SlideShare a Scribd company logo
1 of 18
Download to read offline
Based on an EventTechBrief.com
Article by Michelle Bruno
Getting Hacked is a Nasty Business.
Events are in for a Rude Awakening.
A conference was hacked. This time, hackers
managed to obtain personal details from attendees
of two conferences hosted by the Linux Australia
User Group. Michael Robinson, program director,
cyber forensics at Baltimore’s Stevenson University,
took a look at media reports of the incident to
describe what may have happened and provide
some advice on how event organizers can do a
better job of protecting their attendees from what
could be inevitable.
It happened again...
Beware the Innocent E-mail...
Organizers admit that hackers gained unauthorized
access to one of their servers, but Robinson says,
“It’s pretty unlikely that someone broke in from the
Internet and hit that server.”
 
A more plausible explanation is that an end user
connected to the network was duped into clicking
on a link from the Internet or an email. In doing so,
he inadvertently released malware that moved
laterally across the network to grant a hacker
access to the server that contained all of the
attendee data.
An end user is anyone on a computer connected to
the network including a conference planner,
registration assistant, systems administrator, or
accountant. “If their computers are compromised,
it’s not that difficult to get access to the registration
data,” Robinson explains. 
The vulnerability to which Linux Australia
succumbed was the fact that “it stored attendee
data from multiple conferences on one central
server, which means that when the server was
compromised, it affected all of the attendees from
all of its conferences for several years.”
Hackers are Paid Professionals...
Robinson surmises that the hackers of the Linux
Australia User Group knew what they were doing.
“The people who attend Linux Australia events are
[for example] systems administrators that work for
the Australian and New Zealand governments. They
have root-level access to sensitive information on
their computer systems and networks.” With
something as simple as an attendee email address,
hackers can launch phishing attacks on them in the
same way they likely attacked the conference.
Taking a Server Offline Won't 
Solve the Problem
The remedies for these types of attacks aren't clear-
cut. Linux Australia reportedly decommissioned the
infected server, strengthened security on the new
one and installed a number of monitoring tools. In
addition, “websites for the conferences will in the
future be archived six months after a conference
concludes and then kept on a separate server and
deleted from [the event management software],"
organizers say. That may not be enough according
to Robinson.
“Typically when a system gets infected, the help
desk will come along and take that one server
offline. However, if the hacker leapfrogged through
the network, taking a server offline doesn’t fix the
problem. The server is taken offline, but the bad guy
is still in the network. He can move laterally to the
new server and compromise that one as well,”
Robinson explains.
Attackers are onto
Conferences as Targets
What happened to the Linux Australia User Group is only the
tip of the iceberg in terms of how conferences can be harmed
by hackers, hacktivists or the disgruntled. Robinson lists a
number of "bad" hacks of which organizers should be aware:
Hackers with the right skills can download registrant information
from a self-service registration kiosk onto a USB drive.
Wireless jammers can interrupt on-site networks including
audio-visual equipment.
Attackers are onto
Conferences as Targets
Pineapple routers (costing about $150) can intercept data
transmissions from attendee devices.
An IMSI-catcher can intercept cell phone data and “spy” on
conference-goers.
Fake websites can be easily built to intercept registrant
information (including credit card numbers)
Social hacktivists can wreak havoc on an event with denials of
service attacks and other tactics.
There are some Simple Fixes...
Event organizers are not entirely defenseless. While
some organizers will work with cyber security
professionals to build in safeguards and monitoring
systems, there are simple precautions all event
hosts can take.
Robinson advises that organizers first communicate
to attendees the measures they have in place to
protect their information and advise them NOT to
use the same passwords for the conference that
they use for other work or their personal accounts.
There are other measures that organizers can take
such as instructing IT to isolate and encrypt the
registrant database and training end users to avoid
clicking on links of any kind unless they are
absolutely sure of the source. “End users are the
biggest threat to network security,” Robinson says.
Also, security contractors and staff can learn how to
spot and disarm jamming and routing devices on
site.
But Wait. There's More.
Besides the obvious consequences
—embarrassment, loss of attendee confidence, and
a potential drop in future attendance—the Linux
Australia User Group and others before them have
had to endure a “baptism by fire,” Robinson says.
“Imagine trying to meet your goals to ‘do more with
less’ and then all of a sudden you get hit with
something like this? Your reputation is damaged,
you incur more costs, and your attendees could sue
you. Your day is going to get a whole lot worse.”
Michael Robinson is
at mrobinson4614@stevenson.edu.
Read the full article
and subscribe to the
newsletter at
www.EventTechBrief.com
@EventTechBrief
Images used under a Creative Commons License via Flickr users:
Photosteve101; Al Ibrahim; James Lee; Hannaford; 
OTA Photos; & Living in Monrovia

