Connect with us

Cyber Security

More Than 8,000 Attendees and 200 Expert Speakers Join First Day of @HACK in Riyadh

Published

on

@HACK, the largest dedicated cybersecurity event in the region opened today in Riyadh, with in excess of 8,000 guests already attending the first day. Over the next three days, upwards of 14,000 thousand attendees from 70 countries are expected at the summit, which features over 200 expert speakers sharing their knowledge to grow the cybersecurity expertise of the Kingdom of Saudi Arabia.

The conference was officially inaugurated by Faisal Al-Khamisi, Chairman, SAFCSP, in the presence of His Excellency Engineer Abdullah bin Amer Al-Swaha, Saudi Arabia’s Minister of Communications and Information Technology.

The conference includes the largest ever Capture the Flag ethical hacking contest in the region, with over 1,000 participants from around the world competing for a prize pool of SAR 1 million. It also features the most extensive advanced technical training program in the world outside of the annual Black Hat conference in Las Vegas.

@Hack is organized by the Saudi Federation of Cybersecurity, Programming, and Drones (SAFCSP) and leading events specialist Informa Tech, in association with the renowned cybersecurity event organizer Black Hat, and in partnership with the General Entertainment Authority of Saudi Arabia. The conference is three times larger than any previous cybersecurity summit in the region and is the largest cybersecurity event in the world in 2021. @HACK is on until 30th November at Riyadh Front Expo Centre.

Cyber Security

Ooredoo Qatar Chooses Fortinet Secure SD-WAN

Published

on

Ooredoo Qatar, a part of Ooredoo Group – a leading international communications company operating across the Middle East, North Africa, and Southeast Asia, announced that Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, has been chosen to deliver its Secure SD-WAN solution to boost Ooredoo’s Enterprise EDGE portfolio.

Enterprise EDGE is Ooredoo’s managed SD-WAN service that allows enterprise customers to create a network by mixing and matching services from a wide range of WAN connections. Having transformed its network to be SD-WAN ready, Ooredoo offers a new capability unrivalled by traditional connectivity services.

By leveraging Fortinet Secure SD-WAN, Ooredoo now has access to a security-driven networking approach that consolidates SD-WAN functionality and next-generation firewall security in a single offering. This approach fits squarely with Ooredoo’s objectives to allow business customers to leverage the Ooredoo Advantage, thereby making Ooredoo ‘Best for Business’.

“Ooredoo is a problem solver with the best ICT solutions to address business challenges,” said Thani Ali Al Malki – Executive Director Business at Ooredoo Qatar. “In an entrepreneurial environment faced with increasingly sophisticated security challenges, the peace of mind inherent in Enterprise EDGE built on Fortinet solution will reassure business customers across Qatar, which will then contribute to the complete customer satisfaction for which we aim.”

Fortinet Secure SD-WAN is designed to improve user experience and simplify operations at the WAN edge. This will provide Ooredoo’s customers with a secure SD-WAN solution that integrates next-generation firewall with advanced SD-WAN networking functionality to effectively protect customers’ data and applications along with a high level of visibility, reporting, control and scalability.  It also can be added on top of any standard connectivity services such as National IPVPN, Business Internet, Business Broadband or Mobile Broadband.

As one of the first service providers in the market to offer an in-country SD-WAN solution, Ooredoo’s technical capability means that the new forms of managed customer premise equipment (CPE) will add value to conventional connectivity services by providing enhanced SD-WAN networking features such as application-aware traffic steering, dynamic path selection with service-level agreement (SLA) measurements, and self-healing capabilities.

“We are pleased to strengthen our partnership with Ooredoo Qatar, and enable them to provide secure SD-WAN services to its customers,” said Alain Penel, Regional Vice President – Middle East, Fortinet. “Through our unique security-driven networking strategy which tightly integrates an organization’s network infrastructure and security architecture, Fortinet is enabling Ooredoo with the capability to scale its network and change without compromising security operations while providing superior end-user experience and higher performance to support business customers in their digital transformation efforts.”

Continue Reading

Cyber Security

UAE’S SME Sector Should Closely Evaluate its Cyber Security Framework in 2022

Published

on

Real Secure has strongly emphasised the importance of cyber security for UAE’s SMEs in 2022.  The company also stressed the fact that the majority of the companies in the SME sector with legacy systems don’t engage in regular IT audits which makes them a good target for spammers and ransomware attacks.

“Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. In 2020, the total amount of ransom paid by victims reached nearly $350 million worth of cryptocurrency, a 311% increase compared with the previous year, according to Chainalysis,” the company said.

“According to UAE Ministry of Economy, the SMEs sector represents more than 94 percent of the total number of companies operating in the country and employs more than 86 percent of the private sector’s workforce. A robust technology framework is a backbone for any company, especially in this tech-dependent business eco-system. We strongly believe that SMEs are the bedrock of any economy, and it contributes significantly to the country’s GDP, and they need to be protected from such potent threats,” stated Rateesh Mohan, the Managing Director and Founder of Real Secure.

