Connect with us

Featured

SANS Institute to Focus on Cyber Resilience and Training at GISEC 2021

Published

on

SANS Institute has confirmed that it will be the Official Training Partner for the Gulf Information Security Expo & Conference (GISEC), to be held at the Dubai World Trade Center from May 31 to June 2, 2021. GISEC has emerged as the Arab world’s largest and most impactful cybersecurity event, and SANS Institute will bring several new products likes Cyber Ranges, SANS Foundations and CyberStart to the event, and also display its latest range of world-leading training courses and certifications that promote cyber resilience and empower organizations to deal with security challenges in the post-pandemic new normal.

“The pandemic has forced organizations to accelerate their digital transformation initiatives, which has put them at risk in new and unprecedented ways. Cybersecurity is now front and center of these initiatives. However, the gap for cybersecurity jobs is widening and organizations need to act now to equip and train their staff with skills to deliver best-in-class defense. At GISEC 2021, we plan to highlight this message and demonstrate how our programs can help organizations arm themselves against potential cyber-attacks and narrow the cybersecurity skills gap,” said Ned Baltagi, Managing Director Middle East and Africa, SANS Institute.

Cyber Ranges is a comprehensive suite of hands-on ranges that come with industry-leading interactive learning scenarios. SANS BootUp CTF, for example, is a collection of challenges that help beginners and intermediate players build fundamental hands-on skills in a wide set of cybersecurity disciplines; NetWars Tournaments & Continuous provides cutting-edge cyber challenges within an integrated storyline; and NetWars CyberCity is a kinetic cyber range for learning how to analyze and assess the security of control systems and related infrastructures, and find vulnerabilities that could result in significant kinetic impact.

Cyber42 Cybersecurity Leadership Simulation Games deliver the ultimate hands-on challenges for testing and building your cybersecurity management skills; Jupiter Rockets provides an in-depth offensive simulation for pen testers and red teamers; while Cyber Situational Training eXercise (Cyber STX) is a premiere in-depth training and validation cyber range.

SANS Institute will also talk about SANS Foundations, which has been designed to impart core knowledge and develop practical skills in computers, technology, and security foundations. The course features a comprehensive variety of innovative, hands-on labs and practical exercises that go far beyond what is offered in any other foundational course in cybersecurity. The labs are developed by leading subject-matter experts, drawing on the latest technology, techniques, and concepts in cybersecurity.

CyberStart Game is an online gamified learning platform used in the classroom or accessed at home. It is available to students, teachers and young adults across the Middle East and Africa region. CyberStart Game is designed to teach complex security concepts, while promoting self-exploration and investigation over traditional learning methods. Participants can play over 200 challenges, and are in control of their learning as they train at pace that suits their ability.

SANS Institute has been working with government and commercial organizations in the region, helping upskill security professionals and introduce new talent into the cybersecurity industry. Visitors to GISEC 2021 can drop by at Booth C14 to interact with experts from SANS Institute.

Expert Speak

Level up Your IT Security: All About Insider Threats

Published

on

What do a disgruntled former employee and a vindictive associate with access to an organization’s critical data have in common? They are both high-risk insider threats. Although any cyberattack can be difficult to detect, it is especially difficult to spot insider threats. To avoid the brunt of these attacks, it is imperative to know what signs indicate an insider threat and use this to develop a security model that can defend your organization against these threats.

Despite insider threats being one of the top threats to organizations, traditional cybersecurity strategies seldom focus on them. This makes it harder for organizations to understand insider threats and mitigate them. As insider threats can also be a result of accidental misuse, it is crucial to understand the causes and effects of these threats. To mitigate the risks, organizations can implement a few helpful measures.

Protect the organization’s critical assets
Take inventory of all the critical assets in the organization, including intellectual property, information on internal processes, and customer data. This helps you plan, allocate, and revoke privileged access, ensuring that only the right users have access for the right amount of time.

Deploy solutions that can track employee activity around the clock
Collecting logs from employees’ devices helps you analyze employee activity and identify suspicious behavior. For instance, if there is any unusual activity, such as signing in to the network at 3 am or transferring large amounts of data over the network, it will be logged under suspicious activities. This helps you identify and mitigate insider threats effectively.

Enforce strict data protection policies across the organization
Document privacy and privilege management policies for your organization and educate employees about them. Organizations must maintain records of signed copies of employee acknowledgment forms stating that the employees have read and understood those policies.

Use insider threat detection software
ManageEngine ADAudit Plus leverages user behavior analytics to identify insider threats. It monitors privileged users, detects anomalies, and provides visibility into user activity, helping organizations detect every type of insider attack.

Because the repercussions of insider attacks can be disastrous for organizations in terms of financial and reputational losses, organizations must implement effective IT management solutions to identify and mitigate insider threats.

Continue Reading

Cyber Security

Dubai Future Foundation Launch Report on Cyber Risk Scenarios in Banking and Finance

Published

on

Dubai Future Foundation (DFF), in partnership with the Future Foresight and Decision-Making Support Center at Dubai Police, launched its latest report titled ‘Banking and Financial Services Sector Scenarios of Risks and Resilience’, which examines the risks of cybercrime and the potential implications for the banking and finance sector in Dubai.

The publication is part of DFF’s ‘The Digitisation of Critical Infrastructure’ series that examines several sectors related to critical infrastructure, including energy, water, systems, transport, agriculture, telecommunications, healthcare, food, banking and finance, and emergency services. Disruption to these services, on any level, may have a serious effect on the national economy, public health, safety and the welfare of the community.

