03.08.2020 Views

Cyber Defense eMagazine August 2020 Edition

Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security by Design: How to Protect the<br />

Future of Business<br />

How To Grow Your <strong>Cyber</strong> Expertise During<br />

A Pandemic<br />

Is What’s Lurking in Your Network About<br />

to Come Out?<br />

<strong>Cyber</strong> Security Market to Reach USD 400<br />

Billion by 2026<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CONTENTS<br />

Welcome to CDM’s <strong>August</strong> <strong>2020</strong> Issue --------------------------------------------------------------------------------------------- 6<br />

Security by Design: How to Protect the Future of Business --------------------------------------------------------- 23<br />

By Jim Zuffoletti, CEO & co-founder of SafeGuard <strong>Cyber</strong><br />

How To Grow Your <strong>Cyber</strong> Expertise During A Pandemic ------------------------------------------------------------ 27<br />

By Bradley Hayes, Chief Technology Officer at Circadence<br />

Is What’s Lurking in Your Network About to Come Out? ------------------------------------------------------------ 30<br />

By Carolyn Crandall, Chief Deception Officer, Attivo Networks<br />

<strong>Cyber</strong> Security Market to Reach USD 400 Billion by 2026 ----------------------------------------------------------- 34<br />

By Saloni Walimbe, Content Writer at Global Market Insights, Inc.<br />

COVID-19 And Security Team Cuts Are Costing Businesses in <strong>Cyber</strong> and Financial Risks ------------------ 37<br />

By Samantha Humphries, security strategist, Exabeam<br />

<strong>Cyber</strong>security Challenges When Working from Home --------------------------------------------------------------- 50<br />

By Renuka Sahane, Sr. Content Writer, Scalefusion<br />

Network Security Is Not Data Security ------------------------------------------------------------------------------------ 54<br />

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks<br />

WireGuard - Separating Fact from Fiction ------------------------------------------------------------------------------- 57<br />

By Tomislav Čohar, co-founder, hide.me VPN<br />

Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce<br />

---------------------------------------------------------------------------------------------------------------------------------------- 60<br />

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium<br />

Can We Better Leverage Our – Already Scarce – <strong>Cyber</strong> Security Human Resources? ----------------------- 64<br />

By Douglas Ferguson, Founder & CTO, Pharos Security<br />

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route<br />

These “Below the Radar” Attacks ------------------------------------------------------------------------------------------ 67<br />

By Saryu Nayyar, CEO, Gurucul<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues ------------------------------- 70<br />

By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte<br />

Ransomware, Risk, And Recovery ------------------------------------------------------------------------------------------ 73<br />

By Mickey Bresman, CEO, Semperis<br />

Getting Employees Back to the New Normal --------------------------------------------------------------------------- 77<br />

By Brendan O’Connor, CEO and Co-founder, AppOmni<br />

Security in The New Normal Requires an Agile Approach ---------------------------------------------------------- 80<br />

By Danny Presten, Chief Methodologist at Digital.ai<br />

Why Are Fully Staffed <strong>Cyber</strong>security Teams Unable to Keep Up with Hacks? -------------------------------- 84<br />

By Steve Salinas, Head of Product Marketing, Deep Instinct<br />

Looks Like Russian Hackers Are on An Email Scam Spree ----------------------------------------------------------- 88<br />

By Tim Sadler, CEO, Tessian<br />

TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model---------------------------------------------- 91<br />

By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks<br />

Build Your AI Incident Response Plan… Before It’s Too Late ------------------------------------------------------- 94<br />

By Patrick Hall* and Andrew Burt**<br />

Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security - 99<br />

By Anthony Bettini, CTO, WhiteHat Security<br />

Is API Usage Putting Your Organization Out of Compliance? ---------------------------------------------------- 102<br />

By Matt Keil, Director of Product Marketing, Cequence Security<br />

HIPAA Compliance and The Protection of <strong>Cyber</strong> Security --------------------------------------------------------- 105<br />

By Andrew Mikhailov, CTO at Zfort Group<br />

Smart Gadgets in Proving Workplace Violence ---------------------------------------------------------------------- 109<br />

By Milica D. Djekic<br />

<strong>Cyber</strong> Against Granny ------------------------------------------------------------------------------------------------------- 116<br />

By Yotam Gutman, SentinelOne<br />

Are the Worst Cryptocurrency Security Breaches Behind Us? --------------------------------------------------- 119<br />

By Tim Fries, Co-Founder, The Tokenist<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

New <strong>Cyber</strong><strong>Defense</strong>Magazine.com website, plus updates at <strong>Cyber</strong><strong>Defense</strong>TV.com & <strong>Cyber</strong><strong>Defense</strong>Radio.com<br />

Dear Friends,<br />

In the <strong>August</strong> issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine, you will find both relevant and actionable<br />

intelligence from a broad spectrum of cyber experts. We at <strong>Cyber</strong> <strong>Defense</strong> Media Group are<br />

pleased to provide our readers and clients with up-to-date and cogent articles on which you<br />

can rely in fulfilling your own duties.<br />

In my role as Publisher, I make it my daily responsibility to observe, digest, and select<br />

those topics of greatest value and interest to practitioners in the world of cybersecurity.<br />

Today, we face a continuation and deepening of the effects of COVID-19 on nearly all enterprises which depend<br />

on cyberspace for their operations. The challenges of maintaining security continue to grow with our dependence<br />

on cyber-related systems of all kinds.<br />

In the midst of increasing attacks on cyber systems across the board, we must keep an eye on the effects of “social<br />

distancing” and the prospect of re-opening in-person activities. Since these restrictions do not appear to be going<br />

away in the near future, it’s imperative to concentrate on strengthening protections against cyber exploits.<br />

Sharing actionable intelligence is the first and best means of doing so.<br />

In this spirit, we are pleased to continue providing the powerful combination of monthly <strong>eMagazine</strong>s, daily<br />

updates and features on the <strong>Cyber</strong> <strong>Defense</strong> Magazine home page, and webinars featuring national and<br />

international experts on topics of immediate interest.<br />

We've also launched our Black Unicorn Report for <strong>2020</strong> which you can download by visiting<br />

www.cyberdefenseawards.com. Please share in our enthusiasm and congratulations for all of the winners, as they<br />

help us get one step ahead of the next breach.<br />

Warmest regards,<br />

Gary S. Miliefsky<br />

Gary S.Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or information about<br />

CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag and<br />

@Miliefsky – it helps spread the word about our free resources<br />

even more quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook formats.<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec information.<br />

From the International<br />

Editor-in-Chief…<br />

The word “quarantine” has been in use in one form or another for<br />

many centuries. In any search for its root, the Italian term<br />

quarantena, meaning "forty days" will appear. In its original<br />

concept, the period of 40 days was considered to be an adequate<br />

period for a disease to run its course and general health to return.<br />

Today, we are experiencing physical quarantine requirements for<br />

both national and other jurisdictional borders.<br />

In contrast, there is no assurance that any such set period can<br />

provide a way to avoid cyber disruptions brought about by “viruses”<br />

or other criminal exploits. Both the private and government sectors<br />

must undertake immediate and ongoing actions to overcome these<br />

incursions.<br />

As we observed last month, the international effects of COVID-19<br />

include restrictions on physical travel, resulting in greater<br />

dependence on cyber “travel” to accomplish necessary business<br />

and government functions. As might be expected, this expanded<br />

reliance on cyber resources also provides greater opportunities for<br />

criminal activity. Only by concerted and cooperative efforts can we<br />

succeed in implementing an effective defense.<br />

Accordingly, let me take this occasion to renew my suggestion that<br />

in the days ahead we agree to put our differences aside in favor of<br />

responding to our common enemies: the COVID-19 virus itself and<br />

those who would take advantage of this crisis to perpetrate<br />

criminal schemes.<br />

To our faithful readers, we thank you,<br />

Pierluigi Paganini<br />

International Editor-in-Chief<br />

PRESIDENT & CO-FOUNDER<br />

Stevin Miliefsky<br />

stevinv@cyberdefensemagazine.com<br />

INTERNATIONAL EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

US EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP (a Steven G. Samuels LLC d/b/a)<br />

276 Fifth Avenue, Suite 704, New York, NY 10001<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

8 YEARS OF EXCELLENCE!<br />

Providing free information, best practices, tips and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

magazine is your go-to-source for Information Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

WEBINARS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>August</strong> <strong>2020</strong> Issue<br />

From the U.S. Editor-in-Chief<br />

There is no “new normal” – and there isn’t going to be.<br />

Regardless of what you may read elsewhere about the “new normal,” it’s no more than wishful thinking<br />

or sales puffery. The very term “normal” implies stability, but the entire cyber system is in flux. As a<br />

dynamic rather than static phenomenon, the concept of “normal” is no longer appropriate in our world,<br />

and the sooner we all prepare to live with that fact, the better prepared we will all be to exercise effective<br />

cyber defenses.<br />

The closest battle analogy to what we now face is “asymmetrical warfare.” In short, that refers to the<br />

situation where the attackers and defenders play by two different sets of rules. In the cyber world, the<br />

attackers honor no rules at all. Moreover, the defenders have to repel 100% of the attacks to prevail, but<br />

the attackers only have to score occasionally.<br />

In the case of malware and ransomware, the target organizations are proscribed from engaging in<br />

criminal activity, such as hunting down and destroying the criminals. We must rely on government action<br />

to find and punish them. But that doesn’t mean we can’t provide helpful information to law enforcement.<br />

At least they have remedies like seizing assets, confiscating accounts, and imprisonment.<br />

In that perspective, we are pleased to present the <strong>August</strong> <strong>2020</strong> issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine, with<br />

over two dozen articles on cyber and security topics of immediate interest. We continue to provide<br />

thoughtful articles from a broad spectrum of contributors who share their expertise and insights with our<br />

community.<br />

Wishing you all success in your cyber security endeavors,<br />

Yan Ross<br />

US Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & US Editor-in-Chief for<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine. He is an accredited author and educator and<br />

has provided editorial services for award-winning best-selling books on<br />

a variety of topics. He also serves as ICFE's Director of Special Projects,<br />

and the author of the Certified Identity Theft Risk Management Specialist<br />

® XV CITRMS® course. As an accredited educator for over 20 years, Yan addresses risk management<br />

in the areas of identity theft, privacy, and cyber security for consumers and organizations holding sensitive<br />

personal information. You can reach him via his e-mail address at<br />

yan.ross@cyberdefensemediagroup.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Your website could be vulnerable to outside attacks. Wouldn’t you like to know where those<br />

vulnerabilities lie? Sign up today for your free trial of WhiteHat Sentinel Dynamic and gain a deep<br />

understanding of your web application vulnerabilities, how to prioritize them, and what to do about<br />

them. With this trial you will get:<br />

An evaluation of the security of one of your organization’s websites<br />

Application security guidance from security engineers in WhiteHat’s Threat Research Center<br />

Full access to Sentinel’s web-based interface, offering the ability to review and generate reports as well<br />

as share findings with internal developers and security management<br />

A customized review and complimentary final executive and technical report<br />

Click here to sign up at this URL: https://www.whitehatsec.com/info/security-check/<br />

PLEASE NOTE: Trial participation is subject to qualification.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security by Design: How to Protect the Future of<br />

Business<br />

By Jim Zuffoletti, CEO & co-founder of SafeGuard <strong>Cyber</strong><br />

Estimates suggest that by 2021, cybercrime will cost the world $6 trillion every year. This will constitute<br />

“the greatest transfer of economic wealth in history,” making cybercrime “more profitable than the global<br />

trade of all major illegal drugs combined.”<br />

Too many enterprises fail to protect themselves adequately because most of them are approaching<br />

cybersecurity in the wrong way. They are recapitulating Web 1.0 models of information security, in which<br />

security is applied as an afterthought, bolted on to a process or technology solution.<br />

This approach is inadequate. Modern forms of digital risk are too sophisticated and too dangerous.<br />

Instead, to simultaneously drive business growth and properly protect themselves, forward-looking<br />

enterprises need to implement a Security by Design approach. This approach enables companies to build<br />

comprehensive security into the foundations of all enterprise teams, processes, and behavior –<br />

empowering organizations to embrace new digital tools with peace of mind.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security by Design: Trading the Reactive for the Proactive<br />

The security perimeter is gone. Today, every aspect of the business is tied to cloud SaaS applications<br />

and mobile chat apps that live outside the traditional perimeter. Marketing makes constant use of social<br />

media apps; customer data is stored in a cloud-based CRM; internal communications are conducted over<br />

collaboration platforms like Microsoft Teams; sales teams might even leverage WhatsApp and WeChat<br />

to talk to prospects. An enterprise’s daily operations are conducted in the cloud, and more importantly,<br />

that’s where data resides, too. Business communications contain customer data, IP, and more.<br />

With a Security by Design approach, you react to this reality by constructing a flexible network perimeter<br />

around every end user. You depart from the 64% of businesses who don’t include the security team in<br />

discussions of technology-enabled business initiatives. Instead, you start with understanding what tools<br />

are needed by all the people within the enterprise, and then you apply security to all of those tools – at<br />

the end user level. You create a tech stack and a set of practices that mean security is woven through<br />

every part of the business.<br />

Traditional security tools are not built to deal with a post-perimeter, multi-channel security landscape.<br />

Because of this, they can only offer a reactive security stance. Events like these become commonplace:<br />

● Information security finds out that an employee opened a malicious link sent over LinkedIn, and<br />

malware has transited from their home computer over the VPN. They rush to try and repair the<br />

damage.<br />

● HR finds out that a group of employees is bullying another employee over Slack, and has to go<br />

and investigate – weeks after the issue started.<br />

● Marketing suddenly finds themselves locked out of the company Instagram, and only then do<br />

they try to roll out an account takeover response plan.<br />

● A sales rep discovers a fake website that has been up and running for months, and belatedly<br />

begins the long process of trying to get the website taken down.<br />

● A compliance office discovers that a rep has been having a noncompliant conversation with a<br />

prospect, and can only try and correct the behavior after the fact.<br />

Everything is reactivity. However, if you are only trying to deal with incidents once they have already<br />

occurred, you are setting yourself up for controlled failure. Eventually, one of these incidents will be<br />

serious: a ransomware attack, IP theft, or something else that can seriously hamper growth.<br />

By contrast, a Security by Design framework establishes protection from digital risks prior to their<br />

emergence as a threat.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security by Design = Growth by Design<br />

The real beauty of Security by Design is that the approach can have a material business impact. A bad<br />

ransomware attack, or IP theft, can be devastating, and seriously hamper ambitions of growth. To be<br />

productive, reach customers, and stay competitive, businesses need to embrace social media,<br />

collaboration apps, and messaging apps. But without the right protections, in embracing these cloud<br />

channels, they are rolling the dice on the integrity of their enterprise. Their digital transformation is risky,<br />

and contains blind spots.<br />

However, once security is built into an enterprise’s approach, new tools and platforms are secure from<br />

the start. This immediately creates secondary business benefits. When you are proactively monitoring<br />

your cloud channels, entire new datasets are generated. These can then be piped via an API into a<br />

business insights engine. Compliance issues can be monitored in real time, at scale, across various<br />

languages.<br />

Security by Design is an approach that powers business goals. Security teams have become accustomed<br />

to being seen as the department that wants to put the brakes on sales and marketing’s embrace of new<br />

tools – but with this approach, they can do the opposite. They can greenlight new tools, and work with<br />

growth teams to optimize the output of those tools so that they become a part of the revenue engine.<br />

One layer down, the business benefits of Security by Design compound again. Alongside staff members,<br />

consumers also value security. Individuals are tired of data breaches, and solemn promises by<br />

enterprises to do better next time. As Ernst & Young put it, “when data confidentiality, integrity or<br />

availability are compromised, or products and services cease to perform as expected, trust built over<br />

years can be lost in a day.”<br />

Being able to present yourself as a company that is prioritizing security in active and innovative ways is<br />

a major competitive advantage. By moving toward a proactive security model, you both better protect<br />

your company and your employees from attacks – and better satisfy customers.<br />

Let’s revisit how a Security by Design approach changes the business examples cited above. When you<br />

trade a security as bolt-on approach for a Security by Design approach, you move from a reactive stance<br />

to a proactive stance:<br />

● Information security procures technology to enable employees to use LinkedIn. The technology<br />

immediately detects any malicious links, flags the posts and intercepts the content – before<br />

anything malicious can be clicked on.<br />

● HR procures technology to protect the company’s expanded Slack environment. Inappropriate<br />

conduct is immediately flagged, and HR can intervene early and stop the problem from worsening.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


● Marketing and security defined the roles and responsibilities for social media and fake accounts.<br />

Using a cross-function approach, Marketing detects an account takeover, and immediately<br />

retakes control. They alert security to the incident.<br />

● Sales can work with marketing and security to initiate a takedown of any fake account. Such<br />

accounts are detected by technology that actively crawls the internet (both surface and dark)<br />

around the clock.<br />

● A compliance officer is notified that a message sent by a rep might contain an issue, because<br />

compliance and sales have agreed on what channels need monitoring. The message has been<br />

quarantined so it can be checked before it is allowed to be sent.<br />

The Future of Security is by Design<br />

A Security by Design framework enables enterprises to properly protect themselves, and move from a<br />

reactive stance, where a crisis is always around the corner, to a proactive stance. Security by Design is<br />

the only sensible approach in an era where so many business-critical tools live outside the traditional<br />

perimeter, and modern digital risks are so numerous, complex, and sophisticated.<br />

Security by Design is also the only sensible approach for enterprises that want to do everything they can<br />

do to drive growth. When a Security by Design framework is properly implemented, security becomes a<br />

driver of business success. Executives and board members can view digital security as achieving a<br />

positive goal that helps drive business growth. Security becomes synonymous with revenue. When<br />

properly safeguarding the organization is understood as simple financial prudence, including security at<br />

the inception of a product or service becomes an obvious best practice. This view of security is the future.<br />

About the Author<br />

Jim Zuffoletti has been a founder of start-up organizations as<br />

both an entrepreneur and an intrapreneur for the past twenty-five<br />

years. Jim is CEO and co-founder of SafeGuard <strong>Cyber</strong>, a digital<br />

risk protection company securing brands, VIPs, and team<br />

members in the new world of social media and digital<br />

communications. Jim was previously CEO and President of<br />

OpenQ which enabled pharmaceutical, biotech, and medical<br />

device companies to discover, regulate, and leverage the social<br />

networks forged with outside influencers and researchers. Jim<br />

Zuffoletti can be reached at our company website at<br />

www.safeguardcyber.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Grow Your <strong>Cyber</strong> Expertise During A Pandemic<br />

By Bradley Hayes, Chief Technology Officer at Circadence<br />

IT pros can still learn new skills despite perceived barriers to progressing professionally during the<br />

pandemic. While work circumstances and environmental factors have changed in our world and most<br />

people are working and learning remote, a professional's ability to learn is the one thing we can be certain<br />

about right now. And, let’s face it, now it’s more important than ever for cyber pros to be up-to-date on<br />

cybersecurity skills since so many people are encountering increasing amounts of cyber risks while<br />

working remote. Even with the shift to remote work, IT pros can stay connected to the industry and<br />

continue advancing their skills with professional IT/cyber groups, online trainings, cyber games and more.<br />

Here are a few ways cyber professionals and cyber newcomers can continue to grow their career and<br />

expertise during this pandemic.<br />

Build cyber skills with hands-on, online training<br />

It’s more vital than ever for cyber professionals to get the training they need to learn about new threats<br />

and protect company assets. From safeguarding a remote workforce to protecting sensitive online data,<br />

cyber professionals have a lot to do, but need to be highly trained to know how to do it. Distance learning<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


has been a massive shift for many students, and even for those who are ‘students of the business’<br />

learning and training virtually certainly requires a different mindset. Luckily, new emerging training<br />

platforms are making it easy and fun for cyber professionals to learn new skills from anywhere at a pace<br />

that works for them. Circadence’s Project Ares gamified training platform allows learners to build skills<br />

via engaging and personalized hands-on methods. Using gamification and intelligent tutoring AI, learners<br />

participate in a realistic, interactive curriculum of foundational and specialized scenarios in the form of<br />

battle rooms and missions, addressing real, current cyber threats across multiple industries, providing a<br />

comprehensive level of knowledge and practical experience. In a gamified cyber learning environment,<br />

cyber professionals are:<br />

✓ rewarded for completing tasks and objectives<br />

✓ incentivized to learn new skills persistently<br />

✓ encouraged to dialogue and learn together with peers<br />

✓ reminded of what they don’t yet know and held accountable<br />

✓ engaged in their progress through scores and leaderboards<br />

Gamified training is not only a viable solution that will impact today’s defenders, but it will truly change<br />

how cyber professionals learn and intellectualize a new skill.<br />

Network with cyber experts online<br />

<strong>Cyber</strong> professionals are in high demand right now. According to a report from cybersecurity nonprofit<br />

(ISC) 2 there are currently about 2.8 million cybersecurity professionals around the world, but that<br />

workforce would need to grow by roughly 145% to meet the global demand for digital security expertise.<br />

Since cyber careers are in high demand, it’s important for cyber professionals to network and put<br />

themselves out there…online. A few ways professionals can use digital connection to learn are:<br />

✓ Follow and engage with cyber companies on social media (i.e.; Twitter, Linkedin, Facebook)<br />

✓ Track topical hashtags like #cybertraining #cybersecurity #blackhat<br />

✓ Join cyber professional groups on LinkedIn<br />

✓ Participate in virtual conferences or online meet-ups such as the DC <strong>Cyber</strong>security Professionals<br />

or Bay Area <strong>Cyber</strong>security Meet-up<br />

Another way to show off skills and knowledge is with a platform like Project Ares, which maintains<br />

leaderboards and badges of accomplishments. This is a great way to attract a potential employer by<br />

demonstrating skills and expertise.<br />

Connect with formal cyber organizations<br />

There are also organizations that offer online networking events and educational webinars. For example,<br />

NICE/NIST and ISSA are highly reputable outlets to get connected on additional resources and cyber<br />

education. Many companies also offer live and on-demand webinars on current trending cyber topics.<br />

Here are a few as an example: Kickstarting a <strong>Cyber</strong> Career and Learning Happens Better with Games.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> competitions and hackathons are also great ways to connect. <strong>Cyber</strong> competitions expose<br />

contestants to a real-life cyber-attack or threat, making them think quick under tight deadlines to defend<br />

against it and protect their team’s assets. This is a great way for a cyber professional or newcomer to<br />

practice one’s skillset, engage with others in the community, and engage in some friendly competition!<br />

