Stuart O'Brien, Author at Cyber Secure Forum | Forum Events Ltd - Page 37 of 61
Posts By :

Stuart O'Brien

Humans: The root cause of your cyber security issues

960 640 Stuart O'Brien

More than 99 per cent of cyber threats require human interaction to execute – enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks.

That’s according to the latest Human Factor report from Proofpoint, which highlights the ways in which cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions and steal data.

The report, based on an 18-month analysis of data collected across Proofpoint’s global customer base, also found:-

  • Microsoft lures remain a staple. Nearly 1 in 4 phishing emails sent in 2018 were associated with Microsoft products. 2019 saw a shift towards cloud storage, DocuSign, and Microsoft cloud service phishing in terms of effectiveness. The top phishing lures were focused on credential theft, creating feedback loops that potentially inform future attacks, lateral movement, internal phishing, and more.
  • Threat actors are refining their tools and techniques in search of financial gain and information theft. While one-to-one attacks and one-to-many attacks were more common when impostor attacks first began to emerge, threat actors are finding success in attacks using more than five identities against more than five individuals in targeted organizations.
  • The top malware families over the past 18 months have consistently included banking Trojans, information stealers, RATs, and other non-destructive strains designed to remain resident on infected devices and continuously steal data that can potentially provide future utility to threat actors.

People-centric Threats

  • Attackers target people – and not necessarily traditional VIPs. They often target Very Attacked People (VAPTM) located deep within the organization. These users are more likely to be targets of opportunity or those with easily searched addresses and access to funds and sensitive data.
  • Thirty-six percent of VAP identities could be found online via corporate websites, social media, publications, and more. For the VIPs who are also VAPs, nearly 23 percent of their email identities could be discovered through a Google search.
  • Imposters mimic business routines to evade detection. Impostor message delivery closely mirrors legitimate organizational email traffic patterns, with less than 5 percent of overall messages delivered on weekends and the largest portion – over 30 percent – delivered on Mondays.
  • Malware actors are less likely to follow expected email traffic. Overall malicious message volumes sampled in the second quarter of 2019 were distributed more evenly over the first three days of the week and were also present in significant volumes in campaigns that began on Sundays (more than 10 percent of total volume sampled).
  • Click times have traditionally shown significant regional differences, reflecting differences in work culture and email habits among major global regions. Asia-Pacific and North American employees are far more likely to read and click early in the day, while Middle Eastern and European users are more likely to click mid-day and after lunch.

Email Attacks: Verticals at Risk

  • Education, finance, and advertising/marketing topped the industries with the highest average Attack Index, an aggregated measure of attack severity and risk. The education sector is frequently targeted with attacks of the highest severity and has one of the highest average number of VAPs across industries. The financial services industry has a relatively high average Attack Index but fewer VAPs.
  • 2018 saw impostor attacks at their highest levels in the engineering, automotive, and education industries, averaging more than 75 attacks per organization. This is likely due to supply chain complexities associated with the engineering and automotive industries, and high-value targets and user vulnerabilities, especially among student populations, in the education sector. In the first half of 2019, the most highly targeted industries shifted to financial services, manufacturing, education, healthcare, and retail.
  • The Chalbhai phish kit, the third most popular lure for the first half of 2019, targeted credentials for many top U.S. and international banks and telecommunications companies, among others, using a range of templates attributed to a single group but leveraged by multiple actors.
  • Attackers capitalize on human insecurity. The most effective phishing lures in 2018 were dominated by “Brainfood,” a diet and brain enhancement affiliate scam that harvests credit cards. Brainfood lures had click rates over 1.6 clicks per message, over twice as many clicks as the next most clicked lure.

“Cybercriminals are aggressively targeting people because sending fraudulent emails, stealing credentials, and uploading malicious attachments to cloud applications is easier and far more profitable than creating an expensive, time-consuming exploit that has a high probability of failure,” said Kevin Epstein, vice president of Threat Operations for Proofpoint. “More than 99 percent of cyberattacks rely on human interaction to work—making individual users the last line of defense. To significantly reduce risk, organizations need a holistic people-centric cybersecurity approach that includes effective security awareness training and layered defenses that provide visibility into their most attacked users.”

Image by Jan Vašek from Pixabay

Look who you’ll be joining at the Security IT Summit

960 640 Stuart O'Brien

The Security IT Summit is taking place this autumn and we’d love for you to join us as our VIP guest.

