The Future of Security in Australia: a Think Tank Report by BlackBerry. This white paper from BlackBerry, the mobile-native software and services company dedicated to securing the Enterprise of Things, features the analysis and thoughts from a 10-expert roundtable late last year looking at trends in cyber and mobile security.
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
The Internet of Things promises to provide a wide range of futuristic benefits, but what is often overlooked is how deeply IoT sensors and data analytics already impact how we live and how we conduct business. This is especially true of crisis communications. Here, IoT has far-reaching implications, both in the present and in the future.
This whitepaper explores how IoT sensors powerfully expand the capabilities of networked crisis communication solutions. It also discusses typical scenarios for incorporating IoT sensor data within emergency preparedness scenarios. Finally, it demonstrates why AtHoc is particularly well suited for using IoT data to deliver faster, more accurate situational awareness in an intuitive manner, without inundating employees with excess data or forcing emergency management staff to become data scientists.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
451 Research report evaluates BlackBerry's turnaround from a device manufacturer into an enterprise software and security business under John Chen's leadership.
451 Research's conclusions include:
-- "Under CEO John Chen, BlackBerry has significantly improved its financial position and product focus."
-- "Almost every product in BlackBerry's bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT devices."
-- "BlackBerry is very competitive in security, has a formidable leadership team, improving financials and some strong assets thoughtfully acquired, which in turn opens up new white space for it to attack."
-- "QNX is perhaps BlackBerry's most exciting IoT play because of its deployed footprint in embedded-computing markets and automotive. BlackBerry's strategy in connected cars is to aggressively expand beyond its deployed footprint in in-vehicle infotainment into adjacent areas like telematics, advanced driver assistance systems,
gateways and cockpit domain controllers."
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
The Internet of Things promises to provide a wide range of futuristic benefits, but what is often overlooked is how deeply IoT sensors and data analytics already impact how we live and how we conduct business. This is especially true of crisis communications. Here, IoT has far-reaching implications, both in the present and in the future.
This whitepaper explores how IoT sensors powerfully expand the capabilities of networked crisis communication solutions. It also discusses typical scenarios for incorporating IoT sensor data within emergency preparedness scenarios. Finally, it demonstrates why AtHoc is particularly well suited for using IoT data to deliver faster, more accurate situational awareness in an intuitive manner, without inundating employees with excess data or forcing emergency management staff to become data scientists.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
451 Research report evaluates BlackBerry's turnaround from a device manufacturer into an enterprise software and security business under John Chen's leadership.
451 Research's conclusions include:
-- "Under CEO John Chen, BlackBerry has significantly improved its financial position and product focus."
-- "Almost every product in BlackBerry's bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT devices."
-- "BlackBerry is very competitive in security, has a formidable leadership team, improving financials and some strong assets thoughtfully acquired, which in turn opens up new white space for it to attack."
-- "QNX is perhaps BlackBerry's most exciting IoT play because of its deployed footprint in embedded-computing markets and automotive. BlackBerry's strategy in connected cars is to aggressively expand beyond its deployed footprint in in-vehicle infotainment into adjacent areas like telematics, advanced driver assistance systems,
gateways and cockpit domain controllers."
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
An excerpt from magazine where Peplink, Citrix, Vodafone and Cisco voice their thoughts on BYOD, mobile and remote workers, and the devices that make it possible.
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
You might have heard plenty of jargons related to the internet, but the one that has become a buzzword recently and is broken into the mainstream as potentially the most significant term for the way we communicate, work and live in the near future is: The Internet of Things (IoT). Today, everyone is talking about the Internet of Things (IoT) from the newspaper to tech blogs. But what, exactly, is the IoT for beginners? Let’s find out. For more details visit: https://goo.gl/qT4LYA
The Internet of Things (IoT) is an umbrella term which covers a broad repertoire of sensors, applications, technologies, and use cases as they are enabled by the network of objects and devices with an IP address (Internet Protocol). Smart locks, smart cars, smart security system, smart thermostats, and smart health monitor are some of the examples of The Internet of Things (IoT) you’ve probably heard recently, and you’re going to hear more as the year progresses.
Download this BYOD economic analysis and more at http://cs.co/BYOD-Economics
Request a custom BYOD assessment: http://cs.co/BYOD-contactme
"Bring your own Device" (BYOD) sparks productivity and saves costs by connecting employee devices to corporate networks--an example of how the Internet of Everything is creating value around the world. But the current value is dwarfed by the potential gains from implementing BYOD more strategically.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
11 things IT leaders need to know about the internet of things WGroup
The Internet of Things (IoT) is the next phase in the evolution of the Internet. More than 100 devices connect to the Internet every second. By 2020, Cisco estimates that number to be more than 250 per second. Morgan Stanley projects the Internet will be loaded with 75 billion devices by the end of the decade. This document discusses WGroup's perspective on what 11 things IT leaders need to know about IoT.
The Internet of Things (IoT) has been developing over the last 20 years and is often referred to as Industry 4.0 or the “fourth industrial revolution.” It is an umbrella term for all the digital assets and entities connected to the internet. Many of these are intangibles, such as data, human capital via artificial intelligence (AI), intellectual property (IP), and cyber; as such, they need to be made tangible to address value on a balance sheet. Others are connected entities, such as sensor devices, collecting and receiving information in an intelligent fashion across networks.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
BlackBerry is a mobile-native security software and services company dedicated to securing the Enterprise of Things. From Unified Endpoint Management to secure communications and collaboration, BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things can thrive.