<strong>Cyber</strong> competitions positively impact a cyber professional or cyber newcomer’s experience to the industry<br />

by supporting new emerging technologies, engaging in environments for learners to demonstrate their<br />

abilities, and providing an opportunity for recruitment.<br />

Gain real-world experience during the pandemic<br />

Since there is such a strong need for cyber professionals right now, another way to advance your career<br />

or get noticed would be to offer up your expertise via a service to inspect a company’s remote workforce<br />

to ensure they are taking basic safety precautions during the pandemic. Since many companies do not<br />

have adequate cybersecurity support, your cyber intelligence and service might be simultaneously<br />

beneficial to a company in need and lead to a potential job or continued contract work with that company.<br />

More than likely, if you have a skill set in cyber, there is someone out there that needs your help.<br />

In times like these it can be easy to forget the importance of growing and advancing a career. Dramatic<br />

changes to how we work make it even more important to continue to train and learn to be that much more<br />

prepared for potential cyber threats. It’s important for all of us to continue to take part in being cyber-safe<br />

personally and professionally, but also to do our part in keeping the companies we work for and the<br />

broader economy safe from the increasing prevalence of costly cyber-attacks.<br />

About the Author<br />

Bradley Hayes, Chief Technology Officer at<br />

Circadence<br />

With decades of professional experience, Dr.<br />

Hayes’ expertise in Artificial Intelligence and<br />

Machine Learning supports continual innovation<br />

for Circadence’s cyber readiness solutions<br />

Hayes teachers as a professor at the University<br />

of Colorado’s Department of Computer Science and serves as the Director of the Collaborative AI and<br />

Robotics (CAIRO) Lab. He has in-depth experience developing techniques to build autonomous AI that<br />

can learn from and collaborate with humans, making people more efficient and capable during task<br />

execution.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is What’s Lurking in Your Network About to Come Out?<br />

The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to<br />

strike.<br />

By Carolyn Crandall, Chief Deception Officer, Attivo Networks<br />

The COVID-19 pandemic has forced countless millions of people to work remotely, and the rush to enable<br />

that remote work created opportunities for attackers to infiltrate corporate networks due to new devices,<br />

unmanaged endpoints, security gaps, and other issues. Now that the initial adjustment period is over,<br />

some businesses believe that the imminent danger has passed because they have yet to experience an<br />

attack. Unfortunately, this may not be the case. There is reason to believe that attackers may be hiding<br />

under the surface, lurking in corporate networks, and preparing to emerge and do damage. We will likely<br />

soon see new attacks as attackers begin to make their demands known.<br />

Why Now?<br />

Recent studies show that dwell time—the period that attackers spend inside the network before<br />

detection—is now just under 60 days for incidents discovered externally, though this can expand into<br />

months or even years for more advanced attacks. As the COVID-19 lockdown pushes past its third month,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


that 60-day threshold has begun to pass. Attackers who have been biding their time may soon be ready<br />

to strike.<br />

Today’s ransomware attackers don’t operate like they used to. While older ransomware attacks tended<br />

to be “smash and grab” operations stealing and encrypting any data they could, human-operated<br />

Ransomware 2.0 involves attackers spreading throughout the network to identify and target the most<br />

valuable information for the highest financial gain. For the largest possible payout, attackers want to take<br />

down a whole organization, not just one machine. Quickly spreading throughout the network to establish<br />

a stronger foothold is the smartest move, and given that the average ransomware payout was over<br />

$111,000 in Q1 <strong>2020</strong> (up 33% from the previous quarter), the strategy appears to be working.<br />

The COVID-19 Lockdown Has Created New Opportunities<br />

The extensive remote work necessitated by COVID-19 has, unfortunately, exacerbated the issue. Most<br />

businesses simply were not prepared for this volume of employees working from home, and the sudden<br />

onset of the crisis meant that they had to make security compromises in the spirit of achieving service<br />

availability. Naturally, both technology-based and human-based security issues have arisen as a result.<br />

Network endpoints are more exposed, as employees access the network from the outside rather than<br />

from within. Employees are pulling data out of the company that may never have been off-premises<br />

before, creating opportunities for attackers to target less secure machines. Similarly, attackers are<br />

entering the network via split-tunneling VPNs, which separates personal employee traffic from company<br />

networks but doesn’t have all the traditional security controls needed to protect the remote systems from<br />

attacks. Multi-factor authentication can help verify identity as employees work remotely, but some<br />

organizations still do not mandate its use, and it is not always effective against targeted attacks.<br />

Phishing and other scams have also noticeably increased during the lockdown, preying on employees<br />

that are distracted or flustered by the sudden shift in routine, underscoring the fact that organizations<br />

have less control over employees working remotely. The number of BYOD devices (laptops, routers,<br />

access points, etc.) on the network has increased, and it is harder to verify that employees are doing<br />

things like installing security updates promptly, creating potential vulnerabilities. Even employee turnover<br />

can create openings for attackers, as it can be harder to verify the full removal of stored credentials and<br />

other attack paths from all applications and systems. Given that misused or stolen credentials continue<br />

to be at the center of countless breaches, this poses a significant threat.<br />

There are tools designed to help protect against these new threats, but they require effective security<br />

controls at multiple levels of the network. Traditional Endpoint Protection Platforms (EPPs) and Endpoint<br />

Detection and Response (EDR) tools try to stop attacks at the initial compromise of the system. Still,<br />

given the potential new vulnerabilities created by extensive remote work, attackers may have an easier<br />

time bypassing those tools during the current crisis, highlighting the importance of overlapping security<br />

controls and building in a safety net to boost detection capabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Assessing and Addressing These New Risks<br />

A balance of security controls is necessary for initial compromise, lateral movement, privilege escalation,<br />

and data loss prevention. If the attackers have already evaded EPP and EDR tools and compromised an<br />

internal system, technology like cyber deception plays a valuable role in detecting lateral movement and<br />

protecting applications from unauthorized access. Additionally, data loss prevention capabilities can stop<br />

employees (or attackers) from saving sensitive information to personal devices.<br />

Improving lateral movement detection is vital. After the initial compromise of a network, there is a dark<br />

period of lateral movement and privilege escalation before the data protection tools detect anything. This<br />

lack of visibility means that there is no detection mechanism present until the tail end of the attack, which<br />

may be too late. Most security controls will also have challenges pinpointing attack path vulnerabilities,<br />

and tactics, techniques, and procedures (TTPs). Unless the organization has a mechanism to record an<br />

attacker’s activity during a live attack (like a decoy or engagement environment), it can be difficult for<br />

security teams to understand the attack methods, their objectives, and how broad of a footprint the<br />

attacker has established.<br />

To this end, it is vital to have visibility into attack paths to essential assets and network activity that<br />

includes seeing devices coming on or off the network, and can they find shadow admin accounts? This<br />

sort of credential tracking is more important than ever and having the correct tools in place can stop the<br />

execution of a successful breach. Decoys can also record and replay attacks for a better correlation of<br />

attack activities and gathering company-specific threat intelligence.<br />

The spike in remote employees underscores the need to boost VPN security, as new traffic patterns amid<br />

remote work have shattered traditional activity baselines and made suspicious behavior harder to identify.<br />

This need also applies to cloud security as well, since much of the remote work uses PaaS, SaaS, and<br />

IaaS accounts to collaborate between sites. Decoys systems and accounts can also identify<br />

unauthorized attempts to gain credential or administrative access to the VPN network segment or cloud<br />

service, giving organizations visibility into suspicious activity in those areas.<br />

Active Directory is also a prime target, and the ability to track unauthorized AD queries from endpoints is<br />

critical. Attackers target AD because it contains all the information, objects, and accounts they need to<br />

compromise an enterprise network, and such activity is difficult to detect. Detection capabilities that alert<br />

on unauthorized queries and misinform attackers can be instrumental in derailing this form of attack.<br />

Layered <strong>Defense</strong>s Secure the Present and the Future<br />

To invoke a sports analogy, you can’t spike the football before you get to the end zone. There remains a<br />

legitimate likelihood that attackers are actively lurking in networks. The situation underscores the<br />

importance of layered defenses that forces attackers to jump as many hurdles as possible to conduct<br />

their attacks. Attackers have taken advantage of the unfamiliar remote working situation to enter<br />

corporate networks, so it is vital to have protections in place to detect their lateral movement within those<br />

networks and stop them before harm can be done.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Carolyn holds the roles of Chief Deception Officer and CMO at Attivo<br />

Networks. She is a high-impact technology executive with over 30 years<br />

of experience in building new markets and successful enterprise<br />

infrastructure companies. She has a demonstrated track record of<br />

effectively taking companies from pre-IPO through to multi-billion-dollar<br />

sales and has held leadership positions at Cisco, Juniper Networks,<br />

Nimble Storage, Riverbed, and Seagate. Carolyn is recognized as a<br />

global thought leader in technology trends and for building strategies<br />

that connect technology with customers to solve difficult operations,<br />

digitalization, and security challenges. Her current focus is on breach<br />

risk mitigation by teaching organizations how to shift from a prevention-based cybersecurity infrastructure<br />

to one of an active security defense based on the adoption of deception technology.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Security Market to Reach USD 400 Billion by 2026<br />

<strong>Cyber</strong> security market will be driven by rising demand for cyber protection as well as advanced network<br />

infrastructure security across enterprises.<br />

By Saloni Walimbe, Content Writer at Global Market Insights, Inc.<br />

According to Global Market Insights, <strong>Cyber</strong> Security Market is expected to exceed USD 400 billion by<br />

2026. The rising demand for cyber protection as well as advanced network infrastructure security across<br />

enterprises is set to drive cyber security market in the forthcoming timeframe.<br />

Furthermore, rising internet penetration and technological advancement are leading the enterprises to<br />

move to cloud-based business models. The established enterprises are investing majorly in cyber<br />

security solutions since widespread digitization throughout enterprises is prone to information breach and<br />

cyber threats.<br />

The organizations are also establishing infrastructure and network security solutions which includes<br />

internet protocols and firewalls. This further allows them to prevent possible monetary as well as nonmonetary<br />

losses like data storage devices and interconnected servers.<br />

The demand for products related to infrastructure protection is anticipated to grow substantially through<br />

<strong>2020</strong>-2026. Several organizations are adopting the BYOD work practice at a larger level in order to boost<br />

the business productivity and to provide flexibility to the employees. They are also adopting endpoint<br />

protection in order to stop any unauthenticated access and vulnerabilities to enterprise data resources<br />

by mobile devices. Subsequently, owing to huge penetration of cloud services, enterprises are further<br />

adopting cloud security solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Since the cloud business infrastructure is vulnerable to cyber risks, cloud security solutions allows the<br />

company to maintain efficient network operations by following set rules. They tend to manage the total<br />

network security and also prevents unauthenticated alterations over network.<br />

The adoption of cybersecurity solutions across SMEs is likely to grow over 15% CAGR through <strong>2020</strong>-<br />

2026. The increasing number of cyber-attacks over small & medium enterprises along with rising<br />

monetary losses have further led to increasing adoption of cutting-edge security solutions.<br />

Furthermore, these enterprises have also embraced the BYOD guidelines to lessen the capital<br />

expenditure as well as enhance the productivities of employees. They are also making substantial<br />

investments in advanced security solution in order to secure their data, majorly because they are prone<br />

to data breaches and cyber threats.<br />

<strong>Cyber</strong>security products & services demand is increasing in the IT and Telecommunication organizations<br />

owing to the demand for protecting of personal sensitive data. The companies are adopting security<br />

solutions in efforts to protect their virtual information systems, servers, and data centers. This further<br />

helps them to alleviate cyber risks and also sense vulnerabilities at an early stage, thereby protecting<br />

from live attacks. In addition to this, the introduction of strict regulations from government authorities is<br />

impelling the cyber security market growth.<br />

The Europe cyber security market is likely to grow at a CAGR of over 15% by the end of the forecast<br />

timespan. Several enterprises functioning in banking sectors are increasingly adopting technologically<br />

advanced cybersecurity solutions. The private corporates and government enterprises have registered<br />

increasing number of cyberattacks. Additionally, private corporates and government authorities are also<br />

making collective efforts to stop such vulnerabilities.<br />

Citing an instance, European Central Bank collaborated with the members of Euro <strong>Cyber</strong> Resilience<br />

Board. The two together introduced the <strong>Cyber</strong> Information and Intelligence Sharing initiative, which<br />

focuses on detecting and preventing cyberattacks as well as enhancing the cybersecurity throughout<br />

financial institutions.<br />

The competitive landscape of the global cyber security market is inclusive of players such as Google<br />

LLC, Nokia Networks, Oracle Corporation, IBM Corporation, Microsoft Corporation, Amazon Web<br />

Services, and others.<br />

Source: - https://www.gminsights.com/pressrelease/cyber-security-market<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Saloni Walimbe,An avid reader since childhood, Saloni is currently<br />

following her passion for content creation by penning down insightful<br />

articles relating to global industry trends, business, and trade &<br />

finance. With an MBA-Marketing qualification under her belt, she has<br />

spent two years as a content writer in the advertising field. Aside from<br />

her professional work, she is an ardent animal lover and enjoys<br />

movies, music and books in her spare time.<br />

Company Website: - https://www.gminsights.com/<br />

Author Social Media URLs- 1) LinkedIn - https://www.linkedin.com/in/saloni-walimbe-5929b99b/<br />

2) Twitter - https://twitter.com/WalimbeSaloni<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


COVID-19 And Security Team Cuts Are Costing Businesses<br />

in <strong>Cyber</strong> and Financial Risks<br />

By Samantha Humphries, security strategist, Exabeam<br />

With 71% of cyber professionals reporting increased threats since the COVID-19 pandemic started, are<br />

SOCs prepared to mitigate these threats? The Exabeam <strong>2020</strong> State of the SOC report revealed 40% of<br />

companies reported being understaffed, which puts additional strain on security teams and makes their<br />

jobs much more challenging.<br />

And our latest survey reveals that this problem is being exacerbated by the challenges of working from<br />

home, budget cuts and security team reductions. We received responses from 1,005 U.S. and U.K.<br />

cybersecurity professionals who manage and operate SOCs. Our study included CIOs (50%) and security<br />

analysts and practitioners from companies across 12 different industries. Employee size ran the gamut,<br />

although the majority (53%) had between 100-249 security professionals.<br />

The results paint a striking picture of SOC organizations trying to manage more significant security threats<br />

with fewer resources.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Furloughs Are Commonplace Despite Increasing Threats<br />

Unfortunately, despite the increase in cyberthreats, our survey found three-quarters of organizations had<br />

to furlough members from the SOC team. About 50% had to furlough between 1-2 employees. The U.S.<br />

furloughed fewer SOC employees compared to their U.K. counterparts.<br />

Figure 1: Seventy-five percent of organizations had to furlough SOC staff.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Soc Teams Impacted by Redundancies<br />

Overall, 68% of companies report having laid off staff members. The majority had between 1-3 employees<br />

laid off. U.S. SOCs had fewer layoffs compared to the U.K. SOCs.<br />

Figure 2: Almost 30% of companies laid off two staff members from their security teams.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Many Companies Are Deferring New Hires<br />

Given the furlough and redundancy findings, it’s no surprise that 57% of the companies had to defer<br />

hiring since the start of the COVID-19 pandemic. A higher percentage of U.S. companies (71%) delayed<br />

hiring compared to the U.K. with 42% deferring.<br />

Figure 3: Fifty-seven percent of organizations had to defer hiring.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security Tech Investments Also on Hold<br />

The COVID-19 pandemic has not only harmed people, but it also forced 60% of companies to defer<br />

investments in security technology, which were previously planned. The U.S. had a higher deferment<br />

rate of 68% compared to the U.K. rate of 51%.<br />

Figure 4: Nearly sixty percent of organizations had to defer investments in security technology previously<br />

planned.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>attacks Are Skyrocketing<br />

Unfortunately, only 18% of companies overall had not seen an increase in the number of cyberattacks<br />

since the beginning of the COVID-19 pandemic. Eighty-eight percent of U.S. companies reported seeing<br />

slightly more and considerably more attacks compared to 74% of U.K. organizations.<br />

Figure 5: Eighteen percent of organizations reported not having an increase in the number of<br />

cyberattacks since the beginning of COVID-19.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Work from Home = New Challenges for Security Teams<br />

Remote work has presented challenges for many SOC staff members. No doubt reduced staff numbers<br />

made their jobs even more difficult. Respondents cited communications within their security team as the<br />

most significant challenge mitigating threats while working remotely, followed by communications with<br />

other IT departments. Twenty-nine percent reported difficulty investigating attacks. There was little<br />

significant variance in problems between U.S. and U.K. companies, although a higher percentage of U.S.<br />

companies 40% had more difficulty communicating with other IT teams compared to 22% in the U.K.<br />

Figure 6: Twenty-nine percent of organizations reported difficulty investigating attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Home Workers More Prone to Error<br />

The shift to WFH has harmed many employees’ mental states and their ability to do their jobs. Some of<br />

the biggest challenges working remotely included being more prone to making mistakes due to<br />

distractions in the house — 49%, increased blurring of the line between personal and operated computers<br />

and data — 42% and learning new tools — 39%.<br />

Figure 7: Forty-nine percent of security professionals were prone to making mistakes due to distractions<br />

in the home.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Most Companies Continue to Use/Invest in Automation Tools<br />

With fewer SOC staff, automation tools are essential in mitigating security threats. Only 17% of<br />

companies decreased their use/investment in automation tools. Fifty-two percent reported neither<br />

increased/decreased use or investment. Only 8% of the U.S. reduced their use/investment in comparison<br />

to 26% of U.K. organizations.<br />

Figure 8: Seventeen percent of companies decreased their use/investment in automation tools.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


⅓ Of Companies Have Been Hit with A Successful <strong>Cyber</strong>attack During the Pandemic<br />

Thirty-three percent of overall companies reported encountering a successful cyberattack since the<br />

beginning of the pandemic. There were no significant variances between U.S. and U.K. companies<br />

Figure 9: Thirty-three percent of companies reported experiencing a successful cyberattack since the<br />

beginning of the COVID-19 pandemic.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mitigation and Legal Costs Are the Top Consequence of <strong>Cyber</strong>attacks<br />

Companies reported several consequences of successful cyberattacks. The most common effect was<br />

mitigation and legal costs — 44%, followed by loss of business revenue — 41% and a negative impact<br />

on brand reputation — 41%.<br />

Figure 10: Forty-four percent of companies reported mitigation and legal costs were a consequence of<br />

successful cyberattacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>attacks Hitting Organizations in The Wallet<br />

Considering many organizations are seeing a financial impact due to the pandemic, the additional cost<br />

of a cyberattack could not come at a worse time. Regarding lost business revenue, our survey found in<br />

the U.S., 35% lost between $38K-63K, and 14% reached losses of $63K-95K; in the U.K., 40% lost<br />

between £30K-50K. In terms of the financial impact on a brand, in the U.K., 43% saw between £30K-<br />

50K in losses; in the U.S., 38% reported between $38K-63K in losses. Also, 7.5% in each region lost<br />

between £50K-75K or $63K-95K.<br />

Concerning the financial impact of legal and mitigation costs, in the U.K., 33% spent between £20K-40K;<br />

in the U.S., approximately 30% spent between $38K-63K, and for 11 % the costs hit the $63K-95K range.<br />

DOWNTIME IS PROMINENT TOO<br />

Since the beginning of the COVID-19 pandemic, 97% of companies experienced downtime between 1-4<br />

hours. Fortunately, only 3% reported downtime higher than four hours.<br />

Figure 11: Only 3% percent of companies experienced downtime greater than four hours.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The findings from our survey clearly show many SOCs have to manage a much more significant number<br />

of cyberthreats with a leaner staff. Exabeam is committed to helping you and your SOC get through the<br />

COVID pandemic. Here are a few resources to help:<br />

● Webinar: SOC-from-home. Actionable Insights for Security Practitioners<br />

● Blog Series: Securing Your Remote Workforce<br />

● Webinar: Adapting Security Programs for an Unprecedented Future<br />

About the Author<br />

Samantha has 20 years of experience in cyber security. She has defined<br />

strategy for multiple security products and technologies, helped<br />

hundreds of organisations of all shapes, sizes, and geographies recover<br />

and learn from cyberattacks, and trained anyone who’ll listen on security<br />

concepts and solutions. She authors articles for various security<br />

publications, and is a regular speaker and volunteer at industry events,<br />

including BSides, IPExpo, <strong>Cyber</strong>SecurityX, The Diana Initiative, and<br />

Blue Team Village (DEFCON)."<br />

Samantha can be reached online at shumphries@exabeam.com and at https://exabeam.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Challenges When Working from Home<br />

By Renuka Sahane, Sr. Content Writer, Scalefusion<br />

Maintaining the security of corporate data when employees work remotely in the new normal.<br />

IT governance and cybersecurity have gained much-needed attention in the enterprise<br />

environment, thanks to the exponentially growing number of digital devices used in the<br />

workplace. The need to access the internet and intuitive apps that sit on mobile devices used<br />

across all industries is rapidly growing. From conventionally operating businesses such as retail<br />

to technology-driven businesses that are into manufacturing or supply chain, technology has<br />

touched based and revamped operations from the top to bottom.<br />

The era of remote working<br />

And just when the businesses globally were finding and implementing solid strategies to secure<br />

corporate devices and data from unknown threats and cybersecurity challenges, the pandemic<br />

hit. COVID-19 pushed all businesses- even the ones without a mobility strategy into a new<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


normal that not everyone was prepared to endure. Remote working caught up, first out of<br />

hesitation, then out of need and now looks like it’s here to stay.<br />

For companies that had strong strategies in place before moving to remote working, the<br />

transition was easy but for those that did not have policies and security protocols in place, the<br />

change has been a real challenge. Employees have no choice but to work from home and<br />

companies have no option but to facilitate the same. Ensuring work-friendly devices are available<br />

to the employees to upkeep the business performance and employee productivity has been the<br />

primary concern of business leaders.<br />

Equally daunting are the security concerns and cybersecurity challenges that might arise when<br />

employees work from home, for an indefinite period. When the employees and the devices they<br />

use to exit the physical boundaries of the office, they are essentially out of the security posture<br />

of the company.<br />

<strong>Cyber</strong>security challenges during remote working<br />

Unmanaged devices, routers, printers, and other devices<br />

If the employees working from home have not been provided with provisioned and managed<br />

devices including laptops, desktops, and tablets, they choose to opt for personal devices for<br />

work. Unless the company has a BYOD management policy in place and can enable security<br />

restrictions on the work container or profile of these devices, the device usage is safe and can<br />

in fact help add to the employee productivity, since they use their favorite devices for work. But<br />

if the devices are unmanaged and yet the employee is accessing work resources, corporate and<br />

user data on these devices, the data is practically exposed to every possible cybersecurity threat<br />

there is- from apps, websites, and unmonitored personal communication and collaboration tools.<br />