More Related Content

What's hot

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020Hiren Sadhwani
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks TrendsCharles Mok
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 

What's hot (20)

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020
 
News Bytes
News BytesNews Bytes
News Bytes
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Viewers also liked

GöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiGöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiyelbeyi
 
Bluemix introduction
Bluemix introductionBluemix introduction
Bluemix introductiongule mariam
 
El Jardin De La Mente Manual
El Jardin De La Mente ManualEl Jardin De La Mente Manual
El Jardin De La Mente Manualguest7adf3a3
 
LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案Hiroyuki Inoue
 
JISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE
 
Considerations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentConsiderations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentHelene Heller, PMP
 
JISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE
 
Soda Portfolio
Soda PortfolioSoda Portfolio
Soda Portfoliosodadesign
 
Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Mukesh Kumar, PhD, RAC
 
Evidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careEvidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careslwrel
 
Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Maximiliano Firtman
 
[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platformgule mariam
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcampJuraj Bednar
 
Power Presentation Time Management
Power Presentation Time ManagementPower Presentation Time Management
Power Presentation Time Managementpeglover
 
Internet of things
Internet of things  Internet of things
Internet of things gule mariam
 
Oracle数据库中的并行执行
Oracle数据库中的并行执行Oracle数据库中的并行执行
Oracle数据库中的并行执行shadowfalao
 

Viewers also liked (20)

GöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiGöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZlerii
 
Bluemix introduction
Bluemix introductionBluemix introduction
Bluemix introduction
 
El Jardin De La Mente Manual
El Jardin De La Mente ManualEl Jardin De La Mente Manual
El Jardin De La Mente Manual
 
LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案
 
JISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE - Dissemination
JISC BCE - Dissemination
 
Alessandro Baglioni Fotografo
Alessandro Baglioni FotografoAlessandro Baglioni Fotografo
Alessandro Baglioni Fotografo
 
Considerations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentConsiderations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT Investment
 
JISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE Programme Streams
JISC BCE Programme Streams
 
Tutorial
TutorialTutorial
Tutorial
 
The depue project
The depue projectThe depue project
The depue project
 
Soda Portfolio
Soda PortfolioSoda Portfolio
Soda Portfolio
 
Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009
 
Evidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careEvidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-care
 
Episode v0.7
Episode v0.7Episode v0.7
Episode v0.7
 
Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5
 
[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcamp
 
Power Presentation Time Management
Power Presentation Time ManagementPower Presentation Time Management
Power Presentation Time Management
 
Internet of things
Internet of things  Internet of things
Internet of things
 
Oracle数据库中的并行执行
Oracle数据库中的并行执行Oracle数据库中的并行执行
Oracle数据库中的并行执行
 

Similar to Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.

Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRifDhy22
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)OllieShoresna
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...cybluseo
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxCompanySeceon
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service AttackStephanie Williams
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 

Similar to Getting Hacked is a Nasty Business. Events are in for a Rude Awakening. (20)

Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
185
185185
185
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
cyber crime
cyber crimecyber crime
cyber crime
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 

More from Michelle Bruno

Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Michelle Bruno
 
Say Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorSay Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorMichelle Bruno
 
Women and Work After The March
Women and Work After The MarchWomen and Work After The March
Women and Work After The MarchMichelle Bruno
 
All YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsAll YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsMichelle Bruno
 
Got Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesGot Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesMichelle Bruno
 
Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Michelle Bruno
 
What's Holding The Event Industry Back?
What's Holding The Event Industry Back?What's Holding The Event Industry Back?
What's Holding The Event Industry Back?Michelle Bruno
 
Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Michelle Bruno
 
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesThere’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesMichelle Bruno
 
The Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsThe Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsMichelle Bruno
 
The Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceThe Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceMichelle Bruno
 
The Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerThe Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerMichelle Bruno
 
The Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comThe Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comMichelle Bruno
 
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Michelle Bruno
 
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Michelle Bruno
 
ASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftMichelle Bruno
 
EventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetEventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetMichelle Bruno
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityMichelle Bruno
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionMichelle Bruno
 
Trade show techology trends
Trade show techology trendsTrade show techology trends
Trade show techology trendsMichelle Bruno
 

More from Michelle Bruno (20)

Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...
 
Say Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorSay Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services Contractor
 
Women and Work After The March
Women and Work After The MarchWomen and Work After The March
Women and Work After The March
 
All YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsAll YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology Trends
 
Got Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesGot Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With Games
 
Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?
 
What's Holding The Event Industry Back?
What's Holding The Event Industry Back?What's Holding The Event Industry Back?
What's Holding The Event Industry Back?
 
Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?
 
