Cyber Security Live: Predict, protect and survive

clock • 2 min read

Strategy and tactics to fend off evolving threats

Cyber security has long been at the top of pnst organisations' agendas - and for good reason. In a data-driven world, fortunes rise or fall depending on how well core data is secured.

Strange then, that when disaster strikes it often turns out that data was not very secure at all. Just today Computing ran a story on allegedly poor security practice within CapitalOne, the bank that lost personal information of 106 million customers to a hacker.

And barely a week goes by without an unencrypted database full of sensitive data being found on the web by security researchers - with luck before hackers or malicious actors have found it first, but who can say for sure? In a recent example the biometrics of one million people were discovered on publicly accessible database.

Such discoveries make for terrible PR of course, and potentially large fines, which is why victims of cyber attacks are often loathe to comment on them. But in reality, most organisations are more vulnerable than they let on, or even than they realise. Consider the Cloudhopper attacks in which companies were breached by the back door through via their cloud provider, apparently by state sponsored hackers. Arguably, from the affected companies' point of view, this was almost impossible to foresee.

The fact is, hacking gangs, state-sponsored actors and - increasingly - AIs don't give a damn about CEOs' and CISOs' proclamations that they are hiring the brightest and the best and implementing the latest security solutions. There will always be gaps, and sooner or later they will be discovered. The most important thing is how the organisation responds when they are.

DON'T FORGET TO REGISTER

What will you do when you find an adversary has hidden themselves within your network, a well-designed bot using military-grade technology tirelessly probing your defences with endless patience? Do you really know where your vulnerabilities lie?

While concern about security is more or less a constant, today's threats are on a different scale, so don't bring a human to a bot-fight, at least not without some hefty backup. AI and APT scanners are part of the solution but they are only as good as the data they are fed and the visibility they are allowed.

New threats, new approaches

Organisations need to be aware of evolving threats, stay abreast of the latest solutions and best practices for protecting core data and systems, and work on a multifaceted layered approach so that when defences are breached damage is minimised.

Computing's Cyber Security Live event in November will cover all of these topics and more. The conference is an excellent opportunity to gain practical tips through sharing and reviewing peers' mistakes and experiences. Cyber Security Live aims to:

  • Inform CISOs and other IT professionals about future threats
  • Help them predict and prepare for these threats
  • Implement an excellent cyber-security solution without breaking the budget

Attendance is free for qualifying professionals. We look forward to seeing you there.

You may also like
NSO's Pegasus spyware used to hack exiled Russian journalist

Hacking

Galina Timchenko led a media outlet Moscow declared ‘undesirable’

clock 14 September 2023 • 2 min read
We tried ChatGPT for vulnerability fixes. Most flaws are too complex for generative AI alone

Security Technology

An experiment with ChatGPT 3.5 found that 80% of code fixes were unusable or introduced new vulnerabilities

clock 12 July 2023 • 4 min read
Accidental exclusion exacerbating cyber's staffing problem

Careers and Skills

Many people who would excel in cybersecurity roles see no obvious way in, with those that do make it getting stuck in entry-level positions

clock 12 May 2023 • 4 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Epic Games hacker isn't a hacker, at all

Epic Games hacker isn't a hacker, at all

Describe themselves as 'criminal geniuses'

Tom Allen
clock 05 March 2024 • 2 min read
IT Essentials: LockBit and load

IT Essentials: LockBit and load

They fought the law, and the law won - for now

Tom Allen
clock 26 February 2024 • 2 min read
Law enforcement takes down LockBit - updated

Law enforcement takes down LockBit - updated

NCA among the groups under 'Operation Cronos'

Tom Allen
clock 20 February 2024 • 2 min read