Moreso, the devices are invariably connected to an internet router, peripherals such as printers.<br />

Work calls happen in the presence of family/roommates and there are home automation systems<br />

and bots eavesdropping on every work-related conversation. Clearly, the security protocols are<br />

dull, if not faded during remote working.<br />

How secure is home WiFi and/or VPN?<br />

This has been a serious concern for organizations that haven’t extended secure internet hotspot<br />

devices for employees to connect to while working remotely. The security of personal WiFi is<br />

highly questionable, especially when it is accessed by multiple users for personal use. Home<br />

networks commonly have the WEP protocols, which are known to be weaker, paving the way<br />

for cybercriminals to walk into your data and devices.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Also, while VPN might look like the best option for providing network security via encryption, if<br />

the VPN connects to any of the compromised devices, for example, the personal tablet of the<br />

employee, the hackers can crawl in the gaps created. It is important to ensure endpoint<br />

authentication to VPN access via certificate management, for instance, to ensure that only<br />

managed/work devices are connected to such networks. Needless to say, monitoring the VPN<br />

security at all times, recognizing potential failures, and extending support via patch management<br />

is crucial.<br />

It is also important to note that if the employees are using legacy PCs, managing them outside<br />

of the corporate network or via VPN is practically impossible. In such cases, quickly procuring<br />

the latest tech by leasing or leveraging ‘desktop as a service’ can be a good option.<br />

Phishers taking advantage of emotional vulnerabilities<br />

Reports of increased phishing scams since the COVID-19 pandemic are surfacing. People are<br />

vulnerable, anxious and it is a tough time for all. The employees are susceptible to click on<br />

malicious emails that appear to be from government agencies, healthcare bodies, or WHO or<br />

might give away critical personal data to healthcare-related apps that are not authorized.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What companies can do...<br />

Start with a robust policy to maintain security for remote working. Manage employee-owned as<br />

well as corporate-owned devices with an EMM solution and exercise access control, manage<br />

website access, and add security to corporate content with extensive policy configurations. Be<br />

on the top of the device security and rectify potential threats quickly.<br />

And most importantly, build a culture of security among your employees and train them on the<br />

best practices. Your corporate data is only as safe as your employees want it to be. Go beyond<br />

device policies to educate your employees on the importance of data and cybersecurity<br />

About the Author<br />

Renuka Shahane is a Sr. Content Writer at Scalefusion -a leading Mobile<br />

Device Management solution. Renuka is keen in learning new trends<br />

surrounding cybersecurity, repercussions of remote working and the<br />

evolution of enterprise mobility. You can read more of her work at<br />

https://blog.scalefusion.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Network Security Is Not Data Security<br />

Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a<br />

cyber-attack.<br />

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks<br />

Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber<br />

attack. In 2019, more than 15 billion records were exposed in data breaches, amounting to more than<br />

$3.5 billion lost to cyber crime.<br />

Moreover, the unprecedented events of recent months in <strong>2020</strong> have seen the number of attempted data<br />

breaches continue to rise, with cyber hackers taking advantage of remote working and individuals’ fears<br />

over COVID-19. In fact, a survey showed that 50% of organizations were unable to guarantee that their<br />

data was adequately secured when being used by remote workers.<br />

There is clearly a lot at stake. Organizations need to protect their data, but they also need a robust data<br />

assurance solution. Data assurance, or information assurance, is a challenge due to the many networking<br />

technologies deployed in today’s environments, making policies disjointed due to differing technology<br />

and network infrastructures, as well as data regulations driving data security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Regulatory compliance is becoming more complex, and each regulatory policy widens the scope for<br />

required data security controls, often resulting in point solutions, added complexity and the loss of network<br />

visibility.<br />

Therefore, strict separation of duties is a core compliance requirement to ensure there is no risk of<br />

network policy interfering with data security policy; but this is often difficult to enforce when security is<br />

tied to infrastructure.<br />

So, how can organizations secure their data, even when the network isn’t secure to begin with? And how<br />

can they ensure the security posture is always visible in order to ensure their data is always secure?<br />

Simon Hill, Director Sales Operations at Certes Networks explains why a five-step approach is essential<br />

to keep a customer’s data secure.<br />

The Five Step Approach to Data Assurance as a Business Strategy<br />

Due to increasing pressures to keep data secure, securing data as it travels across the network has never<br />

been more important. Encryption is certainly one way to keep data secure as it travels across the network,<br />

but it is not as simple as just deploying an encryption solution. Organizations must follow these five steps.<br />

1. Convert data assurance requirements into an intent-based policy. This is then used to configure and<br />

enforce the required security parameters for sensitive data.<br />

2. Creating multiple polices, one for each data classification or regulation, not only ensures that data is<br />

protected at all times, but with each policy using its own keys, customers are creating micro-segments<br />

using strong cryptography or crypto-segments. These crypto-segments keep data flows protected<br />

using separate keys and also provide critical protection against the lateral movement of threats.<br />

3. Organizations must look at the requirements of their environment. Whether it is low latency<br />

applications, high throughput data requirements or rapidly changing network environments,<br />

organizations must have the flexibility and scalability to secure any environment to meet the depth<br />

and breadth of their organization’s needs.<br />

4. Organizations also need full network visibility without compromising data security. With traditional<br />

encryption blinding the network and security operations tools, monitoring, troubleshooting, adds,<br />

moves, or changes are made difficult without first turning encryption off. An encryption technology<br />

solution should enable the network to look and work in the same way after deployment as it did before,<br />

enabling all networking and security functions even while data is being protected.<br />

5. Lastly, with a data assurance strategy, organizations can benefit from a real-time view of their data<br />

security posture, graphically showing data security performance at all times. An observability tool or<br />

a third-party security dashboard can ensure rapid detection, response and remediation of nonconformance<br />

and provide evidence as part of any required audit. Organizations using Artificial<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Intelligence can also take advantage of the programmable interfaces when using a dynamic program<br />

with a security overlay, which reduces the time to remediation and removes the need for manual<br />

intervention when threats are detected within the security stack.<br />

Confidence in Data Assurance<br />

The goal of a data assurance solution should be high confidence with low impact, and the ability to scale<br />

to the needs of an organization with, for example, a zero-impact software-defined overlay and real-time<br />

reporting of policy conformance to achieve this.<br />

Taking a software-defined approach truly delivers on true separation of duties, enabling security teams<br />

to retain control of the data security posture at all times without compromising network performance or<br />

the agility needed so that applications teams can be effective.<br />

Furthermore, with a robust data security strategy, organizations can quickly turn their data cyber<br />

assurance requirements into intent-based policy which can be monitored in real time to ensure roundthe-clock<br />

visibility of their data assurance posture. Whether one data classification or multiple, securing<br />

data using crypto-segmentation to micro-segment data flows, protects against the lateral movement of<br />

threats whilst also ensuring all data is secure in motion.<br />

Armed with this five-step approach, organizations can take actionable steps not only gain a deep<br />

understanding of how to enhance their security posture and to manage and enforce policies but to<br />

measure the effectiveness of their security strategy. When securing data vs. securing the network is the<br />

priority, data loss can be prevented and data security can truly be seen as a strategic contributor to the<br />

organization’s success.<br />

About the Author<br />

Matt Cable is VP Solutions Architect and MD<br />

Europe, Certes Networks. Matt is a <strong>Cyber</strong>-Security and<br />

Cryptography expert with more than 20 years of consultancy<br />

experience that covers IT Strategy and Enterprise.<br />

Matt can be reached on LinkedIn here -<br />

https://www.linkedin.com/in/mattcable72/ - and at our company<br />

website www.certesnetworks.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


WireGuard - Separating Fact from Fiction<br />

By Tomislav Čohar, co-founder, hide.me VPN<br />

Offering high speeds, excellent levels of security and a low footprint, WireGuard has rightly caused ripples<br />

within the VPN industry. WireGuard is an open-source protocol that employs cutting-edge cryptography<br />

and provides fierce competition for the likes of IPsec and OpenVPN. As a user then, what advances can<br />

you expect from WireGuard? Has this protocol been over-hyped and are we just seeing a flurry of smoke<br />

and mirrors from a biased media?<br />

WireGuard certainly offers a lower footprint - it was made to be as lightweight as possible and can be<br />

implemented with just a few thousand lines of code. The resulting reduced attack surface is certainly a<br />

benefit and also makes auditing the code a much more straightforward process. Users enjoy the benefits<br />

of being able to switch seamlessly from something like Wi-FI to 4G LTE due to WireGuard’s built-in<br />

roaming capabilities. Also, WireGuard uses your network more adroitly than other VPN protocols. With a<br />

mere 32 bytes overhead, it trumps other protocols that use much more space for their signaling. As a<br />

user, you get more space for your data with higher throughput.<br />

WireGuard is a remarkably fast protocol that doesn’t skimp on security. This is thanks to the use of<br />

modern and efficient cryptography constructs. WireGuard works from within the Linux kernel meaning<br />

that it can process data faster, eliminating much of the latency associated with other protocols. Keeping<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


on the security track, with WireGuard being a more recent addition compared to the likes of OpenVPN, it<br />

has benefitted from being built from the ground up to support more modern encryption methods and hash<br />

functions.<br />

Telling it straight<br />

Taking all of these benefits into account, recent media coverage and some claims have certainly been a<br />

cause to raise eyebrows. Let’s take a look at just a few of the myths that have been circulating in recent<br />

weeks and months so that you can better understand exactly what WireGuard can deliver.<br />

Fixed IP address<br />

So does WireGuard insist that each device on the network get a fixed IP address? No, not really. In fact,<br />

it doesn’t really demand anything and largely performs in a similar fashion to any other protocol; operating<br />

as a versatile cryptographic piece of a larger puzzle called a VPN tunnel. It's more useful to think about<br />

how you manage it. If you use a simple or rigid setup, this requires static IPs on the servers. However, it<br />

can be managed in a more dynamic fashion. WireGuard is able to perform just like any other VPN protocol<br />

by adding IPs when they're needed and getting rid of them as soon as the VPN session is concluded.<br />

Server Communication and data exchange<br />

Can WireGuard offer a considerable change to the way servers communicate with each other?<br />

Again, not really, it operates in a similar fashion to all the other protocols. What about the exchange and<br />

verification of data? Is it the case that WireGuard sticks to strong but simple ways of exchanging and<br />

verifying data? In fact, WireGuard only supports one method of key exchange. There is only support for<br />

one AEAD. Other protocols support a profusion of cryptosystems but tend to settle on AES. AES is not<br />

flawed, no exploit has been found yet. Also, AES256 cipher is cryptographically stronger than ChaCha20<br />

which is used by WireGuard. However, It is computationally expensive when compared to ChaCha20.<br />

ChaCha20 offers the best bang for the buck. One could argue that Poly1305 MAC is stronger than<br />

GHASH, but then again we come to the point of the whole AES-GCM construct being supported in Intel’s<br />

hardware.<br />

Internet Speed<br />

When we talk about who is quick and who is slow, are other protocols more sluggish than WireGuard?<br />

Would you see a dramatic increase in speed by adopting WireGuard? Essentially, some VPN protocols<br />

are slower, but this is almost entirely down to circumstances and not really related to crypto. If you are<br />

connecting through a dialup modem, for example, then speedy crypto becomes a moot point. Additionally,<br />

if you are a provider that supports much faster protocols then WireGuard isn't going to be able to deliver<br />

on impressive speed promises.<br />

Our measurements show that OpenVPN usually outperforms WireGuard by at least 10 percent (on the<br />

Windows platform when WinTUN driver is used and when the OS is running on an Intel CPU. On Linux,<br />

again on an Intel CPU, WireGuard outperforms OpenVPN significantly (by more than 40%), but it is still<br />

significantly slower than IPSec (by more than 10 percent). These measurements were performed on an<br />

1 Gigabit LAN since such a speed is commercially available for our customers. On 10 Gigabit Ethernet,<br />

OpenVPN pales in comparison with WireGuard as it is about 10 times slower. IPSec, on the other hand,<br />

outperforms WireGuard by more than 30 percent when AES is used as a symmetric algorithm.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Running in-kernel<br />

Can you achieve the highest possible performance just by running in-kernel? Not really - actually, IPSec<br />

is way faster on all platforms. IPSec runs much faster because it runs in the kernel too, but is significantly<br />

more optimised for Intel CPUs. The point is, running within the kernel offers a major speed increase but<br />

WireGuard is not the only protocol to run in such a way. PPTP/L2TP do too. OpenVPN developers plan<br />

to release a kernel module for Linux soon. SoftEther (which runs completely in the userspace)<br />

outperforms WireGuard when throughput is the primary concern.<br />

WireGuard definitely warrants all of the interest it has garnered - it remains to be seen whether it becomes<br />

a revolution for the VPN industry. As things stand it certainly offers faster speeds and better reliability<br />

compared to some of the existing VPN protocols - and there is the added promise of new and improved<br />

encryption standards. It is surely only a matter of time before we see more and more VPN services<br />

incorporating WireGuard into their structure.<br />

About the Author<br />

Tomislav Čohar is the co-founder of hide.me VPN.<br />

https://hide.me/en/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Conducting Risk Prioritization and Remediation to<br />

Combat Challenges in The Distributed Workforce<br />

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium<br />

Most agencies have successfully met initial telework surge requirements – putting the basics in place to<br />

continue essential operations. Recent research found approximately 90 percent of federal employees<br />

now telework and 76 percent feel they will be able to telework at least part-time in the future. With the<br />

basics now in place, the next priority for every IT team is a careful assessment of cyber risks, current<br />

protections, and what is needed to keep systems and data safe in an environment with exponentially<br />

more endpoints in more places.<br />

Data residing on endpoint devices operating beyond the agency network perimeter isn’t all that’s at risk–<br />

if compromised, those devices can also be used by malicious actors to tamper with or steal sensitive data<br />

on the agency’s enterprise network. As the number of devices outside of the protected network grows,<br />

the attack surface expands and risk increases.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The reality is that many organizations were already struggling with basic cyber hygiene before the<br />

telework surge – and most of the security tools implemented were designed for local enterprises. With a<br />

distributed workforce, this means increased cyber risk, as the security tools in place become even less<br />

effective.<br />

In this new environment, federal IT teams should focus on risk prioritization and remediation – identifying<br />

and addressing the vulnerabilities that pose the highest risk and could have the biggest negative impact<br />

on the agency and its mission.<br />

Performing Risk Prioritization and Remediation<br />

Almost half of federal agencies say the new distributed workforce has affected the execution of projects<br />

and over one-quarter feel planning for the next fiscal year has been delayed. April and May were months<br />

of change, and June is predicted to be a catch up month. Demand and expectations for real-time<br />

information and IT support from customers are up, so agencies must be prepared.<br />

Risk prioritization can help IT teams evaluate the infrastructure beyond data vulnerabilities to help<br />

determine which vulnerabilities to patch and assess an endpoint’s security level – which can dramatically<br />

change the risk level. By prioritizing risks, security teams can more effectively allocate their already<br />

limited resources to focus on mission critical tasks.<br />

However, IT teams now have to consider the degrees of separation between each endpoint in context.<br />

In addition to the connectivity to the enterprise network, there’s often connectivity to other endpoints, the<br />

applications and users authenticated to each, and the rights and privileges conveyed through such<br />

mechanisms as AD group membership. Even if one endpoint is completely secure, a user profile on<br />

another more vulnerable endpoint could provide an access point for lateral movement into the entire<br />

network. Given that these factors and variables can change by the second in a large enterprise, a<br />

quarterly, monthly or even weekly risk assessment is insufficient.<br />

Often, the security problems that agencies are facing are oversimplified, and vendors can only provide<br />

partial solutions to help; they run a vulnerability assessment and receive a risk score from systems such<br />

as the industry standard Common Vulnerability Scoring System (CVSS), helping them assess and rank<br />

their vulnerability management processes. However, while risk scoring systems such as these combine<br />

several types of data in order to provide the vulnerability risk score, they aren’t always based on real time<br />

data and the results are only as good as the data that’s input.<br />

Vendors have completed a piece of the puzzle by diagnosing vulnerabilities and identifying threats, but<br />

have to now take into consideration the millions of risk scores across millions of endpoints – some of<br />

which are unknown – trying to access the network and the context of the relationship between these<br />

endpoints over time.<br />

The lack of complete visibility into the network leaves many vulnerabilities unknown and makes risk<br />

assessments little more than guesswork for IT teams – increasing the likelihood of a breach. Risk scores<br />

are living, breathing things and, especially in the new teleworking environment, must be based on real<br />

time data to protect the agency’s environment and overall mission.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Connectivity Hurdles<br />

Now that agencies have established basic connectivity, the focus has shifted to optimizing connections<br />

and improving security. There are a variety of approaches – some agencies have deemed split tunnel<br />

virtual private networks (VPNs) too risky, opting for full tunnel VPNs where both user and management<br />

traffic flow through the same channel. While this approach can achieve the short-term goal of<br />

establishing and maintaining secure connectivity, it also has unintended consequences.<br />

Using full tunnel VPNs can lead to slow response times, causing employees to disconnect from the VPN<br />

altogether. When this happens, IT teams are blind to those devices and they don’t get routine patches,<br />

making them increasingly vulnerable to cyberattacks. While these endpoints used to enjoy the added<br />

protection of an existence behind the protective boundary of the enterprise network perimeter, they are<br />

now isolated in an uncontrolled environment with only their point tools protecting them and active<br />

management and visibility only afforded while connected to the VPN.<br />

BYOD has added another layer of risk and complexity, with many employees turning to personal devices<br />

to continue working. However, there’s often a discrepancy between not just the out of the box tools that<br />

reside on an individual’s personal device and their work computer, but also the security tools loaded and<br />

managed on each. And, when these BYOD devices only have periodic connectivity to the agency<br />

network, cyber criminals no longer have to penetrate a multi-layered protected perimeter to get into the<br />

main server. They can use the unprotected device as an entry point into the network.<br />

A holistic approach helps enable improved visibility and control over the network, regardless of where an<br />

asset is located. The challenge is that decisions about connectivity, endpoint security, and perimeter<br />

security are often made in a vacuum by those independent teams responsible for each versus a combined<br />

solution. With a holistic approach in mind, teams can understand what is impacting the agency’s risk,<br />

mitigate each risk for the time being, and remediate it for the long-term.<br />

The Next Phase<br />

As agencies look to the future, operations will not resume as in times past and budgets will be<br />

impacted. Agencies must consider the sustainability of solutions long-term, specifically in terms of<br />

mitigation of the inherent risk a distributed workforce carries. They should be pragmatic in their future<br />

plans, having ideological discussions around assessing and measuring risk, dealing with steps to mitigate<br />

risks, and finding cost-effective ways to address risk and secure the network. IT teams need to be data<br />

driven and look at the validity of the data agencies are working with.<br />

Agencies must build a foundation for assessing and addressing risk based on real time data to maintain<br />

business and mission continuity amid a risk landscape that’s changed dramatically and irrevocably.<br />

It may seem impossible to get a hold of the amount of data needed quickly enough to make good risk<br />

decisions. But, it’s not impossible – it’s being done today. With the new levels and types of risk that arise<br />

from this remote environment, it is critical to set aside traditional risk assessments and protections and<br />

start looking at risk pragmatically. Agencies must take a hard look at existing tools and how they are<br />

hamstrung when dealing with remote endpoints - and consider replacing those legacy tools/platforms<br />

that fall short.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Egon Rinderer is the Global Vice President of Technology and<br />

Federal CTO at Tanium. With 30 years of Federal and private sector<br />

industry experience, Egon currently leads the global Enterprise<br />

Services Organization as well as leading Tanium Federal as Chief<br />

Technology Officer. Joining Tanium at a time when the company<br />

was made up of less than 20 employees, he has held roles ranging<br />

from Technical Account Manager to Federal Pod Lead to global Vice<br />

President of the TAM organization. Prior to joining Tanium, Egon<br />

was with Intel Corporation and served throughout the US military<br />

and intelligence community in the United States and abroad in an<br />

operational capacity. Egon can be reached at<br />

egon.rinderer@tanium.com, online at<br />

https://www.linkedin.com/in/egon-rinderer/, or at our company<br />

website at https://www.tanium.com/solutions/federal-government/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Can We Better Leverage Our – Already Scarce – <strong>Cyber</strong><br />

Security Human Resources?<br />

By Douglas Ferguson, Founder & CTO, Pharos Security<br />

It is accepted that there is a significant cyber security skills deficit. The result, it is argued, is that cyber<br />

security teams do not have access to the human resources they need to be successful. Therefore, CISOs<br />

and security teams cannot effectively protect their organization from cyber breach and impact. Often left<br />

unsaid is that cyber security teams often undermine themselves by poorly calibrating and pitching<br />

resource requirements and inadequately leveraging available expertise.<br />

Security can be described, in simple terms, like a wall. Where the height corresponds to the level of threat<br />

sophistication security can counter, the width corresponds to coverage, and the depth corresponds to<br />

types of control (predict, protect, detect, respond, recover). Each of these dimensions strongly influence<br />

the costs of a security program – and the ability to control breach outcomes vs. different types and<br />

sophistications of attack.<br />

Not enough expertise<br />

These are two key issues surrounding perceived expertise shortages:<br />

1. The over reliance on high-end expertise<br />

2. The suboptimal leverage of adequate expertise<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Countless times I have seen an organization lament the ability to find high-end security experts to anchor<br />

and properly design and implement high – believed – priority security controls. Often, when high-profile<br />

experts are brought in, these controls become an ivory tower and a significant resource hog usurping<br />

resources for less flashy, more commodity, but critical foundational controls. Unfortunately, much more<br />

common and commodity skills are deemphasized, and sub optimally leveraged to build out the more<br />

mundane, but foundational, security controls.<br />

What has happened in the above case is an over reliance on high-end expertise (as saviours) to<br />

compensate for lack of an effective threat and cost calibrated cyber security strategy and unbalanced<br />

SecOps. This results in unexpectedly weak overall protection performance, which is why we see, again<br />

and again, security breaches at high profile organizations that have lots of security budget, technology,<br />

and experts.<br />

It is analogous to many professional sports teams that overspend on a few superstars, to the detriment<br />

of having enough budget to pay for supporting players. Because you win as a team, the superstar’s value<br />

is frittered away when their skill is relied on to carry the team, rather than a cohesive team strategy. The<br />