5 November 2019 – Hilton London Canary Wharf

This VIP pass will give you the opportunity to meet with suppliers based on your own unique requirements, attend a series of seminars and network with like-minded senior cyber security professionals. Plus, lunch and refreshments are complimentary.

Unlock your priority pass here and join representatives from:

  • ADVANZ Pharma
  • All Fleet Services 
  • Alvarez & Marsal
  • Ashville College
  • Asto, by Santander
  • Avanti Communications Group 
  • Bank of America Merrill Lynch
  • Belvoir Group
  • Baringa Partners LLP
  • Bibby Financial Services
  • Birketts LLP
  • Catalyst
  • CashFlows
  • Consulum UK 
  • Cote Restaurants
  • CSL Group
  • EDF Energy
  • ED&F Man Holdings 
  • First Choice Homes Oldham
  • Freshfields Bruckhaus Deringer LLP
  • Harrods 
  • Howard Kennedy
  • Inspired Education
  • Intellectual Property Office
  • Lloyds Banking Group
  • London Mutual Credit Union
  • London School of Economics
  • Metro Bank 
  • Optum International
  • Petroleum Pipe 
  • PunterSouthall Group
  • RB (Reckitt Benckiser)
  • Sainsbury’s
  • Simplyhealth
  • Skyes Cottages 
  • St. Dominics SFC
  • Ten Lifestyle Management
  • Whitbread
  • Willis Towers Watson

Confirm your VIP ticket here to avoid disappointment!

Keeping data secure in the oil and gas industry

960 640 Stuart O'Brien

By Jerry Askar, Managing Director Middle East, Levant & Africa, Certes Networks

As automation continues to evolve, the utilities sector is finding that encryption of their network data is a critical to safeguard against cyber-attacks.  And, as organisations across the globe continue to prioritise cybersecurity, the threat landscape continues to expand.  Although good progress is being made, it is evident that critical network vulnerabilities are still being left unprotected. 

This is particularly the case in the oil and gas sector, which is the latest to enter the cyber security spotlight according to the latest threat report by security firm Dragos that highlighted that the sector is a valuable target for adversaries seeking to exploit industrial control systems (ICS) environments.

The report revealed a new activity group targeting the industry, bringing the total number of tracked ICS-targeted activity groups to nine, five of which directly target oil and gas organisations. What’s more, the increased deployment of automation within the oil and gas industry to manage costs, extract the most value from current assets and maximise up-time, only causes the threats to ICS and supervisory control and data acquisition (SCADA) networks to rise.

The threat is clearly high, as are the potential consequences of a cyber-attack on this sector. An attack on an oil or gas organisation would not only have severe political and economic impacts, but it would also have a direct effect on civilian lives and infrastructure. Much of how the population lives and works is dependent upon the energy from oil and gas production, from communication, the use of electronic devices and appliances, and even heating, cooling and cooking. The smallest attack on this sector could result in devastating effects. 

Beyond consumer impact, an oil or gas company hit by a cyber-attack could experience a plant or production shutdown, utilities interruptions, equipment damage or loss of quality, undetected spills and of course safety measure violations. For example, in December 2018, Saipem, an Italian oil and gas industry contractor, fell victim to a cyber-attack that hit servers based in the Middle East, India, Aberdeen and Italy, which led to the cancellation of data and infrastructures.

Mitigating cyber-attack damage 

Understanding not just the threats faced by this sector, but also how the attacks are taking place and the behaviours and capabilities of activity groups targeting oil and gas companies, is essential. As the Dragos report warned, there is currently limited visibility – or observability –into the network ecosystem, including communications to and from operations centers, distribution substations and even home “smart grid” networks. This means that intruders can dwell for longer and the root cause of the attack can remain undetected. As is widely documented, the longer an attacker remains in a network, the more damage the breach will cause.

To protect data in ICS/SCADA environments, organisations in the oil and gas industry need an encryption solution that not only safely encrypts data enterprise-wide, but that is also scalable and easy to implement, without disrupting, replacing or moving the network infrastructure. Furthermore, some encryption technologies will provide organisations with greater visibility of their data to monitor deployed policies. By defining and deploying policies and keys based only on which users should have access to what data, organisations can ensure that only those who need to send or receive the data have the access to do so. In addition, many Observability network features can provide crucial flow data so that IT operators can observe policy enforcement and quickly shut down a policy if compromised to stop further damage and potential escalation.

