Daniel Ehrenreich, BSc. is a leading Industrial Control System (ICS) expert and acting as consultant and lecturer at Secure Communications and Control Experts (SCCE) consulting entity, based in Israel.
Periodically conducting workshop sessions via Internet and in person for educating international participants on ICS cyber security risks and defense measures for a broad range of ICS verticals.
Studied CISSP in 2014 and is certified as a Lead Auditor for the ISO 27001-2013 standard by the Israeli Institute of Standards.
Daniel has over 30 years of engineering experience with ICS for: electricity, water, oil and gas and power plants as part of his activities at: Tadiran Electronics, Motorola Solutions, Siemens and Waterfall Security.
Reselected as the Chairman for the 6th ICS Cybersec AI&ML 2021 hybrid conference, organized by People and Computers.
Smart Buildings, Deep Learning AI, Drones, Robotics, and IoT....What is next?
Martin Sheridan, CTO of Sheridan Solutions Consulting and his co-author, our COO Scott Taylor explore the challenges and opportunities that emerging technologies are driving across security industry.
Top Industries Looking for Cyber Security Experts.pdfDataSpace Academy
With cyber-crimes taking a toll on almost all the industries out there, there is a rising demand for cyber security experts. From finance to healthcare to defense, and more, industries all across the world are actively hunting for cybersecurity specialists. Businesses worldwide are also flexible to offer high pay packages, thereby assuring a thriving career opportunity for cybersecurity professionals. The blog offers a brief on the top industries that are looking for skilled cyber security experts.
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
Technology continues to evolve at a rapid pace, presenting both opportunities and challenges. Among these challenges, the threat of cyber security attacks looms large. This poses significant risks to individuals, businesses, and governments alike. The importance of adopting robust security measures cannot be overstated. please visit: https://www.cyberhive.com/insights/how-to-avoid-cyber-security-attacks-in-2024/
What i learned at issa international summit 2019Ulf Mattsson
This session will discuss what attendees learned at The ISSA International Summit 2019, held on October 1-2 at in Irving/Dallas, TX.
Learn from one of the presenters at this conference and what cybersecurity professionals got to share and learn from the leaders in the industry.
Over the last 30 years ISSA international has grown into the global community of choice for international cybersecurity professionals. With over 100 domestic and international chapters, members have world wide support with daily cyber threats that are becoming increasingly intricate and difficult to prevent, detect, and re-mediate.
Smart Buildings, Deep Learning AI, Drones, Robotics, and IoT....What is next?
Martin Sheridan, CTO of Sheridan Solutions Consulting and his co-author, our COO Scott Taylor explore the challenges and opportunities that emerging technologies are driving across security industry.
Top Industries Looking for Cyber Security Experts.pdfDataSpace Academy
With cyber-crimes taking a toll on almost all the industries out there, there is a rising demand for cyber security experts. From finance to healthcare to defense, and more, industries all across the world are actively hunting for cybersecurity specialists. Businesses worldwide are also flexible to offer high pay packages, thereby assuring a thriving career opportunity for cybersecurity professionals. The blog offers a brief on the top industries that are looking for skilled cyber security experts.
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
Technology continues to evolve at a rapid pace, presenting both opportunities and challenges. Among these challenges, the threat of cyber security attacks looms large. This poses significant risks to individuals, businesses, and governments alike. The importance of adopting robust security measures cannot be overstated. please visit: https://www.cyberhive.com/insights/how-to-avoid-cyber-security-attacks-in-2024/
What i learned at issa international summit 2019Ulf Mattsson
This session will discuss what attendees learned at The ISSA International Summit 2019, held on October 1-2 at in Irving/Dallas, TX.
Learn from one of the presenters at this conference and what cybersecurity professionals got to share and learn from the leaders in the industry.
Over the last 30 years ISSA international has grown into the global community of choice for international cybersecurity professionals. With over 100 domestic and international chapters, members have world wide support with daily cyber threats that are becoming increasingly intricate and difficult to prevent, detect, and re-mediate.
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
CIOs play a pivotal role in safeguarding the digital frontier.
Their responsibilities include risk assessment, policy development, and staying informed about emerging technologies.