1980 Olympic hockey Miracle on Ice is a classic example of US teamwork triumphing over the collection<br />

of Soviet superstars for the gold medal.<br />

Effective security strategy follows a process like learning to crawl, then walk, then run. You must first be<br />

able to control low sophistication threats (like accidents and mischief) before you try to protect against<br />

hackers before you then should even consider trying to control espionage and nation states.<br />

The reality is, high-end cyber security expertise is rarely required for the bulk of foundational SecOps<br />

implementation and operation; rather, strong planning, threat, resource and cost calibration, project<br />

management, and measurement of SecOps KPIs aligned to pragmatic protection goals is what is needed.<br />

There is a time for high-end expertise – in initial strategic planning and then advanced tactics – but never<br />

to cover up for lack of these.<br />

Not enough budget<br />

We often experience budget requests denied or reduced because of headcount unit costs, or quantity<br />

requested – and sometimes location. How do we justify these costs in a pragmatic way?<br />

The fundamental question to answer is: “What are we trying to achieve?” Because to answer that is to<br />

control cost variables. And human resource costs vary by skills sophistication, with more advanced skills<br />

being rarer and more expensive. You only need to pay for these when the time is right.<br />

In the eyes of executive leadership – those that ultimately approve budgets - security teams today do an<br />

inadequate job calibrating and articulating necessary levels, quantity, and location of specific skills.<br />

Because the cost of these skills varies depending on the security wall dimensions introduced above,<br />

security budgets are often uncalibrated with overspend and underspend. The conclusion drawn by many<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


executives is that security is a necessary evil because it is very difficult to measure budget performance<br />

and protection outcomes.<br />

Lack of cyber security ‘common sense’<br />

We often hear that ‘humans are the weak link in cyber security’ – usually meaning that they do ‘stupid<br />

things’ that unintentionally help hackers. Security controls (e.g. people, process, technology) exist to<br />

control security outcomes. They are largely intended to control humans from doing something or having<br />

access to something. When we blame humans as the weakest link, we are simply pointing out that<br />

controls do not effectively control desired security outcomes. Largely, the people to blame here are not<br />

the ‘general workforce and public’ but the security practitioners whose job it is to produce controlled and<br />

expected outcomes. And for the challenges of effectively calibrating, gaining access to, and leveraging<br />

required skills, they are often the victims of their own vicious cycle.<br />

Programmatic and control cyber security performance is challenged because humans are the weakest<br />

link, just not in the way that cyber security experts are pointing their fingers.<br />

About the Author<br />

Douglas Ferguson, a security professional of over<br />

20 years, is the Founder and CTO of Pharos<br />

Security. Pharos specializes in aligning security<br />

goals and strategy to the business and a calibrated<br />

risk appetite, ensuring an integrated business plan<br />

and optimized operations build that to plan and on<br />

budget.<br />

Prior to Pharos, Ferguson was with Barclays Bank in London, where he was responsible for numerous<br />

security programs and initiatives across more than 40 countries. Previously, Ferguson was a Managing<br />

Consultant and researcher on the acclaimed X-Force at Internet Security Systems. He delivered security<br />

services to more than 200 clients globally and was a co-creator of the breakthrough System Scanner<br />

technology. Douglas can be reached online at dferguson@pharossecurity.com and the Pharos website:<br />

https://pharossecurity.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CERT Warns Bad Actors Are Targeting Remote Access –<br />

How Security Operations Find and Route These “Below<br />

the Radar” Attacks<br />

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data<br />

Restoration<br />

By Saryu Nayyar, CEO, Gurucul<br />

Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been an inviting target<br />

for attackers. Even 2003’s Matrix Reloaded used an exploit against an old version of Secure Shell (SSH)<br />

as a plot device in a rare cinematic example of a real-world cyber-security threat. The recent shift to a<br />

remote workforce in response to a global pandemic has made remote access an even more inviting target<br />

for threat actors of all stripes.<br />

As a recent report from New Zealand’s CERT pointed out, malicious actors are actively focusing on<br />

remote access vectors, using a range of attack techniques. While unpatched systems are an ongoing<br />

issue, attackers are also targeting weak authentication schemes, including a notable lack of two-factor<br />

authentication. The users themselves are also a primary target. Targeted email such as spear phishing,<br />

which goes for a specific target, or cast-netting, that targets people within a single organization, have a<br />

history of success and have seen a noticeable rise.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Fortunately, information security professionals still have a range of tools and techniques they can use to<br />

help prevent breaches and to mitigate them when they do happen.<br />

Many attack scenarios, especially ones involving remote access attacks, start with targeting the users<br />

themselves. Many penetration testers will tell you the users are the easiest target and the first thing<br />

they’ll go after. But this also gives an organization the opportunity to convert their user base from part of<br />

the attack surface into their first line of defense. Making sure you have trained them on best practices<br />

and have enabled a strong multi-factor authentication scheme can go a long way to preventing<br />

unauthorized access.<br />

For many organizations, the Security Operations team, rather than their users, is the main line of<br />

defense. Even when the services are provided whole, or in part, by a third party, they are the ones who<br />

have the ultimate responsibility for the organization’s security well-being. Which means assuring they<br />

have the correct tools and the right training is as important as making sure the users are trained and<br />

equipped. The question becomes whether they have the right tools and training to identify and mitigate<br />

attack profiles that have now shifted to target the remote workforce.<br />

The threats they have been historically focused on have not disappeared, but they may no longer be the<br />

primary attack surface. Likewise, the tools they use to identify and mitigate attacks may not be the best<br />

ones now that the attacker’s focus has shifted.<br />

Threat actors have become increasingly skilled at compromising systems and then hiding their activity<br />

“below the radar” to avoid detection, which makes their activity harder to detect. More so now that they<br />

have a remote workforce to both target for attack and use for concealment. That means the SecOps<br />

team will need to look at the situation holistically rather than relying on single indicators of compromise.<br />

To that end, an advanced security analytics platform that can consolidate all the organization’s security<br />

data into a single place and then perform AI-based analytics the entirety of the data may be in order. By<br />

looking at all the information, it is possible to identify anomalous behavior that differs subtly from what’s<br />

expected, or accepted, for a normal user. That can be the first indication of a compromise. Using<br />

machine learning techniques, the system can adapt to the changing threat surface and present a riskbased<br />

assessment to the SecOps team.<br />

Combined with their existing tools and efficient automation, security operations personnel can get ahead<br />

of an attack to keep a single compromised account or remote access system from escalating to a serious<br />

data breach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Saryu Nayyar is the CEO of Gurucul. She is an<br />

internationally recognized cybersecurity expert, author<br />

and speaker with more than 15 years of experience in the<br />

information security, identity and access management, IT<br />

risk and compliance, and security risk management<br />

sectors. She was named EY Entrepreneurial Winning<br />

Women in 2017. She has held leadership roles in security<br />

products and services strategy at Oracle, Simeio, Sun<br />

Microsystems, Vaau (acquired by Sun) and Disney, and held senior positions in the technology security<br />

and risk management practice of Ernst & Young. She is passionate about building disruptive technologies<br />

and has several patents pending for behavior analytics, anomaly detection and dynamic risk scoring<br />

inventions.<br />

Saryu can be reached on Twitter at @Gurucul<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4 Simple Ways to Repel Ransomware as The Rise in<br />

Remote Work Continues<br />

By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte<br />

Ransomware attacks are now the most common security incident taking place today. According to a<br />

recent report from TrustWave, ransomware rates quadrupled in 2019, accounting for one out of every<br />

five security incidents and unseating payment card theft as the most prevalent threat category. This spike<br />

in ransomware couldn’t come at a worse time, as companies all over the world are grappling with many<br />

operational and security challenges associated with the coronavirus-induced shift to remote work.<br />

Why is this such a problem? IT and security leaders are generally all too aware of this threat and wellequipped<br />

to defend against it in conventional business environments. But with the vast majority of<br />

employees working from home, the traditional network perimeter has evaporated and so have many<br />

foundational security protections. For a 1,000 person company that’s become 100% remote,<br />

administrators now have 1,000 mini networks to protect against this onslaught of ransomware attacks<br />

instead of one or several – but without the same level of control or defenses. And unfortunately the tried<br />

and true method of simply implementing backup and recovery policies to safeguard against successful<br />

ransomware infections isn’t as practical or realistic with a massively distributed, off-network workforce.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Luckily there are several best practices beyond general endpoint protections and malware defenses that<br />

every security administrator can and should implement today to protect remote workers from this threat.<br />

Here are four keys to securing your off-network employees and fending off ransomware attacks as the<br />

COVID-19 pandemic continues:<br />

1. Implement ransomware education and training – According to Verizon, 80% of reported<br />

security incidents involve phishing, and according to one report, phishing attacks are to blame for<br />

two-thirds of successful ransomware infections in 2019. Although remote employees are not “on<br />

their own” as they work from home, they are further away from your skilled IT and security staff<br />

and must be trained to independently identify and avoid potential ransomware attacks.<br />

Regardless of the size of your organization, invest in educational programs and regular training<br />

that teach employees about common ransomware delivery techniques and red flags to watch out<br />

for. Better yet, incorporate regular practical tests that entice users into clicking on would-be<br />

malicious links or downloads, and provide additional training as needed. Investing in ransomware<br />

education and training is well worth it when you consider the potential financial and reputational<br />

damage caused by a breach.<br />

2. Strengthen data access policies – Now that the majority of your workforce is operating outside<br />

the office network perimeter, it’s never been more critical to tightly control permissions. Create<br />

strict identity and access policies and buttress your access control lists so you can limit employee<br />

access to areas of your infrastructure in which you’re storing valuable company data and content.<br />

Shoring up these policies will allow you to enable or deny permissions by account, user, or based<br />

on specific elements such as date, time, IP address, or whether requests are sent with SSL/TLS.<br />

Use the principle of least privilege, only giving users access to the accounts, systems and data<br />

that’s absolutely necessary for them to be productive. This is a crucial step when it comes to<br />

ensuring attackers or unauthorized parties can’t get access to, delete or expose your businesscritical<br />

data.<br />

3. Require multi-factor authentication – It goes without saying that you should put in place policies<br />

that require users to set complex passwords that are 16 characters at a minimum. That said, even<br />

strong passwords are no longer enough when it comes to secure authentication. Given enough<br />

time, a simple brute force attack can crack highly complex credentials. Deploying a multi-factor<br />

authentication solution should be a no-brainer for every organization today, especially with so<br />

many employees accessing company data from outside the enterprise perimeter. A second or<br />

third authentication factor delivers another critical layer of protection, so that even if an attacker<br />

gets their hands on a weak or stolen employee password, they’ll be unable to log in and<br />

compromise your systems without a physical token, personal smartphone or unique biometric<br />

signature.<br />

4. Reexamine and harden the compute layer – If you haven’t already, now is the time to assess<br />

and secure your compute layer to ensure your systems and data remain available and to keep<br />

any threat actors that could potentially find a way in through one of many remote entry points from<br />

using your resources to spread malware. One easy way to do this is to remove outdated or<br />

unnecessary programs from user devices, which just offer additional attack surfaces for bad<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


actors to target. Ensure that all user devices are updated and patched automatically, or as<br />

frequently as possible. While these measures can’t provide 100% protection against zero-days,<br />

they can significantly reduce your risk. Additionally, take time to adjust your hypervisor firewall<br />

rules. This is important because you can manage both ingress and egress traffic to set granular<br />

rules for which users can send, receive and access both inbound and outbound data, as well as<br />

how much and which types. Setting strict outbound rules is incredibly important here due to the<br />

fact that ransomware attacks often threaten to leak confidential company data.<br />

Our research shows that exposure of just a single terabyte of data could cost you $129,324; now think<br />

about how many terabytes of data your organization stores today. Most companies end up storing<br />

hundreds of thousands to hundreds of millions of files, many of which are highly valuable and critical to<br />

business operations. Ransomware attacks continue to wreak havoc on companies of all types and sizes<br />

by locking those assets away as leverage for cyber extortion. Even though there are advanced solutions<br />

out there that can allow you to simply roll back your environment to a pre-attack state and restore all files<br />

to the last unaffected version, a widely distributed workforce can make this much more challenging (and<br />

increase the odds of reinfection without the proper preventative measures in place).<br />

As the coronavirus pandemic continues to play out over the coming months, attackers will focus their<br />

attention on the many new targets supplied by the burgeoning population of remote workers – just hoping<br />

that they’re unprepared and unprotected enough to make for easy footholds into your organization. The<br />

most effective approach is to prevent ransomware infections before they can inflict damage.<br />

Implementing the above best practices today will help you better secure off-network employees if and<br />

when ransomware comes calling.<br />

About the Author<br />

Kris Lahiri is a co-founder and the Chief Security Officer of Egnyte.<br />

He is responsible for creating and implementing Egnyte's global<br />

information security and compliance management strategies,<br />

policies and controls that protect all of Egnyte's customers'<br />

content and users. Prior to Egnyte, Kris spent many years in the<br />

design and deployment of large-scale infrastructures for Fortune<br />

100 customers of Valdero and KPMG Consulting. Kris has a<br />

B.Tech in Engineering from the Indian Institute of Technology,<br />

Banaras, and an MS from the University of Cincinnati. For more<br />

information, visit: https://www.egnyte.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ransomware, Risk, And Recovery<br />

Why You Need to Take A Hard Look At Your Corporate Recovery Plan<br />

By Mickey Bresman, CEO, Semperis<br />

What we as IT and security professionals worry about when planning for disaster recovery has evolved<br />

over time.<br />

At first, the major concerns were natural (e.g. hurricanes) or man-made (power failure) physical disasters.<br />

After 9/11, we included other physical disasters such as airplanes or explosives to the risk list. Today we<br />

have COVID-19, which has emptied not datacenters but offices as entire economies have struggled to<br />

suddenly work remotely. Along the way, insider-triggered logical disasters – whether deliberately through<br />

an angry employee or an “oops” admin mistake – were also added to the list.<br />

In the last couple of years, however, one cyber threat has eclipsed all the others: denial of availability<br />

(DoA) malware, including wiperware and ransomware. If you don’t update your business continuity /<br />

disaster recovery (BC/DR) strategy to be “cyber first” to account for this threat, you’re needlessly exposing<br />

your organization to potentially catastrophic risk.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Let’s look at how the ransomware threat, enterprise vulnerability to this threat, and the threat’s impact<br />

combine to move it to the top of your BC/DR risk matrix. Finally, we’ll recommend action you must take<br />

to minimize ransomware’s impact to your organization.<br />

The shape of historic disaster recovery plans<br />

Most historic disaster threats share one characteristic: they can be mitigated with physical or logical<br />

distribution or redundancy. East coast data center threatened with a hurricane? Ensure you have a<br />

redundant data center in the central US. Worried about power loss? Install a backup UPS for fault<br />

tolerance.<br />

Insider logical disasters can be more difficult to recover from than physical disasters, as corruption can<br />

spread via the same mechanisms that provide your systems their fault tolerance. But the history of such<br />

incidents has shown that these occurrences are relatively rare, companies have mitigating controls in<br />

place, and the incident’s damage is usually limited.<br />

The DoA threat<br />

In contrast, the threat of cyber disaster has come to dominate all other threats due to its frequency and<br />

massive impact. Wipers like NotPetya, Shamoon, Destover and ransomware such as Petya, WannaCry,<br />

and LockerGoga have crippled organizations large and small around the world, encrypting some or all of<br />

their IT infrastructure within minutes or hours of a single computer’s infection and sending them back to<br />

manual operations until (or if) they can recover their systems.<br />

Originating as broadly distributed campaigns, ransomware attacks have evolved into highly targeted and<br />

extremely damaging network-wide infections i . <strong>Cyber</strong>security Ventures predicts that ransomware<br />

damages will cost the world $20 billion by 2021 ii . In addition to large enterprises, state and local<br />

governments have also become targets: 53 were reported in 2018, and at least 70 in 2019 including<br />

Baltimore and Atlanta iii .<br />

The enterprise vulnerability<br />

Organizations of all sizes are highly vulnerable to ransomware attacks. Phishing, especially targeted<br />

(spear) phishing, remains an extremely effective infection vector because it plays on human nature.<br />

Microsoft has stated iv that phishing maintains an approximately 15% success rate regardless of education<br />

programs – even among its own employees.<br />

There’s also critical vulnerability well understood by IT professionals that has less awareness up the<br />

management chain. Microsoft’s Active Directory - the distributed security system that controls user<br />

authentication and systems authorization in well over 90% of the world’s medium and large organizations<br />

– is devilishly hard to restore. Because of this, only a small percentage of companies have a<br />

comprehensive, regularly tested AD recovery plan. (Look your AD admin in the eye and ask.)<br />

Why, after a product lifetime of almost 20 years, do IT departments not have the same level of recovery<br />

plan for AD as they would for a critical file server? Mainly because AD is very robust to both physical<br />

domain controller failures and logical failures. But it was designed in the late 90’s when no one could<br />

conceive of malware that encrypts every single domain controller within minutes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Under the very best circumstances, it takes days to restore AD in medium to large organizations. All<br />

applications that depend upon AD – most of the enterprise, from file servers to physical security systems<br />

- cannot be returned to availability until it’s restored. And a ransomware attack that has encrypted most<br />

of your network is not the best of circumstances.<br />

The devastating impact<br />

Unlike a natural disaster, every computer system within network reach of a malware attack is at risk<br />

regardless of its location in the world. But for one African server, Maersk’s AD would have been entirely<br />

destroyed by NotPetya. That server just happened to be offline due to power failure. Its hard drives were<br />

hand-flown from Ghana to IT headquarters in England to begin the AD recovery process, which ultimately<br />

took nine days. And most applications couldn’t be restored until AD was restored. NotPetya is<br />

conservatively estimated to have cost the company $300M and its suppliers much more. In total,<br />

NotPetya was estimated to have caused $10 billion damage to organizations worldwide.<br />

A month after they were hit with LockerGoga, 100-year-old Norsk Hydro was still operating most of its<br />

160 manufacturing facilities manually using pre-printed order lists. When all of the computers of Houston<br />

County, Alabama were encrypted, the high school principal said, “People are going to learn what it was<br />

like 50 years ago, 30 years ago.”<br />

Updated Risk Matrix<br />

Given this new reality, BC/DR professionals must adopt a cyber first mindset for their inherent risk<br />

analysis:<br />

<strong>Cyber</strong> First BC/DR Risk Matrix<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This updated matrix considers the threat frequency, enterprise vulnerability, and impact of ransomware<br />

and other malware.<br />

Remediating the ransomware risk<br />

How do you lower the risk associated with a ransomware attack? Historically, prevention and detection<br />

have been the main defenses against malware, but for ransomware we’ve already shown these<br />

approaches are only moderately effective. Recreating lost data is usually impossible or impractical. Some<br />

victims have paid to recover their data, but this is a chancy (and morally ambiguous) approach. Further,<br />

data encrypted by worms like NotPetya are unrecoverable.<br />

This leaves recovery as a keystone strategy to minimize the impact of ransomware to your organization.<br />

An automated, tested recovery plan for all your critical systems is the best way to minimize the damage<br />

inflicted by a ransomware attack. Infrastructure such as Active Directory, DNS, and DHCP must be your<br />

top priority because they are foundational to recovering everything else on your network.<br />

Ransomware attacks are the leading cause of organizational IT disruption today. Business continuity and<br />

disaster recovery planning need to take this new reality into account and update their risk analysis<br />

accordingly. Recovery has traditionally taken a back seat to prevention and detection for malware<br />

protection, but today rapid, automated restoration of your systems and data may be the only shield your<br />

organization has against corporate Armageddon.<br />

i<br />

Multiple sources – Microsoft SIR, Verizon, etc.<br />

ii https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usdby-2021/<br />

iii<br />

https://www.recordedfuture.com/state-local-government-ransomware-attacks/<br />

iv<br />

"Shut the door to cybercrime…" Ignite 2017, BRK3016, 35:45<br />

About the Author<br />

Mickey Bresman, CEO, Semperis<br />

Mickey is a co-founder of Semperis and leads the company’s<br />

overall strategic vision and implementation. A long-time<br />

enterprise software expert, Mickey began his technical career in<br />

the Navy computing technical unit over a decade ago. Prior to<br />

co-founding Semperis, Mickey was the CTO of a Microsoft gold<br />

partner integration company, YouCC Technologies, successfully<br />

growing the company’s overall performance year over year.<br />

Mickey holds a BA in Technical Management and a Minor in<br />

Electronic Engineering.<br />

Mickey can be reached on Twitter at @ber_mic and at our<br />

company website http://www.semperis.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Getting Employees Back to the New Normal<br />

Work will never be quite the same once the pandemic has passed<br />

By Brendan O’Connor, CEO and Co-founder, AppOmni<br />

There are encouraging signs that the Covid-19 pandemic – arguably the greatest disaster of our<br />

generation – is beginning to recede, at least in some parts of the world. While the disarray it provoked<br />

throughout the economy is still very much with us, there is reason to believe that a tolerable new normal<br />

will emerge – an innovative set of practices representing a tectonic shift away from what normal used to<br />

be – in the workplace, in leisure pursuits, and in commerce.<br />

Although the contours of that new normal are still in flux, the experience of the past few months has<br />

driven home some durable lessons – lessons we expect will help shape post-pandemic life as recovery<br />

gets underway. One of the most apparent is that working from home is almost certain to become an<br />

enduring element of employment for millions of workers. That’s good, both for the workers and their<br />

employers. But it comes with certain caveats.<br />

For starters, I’ve heard from leaders of several organizations that employees working from home have<br />

been asking their companies to slow down the release of new and updated versions of their enterprise<br />

software. Learning new software and mastering feature changes, particularly without hands-on personal<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


guidance, is disruptive, often leading to a surge of help desk calls that can be hard for IT staff, working<br />

remotely, to keep up with.<br />

The practical consequences of slowing the rollouts might include accepting longer lives for software<br />

versions that would previously have been considered obsolete. It would also argue for greater use of<br />

automated instructional software layered atop the enterprise application – software that enables<br />

employees to master changes more quickly and with greater confidence.<br />

Another result of the coronavirus outbreak has been an acceleration of information movement from onsite<br />

data centers into the cloud – a transition that had already been underway. Cloud-based applications<br />

and related data can be readily accessed by people working remotely using just about any kind of digital<br />

device, which makes it attractive for homebound workers. And today, public clouds are widely regarded<br />

as secure. It is in cloud providers’ best interest to ensure the highest security of the application and data<br />

to attract more adopters. Increasing adoption of public cloud and transition away from traditional<br />

datacenter solutions will be additional added changes in the digital landscape.<br />