BlackBerry 10 Implications for Enterprise MobilityAntenna Software
Slides from a webinar held in February 2013 on the launch of the new BlackBerry 10.
If you are interested in watching the OnDemand video of this webinar: http://info.antennasoftware.com/BB10_Implications_Webinar_OnDemand.html
This presentation covers:
*New features and functionality of BlackBerry 10
*Implications for current BlackBerry users and the future of BlackBerry platforms
*How BlackBerry 10 fits into Antenna's enterprise mobility platform roadmap
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
An excerpt from magazine where Peplink, Citrix, Vodafone and Cisco voice their thoughts on BYOD, mobile and remote workers, and the devices that make it possible.
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
You might have heard plenty of jargons related to the internet, but the one that has become a buzzword recently and is broken into the mainstream as potentially the most significant term for the way we communicate, work and live in the near future is: The Internet of Things (IoT). Today, everyone is talking about the Internet of Things (IoT) from the newspaper to tech blogs. But what, exactly, is the IoT for beginners? Let’s find out. For more details visit: https://goo.gl/qT4LYA
The Internet of Things (IoT) is an umbrella term which covers a broad repertoire of sensors, applications, technologies, and use cases as they are enabled by the network of objects and devices with an IP address (Internet Protocol). Smart locks, smart cars, smart security system, smart thermostats, and smart health monitor are some of the examples of The Internet of Things (IoT) you’ve probably heard recently, and you’re going to hear more as the year progresses.
Download this BYOD economic analysis and more at http://cs.co/BYOD-Economics
Request a custom BYOD assessment: http://cs.co/BYOD-contactme
"Bring your own Device" (BYOD) sparks productivity and saves costs by connecting employee devices to corporate networks--an example of how the Internet of Everything is creating value around the world. But the current value is dwarfed by the potential gains from implementing BYOD more strategically.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
11 things IT leaders need to know about the internet of things WGroup
The Internet of Things (IoT) is the next phase in the evolution of the Internet. More than 100 devices connect to the Internet every second. By 2020, Cisco estimates that number to be more than 250 per second. Morgan Stanley projects the Internet will be loaded with 75 billion devices by the end of the decade. This document discusses WGroup's perspective on what 11 things IT leaders need to know about IoT.
The Internet of Things (IoT) has been developing over the last 20 years and is often referred to as Industry 4.0 or the “fourth industrial revolution.” It is an umbrella term for all the digital assets and entities connected to the internet. Many of these are intangibles, such as data, human capital via artificial intelligence (AI), intellectual property (IP), and cyber; as such, they need to be made tangible to address value on a balance sheet. Others are connected entities, such as sensor devices, collecting and receiving information in an intelligent fashion across networks.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
BlackBerry is a mobile-native security software and services company dedicated to securing the Enterprise of Things. From Unified Endpoint Management to secure communications and collaboration, BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things can thrive.
BlackBerry 10 Implications for Enterprise MobilityAntenna Software
Slides from a webinar held in February 2013 on the launch of the new BlackBerry 10.
If you are interested in watching the OnDemand video of this webinar: http://info.antennasoftware.com/BB10_Implications_Webinar_OnDemand.html
This presentation covers:
*New features and functionality of BlackBerry 10
*Implications for current BlackBerry users and the future of BlackBerry platforms
*How BlackBerry 10 fits into Antenna's enterprise mobility platform roadmap
BlackBerry is a security software and services company dedicated to securing the enterprise of things. The Enterprise of Things is the network of intelligent connections and end points within the enterprise that enable products to move from sketch to scale. BlackBerry's integrated security software helps companies manage and secure their mobile devices and connected things and secures communications for all messaging and file types – ultimately making them BlackBerry Secure.
DTEK50 secure smartphone powered by Android combines BlackBerry’s unique security, privacy, and productivity with device design, specs, and a price point accessible for professionals and ideal for enterprise deployments. DTEK50’s slim, sleek design, and robust specs deliver on the expectations of Android customers. It combines the most critical features users need to power through their day: BlackBerry Intelligent Keyboard, the 5.2” display, BlackBerry Hub, Convenience Key, Stunning Camera, DTEK, and other great, best-in-class security features, plus access to the world’s largest app ecosystem.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
Troels Ørting Jørgensen, Chairman at Bullwall, Expert Member at INTERPOL
Mr. Ørting is a globally recognized Cyber Security Expert. He has been working in cybersecurity ‘first line’ for over 4 decades. Throughout career, Mr. Ørting has been working with governments and corporations to advise on how they react to the increasing international cyber threats, and worked closely with law enforcement, intelligence services and cyber security businesses.
Formerly, with the Danish National Police, first as Director, Head of the Serious Organised Crime Agency and then as Director of Operations, Danish Security Intelligence Service; Deputy Head, ICT Department and Deputy Head, OC Department, Europol, EU’s Police Agency; Head of European Cybercrime Centre and Head of Europol Counter Terrorist and Financial Intelligence Centre. 2015-18, Group Chief Information Security Officer (CISO), Barclays. Chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has very strong experience in cyber security. Since 2018, Head of the Centre for Cybersecurity, World Economic Forum. Chairman of the Board of World Economic Forum Centre for Cybersecurity (C4C).