Conclusion

Lessons need to be learned from the past attacks on the oil and gas industry, such as the Saipem attack which had global consequences. With the sector facing such a high cyber risk, it’s more crucial than ever for oil and gas organisations to inhabit a cyber security culture and move from reactionary to proactive. 

This means employing an encryption management solution, along with the right forensic intelligence tools, to understand and safeguard against future cyber-attacks and their potential for devastating consequences.

Image by Robson Machado from Pixabay

Are trusted employees your biggest threat?

960 640 Stuart O'Brien

Trusted employees have access to company-sensitive information, assets and intellectual property, and permission to make financial transactions – often without requiring any further approval.

Attackers target these privileged, trusted people – impersonating suppliers, regulators and colleagues – and try to encourage them to do something they have permission to do, but shouldn’t, like diverting payments to a different account.

As far as they’re aware, they’re not doing anything wrong…

Find out how to combat this threat at: https://www.corvid.co.uk/blog/are-employees-your-biggest-threat

Do you specialise in Vulnerability Management? We want to hear from you!

960 640 Stuart O'Brien

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in September we’re focussing on Vulnerability Management solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re a Vulnerability Management solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Chris Cannon on c.cannon@forumevents.co.uk.

Here are the areas we’ll be covering, month by month:

Sep – Vulnerability Management
Oct – Employee Security Awareness
Nov – Malware
Dec – Network Security Management

For information on any of the above topics, contact Chris Cannon on c.cannon@forumevents.co.uk.

Image by Steve Buissinne from Pixabay

Your personalised schedule at the Security IT Summit

960 640 Stuart O'Brien


The Security IT Summit is a highly-focused one-day event that will help underpin your strategy for 2020 and beyond. 

It takes place on November 5th at the Hilton London Canary Wharf and is entirely FREE for you to attend. This will be your schedule:

8.00am: Registration

8.45am: Opening presentation

9.40am: Seminar sessions

10.30M: Pre-arranged 1-2-1 meetings with suppliers of your choicej

1.30pm: Lunch & networking

2.20pm: Pre-arranged 1-2-1 meetings with suppliers of your choice

4.30-pm: Event closes

The Security IT Summit could be the best day you spend out of the office in 2019. You’ll be joining other senior cyber security professionals from the likes of: 

  • ADVANZ Pharma
  • All Fleet Services 
  • Alvarez & Marsal
  • Ashville College
  • Asto, by Santander
  • Avanti Communications Group 
  • Bank of America Merrill Lynch
  • Belvoir Group
  • Baringa Partners 
  • Bibby Financial Services
  • Birketts 
  • Catalyst
  • CashFlows
  • Consulum UK 
  • Cote Restaurants
  • CSL Group
  • EDF Energy
  • ED&F Man Holdings 
  • Freshfields Bruckhaus Deringer 
  • Harrods 
  • Howard Kennedy
  • Inspired Education
  • Intellectual Property Office
  • Lloyds Banking Group
  • London School of Economics
  • Metro Bank 
  • Optum International
  • Petroleum Pipe 
  • PunterSouthall Group
  • RB (Reckitt Benckiser)
  • Sainsbury’s
  • Simplyhealth
  • Skyes Cottages 
  • St. Dominics SFC
  • Ten Lifestyle Management
  • Whitbread
  • Willis Towers Watson

Register your FREE place here today!

Security IT Summit

Your personalised schedule at the Smarter Payments Summit…

960 640 Stuart O'Brien

The Smarter Payments Summit is a highly-focused one-day event that will help underpin your strategy for 2020 and beyond.

It takes place on September 9th at the Hilton London Tower Bridge and is entirely FREE for you to attend.

This will be your schedule:

8.00am: Registration
8.45am: Opening presentation
9.40am: Seminar sessions
10.30M: Pre-arranged 1-2-1 meetings with suppliers of your choice
1.30pm: Lunch & networking
2.20pm: Pre-arranged 1-2-1 meetings with suppliers of your choice
4.30-pm: Event closes

The Smarter Payments Summit could be the best day you spend out of the office in 2019.

Register your FREE place here.

Government strives to increase diversity in cyber security

960 640 Stuart O'Brien

The third round of funding through the Cyber Skills Immediate Impact Fund (CSIIF) has been launched by Cyber Security Minister Nigel Adams.

The Fund aims to increase the number and diversity of people entering the cyber security profession, with training providers able to bid for up to £100,000 to work with employers and design training programmes which retrain a diverse range of individuals for a career in cyber security.