Then there’s the Big One: security. Data security has always been a focus of IT professionals and<br />

frequently a concern to senior management as well. But the explosion of off-site computing resulting<br />

from employees working at home, frequently using their own consumer-level digital devices, has made<br />

security an imperative. Of course, there was serious concern from the onset of Covid-19 that large-scale<br />

work-from-home patterns would present a temptation to hackers. Less effective security in home<br />

environments – including network sharing with children and other family members – would make it much<br />

easier for criminals to perpetrate fraud or attack unsuspecting users.<br />

As it turns out, those suspicions were right. According to the Wall Street Journal, cyberattacks against<br />

banks and other financial firms rose by 238 percent between February and April 1 , just as the bulk of their<br />

employees began working remotely. At the same time, aggressive furloughing for cost reduction led to<br />

a decrease in the number of employees whose regular assignments involved responding to cyberattacks.<br />

The problem has been amplified by the government’s mass distribution of stimulus funds for individuals<br />

and businesses through financial institutions, which play a central role in the pandemic response.<br />

Capitalizing on chaos is a familiar pattern for every sort of criminality, and the confusion resulting from<br />

the coronavirus response provided a perfect recipe for abuse.<br />

What does that mean going forward into a post-pandemic world? There are, as a report pointed out,<br />

various technical steps that would be prudent to take including multi-factor authentication, special controls<br />

for certain facility-based applications, and device virtualization. But the primary focus needs to be on<br />

people – the system’s users.<br />

An indefinitely and perhaps permanently distributed workforce needs to stay aware of how the things<br />

they do can either create or abate risks. That means constantly communicating the basics of digital<br />

hygiene, possibly engaging a service that focuses on raising user awareness of cyber mischief, along<br />

with vigilant monitoring for telltale signs of a security breach. Among the best practices for users:<br />

● Keep business and personal email and other work accounts separate.<br />

● Require the use of multi-factor authentication and ensure such policies are continuously enforced.<br />

● Make sure users know what to do if a device is lost, stolen or compromised.<br />

● Keep processes as simple as possible; when they get complicated, they get ignored.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


● Equip IT and security teams with tools for continuous monitoring across multiple SaaS<br />

environments.<br />

Of course, there are likely to be other features about the emerging ‘new normal’ that touch in one way or<br />

another on the digital lives of organizations, their employees, and the people they serve. For example,<br />

one commentator in Forbes argued that adopting and then complying with a new international<br />

cybersecurity regulatory framework – a regimen similar to GDPR or HIPPA – would be timely. Whether<br />

the political and economic support for such a regimen will materialize in the U.S. is an open question.<br />

But with or without one, the pandemic has given the need to create a secure and resilient digital<br />

ecosphere of technology, processes, and people, greater urgency than ever before.<br />

About the Author<br />

Brendan O’Connor – CEO and Co-founder<br />

Brendan is a 20 year veteran of the security industry. Prior<br />

to founding AppOmni, he was Security CTO at ServiceNow.<br />

Before joining ServiceNow, Brendan spent 10 years at<br />

Salesforce where he led Salesforce’s global information<br />

security organization as CSO. Prior to his role as CSO,<br />

Brendan was VP Product Security at Salesforce. Brendan<br />

has also worked in the Financial Services and<br />

Communications sectors. His past experience includes<br />

work as a vulnerability researcher, security engineer, and<br />

privacy advocate. He is passionate about securing the technology that connects the world.<br />

Brendan can be reached on Twitter at @AppOmniSecurity and at our company website<br />

https://appomni.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security in The New Normal Requires an Agile Approach<br />

By Danny Presten, Chief Methodologist at Digital.ai<br />

Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a<br />

300% increase in cybercrimes. <strong>Cyber</strong> criminals are stepping up their game during the COVID-19<br />

pandemic and, to ensure safety and security, businesses must do the same.<br />

To keep pace with the ever-increasing threat level and achieve results in the new normal of remote-based<br />

working, many organisations are taking an Agile approach. Once thought of as the domain of DevOps,<br />

Agile is making its way into DevSecOps, cybersecurity and beyond, and for good reason.<br />

Agile is an iterative way of working that encourages rapidly releasing smaller slices of value as opposed<br />

to the long lead in times of larger, traditional projects. In this way, results can be continuously improved<br />

as quickly as circumstances change to meet ever evolving business needs. Many companies have<br />

benefited from an Agile approach to delivering software and now organisations are expanding those ways<br />

of working to include more and more security teams.<br />

Agile offers huge benefits in cybersecurity where security teams are faced with threats that are continually<br />

evolving, and bad actors who will look to adjust their methods almost instantaneously to find the best<br />

attack vector.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The 14 th Annual State of Agile Report explores this uptake and the reasons for it, along with wider issues<br />

concerning Agile.<br />

The importance of Agile<br />

The 14 th Annual State of Agile report, based on a survey of more than 1,000 global IT and business<br />

professionals, highlights how Agile adoption improves key capabilities needed to respond to current<br />

business challenges. Around six in ten respondents said Agile has both helped increase speed to market<br />

and improved team productivity.<br />

A follow up survey conducted in mid-May <strong>2020</strong> to learn more about how the COVID-19 pandemic has<br />

affected Agile adoption revealed that 55 percent of respondents said their company plans to increase the<br />

use of Agile in the next 12-24 months. This is a rise of 13 percent over the original survey completed just<br />

five months previously. Additionally, 43 percent of organisations said their momentum for Agile adoption<br />

has increased over the past 90 days, with 15 percent saying the increase is significant.<br />

The main catalyst for organisations to adopt Agile comes from wanting to accelerate delivery of value to<br />

customers as well as being able to quickly respond to changing circumstances. Indeed, our survey found<br />

that the second largest reason for adopting Agile is to enhance the ability to manage changing priorities,<br />

with two-thirds (63 percent) of respondents citing this as a key motivator.<br />

This key advantage has led to Agile being adopted in many areas of the business. Software development<br />

and IT are understandably the most popular at 37 percent and 26 percent. However, increasingly it is<br />

being utilised in operations, marketing, HR and sales. <strong>Cyber</strong>security is no exception as Agile can help<br />

security teams combat continually evolving threats.<br />

The diffusion of Agile principles<br />

The concept of Agile has been around for many years now. It began in the late 2000s with the Scrum<br />

framework, which focuses on teamwork, accountability and iterative releases for the development of<br />

hardware and software. This was expanded throughout the early 2000s through a variety of scaling<br />

frameworks allowing multiple small teams to collaborate effectively on various parts of the product. Today<br />

teams collaborate in a variety of ways beyond the traditional face to face interactions with 71 percent of<br />

companies reporting teams collaborating across multiple geographies.<br />

As companies began to benefit from increased development productivity, they realised their next<br />

bottleneck was actually getting the new product to production. This led to the rise in prominence of<br />

DevOps in the middle of the 2010s ushering in an expansion in Agile practices and culture. To that end<br />

more than 90 percent of respondents are now placing a high value on DevOps and 75 percent of<br />

organisations are actively planning and/or implementing transformation in this area. Organisations going<br />

through their DevOps transformation look to achieve accelerated delivery speed (70 percent), improved<br />

quality (62 percent) and reduced risk (48 percent). In an increasingly digital world, it’s critical to get high<br />

quality, valuable software to consumers as rapidly as possible. It’s clear that organisations are realising<br />

focus in this area is critical for their survival.<br />

As DevOps began to address operational bottlenecks, organisations started to see issues in other areas<br />

and have realised they need to look at the entire end-to-end value stream. Value Stream Management<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


(VSM) helps to decrease time to value by providing a systematic approach for measuring and improving<br />

workflow across the organisation through a combination of people, processes, and technologies.<br />

Currently, eight out of 10 respondents said they have an interest in, are planning to implement, or are<br />

implementing VSM. Having an end-to-end view of how value flows in an organisation will enable firms to<br />

tie actual outcomes to deliveries enabling a much-improved view of value planned and delivered.<br />

The rise of VSM has led to the incorporation of security into the DevOps process, rather than as an<br />

afterthought, to create DevSecOps. This approach enables organisations to address security issues<br />

during development, reducing cycle time and rework while improving quality and streamlining the<br />

workflow. Additionally, this also means the security team now has a seat at the DevOps table and can<br />

make sure that the appropriate security is in place as an app is being built, reducing vulnerabilities.<br />

Challenges implementing Agile<br />

With all the advantages an Agile framework offers, why aren’t more businesses fully adopting it?<br />

Organisational obstacles can often be considerable. More than 40 percent of respondents report an<br />

overall organisational resistance to change, not enough leadership participation, inconsistent practices<br />

across teams and an organisational culture that is at odds with Agile values. Even more challenging to<br />

note is that these have been top barriers for Agile adoption consistently for more than five years.<br />

It’s critical that leadership understands the principles that make an Agile ecosystem work and take effort<br />

to bring about the necessary organisation change to harness their benefit.<br />

Making Agile a success relies on implementing proven practices and principles that are executed through<br />

a culture immersed in this way of working. Increasingly we’re seeing management learn and own those<br />

core Agile values. While it’s obvious there is more work to do it’s encouraging to see movement as an<br />

organisation’s success depends on it.<br />

Coping with increasingly sophisticated bad actors while simultaneously working through the new realities<br />

brought on by the pandemic require an organisation that can pivot at a moment’s notice. Those<br />

organisations leveraging an Agile approach are better able to respond to changing conditions, maintain<br />

quality and security, and provide solutions that bring value to their customers.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Danny is Chief Methodologist at Digital.ai. He has several<br />

transformation tours of duty behind him in which he's<br />

worked in agile organisations, consulted with senior leaders<br />

and led training initiatives. He is an entrepreneurial selfstarter<br />

with over 20 years’ experience successfully<br />

addressing complex delivery challenges in a variety of<br />

industries including web development, e-commerce,<br />

healthcare, nonprofit, supply chain, and legal.<br />

Danny can be reached online at can be reached online at<br />

https://www.linkedin.com/in/danny-presten-3b5b413/ and at our company website https://digital.ai/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Are Fully Staffed <strong>Cyber</strong>security Teams Unable to<br />

Keep Up with Hacks?<br />

By Steve Salinas, Head of Product Marketing, Deep Instinct<br />

Faced with mounting cyber threats, large enterprises are devoting more resources than ever to improving<br />

their cybersecurity posture. According to a Cisco survey released last fall, 93% of enterprises with 10,000<br />

or more employees spend more than $250,000 annually on cybersecurity, with half spending over $1<br />

million each year.<br />

The return on those investments leaves much to be desired. A 2019 report from Accenture and the<br />

Ponemon Institute found that security breaches had increased 11% since 2018 and had spiked 67%<br />

since 2014. Some experts ascribe the problem to woefully understaffed cybersecurity teams – but even<br />

fully staffed, highly experienced cyber teams are encountering hacks they can’t fully prevent or contain.<br />

The real culprit isn’t necessarily the size of the typical organization’s cybersecurity staff, but the outdated<br />

tools and operational methodologies many of these teams use. As hacks grow more frequent and more<br />

complex, organizations should rethink the tools and technologies they’re using to meet the threat.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Rising Cost of Failure<br />

How much is cybersecurity costing companies? In a recent Ponemon-Deep Instinct survey of IT and IT<br />

security practitioners, only 40% of respondents believed their budgets were sufficient for achieving a<br />

robust cybersecurity posture.<br />

These budgets are predominantly funneled into containing and remediating threats rather than preventing<br />

them – in large part because cyber staff are overwhelmed with the amount of data that they need to<br />

monitor. Yet this “assume a breach and then contain” approach comes at a big cost, with the time and<br />

money spend remediating attacks costing well into the hundreds of thousands of dollars. The value of<br />

preventing a cyber-attack ranges from $400,000 to $1.4 million, depending on the nature of the attack. If<br />

an attack is the first of its kind, it’s virtually guaranteed to succeed with absent strong preventative<br />

capabilities, and organizations stand to lose upwards of $1 million per successful attack.<br />

Subpar Solutions, Subpar Results<br />

Why are current approaches to cybersecurity proving so inadequate? Because they over-rely on the<br />

human intervention.<br />

Specifically, most AI-based cybersecurity solutions are powered by traditional machine learning (ML),<br />

which is inhibited by a number of limitations that have become substantial problems in the recent past.<br />

Chief among these limitations is data: ML models are trained on only a fraction of the available raw data,<br />

and are trained on features identified by experts.<br />

Human error, of course, also comes into play, even when highly specialized computer scientists with<br />

expertise in cybersecurity carry out ML feature engineering. These professionals excel at training ML<br />

models on known threats – but even seasoned cybersecurity professionals are unable to anticipate<br />

emerging, first-seen attacks, that are designed to be evasive. Hackers of course, understand this, which<br />

is why they now building malware that is capable of fooling ML models into classifying it as benign.<br />

Finally, there’s a limit to the size of the dataset for training ML systems before reaching learning curve<br />

saturation – the point past which the system no longer improves its accuracy.<br />

Given these limitations, ML systems struggle to detect new, previously unseen malware, while generating<br />

high rates of false positives. Just as the cost of an unprevented attack can deliver a real blow to the<br />

bottom line, the time and resources required to investigate false positives also strains security teams’<br />

resources. This, in turn, breeds a sense of “alert fatigue,” making teams more prone to error when<br />

genuine threats emerge.<br />

Simply put, AI trade-offs – not understaffed cybersecurity teams – may be one of the biggest inhibitors to<br />

achieving a resilient cybersecurity posture.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AI-Powered Hackers and the Increased Pace of Attacks<br />

Compounding the challenges posed by flawed cybersecurity solutions, hackers are increasingly<br />

leveraging automation to diversify their attacks and execute them at an accelerated pace. The AV-Test<br />

Institute found that over 350,000 new malware are generated every day and networks regularly<br />

experience thousands of security events daily– making it all the more difficult for human security<br />

professionals to sift through all potential threats. Even the largest, most skilled cybersecurity teams can’t<br />

be expected to handle this load. And when cybersecurity teams successfully detect a threat, they often<br />

run out of time to respond before hackers have already caused substantial damage.<br />

Take the 2019 Equifax data breach. In the wake of the breach, Equifax’s security team worked 36-hour<br />

shifts, which the company’s CISO acknowledged had come at a great cost to the team’s mental health.<br />

On average, it takes 191 days – half a year – to identify an attack. Without the luxury of months to spare,<br />

how should organizations adjust their cybersecurity approach?<br />

A <strong>Cyber</strong> Paradigm Shift<br />

In the short term, adding more cyber professionals to IT teams can help – but even a large and<br />

experienced team won’t be able to compensate for subpar security tools.<br />

Because today’s hackers are operating autonomously, cyber solutions need to do so, as well. Such<br />

solutions require minimal staff intervention, enabling teams to triage potential security events and prevent<br />

time wasted on false positives. Deep learning-based autonomous solutions also offer powerful<br />

capabilities for detecting and preventing attacks before they are executed – potentially helping<br />

organizations save millions.<br />

It’s little wonder, then, that two-thirds of IT and IT security leaders believe that using automation and<br />

advanced AI like deep learning, will improve their ability to prevent attacks and that they plan to implement<br />

these solutions within the next two years.<br />

While beefing up staffing isn’t a panacea, implementing autonomous solutions isn’t about putting cyber<br />

professionals out of work. Instead, it’s about putting their essential skillset towards more efficient and<br />

strategic use while simultaneously tightening and improving existing cybersecurity measures.<br />

The dizzying pace at which today’s cyber threats are evolving underscores the need for a cyber paradigm<br />

shift that emphasizes autonomous protection and attack prevention. Humans alone can’t combat the<br />

hyper-efficient machines hackers are employing. Only when malicious actors’ sophisticated technology<br />

is met by even more sophisticated technology, will organizations achieve resilient protection.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Steve Salinas is the Head of Product Marketing at Deep Instinct.<br />

Steve Salinas is Head of Product Marketing for Deep Instinct, a leading<br />

provider of deep learning-based cybersecurity solutions. His<br />

experience includes holding product management, product<br />

marketing, and solution engineering positions with leading security<br />

vendors, including Guidance Software (now OpenText), Alert<br />

Logic, Siemplify, and Cylance. He is a frequent presenter at<br />

industry conferences, podcasts, and regularly publishes blogs<br />

aimed at providing both business and technical insights to the<br />

security community. Steve went to Texas A&M University for<br />

undergrad and earned an MBA from Pepperdine University. Steve<br />

lives in Huntington Beach, California. Steve can be reached online at @so_cal_aggie and at the company<br />

website https://www.deepinstinct.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Looks Like Russian Hackers Are on An Email Scam Spree<br />

By Tim Sadler, CEO, Tessian<br />

In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These<br />

types of attacks, whereby a trusted relationship is compromised through email impersonation or email<br />

account hacking, are becoming more common and also more successful. The reason? First, they are<br />

easier and cost-effective to carry out, making such attack methods attractive and lucrative for<br />

cybercriminals. Second, to improve the success rate of their scams, hackers are making it much more<br />

difficult for their victims to detect that they are being targeted.<br />

In fact, just recently, researchers identified a cybercriminal gang called Cosmic Lynx that has carried out<br />

more than 200 BEC campaigns since July last year, in attempts to steal as much as $2.7m from Fortune<br />

500 or Global 2000 companies. Believed to be the first reported case of a BEC gang operating from<br />

Russia, the group delivers sophisticated and creative email campaigns that target senior executives,<br />

tailoring their messages to discuss legitimate mergers and acquisitions.<br />

Why Cosmic Lynx is cause for concern<br />

BEC scams are not, traditionally, this group’s method of attack. However, as BEC offers a lucrative<br />

opportunity to steal millions of dollars in just a few emails, it appears that this Russian cyber gang is<br />

changing its tact.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


One of the defining characteristics of Cosmic Lynx’s campaigns is that they are far more sophisticated<br />

than generic phishing scams. This is a well-researched operation, run by experienced hackers who have<br />

clearly done their homework. The hackers investigated companies that were completing an acquisition,<br />

identified a senior executive target, and impersonated the CEO of the target company in order to deceive<br />

their victim into wiring money to a fraudulent account.<br />

To add another layer of perceived legitimacy, the hackers also impersonated an external lawyer at a wellregarded<br />

law firm to “facilitate the payment”, making it very difficult for the target to think that they are<br />

being scammed. Finally, the hackers ensured a high level of quality and diligence in their campaigns,<br />

paying particular attention to brands’ details, and making sure grammar and spelling were without error.<br />

Social engineering campaigns like this can be devastating to businesses, and anyone in an organisation<br />

can fall for the scams. As hackers up their game, businesses need to ensure all employees are aware of<br />

the threats in their inboxes and consider whether they have the security measures in place to detect the<br />

deception before it's too late.<br />

My company has DMARC so I should be protected against email impersonation, right?<br />

Implementing Domain-based Message Authentication, Reporting & Conformance (DMARC) is a<br />

necessary first step for businesses to prevent hackers spoofing your company’s domain in its email<br />

attacks. Without it, an attacker can directly impersonate your company’s domain and users will think they<br />

are receiving an email from a legitimate (and trusted) source.<br />

In the particular case of Cosmic Lynx, researchers found that the group has a strong understanding of<br />

DMARC and analyses the public DMARC records to select its targets and methods of attack. The problem<br />

is that, as DMARC records are publicly available, it's very easy for hackers to identify companies that do<br />

not have email authentication protocols in place, allowing them to directly impersonate a company's<br />

domain and pose as the CEO.<br />

But even if your company does have a DMARC policy in place, attackers can also assess how strictly<br />

you've configured it. If your company has a strict email policy in place, the attacker can still carry out an<br />

advanced spear phishing attack by registering a look-a-like domain, banking on the fact that a busy<br />

employee may miss the slight deviation from the original domain. This highlights why companies cannot<br />

rely on the email authentication protocol as a silver bullet to prevent email impersonation scams.<br />

The other problem is that while your organisation might have DMARC in place, your external contacts<br />

may not. This means that while your organisation's domain is protected against direct impersonation,<br />

your employees may be vulnerable to impersonation of external contacts like partners, customers or<br />

lawyers. Again, this knowledge has worked to Cosmic Lynx's advantage; they impersonated external<br />

lawyers from real UK law firms to add another layer of legitimacy to their scams.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How do I protect my company from BEC?<br />

Of course, security teams put rules and policies in place to stop malicious messages landing in inboxes<br />

but, as we’ve seen, hackers find ways around these rules. Another solution is to train employees on the<br />

threats. And security training helps to raise awareness, but solely relying on training means relying on<br />

your employees to spot every scam and every threat. This is unrealistic; businesses cannot expect busy<br />

and stressed employees to get it right 100% of the time, especially when hackers make their deceptions<br />

so difficult to detect.<br />

To prevent BEC attacks, you need to detect the impersonation but it’s a difficult problem to solve. To<br />

accurately detect it, you need to understand what is being impersonated. You need to be able to answer<br />

the question, “for this user, at this point in time, given this context, is the sender really who they say they<br />

are?”.<br />

Machine learning can help, though. By using machine learning algorithms to analyse historical email<br />

communications and understand each and every employees’ relationships over email, you can start to<br />

build a picture of normal (and abnormal) behaviour. When an employee receives an email that looks out<br />

of the ordinary, they can be alerted in real-time to the threat and given advice on what to do next.<br />

The example of Cosmic Lynx has shown that more and more cyber-criminal gangs are turning to BEC to<br />

achieve their objective of scamming businesses out of hundreds of thousands of dollars. Companies<br />

need an advanced, multi-layered solution to this increasingly sophisticated problem. By using machine<br />

learning to protect people on email, and by solving the problem at the human layer, businesses can start<br />

to tackle the rising threat of BEC.<br />

About the Author<br />

Tim Sadler, CEO, Tessian<br />

Tessian is building the world’s first Human Layer<br />

Security platform to automatically secure all humandigital<br />

interactions within the enterprise. Today, our<br />

products use stateful machine learning to protect<br />

people using email and to prevent threats like spear<br />

phishing, accidental data loss due to misdirected emails, data exfiltration and other non-compliant email<br />

activity. We’ve raised $60m from legendary security investors like Sequoia and Accel and have over 150<br />

employees located in New York and London.<br />

https://www.tessian.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


TLS/ SSL Decryption – One of the Main Pillars of Zero<br />

Trust Model<br />

By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks<br />

In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to<br />

imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries<br />

from healthcare to the education sector to the government using the internet to provide easy access to<br />

data, it is no wonder that cybersecurity teams are always working around the clock to try and come up<br />

with better ways of defending these networks and the data they store.<br />

Insider Threats – Need for Security to Evolve from “Castle and Moat” Approach<br />