Troels Oerting
“WE, IN SECURITY, SHOULD NOT PROMOTE FEAR – BUT PROTECT HOPE”
BEFORE THE GLOBAL PANDEMIC HIT THE WORLD IN SPRING 2020, the digital transformation increased speed and magnitude. Fuelled by super-drivers like mobile/5G, IoT, Cloud and AI the number of users, applications, storage, connections and algorithms outpaced what we had seen before. The huge possibilities provided by the Internet created a ‘tech’ environment attracting the best brains the World could produce and geopolitical tensions between China, Russia, EU and US intensified the regional competition on ‘who controls the Internet’ and the subsequent influence, growth and wealth.
THE GLOBAL COVID PANDEMIC FORCED US TO MOVE APPROXIMATELY 1.2 BN WORKERS FROM THEIR OFFICES to work from homes in order to keep the wheels spinning. Internet enabled communication tools substituted physical meetings, teaching, marketing, trading, reading, accounting, watching and demand for online services surged and Accenture has estimated that globally we went through 3 years normal speedy digital transformation in just 3 months. This will continue. We will not go back to the ‘old days’ even after we get a vaccine. We will continue to work remotely – not necessarily from home but from anywhere. Both employers and employees have seen the benefits of this new flexible work-regime providing support from working both from offices and from anywhere.
“In the future everything will be connected, everything will be sensing, everything will be stored and everything will be used, sold or utilised in other ways”
THE FUTURE will provide more positive opportunities for the global, and connected, citizen – for businesses, education, healthcare, sustainability, climate, transparency and democracy. But it will also present challenges to security, privacy...
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
A Time of Great Risk: The Time Between Compromise and Mitigation
In most organizations today, threat detection is based on various security sensors that attempt to look for anomalous behavior or for known signatures of malicious activity. These sensors include firewalls, intrusion detection/prevention systems (IDS/IPS), application gateways, anti- virus/anti-malware, endpoint protection, and more. They operate at and provide visibility into all layers of the IT stack.
File Sharing Use Cases in Financial ServicesBlackBerry
Financial services institutions need to meet high standards of security, particularly when collaborating with external partners, in order to comply with federal regulations and protect their customers. However, security protocols designed to protect sensitive information can actually hinder workplace productivity. This presentation demonstrates different ways that financial institutions were able to get back to business using BlackBerry Workspaces, the secure file sync & share solution.
Check it out - BlackBerry QNX is the only company to pop up in 4 categories of this infographic showcasing all of the autonomous vehicle companies in Ottawa, Canada! Learn more at OttawaAVCluster.com.
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
How many companies pushing the envelope on self-driving cars are based in the Kanata North Tech Park in Ottaway, Canada? And how many times does BlackBerry QNX and its Autonomous Vehicle Innovation Center (AVIC) show up? Learn more at OttawaAVCluster.com
In most industries, the enterprise market is bigger than the consumer market; the Internet of Things (IoT) is no exception. Spend in 2016 was valued at $737 billion, with most of that spend occurring among enterprises. This is why when it comes to “Things,” BlackBerry is focused on EoT – the Enterprise of Things. So today we have taken our unique quality and turned it into a market-leading strategy – securing the EoT.
BlackBerry QNX technology touches our lives in many ways, from flipping a light switch, to seeing the doctor, to driving a car. Learn 35 surprising ways you encounter QNX technology in your daily live.
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
BlackBerry Work (formerly known as Good Work) is the best-in-class all-in-one enterprise productivity app that provides employees with integrated email, calendar, contacts, presence, document access, document editing, and more. With countless features such as contact photos and status, the ability to join meetings with one tap, full contact management and VIP notifications, and the ability to run presentations from mobile, you can be sure that every business process that can be done on desktop can now be done on the go.
Unlike consumer grade apps, BlackBerry Work is built for the business user. Designed to offer a consistent user experience across any device, it allows employees to communicate effectively from anywhere, whether it be at work, home, on the road—the possibilities are endless.
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
Organizations need to share files. In fact, over 50% of business processes, including some of the most critical, are document- based. However, most file sharing solutions have consumer-grade roots, and were not built with the security that enterprises need, balanced with the collaboration and mobility features their end users want. BlackBerry Workspaces™ makes enterprises more mobile and collaborative, while reducing the risk, complexity and cost of sharing information across and beyond your organization. Workspaces embeds digital rights management (DRM) protection in your files, so your content remains secure everywhere it goes. With Workspaces, you stay in control – even after files are shared outside your firewall.
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
Supporting outmoded technology for fragmented business processes can inevitably put any business at risk of becoming competitively irrelevant. This is especially true for enterprises in the fast-paced world of technology and manufacturing, where businesses are often globally dispersed and at risk of copycats in the black market. This is also an industry where the careful timing of product releases drives profitability. Staying on the leading-edge of technology adoption is critical to keeping up with the speedy execution and high expectations of the market.
Learn how BlackBerry Workspaces enables Technology & Manufacturing companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
BlackBerry® Workspaces allows enterprises to realize numerous business workflows to promote increased productivity and cost savings. The unique file-centric security approach allows controls and tracking to be built into documents. Now employees can safely access, share and collaborate on sensitive information on any endpoint with any user, reaping the benefits while reducing the risk associated with sharing across organizations.
BlackBerry Workspaces Mobile ApplicationsBlackBerry
Native mobile applications from BlackBerry Workspaces can enable smartphones and tablets to access sensitive corporate information, combining strong security, granular tracking and user-friendly mobile collaboration tools to realize work efficiency from anywhere on any device. Enterprises can now manage all of their corporate content through a “single pane of glass” or unified view for Enterprise File Sharing, Mobile Content Management and Collaboration.