“Real Secure being a cybersecurity company, we take all the necessary steps to protect organizations from such attacks which cause downtime and heavy financial loss. We have provided security solutions and assessments to large organizations, and we aim to provide the same level of expertise and security focus to the SME sector through our managed services business,” added Mohan.

“Our managed services division currently supports companies, mostly SMEs in the UAE with its IT infrastructure, as some of them don’t have the budget to have a full-scale IT department. Furthermore, we understand the criticality of security in today’s technology landscape, and all our solutions are developed keeping this key factor in mind. We ensure security is at the forefront of any project that we embark upon and is integrated into everything that we do including developing new applications, cyber security, implementing physical security solutions such as CCTV, or deploying pre-existing solutions,” said Mohan.

“Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information. Hackers take advantage of security weak spots to steal sensitive data or lock files. Companies need to take cybersecurity seriously and invest in it with adequate resources. Secondly, there needs to be more highly educated cybersecurity experts ready to address the menace of ransomware attacks that organizations are currently facing,” added Mohan.

“Cyberthreats became the major threat for businesses where many businesses had to shut down globally due to lack of proper cybersecurity systems in place. We are also working with logistics companies 24/7 to make sure that their organization is secured, and their services can go uninterrupted,” added Mohan. Real Secure says that it works with SMEs across various other verticals including healthcare, hospitality, logistics, and construction, among several others.

Continue Reading

Cyber Security

Measuring and Mitigating Cyber Risk

Published

on

Written by Saket Modi, Co-Founder, and CEO at Safe Security

As businesses continue to invest in digital transformation and base their business models on technology, cyber threats only become more imminent. Cyber Risk is no longer an IT problem, but a boardroom concern. With cyberattacks disrupting business continuity, they pose a direct impact on the top and bottom line of an organization’s balance sheet. Thus, making cybersecurity one of the top priorities of every organization.

Challenges with traditional cybersecurity approach
The evolving breach trends verify that complying with frameworks alone can no longer holistically safeguard organizations. Frameworks such as ISO, NIST, PCI DSS, and others are used as reference checklists for cybersecurity and risk management practices, however, they provide limited visibility. Cybersecurity must be aligned in every organization; threats and mission-critical business needs, provided by products that deliver holistic and actionable insights.

The Frameworks approach to risk-posture assessments is subjective, labor-intensive, and only offers point-in-time snapshots/assessments. They rely on a qualitative scale without any objective and quantitative measure to assess the security posture of an organization.

Similarly, Security Rating Services represent an independent source of publicly accessible data to support some use cases. However, these services don’t provide a complete assessment of security controls, as their information is primarily sourced from publicly accessing internet IP addresses, honeypots, analyzing Deep and Dark web content, and individual proprietary data warehouses.

A new approach to cybersecurity
Today, the delegation of risk decisions to the IT team cannot be the only solution and has to be a shared responsibility. The board and business executives are expected to incorporate the management of cyber risk as part of their business strategy since they are accountable to stakeholders, regulators, and customers. For the CROs, CISOs, and Security and Risk Management Professionals to be on the same page, there has to be a single source of truth for communicating the impact that cyber risk has on business outcomes, in a language that everyone can understand.

This is where Cyber Risk Quantification becomes a game-changer. There is a need for a solution that integrates with the entire security stack and gives a measurable analysis that supplements decision-making. This comprehensive information empowers CISOs and executives to make informed and timely data-backed decisions to ensure the cybersecurity of the organization.

Continuous Assessment of Cyber Security is the need of the hour
Compliance and government guidelines mandate the move to go beyond periodic assessments and into continuous monitoring of sensitive and critical information. In such situations, a CISO may often be unable to quantify the maturity of the Information Security measures deployed in the organization. Continuous Assessment of cybersecurity risk posture lets an organization prioritize the key focus areas across their Critical Assets and most vulnerable technology, third parties, or employees. This ensures that adequate measures towards holistic Cyber Security maturity are adopted throughout the organization.

Objectivity and simplicity should be at the core of a cybersecurity strategy
Cybersecurity posture cannot be represented by lengthy reports anymore. It needs to become objective and help decision-makers across the organization truly understand the risk posture and the financial value of the risk that the organization faces. It also needs to be free from IT jargons to enable the boardroom to have a clearer view of the risk posture, thereby facilitating data-driven and informed decisions. Executives can get overwhelmed with excruciating details from multiple tools or people. They can now rely on all the data that has been collected and converted from these sources into a simple yet comprehensive risk metric that they can use to track and build their trust on.

Benefits of Cyber Risk Quantification
With quantified cybersecurity risk management practices, organizations have:

  1. A unified cybersecurity strategy: Cybersecurity that is presently siloed, will have a single pane of glass view for security leaders to make quicker, data-driven decisions.
  2. An objective metric of communication: The potential financial impact of a cyber attack converts its risks to a direct business threat. It becomes a simple and effective means to communicate risks to all internal and external stakeholders.
  3. Real-time visibility: Dynamic visibility of what is going well and what needs improvement is enabled by a real-time cohesive output – breach-likelihood across people, process, technology, and third-party.
Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.