Modern cyberattacks are not limited to just network intrusion from the outside. Internal threat actors can<br />

often be found at the centre of sophisticated attacks.<br />

Initially, we had the concept of zones, perimeters and network segments – placing all the protected assets<br />

“inside” the secured network perimeter. However, attackers are always evolving the methods they use;<br />

always on the lookout for weak points in your network defences; and coming up with newer ways of<br />

infiltrating the perimeter. Keeping up with them is a challenging and ongoing struggle. We also need to<br />

realize that the “castle and moat” approach to our network defences was mostly effective against threats<br />

that resided outside the network. But what about the threats on the inside? What about modern attacks<br />

that work on multiple levels to try to bring your networks down? How do we protect our networks from<br />

people who have legitimate access to all its resources? How do we battle the ever-growing and everevolving<br />

modern cyberattacks? Add to these questions, regulations like GDPR, and the rising fines, and<br />

you will see that having your networks attacked and data breached is one of the worst things that can<br />

happen to your company. With these issues as the backdrop, we are forced to re-assess and re-think the<br />

way we defend our networks, users and data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Zero Trust Model – a Modern <strong>Cyber</strong>security Approach<br />

Zero Trust attempts to fix the problems, and patch the holes, in our cybersecurity strategies. At the core<br />

of it, the Zero Trust model is based on the principal of “trust nobody.” The Zero Trust model dictates that<br />

no one in your network should be trusted completely, that access should be restricted as much as<br />

possible, and that trust should be seen as yet another vulnerability that can put your network at risk.<br />

Some of the precepts of the Zero Trust model are:<br />

• Networks need to be redesigned in a way that east-west traffic and access can be restricted.<br />

• Incident detection and response should be facilitated and improved using comprehensive<br />

analytics and automation solutions, as well as centralized management and visibility into the<br />

network, data, workloads, users and devices used.<br />

• Access should be restricted as much as possible, limiting excessive privileges for all users.<br />

• In multi-vendor networks, all solutions should integrate and work together seamlessly, enabling<br />

compliance and unified security. The solutions should also be easy to use so that additional<br />

complexity can be removed.<br />

Danger of Security Blind Spots<br />

In recent times, we have witnessed a phenomenal rise in the use of encryption across the internet. Google<br />

reports that over 90 percent of the traffic passing through its services is encrypted. The same is true for<br />

all the other vendors. This rise has been driven by many factors, including privacy concerns.<br />

However, with encryption comes the creation of a “blind spot” in our network defences as most of the<br />

security devices we use are not designed to decrypt and inspect traffic. The Zero Trust model is not<br />

immune to this problem as visibility is considered as one of the key elements to its successful<br />

implementation. Without complete encrypted traffic visibility, the model will fail, introducing vulnerabilities<br />

that can be exploited by both insiders and hackers.<br />

TLS/SSL Decryption – One of the Main Pillars of Zero Trust<br />

A centralized and dedicated decryption solution must be placed at the centre of the Zero Trust model and<br />

should be included as one of the essential components your security strategy.<br />

Many security vendors will make claims of the ability to decrypt their own traffic, working independently<br />

of a centralized decryption solution. However, this “distributed decryption” approach can introduce<br />

problems of its own, including inferior performance and network bottlenecks, and fixing these would<br />

require costly upgrades. In a multi-vendor, multidevice security infrastructure, the distributed decryption<br />

also forces you to deploy your private keys in multiple locations, creating an unnecessarily large threat<br />

surface in your network, which could be subject to exploitation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Key features of a good TLS/ SSL Decryption Solution<br />

It is important that a dedicated, centralized decryption solution provides full visibility to the enterprise<br />

security infrastructure for TLS/SSL traffic. Not only that, but the solution also needs to provide a multilayered<br />

security approach, which then makes it the perfect candidate to be deployed at the centre of a<br />

Zero Trust network.<br />

Below are some of the features to look out for when looking to implement a TLS/ SSL Decryption Solution:<br />

• Full Traffic Visibility – It needs to enable the entire security infrastructure to inspect all traffic in<br />

clear-text, at fast speeds, ensuring that no encrypted attacks or data breaches can slip through<br />

• Ease of Integration – It should be vendor agnostic and easily integrate with security devices<br />

already deployed within the network. This drives down additional costs and upgrades.<br />

• Multi-Layered Security Services – These are additional security services, including URL<br />

filtering, application visibility and control, threat intelligence and threat investigation, that help<br />

strengthen the security efficacy of the entire enterprise network<br />

• User Access Control – The product should be able to enforce authentication and authorization<br />

policies to restrict unneeded access, log access information and provide the ability to apply<br />

different security policies based on user and group IDs.<br />

• Micro Segmentation – It should facilitate micro-segmentation through its ability to provide<br />

granular traffic control, user and group ID-based traffic control, and support for multi-tenancy<br />

• Securing Cloud Access – SaaS security is an important feature which can be provided by<br />

enforcing tenant access control and visibility into user activities.<br />

In conclusion, without a centralized and dedicated TLS/SSL decryption solution, the Zero Trust model is<br />

unable to do what it was designed to do – protect our networks, users and data from threats residing<br />

inside and outside the network.<br />

About the Author<br />

Adil Baghir is Technology Consultant Lead for Middle East &<br />

Africa at A10 Networks. He is a security and networking<br />

specialist having worked for tech powerhouses like STC,<br />

Mobily and Applied Technologies Company.<br />

Adil can be reached online at (abaghir@a10networks.com)<br />

and at our company website https://www.a10networks.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Build Your AI Incident Response Plan… Before It’s Too<br />

Late<br />

By Patrick Hall* and Andrew Burt**<br />

* Patrick Hall is principal scientist at bnh.ai, a boutique law firm focused on AI and analytics, and an<br />

adjunct professor in the Department of Decision Sciences at GWU.<br />

** Andrew Burt is managing partner at bnh.ai and chief legal officer at Immuta.<br />

Artificial intelligence can fail. It can also be attacked. When a failure or attack spins out of control, this is<br />

a major AI incident. There have been over 1,000 public reports of AI incidents in recent years. Yet many<br />

organizations are operating nascent AI efforts without incident response plans - using AI, in other words,<br />

without any clear understanding of what to do when it fails.<br />

Why? Organizations simply aren’t thinking about AI failures, they’re focused on AI successes instead.<br />

Indeed, there’s a great deal of hype on the positive side of this technology, and deservedly so. It can<br />

make and save money, and it can even be transformational. However, AI is probably more likely to fail<br />

than traditional enterprise software, at least as of today. It’s for this reason that some have called the<br />

technology the “high-interest credit card of technical debt.” Governments around the world are<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


increasingly interested in enforcing best practices for AI. And numerous damaging attacks against AI<br />

systems have already been published in machine learning and security research journals.<br />

Our bet is you’ll be hearing more about AI incidents in the coming years. Below, we’ll go over why AI is<br />

(and is not) different from more traditional software systems, some of the primary lessons we’ve learned<br />

writing AI incident response plans, and we’ll introduce the free and open bnh.ai Sample AI Incident<br />

Response Plan to help you make your organization better prepared for AI incidents.<br />

How AI Is (and Is Not) Different<br />

What’s so different about AI? Basically, it’s much more complex than traditional software, it has a nasty<br />

tendency to drift toward failure, and it’s often based on statistical modeling. What does that really mean?<br />

More complexity: For starters, AI systems can have millions or billions of rules or parameters that<br />

consider combinations of thousands of inputs to make a decision. That’s a lot to debug and it’s hard to<br />

tell if an AI system has been manipulated by an adversary.<br />

Drift toward failure: Most AI systems are trained on static snapshots of the world encapsulated in<br />

training datasets. And just in case you haven’t noticed, the world is not a particularly static place. As the<br />

world changes, the AI system’s understanding of reality becomes less and less valid, leading to degrading<br />

quality of decisions or predictions over time. This is known as “model decay” or “concept drift,” and it<br />

applies to nearly all current AI systems.<br />

Probabilistic outcomes: Most AI systems today are inherently probabilistic, which means that their<br />

decisions and predictions are guaranteed to be wrong at least some of the time. In standard software,<br />

wrong outcomes are bugs. In AI, they are features. This makes testing and establishing tolerances for<br />

failure more difficult.<br />

The combination of these three characteristics present a number of testing difficulties, potential attack<br />

surfaces and failure modes for AI-based systems that often are not present in more traditional software<br />

applications.<br />

If that’s what’s different, then what’s the same?<br />

In the end, AI is still just software. It’s not magically exempt from the bugs and attacks that plague other<br />

software, and it should be documented, tested, managed, and monitored just like any other valuable<br />

enterprise software asset. This means that AI incident response plans, and AI security plans more<br />

generally, needn’t reinvent the wheel. Frequently they can piggyback on existing plans and processes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What We Learned About AI Incident Response<br />

Drafting AI incident response plans has been eye-opening, even for us. In putting to paper for our<br />

customers all the various ways AI can fail and its many attack surfaces, we’ve learned several big<br />

lessons.<br />

Neither MRM Nor Conventional lR is Enough<br />

The basics of our AI incident response plans come from combining model risk management (MRM)<br />

practices, which have become fairly mature within the financial industry, with pre-existing computer<br />

incident response guidance and other information security best practices. MRM helps protect against AI<br />

failures. Conventional incident response provides a framework to prepare for AI attacks. These are both<br />

great starts, but as we detail below, a simple combination of both is still not quite right for AI incident<br />

response. This is why our Sample AI Incident Response plan includes guidance on both MRM and<br />

traditional computer incident response, plus plans to handle novel AI risks in the context of the burgeoning<br />

AI regulation landscape in the US.<br />

MRM practices, illustrated in, among other places, the Federal Reserve’s Supervisory Guidance on<br />

Model Risk Management, known as SR 11-7, are an excellent start for decreasing risk in AI. (In fact, if<br />

your organization is using AI and is not familiar with the SR 11-7 guidance, stop reading this article and<br />

start reading the guidance.) Broadly, MRM calls for testing of AI systems, management of AI systems<br />

with inventories and documentation, and careful monitoring of AI systems once they are deployed. MRM<br />

also relies on the concept of “effective challenge” - which consists of models and processes being<br />

questioned and reviewed by humans in multiple lines of technology, compliance, and audit functions.<br />

However, MRM practices do not specifically address AI security or incident response, and they often<br />

require resources not available to smaller organizations.<br />

We’ll address incident response for smaller organizations in the next section, but from an information<br />

security perspective, traditional incident response guidance is helpful - though not a perfect fit. For<br />

instance, AI attacks can occur without traditional routes of infiltration and exfiltration. They can manifest<br />

as high usage of prediction APIs, insider manipulation of AI training data or models, or as specialized<br />

trojans buried in complex third-party AI software or artifacts. Standard incident response guidance, say<br />

from SANS or NIST, will get you started in preparing for AI incidents, but they also weren’t specifically<br />

designed for newer attacks against AI and could leave your organization with AI security blindspots.<br />

When Going Fast and Breaking Things Goes Wrong<br />

MRM practices require serious resources: lots of people, time, and technology. Standard MRM may not<br />

be feasible for early-stage or small organizations under commercial pressure to “go fast and break<br />

things.” Common sense indicates that when going fast and breaking things, and without conventional<br />

MRM, AI incidents are even more likely. With AI incident response, smaller organizations without the<br />

capability for heavy-handed supervision on the build side of AI can spend limited resources in a manner<br />

that allows them to stay agile while also confronting the reality of AI incidents.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Attitude Adjustments<br />

There is a lot of hype surrounding AI and the profession of data science. This hype, coupled with lax<br />

regulatory oversight has led to a wild west of AI implementations that can favor the kitchen sink over the<br />

scientific method.<br />

A hype-driven sense of entitlement can sometimes lead to friction and resistance from front line AI<br />

practitioners. We’ve found that some practitioners are unwilling or unable to understand that, despite their<br />

best intentions, their AI systems can fail, discriminate, get hacked, or even worse. There’s not much to<br />

say about this except that it’s time for the commercial practice of AI to mature and accept that with<br />

increasing privilege comes increased responsibility. AI can, and is already starting to, causes serious<br />

harm. As of today, compliance, legal, security and risk functions in large organizations may have to make<br />

manual attitude adjustments, and insist that AI groups are subject to the same level of oversight as other<br />

IT groups, including incident response planning for AI attacks and failures.<br />

Don’t Deploy AI Without an Incident Response Plan<br />

The final takeaway? AI is not magic -- meaning organizations can and should govern it. If AI is the<br />

transformative technology it is hyped to be (and we do believe it is), then deploying AI with no incident<br />

response plans is a recipe for disaster. After all, we don’t fly commercial jetliners without detailed plans<br />

for systems failures; we don’t run nuclear reactors without emergency plans; if the activity is important to<br />

us, we think and plan in advance about its risks.<br />

And that means we also need to be prepared for AI to fail. Having an AI incident response plan in place<br />

can be the difference between an easily manageable deviation in AI system behavior and serious AIdriven<br />

harm and liabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Authors<br />

Andrew Burt is managing partner at bnh.ai, a boutique law firm focused<br />

on AI and analytics, and chief legal officer at Immuta. He is also a visiting<br />

fellow at Yale Law School's Information Society Project.<br />

Previously, Andrew was Special Advisor for Policy to the head of the FBI<br />

<strong>Cyber</strong> Division, where he served as lead author on the FBI’s after action<br />

report on the 2014 Sony data breach, in addition to serving as chief<br />

compliance and chief privacy officer for the division.<br />

A frequent speaker and writer, Andrew has published articles on law and<br />

technology for the New York Times, the Financial Times and Harvard<br />

Business Review, where he is a regular contributor. He holds a JD from<br />

Yale Law School.<br />

Patrick Hall is principal scientist at bnh.ai, a boutique law firm<br />

focused on AI and analytics. Patrick also serves as an advisor to<br />

H2O.ai and as an adjunct professor in the Department of Decision<br />

Sciences at The George Washington University.<br />

Before co-founding bnh.ai, Patrick led H2O.ai's efforts in<br />

responsible AI, resulting in one of the world's first widely deployed<br />

commercial solutions for explainable and fair machine learning. He<br />

also held global customer-facing roles and R&D research roles at<br />

SAS Institute. Patrick studied computational chemistry at the<br />

University of Illinois before graduating from the Institute for<br />

Advanced Analytics at North Carolina State University.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Academic Openness and A Rise in Online Classes<br />

Should Invoke A Renewed Focus on Security<br />

By Anthony Bettini, CTO, WhiteHat Security<br />

For decades, researchers and students from around the world have come to study and collaborate,<br />

research and innovate at American universities and colleges under the auspices of academic openness<br />

at our schools. Unfortunately, that academic openness has resulted in universities and colleges becoming<br />

attractive targets for nation-state hackers, cybercriminals, and reportedly, espionage operations. Part of<br />

the reason for this could be because these institutions possess massive amounts of valuable data, as<br />

well as vital information pertaining to government projects and research, personal data of students and<br />

professors, financial and health information and much more.<br />

While higher education has been gradually increasing the number of online classes, the recent global<br />

pandemic has accelerated the process dramatically. Now, universities and colleges have had to quickly<br />

procure or build additional applications to accommodate distance learning and deliver to their students<br />

the same quality educational experiences they would have previously had on campus and in person. The<br />

emergency transition to online classes for students this past spring and the uncertainty for the upcoming<br />

fall adds to risks for security vulnerabilities and compounds the stress for IT administrators, who are<br />

responsible for safeguarding staff and student privacy.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In fact, New York City-based security analytics firm Security Scorecard ranked education last among 17<br />

major industries for cybersecurity preparedness. This lack of vigilance is further illustrated by the<br />

increasing number of cybersecurity-related incidents at higher education schools in recent years. For<br />

example, Harvard University, Stanford University, University of Connecticut, Oregon State University and<br />

many others are reported to have all experienced security breaches of varying degrees.<br />

Make Application Security a Priority<br />

One of the first and easiest steps to ensuring that security remains a priority, either on or off campus, is<br />

to focus on application security.<br />

For some time now, universities and colleges have used software applications in the classroom and<br />

throughout the campus experience to aid students, professors, researchers and visitors in their work.<br />

However, the current global health concerns have forced many schools to re-examine remote education<br />

tools and implement new applications, to augment distance learning capabilities amid uncertainty. This<br />

is especially true for schools that plan for classes to remain online-only in the fall. Under the high-pressure<br />

circumstances of managing expectations for professors, students and even parents, it might be easy to<br />

overlook proper security protocols in the technology, when preparing for a non-typical college experience.<br />

There are several causes of this security oversight, and not all of the responsibility falls on the universities.<br />

Sometimes, software vendors cut corners in the software development process, and that can result in<br />

vulnerabilities that are easy for hackers to exploit within applications.<br />

Applications Need Rigorous Testing Before Deployment<br />

Most higher education institutions rely on a mix of in-house and third-party applications for instruction<br />

including Blackboard, Canvas and others. Regardless of where or from whom the applications are<br />

sourced, they must be rigorously tested for vulnerabilities and exploits before they are deployed for use<br />

at the university.<br />

To know if an application has been properly tested and secured, university IT teams should thoroughly<br />

research the products the universities are considering for use and understand the apps as much as<br />

possible. If they are confident in the development process used and are assured that appropriate testing<br />

and scanning was completed with dynamic application security testing (DAST), static application security<br />

testing (SAST), and software composition analysis (SCA), that is a step in a positive direction. Any failure<br />

to properly test and secure applications will undoubtedly leave students, professors, administration and<br />

university property vulnerable to exploits and hackers.<br />

Security Training for Students<br />

Another priority to securing a university or college is educating the students and faculty about common<br />

practices used to launch cyberattacks on applications and campus networks. These include phishing<br />

attacks, human error, and techniques like formjacking. Most, if not all schools, offer an orientation for new<br />

students, and an orientation session just might be a perfect opportunity to highlight cybersecurity risks<br />

and help students to understand how to safeguard themselves and their personal data from any attempts<br />

by malicious actors to gain unauthorized access to campus applications.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Of course, it is always a good idea to remind returning students of the practical security measures to<br />

protect themselves. To be sure all students are helping to prevent data exposure or cyberattacks, these<br />

reminders can be given via an informative video shown during class, or perhaps as a required gate for<br />

the class registration process.<br />

Share the Responsibility of Security<br />

No matter the circumstance, application security must not take a backseat when developing applications<br />

for use in higher education systems. Similar to the concerns for K-12, higher education institutions must<br />

share the responsibility for security in the applications they use. This means investing time and resources<br />

into ensuring that the tools, software programs and applications are safe and secure, and free of known<br />

vulnerabilities and exploits.<br />

About the Author<br />

Anthony Bettini is the CTO for WhiteHat Security, the leader in<br />

application security, enabling businesses to protect critical data,<br />

ensure compliance, and manage risk. Previously, Anthony ran Tenable<br />

Research where he joined via Tenable’s acquisition of FlawCheck – a<br />

leading container security startup where he served as the CEO &<br />

founder. Before its acquisition by Symantec, Anthony was CEO &<br />

founder of Appthority, a leading mobile security startup and winner of<br />

the “Most Innovative Company of the Year” award at the RSA<br />

Conference.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is API Usage Putting Your Organization Out of<br />

Compliance?<br />

By Matt Keil, Director of Product Marketing, Cequence Security<br />

APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data<br />

exchange between applications, infrastructure, and IoT devices. The recent explosion in cloud usage and<br />

the urgency around digital transformation and creation of mobile apps has caused a steep increase in<br />

the dependence of APIs as a way to speed and simplify development efforts. Today, most organizations<br />

expose multiple APIs to customers and partners, published from different product teams, different<br />

application stacks, and following various DevOps and security procedures, oftentimes, without consistent<br />

security or compliance oversight. According to Gartner, by 2021, 90% of web-enabled applications will<br />

have more surface area for attack in the form of exposed APIs rather than the UI, up from 40% in 2019.<br />

When secured, APIs are a smart way to interconnect endpoints and systems to transmit data and deliver<br />

critical features and functionality. But, when published outside of your normal process (if you have one),<br />

and left unprotected or misconfigured, they give hackers easy access to large volumes of data, and make<br />

it easier to commit fraud and expose private data by automating actions normally done by humans<br />

through web forms. In the end, the API provides the same benefits – ease of use, efficiency and flexibility<br />

– to both developers and bad actors.<br />

It’s important that compliance, privacy, and risk professionals dig deeper to understand the usage of APIs<br />

across the organization, and gain insight into the vulnerabilities that exist so that risk can be measured<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and mitigated. Unfortunately, the fragmented API management space, along with an increase in<br />

decentralized development, has created a situation where most enterprises lack even the most basic<br />

understanding of their API landscape. According to Aite Group, the organizations have an average of<br />

620 APIs – do you know where they all are, who owns them and what they do?<br />

Gaining visibility into your API footprint in the form of inventory, usage, potential vulnerabilities and<br />

specification conformance is vitally important to understand the overall exposure and compliance impact<br />

created by APIs in use. Some questions that every organization should be able to answer (but rarely can)<br />

include the following:<br />

• How many APIs do we have? What applications are these APIs used by or associated with?<br />

• How many were sanctioned by security and how many are “shadow” or unknown APIs?<br />

• Are they all necessary for operations or were deployed inadvertently or forgotten about after they<br />

were no longer necessary?<br />

• Which ones are not actively managed or monitored? Do they have traffic? Is the traffic expected,<br />

or do patterns suggest misuse?<br />

• How many APIs have vulnerabilities or don’t conform to approved API specifications? Do we have<br />

any hidden API headers, parameters or response codes?<br />

• Is there PII or sensitive data being transmitted through APIs unencrypted? Is access regulated<br />

data limited in a way that will keep us in compliance?<br />

Unfortunately, too many organizations get answers to these questions the hard way – when they are<br />

breached. For example, an API might expose too much information when a request is made providing<br />

attackers with insights, they can use to further breach a system. Or, an API might completely lack proper<br />

access authentication or inadvertently grant users with elevated privileges (like giving them Admin rights)<br />

which could be used to exfiltrate or change the data.<br />

"The hallmark of cyber attackers is they are always searching for a path of least resistance. The<br />

expanding use of public facing APIs, especially those that are unknown, coupled with the lack of security<br />

associated with those APIs make them a prime target," says Charles Kolodgy, Principal at Security<br />