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
In media and entertainment, timing is everything. Presenting the right information at the right time is often the key to success. Protecting creative assets, such as scripts and production plans, is just as important as sharing and collaborating on them — because leaks can have severe implications. The industry is in dire need for a better way to share information.
Learn how BlackBerry Workspaces enables Media & Entertainment companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
In healthcare, the efficient delivery of accurate information can save lives. Thus, the current technology trends of mobility and collaboration hold tremendous potential in improving administrative and patient care processes. Yet many hospitals still rely on paper-centric solutions, such as faxes and printers, that are expensive, labor intensive, and prone to data loss. Outdated technology drives up the cost of care and puts organizations at risk of violating industry regulations such as HIPAA and HITECH — potentially incurring exorbitant fines or jeopardizing reputation.
Learn how BlackBerry Workspaces enables Healthcare organizations to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
Government agencies face strict requirements to carefully manage and control sensitive information. However, this information often needs to be shared internally and externally (with other agencies, law enforcement and private sector). As agencies embrace mobility, new challenges emerge for providing information to any mobile device, computer or tablet, anywhere in the world. Users need the ability to work with and share fi les while mobile. Device-centric security fails to address data security requirements when information is accessed on unmanaged devices.
Learn how BlackBerry Workspaces enables Government agencies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
Energy and utilities companies derive significant competitive advantage and operational effectiveness from their resources and processes. Using outdated technologies, such as paper forms and faxes, makes them prone to accidental sharing and data leakage. Also, if the integrity of critical information, such as operational safety procedures, is tampered with, the safety and well-being of employees and reputation of the company are at stake. Careful coordination and consistent communication of such information with select business partners or mobile workers are essential to sustaining productivity.
Learn how BlackBerry Workspaces enables Energy and Utilities companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
Introducing BlackBerry Workspaces to an enterprise workforce kick-starts secure collaboration and true mobile productivity. With powerful security controls centered on files, content that includes intellectual property or Personal Identifiable Information (PII) can now be accessed on BYOD mobile devices, or shared with external business partners without fear. The ability to control, revoke and track corporate files provides unprecedented Data Loss Prevention.
In addition to the protected distribution of sensitive files, Workspaces provides two additional pillars in the world of Data Loss Prevention. Learn about them in this data sheet.
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
No enterprise security strategy or solution is complete without authentication. Managing and authorizing hundreds of user identities across disparate systems presents a formidable challenge for any IT organization. BlackBerry Workspaces recognizes that authentication and identity management should not be a deterrent to adopting critical new technology. We make it easy for enterprises to deploy Workspaces by providing self-provisioning methods out-of-the-box and by enabling integration with existing systems to align with current policies.
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
BlackBerry UEM delivers unified endpoint management and policy control for your diverse and growing fleet of devices and apps. With its single management console and trusted end-to-end security model, it provides the flexibility and security you need to keep your employees connected and protected.
Organizations need to mobilize all their core business apps including collaboration, ISV, and custom-developed apps. However, the conflicting needs of IT, developers and business owners often slow mobile initiatives. A common app platform can speed mobilization by enabling each stakeholder to focus on what they do best.
BlackBerry Dynamics enables IT, developers and business owners to meet their diverse needs and requirements when it comes to mobility, allowing each to focus on its own domain without interfering with other stakeholders.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
3. BLACKBERRY FOREWORD3
At the close of 2016, I had the pleasure of participating in a critical discussion in
Sydney about trends in cyber and mobile security. Together with BlackBerry and
other leaders in various fields of information and people security, this ‘Think Tank’
explored the threat impact today upon organisations in the private and public sectors
in Australia and around the world.
It goes without saying that cybercrime and cybersecurity were high on the agenda.
As a former advisor to the Obama government on the subject, this is an area I am
passionate about. It was clear that it’s a challenge for everyone, from C-levels
to boards to IT managers, who are grappling with these challenges every day
with different strategies. However, beyond this, we also heard first-hand how it
impacts technology and people strategies, including how roles and organisational
responsibilities are changing and solutions are evolving to help manage citizen
and employee safety.
The changing security threat outlook continues to be a challenge and 2017 will
be no different in how we tackle its problems. The landscape will only continue
to evolve, threats will grow and become more complex. This discussion among
some of Australia’s leading experts aimed to examine how organisations and
governments can better ready themselves for a crisis and mitigate risks in the
future. However, this is just a starting block.
We hope the themes in this report help to encourage ongoing dialogue about
cybersecurity, holistic strategies for staff and people safety – and importantly,
what can be done to mitigate and survive cybercrime’s destructive path.
Foreward by
Jeffrey Bleich
Partner at Dentons, former US Ambassador to Australia
and advisor to the Obama government on cybersecurity
Jeffrey Bleich
4. BLACKBERRY INTRODUCTION4
Once primarily the concern of IT departments, digital
attacks now threaten to disable critical infrastructure,
bring entire cities to their knees and steal billions of
dollars from the economy.
In 2015, the number of digital attacks increased 38%
on the previous year.1
The coming year is expected to
see even bigger growth in cybercrime, with the number
of potential targets, agents and vulnerabilities all
continuing to diversify and expand.
It’s a problem with a hefty price tag.
Today in Australia, cybercrime is a significant
financial problem. In the first quarter of 2015, more
than A$234 million worth of financial loss was self-
reported by victims of cybercrime to the Australian
Cybercrime Online Reporting Network (ACORN),
whilst a report by the Attorney General’s office
suggested the potential national cost at around
$2 billion a year.2
The rising threat tide is understandably causing an
increasing level of concern amongst business leaders.