In his remarks, His Excellency Lieutenant General Abdullah Khalifa Al Marri, Commander-in-Chief of Dubai Police, said: “The world is witnessing a remarkable growth in the reliance on digital solutions, especially in the financial sector, and any threat to financial infrastructure may lead to an imbalance in the economic and social system. Therefore, cooperation between the private and public sectors is a pre-requisite for combating cybercrime.”

He praised the constructive collaboration between the Future Foresight and Decision-Making Support Center at Dubai Police and DFF as a prime example of aligning efforts between various entities in the emirate to address potential threats to social security.

Highlighting the role of the Foundation in enriching future knowledge on diverse sectors in Dubai and the wider UAE, Khalfan Belhoul, CEO of DFF, said: “This series of reports coincides with cyberattacks that has risen in many parts of the world and pose a serious danger to communities and organizations today in light of the widespread adoption of advanced technology and accelerated digital transformation across the board.”

He added: “Our partnership with Dubai Police supports the vision of the wise UAE leadership for solidifying governmental partnerships aiming to benefit entities recognize opportunities, which enables them to tackle future challenges.”

Dubai is one of the global pioneers in leveraging advanced technology to improve wellbeing. The emirate has already digitalized most of its public services, from issuing residency visas to paying parking fees.

The report illustrates how the ongoing digitalization increases the rising risk of cyberattacks. The global cybersecurity market is predicted to surge from US$167.1 billion in 2019, to US$248.26 billion by 2023, attaining a 10.4 percent compound annual growth rate (CAGR).

In 2019, Dubai ranked eighth among the world’s financial leaders. With the largest banking industry in the GCC region, the UAE is home to nearly one-third of the region’s banking assets.

Continue Reading

Featured

Digitization is a Priority for Many Business Leaders

Published

on

Niranjan Gidwani, Consultant Director, Member of UAE Superbrands Council, and Former CEO of Eros Group, speaks about the security threat landscape in the region

How has the security threat landscape evolved over the past few months?
Cybersecurity threats are continuously evolving. Cybersecurity threats are not only damaging individuals, organisations, and governments financially, but also causing serious damage to reputation. These threats are seriously impacting the delivery of critical services, and many businesses are failing, or putting in grossly inadequate resources to protect themselves from potential losses. Mainly because cybersecurity threats and data leakages are still not a part of most organisations’ strategic plans.

What sort of security challenges are people facing when working from home and how is your company equipped to handle those challenges?
Serious challenges are a very strong likelihood of data leakage, information sharing, data thefts, business secrets, billing, and pricing information, downloading of sensitive data, customer data. Also downloads of objectionable material, and so on, on official laptops.

Our organization has done the following:

  1. Data loss prevention policy in place.
  2. Device data encryption policy in place.
  3. Usage of VPN-based connectivity.
  4. Continuous monitoring of suspicious user activities.
  5. Robust infrastructure and proper security policies in place.

How has ransomware evolved during the pandemic period and what are you doing to tackle the problem?
Yes, ransomware has increased a lot during the pandemic because organizations have become more vulnerable. Hackers are taking advantage as businesses and individuals are distracted by many more issues during the pandemic. Hackers who commit cyber-attacks know that many will be able to get what they want.

We have to constantly be more vigilant, and take more proactive actions like frequent training of staff associated with handling cybersecurity issues. Also, to periodically check the integrity of such staff, as that could become the weak link. Tighten all open ports (loose links) in network security. Get frequent network and device security audits from a third party. More important is, once such audit reports are received, review the same immediately, and take immediate action on recommendations and investments.

How can companies overcome digital security and privacy challenges?
By encryption of all device’s data. Run end-to-end Security, Network security test assessments like VAPT (Vulnerability Assessment and Penetration Testing) every six months. Remove all redundant data from various devices.

Increase budget and time in implementing cybersecurity advice. Hire trained and highly ethical staff for monitoring potential loss due to digital security. Regular reviews to see that policies and procedures are in place, and working.

Do you believe companies today have accelerated their digital transformation initiatives?
Yes, companies today have accelerated their digital transformation initiatives as compared to previous years. Organizations are using a step-by-step approach to digital transformation. At the same time, it would be interesting to quote a study that also says that most companies are using technology to modernize their existing business model rather than transforming it.

Although 87 percent of senior business leaders say that digitization is a company priority, only 40 percent of organizations have brought digital initiatives to scale. And most business leaders make the mistake of confusing digitization, which is not the same as digital transformation, which is far more strategic.
For 39 percent of CIOs, digital transformation and cybersecurity is the most important task given to them by their CEO. (IDG)

What are the Cybersecurity Trends for 2021?
Data Security would be the number one issue, as, during the pandemic, lots of people have started working from home. Even teachers and students are engaged in remote teaching and studying. An increase in access to personal data carries the risk of destabilizing the digital society. There seems to be an overload of data being collected globally by a multitude of agencies/organisations/governments/licensing authorities/property developers/aggregators, all of which increase risk significantly.

Personal computers, Mobile, IOT, and smart consumer devices security issues as there is a multifold increase in the use of wearables and home/office automation products. Millions of IoT devices are open to the risk of remote code execution (RCE) attacks. Vehicles and transport infrastructure, health and medical infrastructure are new targets for cyber attacks as hackers are targeting smart supply chains. Cloud security since more business processes, infrastructure, and data are moving towards the cloud.

What are the key factors to consider making sure the digital economies of today are secured?
Heavy, and frequently monitored investments in Cybersecurity. Adoption of advanced technologies, robust infrastructure, and architecture. Professionally trained professionals to build a secure and innovative platform. Last but the most important – finally, even the most sophisticated digitization and digital transformation are created by people. Therefore, ensuring by whatever means available, the ethics and integrity of people associated with such initiatives. Because, it is the same highly intelligent minds who also find ways to counter and break into, or steal all good initiatives. Ethics and integrity or lack of it make that difference.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.