the Aegis Ballistic Missile <strong>Defense</strong> System (BMDS), which is a<br />

system allowing the interception of an ICBM (Intercontinental Ballistic Missile), the ones that are currently<br />

being tested by North Korea and usually equipped with one or multiple nuclear warheads. An ICBM has<br />

four phases: boost, post-boost/ascent, midcourse and terminal (reentry in the atmosphere). The Aegis<br />

BMDS aims at destroying an ICBM during the post-boost/ascent phase (before the missile leaves earth’s<br />

atmosphere).<br />

The Lazarus hacking group, famous for the Sony breach in 2014 and allegedly linked to North Korea,<br />

targets individuals associated with U.S. defense contractors with the same tools and tactics of the Sony<br />

breach. This time, the phishing emails display fake job listings and companies’ internal policies. 32 Some<br />

jobs listed were for the US (Terminal High Altitude Area <strong>Defense</strong>) THAAD system, which is a BMDS and<br />

intercept an ICBM in its terminal phase (after the missile re-enters in the atmosphere).<br />

Therefore, if the four U.S. Navy collisions in Asian waters are due to a cyberattack, the explanation could<br />

be that the North Korean government is attempting to infiltrate the U.S. military system to be able to<br />

collect information on the full spectrum of BMDS and, at best, disrupt the defense systems against its<br />

ICBM. On the diplomatic side, it could be a strong message sent to the US and its Asian allies assuring<br />

them that Pyongyang has serious capabilities and that it would be better to negotiate with it than escalate<br />

tensions.<br />

This strategy is part of a general trend in APT (Advanced Persistent Threats), long-term targeted specific<br />

cyberattacks mixing a combination of social engineering, cyberweapons, and vectors to get inside<br />

networks, instead of hacking directly the big fish such as the Department of <strong>Defense</strong> or a big player in<br />

weapons (Aegis, Boeing, Lockheed Martin, etc.), hackers will target a third party working for these targets.<br />

30<br />

MIMOSO Michael. “MAERSK Shipping Reports $300M Loss Stemming from NotPetya Attack”, Threatpost, Aug 16, 2017<br />

https://threatpost.com/maersk-shipping-reports-300m-loss-stemming-from-notpetya-attack/127477/<br />

31<br />

BARANIUK Chris. “How hackers are targeting the shipping industry”, BBC, Aug 18, 2017<br />

http://www.bbc.com/news/technology-40685821<br />

32<br />

BARTH Bradley. “Lazarus Group tied to new phishing campaign targeting defense industry workers”, SC Media, Aug 14, 2017<br />

https://www.scmagazine.com/lazarus-group-tied-to-new-phishing-campaign-targeting-defense-industry-workers/article/681701/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Indeed, their cybersecurity posture will be lower than a critical administration or company with<br />

technologies and processes in places regarding cyberdefense, and with aware employees towards<br />

phishing campaigns.<br />

Future Tensions at Sea<br />

Among many strategic hotspots, the most sensitive ones are currently the Indian Ocean, the South and<br />

East China Seas, and, for the foreseeable future, the Artic.<br />

The Indian Ocean is now a space of geopolitical criticality from a maritime perspective, especially now<br />

that the U.S. wants to improve its relations with New Delhi to counterbalance Beijing’s aspirations in the<br />

context of the BRI (Belt and Road Initiative). China is determined to change the status quo in this region<br />

and is investing in ports (i.e. the String of Pearls) to control the flow of merchandise along sea lines from<br />

China to the Middle East and Africa.<br />

Indeed, these sea lines through the Indian Ocean are vital for China’s oil imports, as about 40% comes<br />

through the Strait of Hormuz and over 80% through the Malacca Strait. 33 Thus, the rationale of shifting<br />

from a land-based armed force to a sea-based one is to defend these interests at sea and protect China<br />

as a regional hegemon. Hence, the people’s liberation army is building aircraft carriers, submarines,<br />

patrol vessels, and has put in place an A2/AD (Anti Access/Area Denial) tactic with investments on shorebased<br />

anti-ship missiles. Ultimately, China wants to push the U.S. behind its second island chains (at the<br />

east side of the Philippine Sea).<br />

As pointed out by The Economist, the Asia Pacific is the trade region of the future: Eight out of the world’s<br />

ten busiest container ports are there. Two-thirds of the world’s oil shipments travel across the Indian<br />

Ocean. Almost 30% of maritime trade goes across the South China Sea; it accounts for over 10% of<br />

world fisheries production and is thought to have oil and natural-gas deposits beneath its seabed. 34<br />

Another strategic hotspot will emerge northward: the Arctic. Within decades, the ice melting phenomenon<br />

will open shipping lanes, allowing vessels like Russia’s first ice class LNG (Liquefied Natural Gas) tanker<br />

to travel through the region. It will also increase disputes for the access to resources and to preserve its<br />

fragile ecosystem. 35<br />

Like in Rudyard Kipling’s novel “Kim” where he made popular the great game at stake between the British<br />

and Russian empires to control Central Asia in the 19 th Century, the new great game is now between the<br />