A recent survey of more than 1,000 IT executives found
nearly nine out of 10 executives (86%) are nervous that
their company’s security won’t be enough to keep out
hackers or malware.3
Cybersecurity today is charged not only with protecting
technology, but also critical infrastructure and even
people. Recent crisis scenarios such as the 2016
South Australian power blackout saw technology
playing a lead recovery role – from messaging impacted
residents about the disaster to routing energy to critical
services such as hospitals and maintaining networks.
The BlackBerry Future of Security Think Tank brought
together a select group of experts to explore the
increasingly complex Australian security environment
– both on and offline. The goal was to establish dialog
amongst public and private sector experts, in order to
better understand the varied challenges facing cities in
the future and how best to develop more comprehensive
and collaborative risk management strategies.
Introduction
Australia’s
cyber risk profile
is changing.
1
BlackBerrySecuritySummitreporting,http://fleetowner.com/technology/your-biz-may-be-compromised-long-you-know-it-if-you-ever-do
2
https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/national-plan-to-combat-cybercrime.pdf
3
http://blogs.blackberry.com/2016/07/survey-nearly-9-out-of-10-executives-worry-their-companys-security-is-too-weak-to-deter-hackers/
5. BLACKBERRY 5 PARTICIPANTS
The Think Tank brought together participants from a wide-range of security
backgrounds – including fraud, cybersecurity and terrorism. Importantly the
sectors they work in are incredibly diverse, from professional services, government
departments, financial services, security agencies, utility and telecommunications
and academia.
The Think Tank was moderated by industry commentator and freelance journalist
Brad Howarth. He was joined by:
• Sinisha Patkovic – Vice President, BlackBerry Government Solutions
• Jeffrey Bleich – Group CEO and Partner, Dentons; Former US Ambassador
to Australia
• John Durbridge – Head of Campus Security, Macquarie University
• Berys Amor – Director for Technology, Corrs Chambers Westgarth
• Rex Stevenson – Director, Signet Group International; Former Director General
for Australian Secret Intelligence Service
• Claudine Ogilvie – Chief Information Officer, Jetstar Airways
• Craig Davies – CEO at Australian Cybersecurity Growth Network Ltd
• George Reinoso – Security and Services Consultant, Ericom
• Derek Chen – Regional Head of IT Security, British America Tobacco
• Dr Liming Zhu – Research Director, Software and Computational Systems,
DATA61 | CSIRO
The discussion unlocked a number of themes pertinent in the security landscape –
above and beyond just cyber. There were four key take outs that reflected what cities
in Australia and businesses within them should be thinking about moving into 2017
and beyond. These included:
• The need for a collective response
• The attack arms race
• Changing vulnerabilities
• Overcoming the human factor
Future of Security
Think Tank participants
6. BLACKBERRY 6 COLLECTIVE RESPONSE
Need for a
collective response
The need for a nationally integrated response
to cyber threats remains the single most
important goal for addressing cybercrime
in 2017, according to the Think Tank members.
7. BLACKBERRY 7
Almost all of the group suggested that changes
to the threat landscape have created an overlapping
responsibility between governments, private enterprise
and industry bodies.
For example, last financial year, peak government
body CERT Australia responded to 14,804 cybersecurity
incidents affecting Australian businesses, 418 of which
involved systems of national interest and
critical infrastructure.
With an increasing number of occurrences, it was
agreed collaboration was key. There are numerous
examples of where a joint effort has proved critical
in staving off a digital threat.
In 2012, a foreign criminal syndicate used some
30,000 Australian credit cards to make unauthorised
transactions of more than $30 million. It was only
because of the combined efforts of the Australian
Financial Police, many Australian banks and technology
providers in identifying the threat, that the sum didn’t
run into the hundreds of millions of dollars.
Yet historically, such deep and large scale cooperation
has been rare and it was the strong view of the Think
Tank that it was an area that needed immediate
emphasis. Participants agreed that there is too little
formal information sharing, and no clear lines of
responsibility in terms of what an organisation should
do to defend itself, and where the government’s role
starts and ends.
Jeffrey Bleich, the former US Ambassador to Australia
and now Group CEO and Partner at Dentons, said such
collaboration required a level of openness not previously
found in the sector.
“Only a few years ago many companies were loath to
share any information or disclose details about security
for fear of conceding a competitive edge. This position
is changing but needs to do so even more if we’re to
more effectively combat cybersecurity threats in the
coming year,” Mr Bleich said.
Mr Bleich’s comments were echoed by many other
Think Tank participants, who felt that while organisations
could cooperate when seeking to extinguish a specific
threat, ongoing collaboration continued to
be problematic.
There were a number of potential barriers to facilitate
more open exchange such as commercial sensitivity,
however the most prevalent concern was a lack of
a singular head administrative entity.
On the government side, there are dozens of bodies
focused on improved security and information sharing.
Within the private sector, the number of formal and
informal bodies and initiatives involved in digitally
protecting our cities runs into the hundreds.
Many of the participants said the plethora of conflicting
priorities and approaches amongst these businesses
could be confusing to individual organisations. Even
a seemingly simple task such as a shared definition
of ‘cybercrime’ could be problematic. In a recent threat
report from the Australian Cybersecurity Centre,
the body said “The Government’s definition of a
cyberattack can be at odds with what the information
security community, the public and the media envisage
cyberattacks to be.”