Mindsets LLC. "It is important for organizations to know what APIs are used by the website, especially<br />

shadow APIs, in order to secure them thus making it more difficult for cyber criminals to achieve their end<br />

goal."<br />

While there are security tools that address some aspects of API security, this problem of visibility needs<br />

to be solved.<br />

“If your organization delivers APIs to external parties, such as your customers or partners, you need a<br />

centralized place to help monitor the security posture and compliance of all your published APIs, detect<br />

any risks immediately, and respond proactively to mitigate risks of data exfiltration,” says Subbu Iyer, VP<br />

of product for Cequence Security. “The first step in developing a mature API security and compliance<br />

program is to discover all the APIs your organization delivers to external parties and analyze their risk<br />

postures.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Matt Keil, Director of Product Marketing, Cequence Security<br />

Matt Keil joined Cequence Security in April of 2019 as a member of<br />

the product marketing team, driving product related messaging and<br />

outbound content creation. Prior to joining Cequence Security, Mr.<br />

Keil worked at Palo Alto Networks for 12 years, where he was part<br />

of the team that launched the company and his most current role<br />

was Director of Product Marketing for Public Cloud. Cumulatively,<br />

Mr. Keil has 18 years of experience in the enterprise network<br />

security market, working for Check Point Software,<br />

NetScreen/Juniper Networks, then Palo Alto Networks and Now<br />

Cequence Security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


HIPAA Compliance and The Protection of <strong>Cyber</strong> Security<br />

By Andrew Mikhailov, CTO at Zfort Group<br />

Businesses face the risk of severe cyber-attacks - the present-day cyberspace criminals are wellorganized,<br />

thoughtful, and marketable. And one of the most sensitive sectors exposed to privacy<br />

risk is the healthcare system. If hackers manage to get in, they would have access to patient health<br />

data, which they could sell to global entities with evil intentions.<br />

About 15% of all data breaches in 2019 involved the healthcare system. As a result, the estimated losses<br />

for this industry in 2019 reached $25 billion. "Over the last three years, the number of breaches, lost<br />

medical records, and settlements of fines is staggering. During this span, nearly 140 million<br />

medical records were involved in a privacy breach", - writes Eric Thompson, a cyber security leader<br />

in his book.<br />

In 2019, an Israeli cyber security center found a computer virus that added tumors into MRI and CT<br />

scans. This malware could also remove actual malignant growths from image files to prevent patients<br />

from getting the care they need. The researchers showed the safety holes to sow doubt about the<br />

health of government figures, commit insurance fraud, or be part of a terrorist attack.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In this situation, basic security tools such as antivirus or firewalls are no longer making the cut.<br />

Healthcare information security obeys data protection laws, particularly the Health Insurance Portability<br />

and Accountability Act (HIPAA) applies in the US.<br />

If a data breach occurs, HIPAA regulation presupposes financial and criminal penalties. HIPAA<br />

outlines requirements to keep the personal health information of clients and patients safe.<br />

What Does HIPAA Protect?<br />

An average incident costs a company about $6.45 million. Thus, organizations should consider both<br />

whether they are compliant and whether all the risks are considered. Generally speaking, HIPAA restricts<br />

uses and disclosures to healthcare operations, the provision of treatment, or payment for healthcare<br />

unless the patient agreed to provide information to a third party, and HIPAA gave authorization.<br />

HIPAA Security Rule ensures the confidentiality, integrity, and availability of health information. Its<br />

Privacy Rule directs the uses and disclosures of health information (the HIPAA Privacy Rule). Thus, these<br />

elements help Covered Entities and their Business Associates to protect Electronic Protected Health<br />

Information (ePHI). The US Department of Health and Human Services (HHS) outlines who HIPAA refers<br />

to in its definition of a Covered Entity.<br />

The HHS Office For Civil Rights (OCR) manages HIPAA. They conduct audits to ensure compliance with<br />

the Covered Entities and businesses that control medical data. HIPAA audits are conducted to track<br />

progress on compliance and to identify areas to improve.<br />

These protected records include diagnoses, treatment information, test results, medications, health<br />

insurance ID numbers, and other identifiers. HIPAA also covers contact information, including phone<br />

numbers, addresses, email addresses, birthdates, and demographic information. So, while the OCR<br />

prepares for the next HIPAA audits, businesses ought to make sure they are ready.<br />

Why HIPAA Needs <strong>Cyber</strong> Security?<br />

HIPAA Security Rule specifies that Covered Entities need to establish and maintain protections for ePHI.<br />

Moreover, protection must defend the organization against breach through any physical, administrative,<br />

and technical means. The rule mandates that HIPAA-compliant organizations:<br />

● All the health data sent, stores, received, or produced has strong confidentiality. It means that it<br />

can be available only to authorized people to access, change, or remove it. The data should also<br />

be always available for authorized individuals.<br />

● Threats to data integrity or security should be predicted whenever possible. Organizations should<br />

defend against any information disclosure or use not allowed by HIPAA.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


● Verifying that the workforce complies with this law is also a business's responsibility.<br />

Under this regulation, companies will need to implement technical and procedural checks to protect this<br />

information and perform risk analysis on risk and vulnerabilities to the confidentiality, integrity, and<br />

availability of ePHI. Technical controls include such things as encryption, authentication, password<br />

complexity, access auditing, and segmentation. Procedural controls normally include password<br />

policies, incident response plans, contingency plans, and audit procedures.<br />

Nowadays, healthcare information is part of the Big Data revolution and exists in a range of different<br />

digital ecosystems. In the healthcare industry, patients use wearables and implantable IoT medical<br />

devices such as heart monitors and pacemakers. With all these items now connected to the Internet, the<br />

data gets exposed to cyberattacks.<br />

With the number of IoT devices increasing every year, most of them do not have endpoint security. That<br />

being said, it is vital to have a plan to protect your company's HIPAA data. One of the major security<br />

issues is how the device collects the information and then transmits it to the hospital. From an ePHI and<br />

HIPAA compliance viewpoint, this is a risk your business must understand and develop a protection<br />

strategy.<br />

As we can see, cyber security and HIPAA compliance are strongly connected. Unfortunately, being<br />

HIPAA compliant does not make your organization safe from cybercriminals. At the same time,<br />

having a robust cyber security program does not make you HIPAA compliant as well. Your business<br />

needs a comprehensive HIPAA compliance and security provider to guarantee your patients' data's<br />

genuine security.<br />

The industry should develop a holistic strategy for healthcare security, including administrative, physical,<br />

and technical safeguards.<br />

Strategies for Improving <strong>Cyber</strong> Security<br />

HIPAA rules are not enough to resist cybercrime. Looking at precisely what this law requires, it doesn't<br />

necessarily align with cyber security best practices. Besides, healthcare organizations shouldn't see<br />

cyber security and HIPAA compliance as separate components, but rather as two concepts working<br />

parallel to one another. In fact, a robust cyber security program supports compliance.<br />

To ensure cyber security in healthcare and prevent sophisticated attacks, healthcare organizations can<br />

implement the following practices:<br />

1. Review your current security risk analyses and identify gaps and areas for improvement. Check that<br />

risk analysis is documented to guarantee regulatory compliance, enhancing the risk analysis's attorneyclient<br />

privilege.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Assess risk management plans to make sure that measures to reduce vulnerabilities identified. Adopt<br />

the best practices used in healthcare. It’s a must to use unique IDs, strong passwords, role-based<br />

permissions, auto time-out and screen lock.<br />

3. Compare HIPAA and other cyber-related policies and procedures against legal and regulatory<br />

obligations, and ensure they are updated based on the results of your most recent risk analysis.<br />

4. Expect the unexpected. Prepare safety incident response plans that meet HIPAA requirements and<br />

other applicable laws for your business to be ready to respond to a possible data breach. Besides, leave<br />

some room in your strategy for the unexpected. This could include everything from hacker attacks to<br />

natural disasters, threatening your healthcare records, and other vital assets.<br />

5. Create backups and develop a recovery plan. While creating backups seems like a common-sense<br />

thing, it can be missed in a small practice environment. Ensure that the medium used to store your backup<br />

data is safe and cannot be wiped out by an attack that would take down your office systems.<br />

6. Make additional investments in people, processes, technology, and management. Defending digital<br />

assets can no longer be delegated solely to the IT staff. Instead, security planning needs to be blended<br />

into new product and service, security, development plans, and business initiatives.<br />

You can't afford to neglect cyber security or compliance. That is why it is critical to match them together<br />

in a secure network that protects your patients and your reputation.<br />

About the Author<br />

From 2017 as a CTO at Zfort Group, Andrew Mikhailov concentrates on<br />

growing the company into the areas of modern technologies like Artificial<br />

Intelligence, BigData, and IoT. Being a CTO, Andrew doesn’t give up<br />

programming himself because it is critical for some of the projects Andrew<br />

curates as a CTO.<br />

Andrew LinkedIn: https://www.linkedin.com/in/andrew-mikhailov-<br />

66571912/<br />

Contact Andrew: andrei.michaiolov@gmail.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Smart Gadgets in Proving Workplace Violence<br />

By Milica D. Djekic<br />

The violence at the workplace could start as the common insult, continue as the verbal abuse and end<br />

up as the mobbing attack that could get correlated with any way of the psychological assault. In other<br />

words, it’s quite obvious why any kind of the workplace violence should go under the Criminal Code and<br />

why the cases of any sort of the mobbing are treated as the crime. The point is anyone breaching the<br />

behavioral codex at the work should get reported to the authorities as they could use such information to<br />

run the investigation. In the business surrounding, there is no place for the personal level as there are<br />

the recommended methods of dealing with the co-workers. Also, any kind of abusive and rude behavior<br />

should get stated to the manager as he would find the way to resolve such an incidental situation. The<br />

well-developed organizations should get adopted the best practice how to tackle such a concern and in<br />

so many cases the abusive employees could get suspended from the work or even fired with the<br />

complaint to the Police as they would deeply break the law and put anyone under the stressful condition.<br />

The stress is the huge disadvantage to anyone and the person coping with such a state could suffer the<br />

real traumatic syndromes. In addition, there are a plenty of sensitive working groups including the persons<br />

with disability or any kind of disorder that should get handled carefully as they could get deeply affected<br />

with any kind of the violent behavior. According to the United Nations conventions these people need the<br />

extra care and any employer getting those guys in its team is the equal opportunity employment provider<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and it would go under the entire procedure of benefits and appreciations giving the chance to such hard<br />

working individuals to contribute.<br />

On the other hand, it could be quite difficult managing the person with the inappropriate vocabulary, poor<br />

manners and any lack of the good family education and does not matter how those persons being<br />

effective at the work or not – they should learn their behavior is adequate for the street, not the office.<br />

The office is not the place for the unkind persons as everyone in the business is overloaded enough with<br />

his tasks and schedules, so what the people need the most is the support and fair treatment. Anyone<br />

being exposed to the workplace violence is the victim of the crime and no intelligent employer would<br />

tolerate such a behavior. Why? If you support someone being so aggressive about the other people<br />

mostly for his intent to obtain some of his commonly unrealistic ambitions and prove some sort of the<br />

professionalism – you are doing so wrong. There are the ways to investigate and prove the violence at<br />

the work and anyone encouraging such an atmosphere at the workplace is committing the crime as well.<br />

Sometimes the employee being the victim of the mobbing would complain to the manager seeking from<br />

him to resolve such an incident and the manager would show the insufficient skill to deal with such a<br />

situation, so probably being driven with some irrationalities he would just fire the person who reported<br />

the abusive behavior at the workplace. In other words, it’s not professional at all getting no business<br />

manners and being so subjective about everyone. The victim of the mobbing needs support as everyone<br />

deserves the respect and even if there are no well-developed procedures and policies in the organization<br />

how to tackle such a concern – the employer should know that it must discourage such a tendency.<br />

The business arena is like the other sport courts – it’s not enough to deal with the skill only, you need to<br />

cope with the fair play and meet so strict requirements and rules. If you are abusive in any sport and that<br />

can happen especially if you lose your tamper – you would definitely suffer some restrictions suggesting<br />

you that the sport’s battlefield is not the place to heal your deep frustrations on anyone and anything. The<br />

similar situation is with the business! It’s not sufficient to get competitive only – you need to operate<br />

according to the law; otherwise, you are not legally acceptable at all. No legal business would need the<br />

troubling staffs at most and if anyone tolerates such a condition in his office that person is equally guilty<br />

as anyone committing the crime over his co-workers. Simply, it’s not about the unhealthy relations at the<br />

work – it’s about the criminal justice case. The rules are rules and no one could avoid them, so it’s clear<br />

that any kind of the violent behavior at the work could pull with itself some legal sanctions. It’s quite<br />

difficult working in the office with so disturbed working correlations and anyone belonging to the sensitive<br />

group of the people could develop some sort of the shock or the real trauma that could get confirmed<br />

through the medical examinations. So, if you do not want to pay a lot for your lack of ethics about your<br />

staffs – you should develop the good behavioral codex that would cope with all possible legal frameworks<br />

and regulations, so far.<br />

The fact is we live at the quite fast pace and the people could get anxious for so many reasons.<br />

Apparently, that’s not the reason to take all your private frustrations with yourself and embarrass the other<br />

people with all of those. If you feel the stress about anything in your life – just attend your doctor and he<br />

would prescribe you the adequate remedies on. For instance, in the developed countries – the autism is<br />

so treatable condition and any kid suffering from so would never get left without any social care and<br />

attention. In other words, there are a plenty of programs supporting such a sensitive group of the people.<br />

In our opinion, the reason why so many people would break the law in the working environment is that<br />

they would suffer some kind of the psychological concern. Maybe they would get stressed, worried or<br />

scared about something, so they would not choose to look for the healthcare support – but they would<br />

rather express themselves as troubling and deal in the quite uncivilized and impatient manners putting<br />

their everything on the risk. It’s the 21 st century and it’s not the shame seeking the medical advice or<br />

attending your healthcare professional for any reason. Anyone with the modern beliefs should understand<br />

so!<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Through this effort, we would try to discuss the need of smart gadgets in proving the violence in the<br />

workplace. At this stage, it’s quite clear that there are the methodologies and steps to evident that sort of<br />

the crime, but the point is if the recordings of the smart gadgets regarding some incidental situations<br />

could get approved as the valid clues in the criminal justice case – that could open up nearly limitless<br />

options to those gadgets manufacturers to get the bigger marketplace for their solutions that could get in<br />

need for many people. In other words, if you get the permission to record some condition and if such a<br />

recording is the valid proof, the number of your customers would increase as those products could be<br />

trusted by the authorities. At this moment, there are so many companies worldwide that can make the<br />

wide spectrum of the smart gadgets for practically any usage and the majority of those products are<br />

attested which guarantees they would work accurately, but if someone makes the legal regulations<br />

suggesting their footage could serve in the criminal justice case under the defined conditions – it’s clear<br />

that so many people could buy those gadgets in order to prevent or prove something getting deeply<br />

illegal.<br />

In other words, this effort is all about the proposed business ideas and some explanations how the good<br />

business plan could cope with the marketplace demands. Also, it’s the suggestion to many governments<br />

across the globe how to leverage their economies putting into their laws and frameworks the outputs of<br />

the emerging technologies as stuffs that could find their applications even under the Criminal Code, so<br />

far.<br />

Assumption #1. The workplace violence could be a consequence of the stress.<br />

Explanation #1. Getting at the work day by day and coping with no break could be quite annoying.<br />

Apparently, there are some lunch pauses, but sooner or later you would get aware that you are beginning<br />

preoccupied with your daily schedule. For such a reason, it’s recommended by the medical experts to<br />

make at least a half of hour break per a working day. Would this support you remaining fresh through the<br />

entire working week? Probably yes, but many people would need some holiday time to recover from the<br />

heavy tasks and renew their energy resources. The fact is so many professions cannot offer to their staffs<br />

to take that long leave and those employees could count on the several days off per a year. The fact is<br />

in so many cases those hard working persons would not get even the weekend off. Many would say they<br />

would be in the shape to work that hard, but sooner or later they would deal with the deeply accumulated<br />

stress. For such a reason, it’s recommended to keep your professional manners and try to avoid any sort<br />

of bullying at the work. Why? You do not need anyone to provoke you as you do not need to provoke<br />

anyone as that person can get back to you. In the both cases, the conflicting situation is unavoidable and<br />

even if you are trying to appear as perfect someone could try to challenge your perfection targeting your<br />

psyche being oversaturated with the stress and if you make an incident you would need to provide so<br />

many explanations before you return things into balance. So, if anyone chooses the workplace violence<br />

as the response to the stress in the workplace it’s clear that’s the result of overtiredness, shocking events<br />

and a lot of struggling with the schedules and deadlines. The good manager should take all these into<br />

consideration as he would be responsible for his employees’ wellbeing. The fact is so many outsourcing<br />

businesses would choose the less developed parts of the world to run the business as the workforce<br />

would be cheap, but suitable – so the profits getting available from there would be so high. Any business<br />

is about the risk and if the government of some developing economy attracts the investors to make a<br />

factory in their country they should know there would be a plenty of challenges to get managed for a<br />

reason those communities could be the sources of some kind of instability. The smart investors would<br />

take everything into account and as they would cope with the paid intelligence on a daily basis they would<br />

figure out if it is worth that to take such a risk on. Any profit maker would want to get the highest possible<br />

incomes from his activities counting on the lowest feasible expanses, so far. For such a reason, those<br />

clever guys would offer the minimal salary to their staffs in order to reduce that sort of the cost. The<br />

people must feed their families from those wedges and on the other hand, their employers would seek<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the maximal level of the professionalism, productivity and effectiveness in return. In the case of the<br />

outsourcing business, it would appear someone would exploit someone. Also, the situation in the<br />

developed countries is not far more different as any capitalist would want to take advantage on the<br />

marketplace and his key players would get satisfied with their incomes, but they would need to push hard<br />

and hard as well as offer the new and innovative solutions and approaches pulling the entire company<br />

ahead. In other words, those guys are not the part of the assembly business as the case is with the<br />

developing societies. They are someone who would be with the brain and who would need to create the<br />

ingenious ideas on. Does not matter if you would work for the normative or the new business strategy<br />

sooner or later you would figure out that the stress is something that can distract you from being wellproductive<br />

and well-creative. In other words, if you are overloaded day by day even the good intended<br />

suggestion from your co-worker could make you attempt the workplace violence and once that happens<br />

you would be in the trouble. Basically, it’s up to your manger how hard you would need to work. Anyone<br />

making the profit would want your maximal effort for the minimal time and if you can provide the<br />

encouraging results within so short deadlines you would get the compliments that you are competitive. If<br />

not, the people would just say thank you for everything! That’s quite stressful, right?<br />

Assumption #2. Employees with the medical condition could be more sensitive to stress.<br />

Explanation #2. If you hire a person with disability or another medical condition, you should be extremely<br />

careful how you would mange that staff. Those persons could be partially dysfunctional about some sorts<br />

of the tasks, but if managed skillfully they can give their maximum with something. The disability could<br />

be mental, physical, sensing or the other and even if you want to hire the totally blind person you should<br />

know that individual can contribute as well and get some kind of personal satisfaction for getting the<br />

chance to work. There are a lot of blind people who would deliver the online classes in the foreign<br />

language. Maybe they would not see well enough, but they would hear exceptionally and adopt some<br />

skills using their bright minds. It’s not always pushing the poor people aside and making them get<br />

marginalized. It’s about giving them opportunity to work and feed their kids. So, if you want to hire the<br />

person with the special condition, you need to provide him the special circumstances. Many people would<br />

believe that cyber defense area is only for the highly skillful persons. We would disagree with so! Even<br />

someone with the mental or physical disadvantage could become the IT security professional, but that<br />

person should not get discriminated at the beginning. There are so many talented people who cannot<br />

hear or walk, but they can sit in front of the screen and create so amazing software solutions being<br />

competitive even for the highest standard IT industries. The fact is those guys are so sensitive to the<br />

stress and it needs the skill to manage them. Remember the Rain Man and the guy with the autism who<br />

got the genius mind. That’s what we talk about! Just try to figure out what could happen if anyone wanted<br />

to discriminate that person. The situation in the developing world in such a sense is hard. There are still<br />

a lot of unresolved concerns about the support and opportunities those folks get from their communities.<br />

Practically, there are some legal regulations, but they are not strictly followed and someone who could<br />

contribute in some manner would stay without the chance to even attempt to do so. On the other hand,<br />

the developed societies would show some care about those guys and they would create them the<br />

conditions to work and progress in their occupation. So surprisingly, some companies from the developed<br />

economies that would run the outsourcing business would choose to remain blind in front of those<br />

people’s needs probably for the reason their local sources would suggest them it’s better to pay some<br />

penalties to the government than to hire the person with disability. Would there be the difference between<br />

the guy with disability in the developed and developing economy? Basically, no! So, the only reasons<br />

why some respectful companies would not treat those people equally as they would do in their counties<br />

are so irrational stories from their outsourcing managers who would not cope with the skill to handle those<br />

hard working individuals. Luckily, the rational part of the human kind would not discriminate anyone and<br />

that’s why we have the Paralympics Games every single season across the globe. If the business is only<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


who would take advantage over whom a lot of brilliant people would miss the chance to make something<br />

out of their lives. No one can succeed on his own and indeed, there is the need for support and<br />

encouragement from the entire community. The nations that would help their people make a progress<br />

would be the nations of successful people, while the small nations would look for the chance to revenge<br />

leading themselves to suffering and nothing else. In other words, go beyond your limits and think big no<br />

matter how poor your conditions are.<br />

Assumption #3. The stress management techniques could reduce the violence at work.<br />

Explanation #3. The people under the stressful condition could develop some kind of anxiety, tension or<br />

fear about what is going on around them. That sort of negative emotion could sabotage their efforts to be<br />

productive and effective at the workplace. Also, they can react so aggressively if anyone says anything<br />

because they are overloaded with their obligations. In addition, the people can express the violence for<br />

working hard and making some kind of the flaw that could go under the self-criticism or the criticism of<br />

their surroundings. Simply, they are a lot of reasons why someone can feel the pressure and give so<br />

assaultive response to that condition. The experience in criminology would suggest that so many violent<br />

offenders have been the victims of mobbing in some period of their lives. So, if someone is under the<br />

pressure chronically that person can develop resilience or respond with the dose of despite and probably<br />

some kind of the violence. The good manager should understand the limits as well as the strong and<br />

weak sides of his team and so skillfully manage all of them on. If the conflict occurs, the team leader<br />

should know how to put it under the control and following the procedures so carefully investigate what<br />

have happened for real. It’s not only about collecting the claims through the catch up interview; it’s more<br />

about coping with the best practice how the inconvenient situation could get resolved peacefully. Any<br />

competitive organization should deal with such a level of the development and also, it’s necessary to<br />

organize some sort of the stress management workshops for your employees as they could get the free<br />

advice and instruction how to reduce their amount of the stress. It’s also about the level of trust and<br />

confidence the employees have about each other as sometimes there is the need to openly talk about<br />

your concerns without any fear that you would get put under the wrong and misunderstanding<br />

interpretation. In other words, the co-workers should see each other as support, not the competitors as<br />

they work united like a team in order to beat the competition on the marketplace for their employer. Every<br />

good manager should know that and if anyone complains to him that person should receive the support<br />

to overcome such a situation. The point is being assertive, not revenging! If you maintain that “I win –<br />