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesThere’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
 
The Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsThe Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing Solutions
 
The Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceThe Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open Source
 
The Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerThe Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud Killer
 
The Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comThe Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.com
 
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
 
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
 
ASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & Rift
 
EventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetEventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two Feet
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for Charity
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to Selection
 
Trade show techology trends
Trade show techology trendsTrade show techology trends
Trade show techology trends
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.

  • 1. Based on an EventTechBrief.com Article by Michelle Bruno Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
  • 2. A conference was hacked. This time, hackers managed to obtain personal details from attendees of two conferences hosted by the Linux Australia User Group. Michael Robinson, program director, cyber forensics at Baltimore’s Stevenson University, took a look at media reports of the incident to describe what may have happened and provide some advice on how event organizers can do a better job of protecting their attendees from what could be inevitable. It happened again...
  • 4. Organizers admit that hackers gained unauthorized access to one of their servers, but Robinson says, “It’s pretty unlikely that someone broke in from the Internet and hit that server.”   A more plausible explanation is that an end user connected to the network was duped into clicking on a link from the Internet or an email. In doing so, he inadvertently released malware that moved laterally across the network to grant a hacker access to the server that contained all of the attendee data.
  • 5. An end user is anyone on a computer connected to the network including a conference planner, registration assistant, systems administrator, or accountant. “If their computers are compromised, it’s not that difficult to get access to the registration data,” Robinson explains.  The vulnerability to which Linux Australia succumbed was the fact that “it stored attendee data from multiple conferences on one central server, which means that when the server was compromised, it affected all of the attendees from all of its conferences for several years.”
  • 6. Hackers are Paid Professionals...
  • 7. Robinson surmises that the hackers of the Linux Australia User Group knew what they were doing. “The people who attend Linux Australia events are [for example] systems administrators that work for the Australian and New Zealand governments. They have root-level access to sensitive information on their computer systems and networks.” With something as simple as an attendee email address, hackers can launch phishing attacks on them in the same way they likely attacked the conference.
  • 8. Taking a Server Offline Won't  Solve the Problem
  • 9. The remedies for these types of attacks aren't clear- cut. Linux Australia reportedly decommissioned the infected server, strengthened security on the new one and installed a number of monitoring tools. In addition, “websites for the conferences will in the future be archived six months after a conference concludes and then kept on a separate server and deleted from [the event management software]," organizers say. That may not be enough according to Robinson.
  • 10. “Typically when a system gets infected, the help desk will come along and take that one server offline. However, if the hacker leapfrogged through the network, taking a server offline doesn’t fix the problem. The server is taken offline, but the bad guy is still in the network. He can move laterally to the new server and compromise that one as well,” Robinson explains.
  • 11. Attackers are onto Conferences as Targets What happened to the Linux Australia User Group is only the tip of the iceberg in terms of how conferences can be harmed by hackers, hacktivists or the disgruntled. Robinson lists a number of "bad" hacks of which organizers should be aware: Hackers with the right skills can download registrant information from a self-service registration kiosk onto a USB drive. Wireless jammers can interrupt on-site networks including audio-visual equipment.
  • 12. Attackers are onto Conferences as Targets Pineapple routers (costing about $150) can intercept data transmissions from attendee devices. An IMSI-catcher can intercept cell phone data and “spy” on conference-goers. Fake websites can be easily built to intercept registrant information (including credit card numbers) Social hacktivists can wreak havoc on an event with denials of service attacks and other tactics.
  • 13. There are some Simple Fixes...
  • 14. Event organizers are not entirely defenseless. While some organizers will work with cyber security professionals to build in safeguards and monitoring systems, there are simple precautions all event hosts can take. Robinson advises that organizers first communicate to attendees the measures they have in place to protect their information and advise them NOT to use the same passwords for the conference that they use for other work or their personal accounts.
  • 15. There are other measures that organizers can take such as instructing IT to isolate and encrypt the registrant database and training end users to avoid clicking on links of any kind unless they are absolutely sure of the source. “End users are the biggest threat to network security,” Robinson says. Also, security contractors and staff can learn how to spot and disarm jamming and routing devices on site.
  • 17. Besides the obvious consequences —embarrassment, loss of attendee confidence, and a potential drop in future attendance—the Linux Australia User Group and others before them have had to endure a “baptism by fire,” Robinson says. “Imagine trying to meet your goals to ‘do more with less’ and then all of a sudden you get hit with something like this? Your reputation is damaged, you incur more costs, and your attendees could sue you. Your day is going to get a whole lot worse.” Michael Robinson is at mrobinson4614@stevenson.edu.
  • 18. Read the full article and subscribe to the newsletter at www.EventTechBrief.com @EventTechBrief Images used under a Creative Commons License via Flickr users: Photosteve101; Al Ibrahim; James Lee; Hannaford;  OTA Photos; & Living in Monrovia