Nonetheless the requirement for a nationally coordinated
approach remains, even if the structure of this
relationship remains still undecided.
BlackBerry Think Tank representative, Sinisha Patkovic
who is BlackBerry’s Vice President of Government
Solutions said, “There are some considerable challenges
in bringing government and private enterprises together
when it comes to cybersecurity. Everyone has a slightly
different expectation and view about what a nationally
coordinated approach would look like. Fortunately,
I think Australia already has a lot of the right foundations
in place for such collaboration, it’s now about taking
the next steps.”
Although full cooperation may be a work in progress,
the Future of Security Think Tank agreed that there
were four key factors that could determine the success
of future collaborations:
• Helping educate Australians about how to better
protect themselves
• Improved dialogue between government and private
enterprise on cybersecurity – particularly in the area
of breach reporting
• Better intelligence provided by government about
emerging and likely cyberattacks
• Closer collaboration amongst those businesses
in the private sector
COLLECTIVE RESPONSE
4
http://webcache.googleusercontent.com/search?q=cache:clNj5DQivWsJ:www.aph.gov.au/DocumentStore.ashx%3Fid%3Da03cf049-7f2b-43bd-846c-9eb7bd2f59ef%26subId%3D253039+&cd=3&hl=en&ct=clnk&gl=au
5
https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016.pdf
6
https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016.pdf
8. BLACKBERRY 8 ARMS RACE
The attack
arms race
Even the cyber criminals themselves are morphing.
The term ‘cyber criminal’ is a catchall category that
now includes a vast range of nation states, groups
and individuals engaged in online crime from all
corners of globe. Their drivers are as distinct as
their backgrounds, from pure financial gain through
to disrupting critical infrastructure.
However, there is one trait that almost all share – they
can move at the speed of light. Criminals are able to
absorb and take advantage of new vulnerabilities within
days or even hours.
The ability to prepare for, or even respond to, such a
rapidly changing threat landscape was much discussed
by the Think Tank members.
One of the big drivers between improved public/
private cyber collaboration was that many Think Tank
participants felt companies were struggling to keep
pace with an ever-changing range of threats.
Dr Liming Zhu, Research Director of Software and
Computational Systems at CSIRO, gave some interesting
insight into how this created a sense of pressure amongst
those charged with protecting the networks.
“At times it really does feel like an arms race. The better we
get at finding countermeasures, those countermeasures then
become a training ground for adversaries to find better exploits.
As a company, you need be methodical about removing classes
of threats completely. Keeping focused on the root cause
is very important,” Dr Zhu said.
9. BLACKBERRY 9
George Reinoso, a Security and Services Consultant
at Ericom, agreed with Dr Zhu’s thoughts. Rather than
getting overwhelmed he said, “The companies that
weather an unexpected crisis the best are the ones that
are meticulous with their planning. They may not know
the nature of the threat but they know, down to the
smallest degree, what their response approach will be.
When working in an environment where things change
so quickly, it’s important not to get too swept up and
instead focus on preparedness. At the end of the day
it’s the details that matter.”
Another way of alleviating the burden of protecting
a network is to seek outside experts to help better
understand and address rapidly changing threats. As
Head of Campus Security at one of Australia’s leading
education organisations, John Durbridge from Macquarie
University said academic insight should play a key role
in shaping industry security strategy. “Keeping ahead
of the game is key when it comes to cybersecurity.
We have access to some of Australia’s brightest
minds here at Macquarie enabling us to draw on their
expertise and stay one step ahead. It’s important that
organisations are flexible and open minded in who
is the ‘expert’ when it comes to security.”
Whilst the industry pushes towards drawing on more
security experts, those behind cybercrimes are often
at the other end of the spectrum.
Underpinning the ‘attack arms race’ is an increasingly
business-like approach taken by digital crime
organisations – offering products and services to the
less technology savvy. Hackers for hire are likely to offer
round-the-clock support desk services, money laundering
expertise and readily packaged cybercrime ‘kits’ .
The so-called ‘script kiddies’ armed with off-the-shelf
DDoS products were widely suspected to be behind
the Dyn attacks in October 2016, which brought down
services such as Twitter, Spotify, Netflix and Paypal.
The hackers infected common IoT devices, such
as DVRs and webcams, with a malware named
Mirai that turned these devices into a powerful botnet
army that jammed up traffic to a domain name system
(DNS) server.
While most Think Tank participants weren’t specifically
concerned about the threat from less sophisticated
attackers, it did raise concerns about the need for
constant vigilance.
Craig Davies, the former Director of Security at
Atlassian and now Chief Executive Officer at the
Australian Cybersecurity Growth Network Ltd said,
“We need to be continually testing and helping our
organisations on security to deal with an almost
constant threat. Every company has a security strategy
and plan, but too many of them just sit in a desk drawer
somewhere. Organisations need to stop asking ‘What
could possibly go wrong?’ and accept that constant
attack is the new normal.”
At times it really does feel like
an arms race. The better we get
at finding countermeasures, those
countermeasures then become a
training ground for adversaries to find
better exploits. As a company, you need
be methodical about removing classes
of threats completely. Keeping focused
on the root cause is very important
ARMS RACE
7
http://www.pcworld.idg.com.au/article/599997/cybercriminals-increasingly-embracing-sophisticated-business-model-approach/
10. BLACKBERRY 10 VULNERABILITIES
Changing
vulnerabilities
However, it is not just the rate and sophistication of attacks that is changing, vulnerability areas
are also shifting. The Think Tank believed that technology security professionals needed to widen
their view of what needs to be protected.