US and China for the control of all Asia. This rivalry will encompass the use and leverage of sea power<br />

as naval strategist Alfred T. Mahan put in perspective in “The Influence of Sea Power Upon History” as<br />

33<br />

The Economist. “Who rules the waves?”, The Economist, Oct 17, 2015<br />

https://www.economist.com/news/international/21674648-china-no-longer-accepts-america-should-be-asia-pacifics-dominant-naval-power-who-rules<br />

34<br />

The Economist. “Who rules the waves?”, The Economist, Oct 17, 2015<br />

https://www.economist.com/news/international/21674648-china-no-longer-accepts-america-should-be-asia-pacifics-dominant-naval-power-who-rules<br />

35<br />

Author interviews. “‘Stavridis’ Book ‘Sea Power’ Explains Why Oceans Matter in Global Politics”, NPR, Jun 6, 2017<br />

http://www.npr.org/2017/06/06/531701056/stavridis-book-sea-power-explains-why-oceans-matter-in-global-politics<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 150<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


national prosperity and power depend on the control of world's sea-lanes, thus: "Whoever rules the waves<br />

rules the world". 36<br />

About the Author<br />

Julien Chesaux is a <strong>Cyber</strong> Security Consultant at Kudelski Security, a<br />

Swiss and American cyber security company. Julien mainly works on<br />

cyber security, information security and geopolitics analysis in order<br />

to help clients to find solutions regarding their threats. He is also a<br />

speaker and writer for different think tanks, journals and events. He<br />

has worked in diplomacy and cyber security for 10 years in<br />

Switzerland, Australia, the Balkans and France. His main research<br />

interests are Global Security, <strong>Cyber</strong> Geopolitics, and International<br />

Affairs.<br />

LinkedIn profile: www.linkedin.com/in/julien-chesaux-65279456<br />

You can reach me at julien.chesaux@gmail.com<br />

36<br />

MAHAN Alfred Thayer, “The Influence of Sea Power upon History: 1660-1783” Little, Brown and Company, Boston, 1890<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 153<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 154<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 155<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 156<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 157<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 158<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 159<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 160<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 161<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 162<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 163<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 164<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 165<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Meet Our Publisher: Gary S. Miliefsky, CISSP, fmDHS<br />

“Amazing Keynote”<br />

“Best Speaker on the Hacking Stage”<br />

“Most Entertaining and Engaging”<br />

Gary has been keynoting cyber security events throughout the year. He’s also been a<br />

moderator, a panelist and has numerous upcoming events throughout the year.<br />

If you are looking for a cybersecurity expert who can make the difference from a nice event to<br />

a stellar conference, look no further email marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 166<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


You asked, and it’s finally here…we’ve launched <strong>Cyber</strong><strong>Defense</strong>.TV<br />

At least a dozen exceptional interviews rolling out each month starting this summer…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A new division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 167<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines for FREE.<br />

This magazine is by and for ethical information security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the information technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465,<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any information storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content<br />

and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 06/01/<strong>2020</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 168<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


TRILLIONS ARE AT STAKE<br />

No 1 INTERNATIONAL BESTSELLER IN FOUR CATEGORIES<br />

Released:<br />

https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />

In Development:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 169<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 170<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


8 Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know<br />

What You Think. It's mobile and tablet friendly and superfast. We hope you<br />

like it. In addition, we're shooting for 7x24x365 uptime as we continue to<br />

scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS<br />

and <strong>Cyber</strong><strong>Defense</strong>MagazineBackup.com up and running as an array of live<br />

mirror sites.<br />

Millions of monthly readers and new platforms coming…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 171<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 172<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 173<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 174<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 175<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 176<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


i<br />

https://www.beazley.com/documents/TMB/Factsheets/beazley-bbr-ransomware-factsheet-us.pdf<br />

ii<br />

https://www.healthcareitnews.com/news/malware-hits-medical-devices-18-percent-healthcare-orgs-last-year<br />

iii<br />

https://www.legacyhealth.org/our-legacy/stay-connected/newsroom/notice-of-email-phishing-incident.aspx<br />

iv<br />

https://cofense.com/state-of-phishing-defense-2018/<br />

v<br />

https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf<br />

vi<br />

https://www.wsj.com/articles/five-charged-of-conspiring-to-steal-trade-secrets-from-glaxosmithkline-1453333452<br />

vii<br />

https://securityboulevard.com/2018/03/employees-are-biggest-threat-to-healthcare-data-security/<br />

viii<br />

https://www.bankinfosecurity.com/misconfiguration-leads-to-major-health-data-breach-a-12042<br />

ix<br />

https://dzone.com/articles/addressing-security-issues-in-connected-healthcare<br />

x<br />

https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 177<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!