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today's Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, and defend against such threats in near real time conditions is not possible without the employment of threat intelligence, big data, and machine learning techniques. Cyber Threat Intelligence CTI has become a hot topic and being under consideration for many organizations to counter the rise of cyber attacks. The vast majority of information security challenges we face today are the result of serendipitous and naive decisions made in the early stages of the Internet. Khin Myat Nwe Win | Yin Myo Kay Khine Thaw "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26504.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26504/information-sharing-of-cyber-threat-intelligence-with-their-issue-and-challenges/khin-myat-nwe-win
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
Explore the world of IoT cybersecurity. Expose challenges and discover effective strategies to secure your digital security. Stay secure in the dynamical landscape of cybersecurity in IoT.
Stefan Zarinschi in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
This edition features The Most Impressive Leaders in Cybersecurity, Making Waves in the Industry that are at the forefront of leading us into a digital future
Read More: https://ciolook.com/most-impressive-leaders-in-cybersecurity-making-waves-in-the-industry-2023-august2023/
Cybersecurity encompasses a set of practices, technologies, processes, and measures designed to protect digital systems, networks, devices, and data from cyber threats, unauthorized access, and malicious attacks.
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
Artificial Intelligence (AI) fortifies cybersecurity by dynamically identifying and neutralizing cyber threats. With machine learning algorithms, AI analyzes patterns in real-time data, swiftly detecting anomalies and potential security breaches. This proactive approach enhances the overall defense mechanism, ensuring robust protection against evolving cyber threats in the ever-changing digital landscape.
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
Holistic Cyber Risk Management Programs in the Financial Industry Must "Predict and Prevent" in Today's Complex Threat Environment, says new White Paper.
Cyber-attacks are an alarming threat to all types of businesses & organizations.The risk of a cyber-attack is not just a risk to your company but also to your privacy.Hence, cybersecurity is crucial for every business. Cybersecurity protects critical data from cyber attackers. This includes sensitive data, governmental and industry information, personal information, personally identifiable information (PII), intellectual property, and protected health information (PHI). If you are looking for tools to fight against cyber threats, then Techwave’s tools & technologies with adequate controls will help your organization stay protected.
Cyber-attacks are an alarming threat to all types of businesses & organizations.The risk of a cyber-attack is not just a risk to your company but also to your privacy.Hence, cybersecurity is crucial for every business. Cybersecurity protects critical data from cyber attackers. This includes sensitive data, governmental and industry information, personal information, personally identifiable information (PII), intellectual property, and protected health information (PHI). If you are looking for tools to fight against cyber threats, then Techwave’s tools & technologies with adequate controls will help your organization stay protected.
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
Executive Summary
No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. Evaluating cyber risk in industrial control system (ICS) networks is difficult, considering their complex nature. For example, an evaluation can consider (explicitly or implicitly) up to hundreds of millions of branches of a complex attack tree modelling of cyberattacks interaction with cyber, physical, safety and protection equipment and processes. This paper was written to assist cyber professionals to understand and communicate the results of such risk assessments to non-technical business decision-makers.
This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyberattacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
Chuck D. BROOKS, President of Brooks Consulting International
Mr. Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles.
In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck has been a featured speaker at dozens of conferences and webinars (Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity). and has published more than 200 articles and blogs on cybersecurity, homeland security and technology issues. His writings have appeared on AT&T, IBM, Microsoft, General Dynamics, Xerox, Cylance, Checkpoint, and many other blogs.
Troels Ørting Jørgensen, Chairman at Bullwall, Expert Member at INTERPOL
Mr. Ørting is a globally recognized Cyber Security Expert. He has been working in cybersecurity ‘first line’ for over 4 decades. Throughout career, Mr. Ørting has been working with governments and corporations to advise on how they react to the increasing international cyber threats, and worked closely with law enforcement, intelligence services and cyber security businesses.