The potential vulnerability of the Internet of Things,
infected Artificial Intelligence engines and even
people themselves were amongst some of the
potential concerns raised by the group.
Most pointed to the potential impact of targeting these
emerging areas. The 2015 attack on Ukraine power
stations via connected plant control equipment provided
a sobering example. In this instance cyber terrorists shut
down 30 substations throughout the country – leaving
hundreds of thousands of residents without electricity
for hours. Authorities believe more than six months of
planning went into the attack using a combination of
spear phishing, keylogging and data exfiltration.
However, participants were quick to point out that it
wasn’t just large-scale utility infrastructure that was
at risk. During the past 12 months, researchers have
hacked everything from hospital insulin pumps to
humble electric kettles.
Think Tank participants said they expected to see
increasing connections between the technological
and physical worlds in a bid to better protect cities.
Jeffrey Bleich felt that an integrated approach is
paramount to success, “The notion that people think
differently in the virtual and physical world is a fiction.
We need to observe human nature and apply this
to both spheres, where we are now operating
simultaneously.”
8
http://blogs.blackberry.com/2016/11/how-hackers-could-draft-connected-cars-into-their-botnet-armies/
11. BLACKBERRY 11 VULNERABILITIES
Craig Davies, Chief Executive Officer at Australian
Cybersecurity Growth Network Ltd, echoed Mr Bleich’s
comments, adding, “It’s critical to our organisations that
we have good overlap between the protection of physical
assets and the IT world. Most organisations in the past
have tended to do one area well, but not necessarily
the other. In such an integrated future we need to be
able to do both really well.”
Derek Chen, Regional Head of IT Security at British
America Tobacco, added, “We’re operating in a new
world. We have had to find new ways of working, with
a number of teams working together whenever there
is a risk highlighted in our organisation to get the best
outcome. An integrated approach is necessary with
fighting sophisticated threats.”
Claudine Ogilvie, Chief Information Officer at Jetstar
further commented, “It is indeed a new world with the
risk of human factors a big threat – just as much as
technology. A big part of a company’s strategy should
be to help staff understand the risks and what to look
out for. To do this you need to bring people on the
journey, putting methods in place to help change
behaviours and be more vigilant. Together with
enhanced technology, it’s important to create that
culture of education across different lines of business –
and that is often overlooked in an organisation.”
“Looking specifically at IT security, with larger
organisations there can be different maturity levels
across the business - what is accepted in one part
of the business, may not be embraced in others.
You can’t simply look at an organisation as a single
environment. There are many individual, yet
overlapping needs.”
In reference to the ‘new world’ of security, this is
also where people, as well as information and data,
are subject to threats. The Think Tank participants
discussed the changing role of the CIO and the wider
threat landscape where partner organisations, friends
and families were an increasingly targeted vulnerability.
These parties were often seen as the weakest link in
the security chain, providing a stepping stone to the
organisation or high value individual.
“As an organisation we don’t only think about security
as something that happens within our internal systems,”
said Berys Amor, Director of Technology at Corrs
Chambers Westgarth. “Sometimes the easiest way
to get to a company might be through a partner
organisation and as an industry we’re increasingly
seeing cyber criminals go after executives through
their personal assistant, friends or even families.”
Looking specifically at IT security, with larger organisations there can
be different maturity levels across the business - what is accepted in
one part of the business, may not be embraced in others. You can’t simply
look at an organisation as a single environment. There are many individual,
yet overlapping needs.
12. BLACKBERRY 12 HUMAN FACTOR
Overcoming
the human factor
Undoubtedly, the key concern amongst businesses
was that security was often perceived as a barrier
to productivity, rather than a critical safeguard.
Many participants believed that increased security
was inseparably linked to sluggish performance or
administrative red-tape.
Research suggests this belief is right on the money.
A recent BlackBerry security survey found that
82% of global executives felt that security precautions,
specifically in mobile working, caused at least some
frustration amongst their employees. Incredibly,
44% of employees felt too much security could
stop employees from doing their job altogether.
Against this backdrop, many in the Think Tank
believed that a better approach for businesses
was to deploy security solutions that better
matched existing employee behaviours.
In an environment of ever evolving technology threats, it’s somewhat ironic
that amongst the biggest problems in digital safety is the ‘human element’.
Every member of the Think Tank was able to provide extensive examples
of how people could unravel even the most well-thought security strategy.
13. BLACKBERRY 13 HUMAN FACTOR
According to Derek Chen, Regional Head of IT Security,
British America Tobacco, “a lot of issues come down
to people, they absolutely shape the risk profile. As an
industry we need to build our solutions from the people
perspective up. The challenge is that behaviours, like
technologies change all the time, you have to constantly
monitor how people are or aren’t using security and
adjust your strategy accordingly. It’s not just about
ticking off boxes and thinking you’re done.”
It’s this kind of accommodating approach that Berys
Amor, Director of Technology at law firm Corrs Chambers
Westgarth has been using with some success. The firm
has developed an ongoing internal communications
program to help employees to better understand the
importance of security.
“Five years ago employees were not as aware of the
security threats and we’ve slowly been able to turn that
around through ongoing awareness activity and making
sure our approach fitted the needs and expectations of
the business. Today we have a lot of interaction with the
business to check that partners and staff are doing the
right thing.”
Companies are highly aware of employees circumventing
security measures. BlackBerry’s recently commissioned
research into mobile working practices found 62% of
Australian businesses are worried about the risks of errant
employees storing sensitive information on cloud services.
