Cyber Security Live: Predict, protect and survive

clock • 2 min read

Strategy and tactics to fend off evolving threats

Cyber security has long been at the top of pnst organisations' agendas - and for good reason. In a data-driven world, fortunes rise or fall depending on how well core data is secured.

Strange then, that when disaster strikes it often turns out that data was not very secure at all. Just today Computing ran a story on allegedly poor security practice within CapitalOne, the bank that lost personal information of 106 million customers to a hacker.

And barely a week goes by without an unencrypted database full of sensitive data being found on the web by security researchers - with luck before hackers or malicious actors have found it first, but who can say for sure? In a recent example the biometrics of one million people were discovered on publicly accessible database.

Such discoveries make for terrible PR of course, and potentially large fines, which is why victims of cyber attacks are often loathe to comment on them. But in reality, most organisations are more vulnerable than they let on, or even than they realise. Consider the Cloudhopper attacks in which companies were breached by the back door through via their cloud provider, apparently by state sponsored hackers. Arguably, from the affected companies' point of view, this was almost impossible to foresee.

The fact is, hacking gangs, state-sponsored actors and - increasingly - AIs don't give a damn about CEOs' and CISOs' proclamations that they are hiring the brightest and the best and implementing the latest security solutions. There will always be gaps, and sooner or later they will be discovered. The most important thing is how the organisation responds when they are.

DON'T FORGET TO REGISTER

What will you do when you find an adversary has hidden themselves within your network, a well-designed bot using military-grade technology tirelessly probing your defences with endless patience? Do you really know where your vulnerabilities lie?

While concern about security is more or less a constant, today's threats are on a different scale, so don't bring a human to a bot-fight, at least not without some hefty backup. AI and APT scanners are part of the solution but they are only as good as the data they are fed and the visibility they are allowed.

New threats, new approaches

Organisations need to be aware of evolving threats, stay abreast of the latest solutions and best practices for protecting core data and systems, and work on a multifaceted layered approach so that when defences are breached damage is minimised.

Computing's Cyber Security Live event in November will cover all of these topics and more. The conference is an excellent opportunity to gain practical tips through sharing and reviewing peers' mistakes and experiences. Cyber Security Live aims to:

  • Inform CISOs and other IT professionals about future threats
  • Help them predict and prepare for these threats
  • Implement an excellent cyber-security solution without breaking the budget

Attendance is free for qualifying professionals. We look forward to seeing you there.

You may also like
NSO's Pegasus spyware used to hack exiled Russian journalist

Hacking

Galina Timchenko led a media outlet Moscow declared ‘undesirable’

clock 14 September 2023 • 2 min read
We tried ChatGPT for vulnerability fixes. Most flaws are too complex for generative AI alone

Security Technology

An experiment with ChatGPT 3.5 found that 80% of code fixes were unusable or introduced new vulnerabilities

clock 12 July 2023 • 4 min read
Accidental exclusion exacerbating cyber's staffing problem

Careers and Skills

Many people who would excel in cybersecurity roles see no obvious way in, with those that do make it getting stuck in entry-level positions

clock 12 May 2023 • 4 min read

More on Security

'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read
Mammoth Microsoft Patch Tuesday fixes four zero-days, five critical bugs

Mammoth Microsoft Patch Tuesday fixes four zero-days, five critical bugs

142 holes plugged this month

John Leonard
clock 10 July 2024 • 3 min read