Connect with us

GISEC

SANS Institute to Put the Spotlight on AI Security at GISEC 2024

Published

on

Ned Baltagi, the Managing Director for Middle East, Turkey and Africa at SANS Institute, speaks about his company’s participation at GISEC 2024

Tell us about the cybersecurity trends for 2024.
This year, with the unprecedented increase of Generative AI technologies, organizations and governments have had to consider what this means for cybersecurity, and how to manage the risks associated with AI. We are also currently seeing an increase in the use of AI and Machine Learning, for both threat detection and automated security responses.

Moreover, as organizations increasingly adopt cloud services and SaaS platforms, vulnerabilities in these technologies become apparent, demanding heightened vigilance. Quantum computing is another area which presents both opportunities and challenges for cybersecurity. Quantum computers have the potential to break current encryption methods, rendering traditional security mechanisms obsolete. Conversely, quantum encryption technologies, such as Quantum Key Distribution (QKD), promise unprecedented levels of security that cannot be undermined by conventional or quantum computing attacks.

Organizations are now investing in zero-trust architecture, moving away from traditional perimeter-based security. There has also been more focus on securing the supply chain and managing third-party risks, following a rise in ransomware attacks.

What is the theme of your participation at GISEC 2024?
At GISEC, we’re putting the spotlight on AI security and how we are preparing tomorrow’s security professionals for the challenges and opportunities presented by AI and emerging technologies. AI’s influence affects all areas of cybersecurity and we continuously update our curriculum to reflect the latest advancements in AI technology. This includes not only courses but also the comprehensive integration of AI-related content across our existing courses.

Our latest offering, AIS247: AI Security Essentials for Business Leaders, is crafted for managers and senior leaders, focusing on the integration of Generative AI tools in the business sphere and emphasizing cybersecurity’s essential role in AI development. By spotlighting AI’s role in various cybersecurity domains, we aim to provide attendees with a holistic understanding of how AI technologies impact security practices, threat detection, risk management, and policy development.

Which products and solutions will you be showcasing at GISEC 2024?
We will showcase our entire portfolio of training courses, as well as our initiatives supporting national government organizations in narrowing the talent gap in the META region. On April 23, we will host the inaugural SANS CISO Network, a platform where thought leaders like James Lyne, our Chief Technology and Innovation Officer, will lead in-depth discussions with CISOs. The session aims to navigate through the complexities of GenAI, the indispensability of zero-trust architectures, the strategic importance of cloud security, and much more.

How are you equipped to help companies overcome digital security and privacy challenges?
Our comprehensive training programs span diverse cybersecurity domains, led by seasoned professionals embedding real-world insights into the curriculum, continually updated to match evolving threats. Beyond training, SANS provides assessment services such as compliance audits, penetration testing and vulnerability checks, aiding in risk mitigation. Additionally, our ongoing research into emerging threats and trends is shared with the cybersecurity community through webcasts, whitepapers, conferences, and more.

Is there a skills gap in the cybersecurity industry? What needs to be done to bridge that gap?
Yes, and sustained training is necessary in addressing this cyber skills gap. By investing in education and training, organizations can build a more skilled workforce capable of defending against emerging cyber threats. Companies should make it a priority to continuously upskill and train their workforce, from offering regular training sessions, workshops, and industry certification programs that cover the latest cybersecurity trends, technologies, and best practices, to creating a supportive work environment that emphasizes ongoing training and development opportunities.

Outside of the existing workforce, focusing on creating awareness about the opportunities and benefits of a career in cybersecurity, such as introducing cybersecurity as a subject in early education and hosting career fairs for graduates, as well as community events, is a great way to nurture and spot local talent.

Cyber Security

Positive Technologies Reports 80% of Middle East Cyberattacks Compromise Confidential Data

Published

on

A new study by cybersecurity firm Positive Technologies has shed light on the evolving cyber threat landscape in the Middle East, revealing that a staggering 80% of successful cyberattacks in the region lead to the breach of confidential information. The research, examining the impact of digital transformation, organized cybercrime, and the underground market, highlights the increasing exposure of Middle Eastern nations to sophisticated cyber threats.

The study found that one in three successful cyberattacks were attributed to Advanced Persistent Threat (APT) groups, which predominantly target government institutions and critical infrastructure. While the rapid adoption of new IT solutions is driving efficiency, it simultaneously expands the attack surface for malicious actors.

Cybercriminals in the region heavily utilize social engineering tactics (61% of cases) and malware (51%), often employing a combination of both. Remote Access Trojans (RATs) emerged as a primary weapon in 27% of malware-based attacks, indicating a common objective of gaining long-term access to compromised systems.

The analysis revealed that credentials and trade secrets (29% each) were the most sought-after data, followed by personal information (20%). This stolen data is frequently leveraged for blackmail or sold on the dark web. Beyond data theft, 38% of attacks resulted in the disruption of core business operations, posing significant risks to critical sectors like healthcare, transportation, and government services.

APT groups are identified as the most formidable threat actors due to their substantial resources and advanced technical capabilities. In 2024, they accounted for 32% of recorded attacks, with a clear focus on government and critical infrastructure. Their activities often extend beyond traditional cybercrime, encompassing cyberespionage and even cyberwarfare aimed at undermining trust and demonstrating digital dominance.

Dark web analysis further revealed that government organizations were the most frequently mentioned targets (34%), followed by the industrial sector (20%). Hacktivist activity was also prominent, with ideologically motivated actors often sharing stolen databases freely, exacerbating the cybercrime landscape.

The United Arab Emirates, Saudi Arabia, Israel, and Qatar, all leaders in digital transformation, were the most frequently cited countries on the dark web in connection with stolen data. Experts suggest that the prevalence of advertisements for selling data from these nations underscores the challenges of securing rapidly expanding digital environments, which cybercriminals are quick to exploit.

Positive Technologies analyst Alexey Lukash said, “In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication. As digital transformation efforts expand, so does the attack surface, creating more opportunities for hackers of all skill levels. Governments in the region need to focus on protecting critical infrastructure, financial institutions, and government systems. The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty.”

To help organizations build stronger defenses against cyberthreats, Positive Technologies recommends implementing modern security measures. These include vulnerability management systems to automate asset management, as well as identify, prioritize, and remediate vulnerabilities. Positive Technologies also suggests using network traffic analysis tools to monitor network activity and detect cyberattacks. Another critical layer of protection involves securing applications. Such solutions are designed to identify vulnerabilities in applications, detect suspicious activity, and take immediate action to prevent attacks.

Positive Technologies emphasizes the need for a comprehensive, result-driven approach to cybersecurity. This strategy is designed to prevent attackers from disrupting critical business processes. Scalable and flexible, it can be tailored to individual organizations, entire industries, or even large-scale digital ecosystems like nations or international alliances. The goal is to deliver clear, measurable results in cybersecurity—not just to meet compliance standards or rely on isolated technical fixes.

Continue Reading

GISEC

ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025

Published

on

As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)

Continue Reading

GISEC

Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies

Published

on

At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.