Saturday, January 2, 2016

Economy, technology and law – views on cyber security … – All About SECURITY

– Six key developments in IT security from an economic, technological and legal point of view illuminates Greg Day, Regional Chief Security Officer EMEA at Palo Alto Networks, in a recent analysis of the year

perception. customize security on the EU

The Directive on network and information security and the reform of the Data Protection Regulation in the EU will have a significant impact on cyber strategies in 2016th Probably by the end of the year could both will shortly have to enter into force. Business, whether part of the critical national infrastructure, or those who have records of more than 5,000 EU citizens handle must bring their security features on the current state of the art, the latter Regulation is aligned according to their risk profile. Today there is a clear gap between the companies that use the latest technology, and those who pursue the same old practices such for many years. By means of potential tests the functionality when events occur, and a possible notification there will be more pressure to keep pace and to prevent security incidents. All this will reinforce the importance of good Internet security in the boardroom. 2016 will be the year in which the company’s conversion to the extent necessary to carry out.

Since Apple Pay and Google Pay and non-contact numbers set via smartphone, there is a shift in cybercrime toward Smartphone enter

In the late 1990s the threat volumes exploded when criminals are increasingly einhackten into online banking and -Shopping. Now, the way we spend money, the biggest transformation take place for decades – with mobile payment platforms (with user numbers in the double-digit range, which corresponds to millions of transactions), Venmo money transfers between friends and eWallets, advance the mainstream. Companies like Braintree allow millions of transactions, making payments on these new technologies. It is expected that the cyber crime will be followed by a large scale these money flows. In recent months, new exploits have been discovered in Apple iOS, parallel to the increasing attacks on Android. Are these the early probing into the complex supply chain of the mobile payment systems? How far this will go in the future, is not yet clear. The scope of smart devices is increasing but continues. Media, connectivity and other services in the car become more important. Recently it became known how attackers penetrate into the vehicle systems. Because here grow the opportunities we have to expect more attention from cybercrime, which followed usually monetary targets. Currently the prevention of incidents is paid less attention to mobile devices, but that should change in the year 2016th

Europe, supply chains and security

While many focus on bringing security to the prior art, they remain dependent on the supply chain. We are only as strong as our weakest link, and some of the greatest violations this have in the past twelve months the world emphasized. In Europe, outsourcing is common to complex international supply chains. The risks that create these partnerships will be reassessed so that companies prevent them are the weak point at which attackers gain admittance. This may mean to include shared resources, to minimize the risk of unsecured connections and a recording of the communication.
On the national level creates a significant contingent of critical national infrastructure (CNI) from public-private partnerships. Many companies are concerned about attacks on national institutions. The risks and thus security for investment companies are typically lower than those of critical infrastructure. But if the company is part of a supply chain for such a CNI, a lack of clarity about where the boundaries are, what additional features are needed and how they should be financed. Attacks on nation states to take what is expected an increasing focus on this complex and challenging subject.

The new role of the CSO

So far, the CSO has reported to the CIO, was still regarded as a safety as a component of IT. But this is changing rapidly for a number of reasons, such as the recent report “Governance of Cyber ​​Security 2015″ Palo Alto Networks is highlighted. Europe is in this case the only region with a significant change in the CISO / CSO reporting to the CIO – from 50 percent in 2012 to 33 percent in 2015. The subject of cyber security increasingly reached the boardroom, which promotes investment and commitment. The CSO is moving from IT to business risk level. CSOs report increasingly either to the Supervisory Board (integration into the legal implications for security incidents), the Chief Financial Officer (due to the business impact) or directly to the CEO (given the importance for the entire business). This role is increasingly removed from the CIO, whose main task is to ensure that the IT effectively supports business operations. A healthy tension between the two demands allows to open up new business opportunities, without sacrificing public safety. While the CSO reports to the CIO, there is concern that conflicts of interest could affect forward to meeting balanced decisions.

Traditional business networks shrink

Until the end of 2015 there will be three times as many IP-enabled devices provide active as men. A data Zetabyte then traverse the global networks, which are 90 percent of the data which have been generated in the last two years worldwide. Companies are no longer able to justify the cost of building large, complex networks and are increasingly trying to outsource their IT systems to shift to the cloud or replace it with consumer technology. Corporate networks shrink to rudimentary core networks.

business tools such as CRM, e-mail and file sharing migrate to the cloud. In his most recent “Application Usage and Threat Report” called Palo Alto Networks, a growth of 46 percent in the use of resources in SaaS companies – last year alone. Add to that the growing acceptance of the Internet of Things, devices such as machine-to-machine (M2M) in the workplace and the increasing demand for wearables. It is no longer surprising to find that the IT, as we knew so far, is changing

While this is happening, there is a new learning curve when it comes to cyber security. What are best practices for Shadow to define IT systems? Concepts such as transparency and policy control to meet regulatory requirements make advanced functions required. These must function in complex, multi-site and multi-homed environments. With BYOD, there were initially uncertainty, then a shift to a model with significant benefits, which the dynamics takes advantage. Despite similar concerns about the transition to the cloud and the Internet of Things Europe moves toward transformative IT and digital business units. 2016 will begin to address these challenges, no matter if it comes to simple wearable devices, intelligent business tools or shared cloud resource companies.

The limits of attacks blur

In recent years, there has been a significant focus on APTs and the nation-state attacks given its effects were often considerably, but the boundaries , Many regular attacks are now counting on more advanced concepts such as the use of multiple components to avoid detection and to focus on more implicit goals. The cybercrime uses old-school techniques such as EXE infections and macros. But fraudsters also employ reconnaissance techniques and commercial cybercriminals look for new innovative technologies and undiscovered vulnerabilities. We must therefore cease to classify attacks into categories and instead concentrate on the methods and motives of the attackers. The impact of a targeted attack by cybercriminals can be as large as at a specific nation-state attack.

We can use different solutions to detect different types of attacks. As the boundaries blur, there is a greater need that these solutions work as a unit. Attacks should not (GT APT &; APT solution, cybercrime – AV solution, Whaling and Phishing & gt; gateway content filtering) by type are identified, but by the opportunity to combine the required attributes / indicators of an attack with each other to correlate it to accurately detect and then stop.

LikeTweet

No comments:

Post a Comment