Alongside this Adams has also announced that after a competitive grant competition, the Institution of Engineering and Technology (IET) has been appointed the lead organisation in charge of designing and delivering the new UK Cyber Security Council, alongside a wider alliance of cyber security professional organisations.

The UK Cyber Security Council will aim to coordinate the existing professional landscape, to make cyber security a well structured and easy to navigate profession which represents, supports and drives excellence going forward.

Cyber Security Minister Nigel Adams said: “The UK is a world leader in tackling cyber attacks but we must make sure we continue to develop the talent we need to protect the public and business online.

“This latest round of funding demonstrates our commitment to make sure the UK’s cyber security industry has a skilled and diverse workforce and, through our new Cyber Security Council, there are clear paths for those wishing to join the profession.”

Simon Edwards, IET Director of Governance and External Engagement, said: “It’s fundamental that cyber security is seen as a nationally recognised and established profession with clear career pathways. The IET, alongside an alliance of professional cyber security organisations, will bring together the credibility and knowledge across a wide range of disciplines to further strengthen the UK’s leadership position in cyber security innovation and resilience on the global stage. With cyber skills shortages already emerging at every level, we are committed to working with the Government and the National Cyber Security Centre on delivering the rapid, yet capable development of specialist cyber skills to meet the growing needs of the industry, manage risk and secure the next generation of talent.”

Jacqueline de Rojas, President, techUK said: “As businesses become ever more reliant on digital tools, the need for a skilled and professional cyber workforce in the UK has increased. Yet the Government’s National Cyber Security Skills Strategy found that more than half of all businesses and charities in the UK have a basic cyber security skills gap.

“Increasing diversity in the sector is one way in which we can seek to plug the growing cyber skills gap, and that is why initiatives like the Immediate Impact Fund are so important. Coupled with the creation of a new Cyber Security Council that will create clearer pathways for people entering the sector, these announcements will go a long way to ensuring that we create and nurture our cyber professionals and continue making the UK the safest place to be online.”

The deadline for applications to the Cyber Skills Immediate Impact Fund (CSIIF) is the 27th September.

Twelve initiatives have already received support from CSIIF with more than 400 people benefitting from training opportunities.

Barracuda snaps up bot detection software

960 640 Stuart O'Brien

Barracuda has acquired bot detection technology from InficSecure Technologies, adding capabilities to its WAF-as-a-Service and Web Application Firewall platforms.

Bot detection has evolved to combat more human-like bot attacks. Low-and-slow bots, which request data slowly and rotate IP addresses often, require special fingerprinting techniques to detect.

Barracuda says combining InfiSecure’s technology with its own Global Threat Intelligence Infrastructure’s set of behavioural data points, will provide WAF with powerful capabilities to combat such attacks.

Barracuda says a generic bot detection methodology fails to address the specific bots written for different applications. InfiSecure’s machine learning layer provides automatic profiling of each individual application to provide application-specific bot detection and mitigation capabilities and help ensure the highest protection.

“This strategic technology acquisition further strengthens our application security portfolio and our commitment to provide application security to our customers,” said Tim Jefferson, SVP, Engineering of Data Protection, Network and Application Security, Barracuda Networks. 

“InfiSecure perfectly complements our recently released Advanced Bot Detection and will bring next-generation capabilities to our WAF-as-a-Service and Web Application Firewall offerings.”

Security IT Summit: An event created just for you

960 640 Stuart O'Brien

The Security IT Summit is a unique one-day event which allows senior cyber security professionals to meet with innovative and competitive suppliers to the industry.

5 November 2019 – Hilton London Canary Wharf

It is entirely free for cyber security professionals to attend and, as our VIP guest, you will be provided with a bespoke itinerary of pre-arranged, face-to-face meetings with suppliers who match your requirements and upcoming projects.

During the course of the event, you can also attend insightful and inspirational seminars from industry thought-leaders. And there are plenty of opportunities to network with like-minded peers who share your challenges.

Lunch and refreshments are also included with your free ticket.

Simply register your place here.

To find out more about attending the Security IT Summit, contact Emily Gallagher on 01992 374085 or email e.gallagher@forumevents.co.uk.

If you’re a supplier to the sector, contact Chris Cannon on 01992 374096 or email c.cannon@forumevents.co.uk to find out about the range of event partner packages.

www.securityitsummit.co.uk