Rather than driving to force employees to use company-
provided storage, 75% of companies within the survey
said they were working towards delivering an enterprise-
grade file sharing service – that would accommodate both
employee workflow and company needs.
The Think Tank said executive support was critical in
creating a successful security culture. Rex Stevenson,
the former Director General for the Australian Secret
Intelligence Service and now Director of Signet Group
International said, “Unless security is driven from the
very top of the organisation, you’re not going to get any
real change. The CEO needs to get behind it and push
it, otherwise all of your effort trying to change the rest
of the organisation is lost. You need the commitment
right through the organisation, but it needs to start with
the most senior executives.”
What can sometimes be an overlooked factor, the Think
Tank believed there are three critical steps in overcoming
the ‘human element’ challenge:
• Constantly test adherence and educate; being
vigilant around both is the centrepiece of a successful
security strategy
• Design strategies and programs within organisations
for the people, not for the product
• Behaviour changes constantly; be aware of how
working and social patterns evolve within an
organisation over time
The challenge is that behaviours, like
technologies change all the time, you
have to constantly monitor how people
are or aren’t using security and adjust
your strategy accordingly. It’s not just
about ticking off boxes and thinking
you’re done.
14. BLACKBERRY 14 THE VIEW
I’ve said it before, and I’ll say it again – mobile, in all its
forms has changed the way the cybersecurity landscape
needs to operate. The Internet of Things will require
further changes to how we all think and act about
cybersecurity in the enterprise and beyond. This is
why we have accelerated our efforts to address these
emerging issues, with what BlackBerry calls – “The
Enterprise of Things.”
By this, we mean the network of intelligent connections
and end points within the enterprise that enables
products to move from sketch to scale. It’s the devices,
computers, sensors, trackers, equipment and other
“things” that communicate with each other to enable
smart product development, distribution, marketing
and sales.
A Future without vulnerabilities?
At BlackBerry, we know that mobile has brought
a series of challenges to organisations – from BYOD
to end user data in the cloud, the convenience of
mobile is marred by the security risks it presents.
Today, as companies continue to grapple with securing
their mobile workforces, they are also looking to the
future and how to manage all the other end-points
that are sharing unsecured data.
As shared on our blog, Inside BlackBerry, when
individuals buy electronic devices or use online
services, they generally assume that they’re secure
and that they will protect our private information.
But all too often, these assumptions turn out to be
wrong, as highlighted by the constant news stories
on major cyberattacks and data breaches. The root
of the problem is the typical industry approach to
security: build products, ship them, and hope they
don’t get hacked.
We know that a future without vulnerabilities is one
of the world’s biggest challenges. So, at BlackBerry,
we’re working day and night to turn this security
model on its head. Rapid patching is critical to product
security, but the reactive approach gives the attacker
the opening move. Formal methods have the potential
to proactively improve security design standards and
certifications, giving us the ability to prove that products
and services are secure – including the obscure details
that even the experts sometimes overlook. With the
cybersecurity battle raging on, formal methods can
change the battlefield over the long term and give us
the best possible chance to win the war.
Organisations therefore need to take a more
strategic look at how they comprehensively protect
themselves from end to end. The right approach
to achieving sustainable results rests on three pillars:
making the decisions at the right level through
Governance of IT and Security, having a big
picture with a comprehensive security program,
and ensuring effective use of the security tools.
Software plays a vital role as it is a core building
block of a modern enterprise. It needs to mitigate
both the current threats as well as be resilient
against challenges still to come.
For BlackBerry, it is vitally important that we not
only create great software but that we are able to
help organisations at a strategic level understand
the threat landscape and take appropriate action.
This is why information-sharing initiatives like this
‘Think Tank’ are very important – because collaboration,
at every level, is key to combatting the ever changing
threat. Without dialogue, we are limited in our
understanding and therefore deficient in our solution.
Our enemy listens, learns and adapts with swiftness
and precision. We must do the same.
The
BlackBerry view
by Sinisha Patkovic, Vice President, BlackBerry Government Solutions
15. BLACKBERRY 15 CLOSING THOUGHTS
The changing cybersecurity threat landscape demands greater clarity regarding the
roles and responsibilities both within and between those organisations under threat.
At the same time, the group which should consider itself under threat is constantly
adding new members, while the threats they face are growing more complex and
broadening in scope.
Faced with such a complex and potentially confusing scenario, it is incumbent upon
all organisations to not just consider the threats they face and their potential impact,
but to also be actively planning for the seeming inevitability that one day their fears
will be realised.
It is not enough for an organisation to simply maintain a defensive perimeter,
especially as the insider threat – be it accidental or malicious – has proven to be
so devastating to so many organisations. So too organisations must accept that the
goals of unscrupulous attacks today are wider than just financial windfalls – intellectual
property, customer records, staff data, and so many other information types all have
value and can all be used to inflict damage at an organisational or even personal level.
And it is not just the actions of malicious actors that organisations must be prepared
for. The heavy dependency of organisations on digital systems and communications
means natural occurrences can have a devastating impact on business continuity.
It is essential that all organisations be well drilled in what to do once an incident
occurs – for the protection of staff as well as for its reputation, intellectual property,
and financial assets. So too it is vital that mechanisms exist so that information
regarding attacks can be quickly shared amongst those most vulnerable.
Because the enemy is multitudinous, well-armed, and has very little to lose.
The same cannot be said of their targets.
Brad Howarth
Closing Thoughts by Think Tank moderator