You win” attitude you would easily figure out it’s all about solidarity and team effort that can make<br />

everyone succeeds. The main trick is anyone with the bad manners would take the criticism so personally<br />

and that person could try to do some kind of bullying once she got reported to her principles. The<br />

employees could warn about someone’s inappropriate behavior and it’s not always about the reward and<br />

punishment – it’s about teaching the staffs how to work as the one. The fact is the stress management<br />

training could be so expansive and the employer that wants to reduce his costs would not pay even a<br />

cent for that, in his opinion, unnecessary stuff. That’s the quite wrong decision for a reason those sorts<br />

of things could serve as the good preventive measure in avoiding the violence at the workplace.<br />

Apparently, the good employer should get developed the adequate procedures, policies and best<br />

practices for tackling that spectrum of situations. Any kind of the mobbing is something that goes under<br />

the Criminal Code and anyone who wants to remain within the legal constrains would try to prevent that<br />

sort of behavior amongst his organization. So, the stress management techniques could reduce the<br />

workplace violence and it’s not wasting of anything protecting your own interests investing into that sort<br />

of prevention, so far.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Assumption #4. Smart gadgets could serve in monitoring a condition of the organism.<br />

Explanation #4. The stress is the natural follower of any organism’s activity and according to some<br />

studies there is the certain amount of the stress the body can handle. Anything above that could be<br />

disadvantaging to the health and cause some acute or chronical medical conditions. So, if it’s defined by<br />

some medical research studies which level of the stress can impact our health and how long it’s<br />

necessary to get under that condition in order to develop some symptoms – it’s quite clear that anyone<br />

or anything throwing us through such a drawback could deal with some kind of guiltiness or crime’s<br />

responsibility. In other words, if your boss is doing the mobbing about you every single day and if you<br />

can notice through your smart hand-wear that your heart rate is increasing then and especially if that is<br />

happening day by day – you can say that such a guy is directly responsible for your cardiovascular<br />

disorder. So, if your smart watch is telling you your body is in the concerning condition and if such a<br />

product has passed through the laboratory testing and validation, so it got the approval it works accurately<br />

– it’s obvious that the recordings of that gadget can serve as something for proving something else being<br />

under the criminal justice. The point is if the law makers would create the law suggesting that those<br />

footages could get used as the valid evidence in the case for proving someone guiltiness in causing the<br />

stressful condition and directly affecting someone’s wellbeing that could mean anyone getting the<br />

capacity to manufacture those devices could sell them on the marketplace for a reason the people would<br />

buy them in order to assure the liability of their claims in front of the authorities. So, if your blood pressure<br />

is going up and your heart rate is getting arrhythmic because of someone’s violence in the workplace<br />

there are the ways to prove that condition and leave the minimal space to the suspect to bend the truth<br />

on the court. On the other hand, the law makers could make a decision to put something like so into the<br />

legal framework because of the interests of their economies that could progress taking advantage over<br />

that sort of the business. It’s all about the business and in so many times it’s not enough to tell your story<br />

to your doctor in order to prove something. Apparently, there are so many approved methods in colleting<br />

the evidence, but once you get in position to deal with something such a rigid and touchable no one could<br />

try to avoid the responsibility. The stress is so unhealthy and only very few people would welcome so<br />

and, in other words, it would harm anyone’s organism and anyone causing the harm is committing the<br />

crime, right? For such a reason the mobbing is seen as the crime in so many countries across the world.<br />

In addition, if you cope with your passively aggressive co-worker who would give you some sort of the<br />

psychological pressure and violence, you can easily suggest him that your smart gadget can record how<br />

you feel about him and once that recording gets the valid evidence on the court that aggressive person<br />

get count on the punishment only. At this stage, the medical forensic investigators could count on the<br />

approved procedures on statements gathering as well as expert’s estimation of the made disadvantages.<br />

On the other hand, if you have reported the incident to the authorities and if even them can catch the<br />

internet signal from your smart gadget – it’s obvious how the case could get its strength in front the public.<br />

The good thing about the smart devices is that they got assigned their IP address and apparently, that’s<br />

the security concern, but also so convenient channel to the investigation to trace what such a gadget can<br />

sense or measure. What’s needed is to approve that methodology in the legal fashion as well as provide<br />

the devices’ manufacturers to obtain the right to produce the solutions that could serve as the evidence<br />

collectors.<br />

Comments<br />

In this effort, we would provide a deep insight into the certain topic in order to explain some of its<br />

perspectives in more details. In our opinion, such a review could get used as the starting point to the<br />

development of some security and safety procedures and policies. Also, it could help to the law<br />

enforcement and intelligence agencies to navigate some investigative process as well as create the law<br />

enforcement and intelligence knowledge bases. Next, this effort could support the forensic detectives<br />

and investigators in their need to clarify some aspects of their work. In addition, those could be the helpful<br />

updates to the law makers to cover on and respond to all the security challenges through the appropriate<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


legal frameworks and regulations. In our belief, some suggestions to the best practice in the criminal<br />

justice environment have been made as well. Finally, this review would cope with some business ideas<br />

and it could serve as the encouragement to an emerging marketplace economy, so far.<br />

About the Author<br />

Milica D. Djekic is an Independent Researcher from Subotica,<br />

Republic of Serbia. She received her engineering background from the<br />

Faculty of Mechanical Engineering, University of Belgrade. She writes<br />

for some domestic and overseas presses and she is also the author of<br />

the book “The Internet of Things: Concept, Applications and Security”<br />

being published in 2017 with the Lambert Academic Publishing. Milica<br />

is also a speaker with the BrightTALK expert’s channel. She is the<br />

member of an ASIS International since 2017 and contributor to the<br />

Australian <strong>Cyber</strong> Security Magazine since 2018. Milica's research<br />

efforts are recognized with Computer Emergency Response Team for the European Union (CERT-EU),<br />

Censys Press and EASA European Centre for <strong>Cyber</strong>security in Aviation (ECCSA). Her fields of interests<br />

are cyber defense, technology and business. Milica is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Against Granny<br />

By Yotam Gutman, SentinelOne<br />

Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and<br />

over) in the United States. <strong>Cyber</strong>crime can be defined as “any criminal activity in which a computer (or<br />

networked device) is targeted and/or used.” <strong>Cyber</strong>criminals with access to an older adult person’s<br />

information via a computer, smartphone, or other networked device, can easily exploit it for nefarious<br />

intent, defined as “an act of forcing, compelling, or exerting undue influence over a vulnerable adult<br />

causing the vulnerable adult to act in a way that is inconsistent with relevant past behavior or causing the<br />

vulnerable adult to perform services for the benefit of another”.<br />

The scope of bad actors targeting senior citizens can be explained by the lack of experience and skills in<br />

using computers/technology among the elderly, against the growing popularity of computer systems held<br />

by people of the same age, and the fact that most of them have credit cards.<br />

In the past, people in their 70s and 80s hardly ever used computers. Nowadays, people of the same age<br />

have social media accounts, surf the Internet, and of course use smartphones.<br />

Unlike their younger counterparts, seniors are less aware of cyber threats and, in many cases, lack the<br />

tools and experience to identify attacks and fraudulent attempts. Even elderly people with no access to<br />

computers or smartphones can fall victim to cyber-related crime such as in the case where their personal<br />

details have been leaked from a database and sold to criminals who can then exploit. Seniors also give<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ad actors the highest hit rates from phone phishing scams with frequent attempts being compromise of<br />

personal information and news of harm/captivity of the elderly’s children.<br />

Most of the crimes against the adult population use a similar pattern as fraud against the elderly with no<br />

connection to computers (such as telemarketing of unnecessary services by highly aggressive sales<br />

reps).<br />

The criminals will reach out to those people in a non-suspicious manner - sending a legitimate-looking<br />

email, offering to connect on Facebook or by using a legitimate website that offers them some vacation<br />

or other prize. The criminals will then try to obtain the details of those people. In particular, they will seek<br />

credit card and identification details that allow them to use these cards. Another tactic is impersonating<br />

a person in need and requesting a transfer of funds.<br />

Recently, the FBI arrested a network of criminals impersonating other people (“Captain Garcia” of the US<br />

military stationed in Syria, for example) who then persuaded their victims - many of whom were elderly -<br />

to transfer money to various causes, all of which were fictitious.<br />

Another favorite method of criminals is impersonating "official" entities - government officials,<br />

municipalities and various authorities, while exploiting the trust (or innocence) of those veteran citizens<br />

and fraudulently obtaining their details.<br />

In addition, this population is exposed to "normal" cybercrime - phishing, infection by malware and theft<br />

of personal information. The only difference is that the likelihood of this population recognizing such an<br />

attack is extremely slim, as the ability of people in this age group to understand that they have been<br />

compromised and to seek assistance is minimal. It should be noted that such attacks can also be carried<br />

out against people through their smartphones, which are very popular with this age group. These devices<br />

are usually not installed with protection software that could alert the user to malicious websites or warn<br />

them of attempts to exfiltrate personal details from the device.<br />

What can be done?<br />

It all starts and ends with education, but this time it is the younger generation which needs to educate<br />

their parents. We should remember the warnings they repeatedly told us when we were younger, and<br />

echo similar messages back to them, though in a slightly different way:<br />

- Know your friends and enemies: research shows that the elderly are oblivious to cyber risks, so it's<br />

worthwhile explaining to them some basic concepts and providing them with some examples of criminal<br />

or fraudulent online activities for them to learn from and avoid.<br />

- Do not open the door to strangers, and do not receive anything from strangers: Any communication<br />

from a party that they do not know personally should be treated with caution. It’s wise to assume all<br />

profiles on social networks are fake until proven otherwise.<br />

-Don't tell anyone any personal information - even if you are convinced that you are in contact with an<br />

official, or a real person - do not provide credit card details, residential address or social security number<br />

- certainly not by email or messenger.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


- If there is any suspicion, call "a responsible adult" - if requests are made to provide contact information,<br />

it is advisable to consult a person who is well-versed in security to see that the site is genuine. Yes, that<br />

person could be your 13-year-old grandson!<br />

- If something looks too good to be true, it's probably not true - this old adage is just as true in the online<br />

world as it is in the physical world. Resist those tempting offers that pop up while browsing for weird apps<br />

that install themselves on the mobile device, and avoid those people who offer big, congested "if only"<br />

details or who to send you money.<br />

Conclusion<br />

Unfortunately, today's elderly will continue to be the victims of cybercrime. This phenomenon will likely<br />

become worse before getting better as more elderly dabble in technology their generation adopts digital<br />

means of payment and banking through smartphones. It will probably take years until the generation who<br />

"grew up using computers" come of age, and are immune to such scams with their decades of built-in<br />

experience and suspicion of every poor girl from Nigeria who needs a hundred dollars a month to buy<br />

dresses for school. Until then, watch out for your parents, and help guard them against those they cannot<br />

guard against themselves.<br />

Aspen initiative for protecting older users online-<br />

https://www.aspentechpolicyhub.org/project/protecting-older-users-online/<br />

About the Author<br />

Lt. Commander (Ret.) Israel Navy, Yotam Gutman, has<br />

filled several operational, technical, and business positions<br />

at defense, HLS, Intelligence, and cybersecurity<br />

companies, and provided consulting services for numerous<br />

others. Yotam joined SentinelOne 6 months ago to oversee<br />

local marketing activities in Israel and contribute to the<br />

global content marketing team. Yotam founded and<br />

managed the <strong>Cyber</strong>security Marketing Professionals<br />

Community, which includes over 300 marketing<br />

professionals from more than 170 cyber companies. Yotam<br />

was chosen as one of the 5 Security Influencers to<br />

Follow on LinkedIn.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Are the Worst Cryptocurrency Security Breaches Behind<br />

Us?<br />

By Tim Fries, Co-Founder, The Tokenist<br />

You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people<br />

don’t like to give up security features for the sake of convenience. Crypto exchanges are especially<br />

notorious for mass hacks that besmirch the entire cryptocurrency ecosystem.<br />

Moreover, no matter what kind of crypto wallet you have, due to the decentralized nature of<br />

cryptocurrencies, it’s akin to having a bank account in your pocket. In the end, we may as well rely upon<br />

the insured deposits of web-based wallets – crypto exchanges – more than anything else.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


People Demand Digital Money<br />

It may surprise you to learn that the concept of internet money did not start with the first cryptocurrency<br />

in the form of Bitcoin (BTC). In fact, the most ancient and pervasive form of money – gold – was the first<br />

basis for digital currency in 1996. Called e-gold, it was effectively a stablecoin before there was such a<br />

thing. Anyone with an e-gold account was able to transfer money equivalent in value to grams of gold to<br />

other e-gold accounts. Unfortunately, it grew too much in popularity before the government shut it down<br />

in 2008.<br />

E-gold may have ultimately failed as a digital currency, which is what people called it at the time, but it<br />

demonstrated a high demand for money that is not externally tempered with and controlled by<br />

governments. Just one year later, Bitcoin emerged on the scene as a digital currency entirely confined to<br />

the digital realm and outside government control. As Bitcoin gained more traction and value, the legacy<br />

media became fever-pitched in tying Bitcoin to the criminal underground.<br />

Fortunately, all their efforts failed along with their trustworthiness. On the other hand, the most current<br />

data on Bitcoin adoption rate provided by The Tokenist, tells a story of increased trust in Bitcoin over<br />

traditional institutions, by 29%. The upward shift in Bitcoin trust and familiarity is primarily led by male<br />

millennials, while people older than 65 are least likely to own and use Bitcoin.<br />

The latter part is important to note because older people represent a demographic that views money as<br />

something that is strictly:<br />

1. Physical<br />

2. Government-controlled<br />

Regardless of age, we can safely say that these two money attributes are more or less present in the<br />

minds of all demographic groups. Therefore, they represent substantial psychological barriers to<br />

overcome for further cryptocurrency adoption. Thankfully, the government’s reaction to the coronavirus<br />

greatly eroded the embedded notion that money, as physical and government-controlled, is inherently<br />

superior to digital money.<br />

When the Federal Reserve decided to summon trillions of dollars on multiple occasions to save the<br />

market from totally crashing, no one with a straight face could say ever again that government money is<br />

derived from real wealth. On the other hand, Bitcoin draws from a predetermined, finite pool of coins, with<br />

each Bitcoin ever-growing in value.<br />

However, there is another aspect to digital money that makes people instinctively distrust it –<br />

cybersecurity. In particular, the prevailing sentiment that anything digital is hackable.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Shortcuts Lead to Cryptocurrency Vulnerability<br />

Although fiat money can be counterfeited, it’s almost unheard of with the modern protections applied in<br />

the money printing presses. This is not the case with Bitcoin and other cryptocurrencies. There are many<br />

cases of mass Bitcoin thefts/hacks from crypto exchanges, such as Japan’s Mt. Gox, Bitcoin7, Bitomat,<br />

Linode, BTC-e, Bitcoinica, Bitfloor, Vicurex, and Hong Kong’s Bitfinex as the largest case of hacking with<br />

120,000 BTC stolen.<br />

Moreover, an alternative marketplace powered by cryptocurrencies, Silk Road, greatly harmed the public<br />

image of new digital money. Operating in the underbelly of the internet, the Tor network, Silk Road<br />

facilitated many hacker attacks, money laundering, and blackmail operations. Criminal activity in this<br />

sector not only harms the directly-affected crypto-holders, but it suppresses further adoption of<br />

blockchain-powered digital money.<br />

In the best of times, outside of stablecoins, cryptocurrencies suffer from volatility compared to fiat money.<br />

Big crypto exchange hacks cause the price of Bitcoin to plummet, which then drags down all lesser<br />

cryptocurrencies with it. Inevitably, this further increases cryptocurrency volatility and decreases its usage<br />

as money.<br />

With all this in mind, it bears emphasizing that blockchain still remains effectively unhackable. People<br />

lost money from crypto exchange hacks because users gave their private keys to these companies. By<br />

doing that, a user forgoes a vital security feature of cryptocurrencies – private and public keys – and<br />

places all the trust into crypto exchanges for the sake of convenience.<br />

Unhackable Blockchain is Only the Beginning of <strong>Cyber</strong>security<br />

Let’s face it. If digital currencies operated under any other system other than blockchain, only hardcore<br />

enthusiasts and first-time adopters would flirt with that kind of digital money. As it stands, blockchain, as<br />

a distributed ledger across nodes, can withstand any malicious attempts at record alteration. This is why<br />

numerous governmental and corporate organizations, from military to healthcare and art galleries, have<br />

started to view blockchain as a low-cost, high-end implementation of cybersecurity.<br />

As we have seen with the latest hacking of Twitter accounts, the human factor is the weakest link in the<br />

cybersecurity chain. In this instance, they befriended the Twitter employee on Discord and then<br />

convinced the employee with some extra incentives to share the administrator account.<br />

Likewise, Bitcoin thefts and breaches occur outside the impervious blockchain:<br />

• Opting to give crypto-exchanges your private key instead of using private wallets – hard, mobile,<br />

or desktop. Then, you must rely on the company in charge of the crypto exchange to have<br />

trustworthy employees and security measures.<br />

• Opting to have a private wallet with both private and public keys, but not securing it enough.<br />

Usually, by leaving passwords and word phrases in other unprotected locations and files.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Falling for scams by email, imposter websites, and apps (or Twitter…)<br />

• Acquiring malware by visiting scam websites and opening files in your email from untrustworthy<br />

sources. Then, this malware gains access to your web-based wallet and is extremely difficult to<br />

remove. Some malware programs even scan your clipboard and text files to replace your<br />

cryptocurrency address with the address of the scammer. Other malware installs a miner to use<br />

your computer as a free mining resource.<br />

More skillful scammers have developed a roundabout way of taking your money, mainly by exploiting<br />

human nature.<br />

• As Bitcoin entered the mainstream news cycle and soared in value, people were starting to feel<br />

left out of the game. Trying to catch up with lesser, cheaper altcoins, they fell into the embrace of<br />

ICO scammers. In 2017, fake Initial Coin Offering (ICOs) was a huge problem, with at least 80%<br />

of ICOs uncovered as scams.<br />

• Pumping and dumping. Relying on the same sentiment as with ICO scams, pump and dump<br />

scammers have adopted a strategy of picking an altcoin low in market cap, buying it in bulk to<br />

spike its price, then selling it after other people bought it for an even higher price.<br />

• Closely related to the aforementioned Twitter hacking, you will also find celebrity impersonation<br />

scams. All of those hacked accounts of famous people were used as cryptocurrency giveaway<br />

scams. Usually, they promise to send you more than what you sent them, as a part of some kind<br />

of charity drive.<br />

As you can see, you can have fool-proof security in the form of blockchain and still be duped if you lack<br />

knowledge and discipline to resist baits.<br />

User-Education Must Come First<br />

Blockchain may be the revolutionary bulwark against hard hacks we were all waiting for, but soft hacks<br />

will continue to plague cryptocurrency users. Even outside of hacks and scams, cryptocurrency, with<br />

Bitcoin leading the charge, has become the perfect means of laundering money. Moreover, moneylaundering<br />

goes hand-in-hand with blackmail and ransom.<br />

Such is the flexibility of digital technology that cybercriminals don’t even have to hack anything at all.<br />

They can simply threaten to hack or insinuate to have some dirt on someone by using vague language,<br />

and the victim would then just have to send a certain cryptocurrency sum to their address. No physical<br />

contact, and no risk.<br />

At least, some careless cybercriminals would assume so.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Only initially could you claim that Bitcoin is anonymous money. In 2011, that all changed with the first<br />

release of the block explorer. Because blockchain keeps an immutable ledger of all transactions, it only<br />

takes such a tool to track down every transaction. However, even this can be countered by creating<br />

multiple wallets and addresses with privacy-focused browsers such as Tor. Some cryptocurrencies, like<br />

Monero (XMR), are designed with untraceability as the core feature.<br />

Takeaway<br />

We can say that digital technology was inevitable. We can even say that blockchain was inevitable. We<br />

are lucky to live in the timeline where we have both. However, what we cannot say is that unbreachable<br />

cybersecurity is inevitable. No matter what kind of cybersecurity system we design, it will have to cater<br />

to the lowest common denominator – human markets.<br />

About the Author<br />

Tim Fries is co-founder of Protective Technologies Capital, an<br />

investment firm focused on helping owners of industrial<br />

technology businesses manage succession planning and<br />

ownership transitions. He is also co-founder of the financial<br />

education site The Tokenist. Previously, Tim was a member of<br />

the Global Industrial Solutions investment team at Baird Capital,<br />

a Chicago-based lower-middle market private equity firm.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Meet Our Publisher: Gary S. Miliefsky, CISSP, fmDHS<br />

“Amazing Keynote”<br />

“Best Speaker on the Hacking Stage”<br />

“Most Entertaining and Engaging”<br />

Gary has been keynoting cyber security events throughout the year. He’s also been a<br />

moderator, a panelist and has numerous upcoming events throughout the year.<br />

If you are looking for a cybersecurity expert who can make the difference from a nice event to<br />

a stellar conference, look no further email marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


You asked, and it’s finally here…we’ve launched <strong>Cyber</strong><strong>Defense</strong>.TV<br />

At least a dozen exceptional interviews rolling out each month starting this summer…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A new division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines for FREE.<br />

This magazine is by and for ethical information security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the information technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465,<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any information storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content<br />

and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 08/03/<strong>2020</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


TRILLIONS ARE AT STAKE<br />

No 1 INTERNATIONAL BESTSELLER IN FOUR CATEGORIES<br />

Released:<br />

https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />

In Development:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


8 Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know<br />

What You Think. It's mobile and tablet friendly and superfast. We hope you<br />

like it. In addition, we're shooting for 7x24x365 uptime as we continue to<br />

scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS<br />

and <strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an array of live mirror<br />

sites.<br />

Millions of monthly readers and new platforms coming…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


i<br />

Multiple sources – Microsoft SIR, Verizon, etc.<br />

ii<br />

iii<br />

iv<br />

https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021/<br />

https://www.recordedfuture.com/state-local-government-ransomware-attacks/<br />

"Shut the door to cybercrime…" Ignite 2017, BRK3016, 35:45<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!