Formerly, with the Danish National Police, first as Director, Head of the Serious Organised Crime Agency and then as Director of Operations, Danish Security Intelligence Service; Deputy Head, ICT Department and Deputy Head, OC Department, Europol, EU’s Police Agency; Head of European Cybercrime Centre and Head of Europol Counter Terrorist and Financial Intelligence Centre. 2015-18, Group Chief Information Security Officer (CISO), Barclays. Chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has very strong experience in cyber security. Since 2018, Head of the Centre for Cybersecurity, World Economic Forum. Chairman of the Board of World Economic Forum Centre for Cybersecurity (C4C).
Troels Oerting
“WE, IN SECURITY, SHOULD NOT PROMOTE FEAR – BUT PROTECT HOPE”
BEFORE THE GLOBAL PANDEMIC HIT THE WORLD IN SPRING 2020, the digital transformation increased speed and magnitude. Fuelled by super-drivers like mobile/5G, IoT, Cloud and AI the number of users, applications, storage, connections and algorithms outpaced what we had seen before. The huge possibilities provided by the Internet created a ‘tech’ environment attracting the best brains the World could produce and geopolitical tensions between China, Russia, EU and US intensified the regional competition on ‘who controls the Internet’ and the subsequent influence, growth and wealth.
THE GLOBAL COVID PANDEMIC FORCED US TO MOVE APPROXIMATELY 1.2 BN WORKERS FROM THEIR OFFICES to work from homes in order to keep the wheels spinning. Internet enabled communication tools substituted physical meetings, teaching, marketing, trading, reading, accounting, watching and demand for online services surged and Accenture has estimated that globally we went through 3 years normal speedy digital transformation in just 3 months. This will continue. We will not go back to the ‘old days’ even after we get a vaccine. We will continue to work remotely – not necessarily from home but from anywhere. Both employers and employees have seen the benefits of this new flexible work-regime providing support from working both from offices and from anywhere.
“In the future everything will be connected, everything will be sensing, everything will be stored and everything will be used, sold or utilised in other ways”
THE FUTURE will provide more positive opportunities for the global, and connected, citizen – for businesses, education, healthcare, sustainability, climate, transparency and democracy. But it will also present challenges to security, privacy...
More Related Content
Similar to Top Cyber News Magazine Daniel Ehrenreich
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
CIOs play a pivotal role in safeguarding the digital frontier.
Their responsibilities include risk assessment, policy development, and staying informed about emerging technologies.
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today's Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, and defend against such threats in near real time conditions is not possible without the employment of threat intelligence, big data, and machine learning techniques. Cyber Threat Intelligence CTI has become a hot topic and being under consideration for many organizations to counter the rise of cyber attacks. The vast majority of information security challenges we face today are the result of serendipitous and naive decisions made in the early stages of the Internet. Khin Myat Nwe Win | Yin Myo Kay Khine Thaw "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26504.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26504/information-sharing-of-cyber-threat-intelligence-with-their-issue-and-challenges/khin-myat-nwe-win
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
Explore the world of IoT cybersecurity. Expose challenges and discover effective strategies to secure your digital security. Stay secure in the dynamical landscape of cybersecurity in IoT.
Stefan Zarinschi in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
This edition features The Most Impressive Leaders in Cybersecurity, Making Waves in the Industry that are at the forefront of leading us into a digital future
Read More: https://ciolook.com/most-impressive-leaders-in-cybersecurity-making-waves-in-the-industry-2023-august2023/
Cybersecurity encompasses a set of practices, technologies, processes, and measures designed to protect digital systems, networks, devices, and data from cyber threats, unauthorized access, and malicious attacks.
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
Artificial Intelligence (AI) fortifies cybersecurity by dynamically identifying and neutralizing cyber threats. With machine learning algorithms, AI analyzes patterns in real-time data, swiftly detecting anomalies and potential security breaches. This proactive approach enhances the overall defense mechanism, ensuring robust protection against evolving cyber threats in the ever-changing digital landscape.
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
Holistic Cyber Risk Management Programs in the Financial Industry Must "Predict and Prevent" in Today's Complex Threat Environment, says new White Paper.
Cyber-attacks are an alarming threat to all types of businesses & organizations.The risk of a cyber-attack is not just a risk to your company but also to your privacy.Hence, cybersecurity is crucial for every business. Cybersecurity protects critical data from cyber attackers. This includes sensitive data, governmental and industry information, personal information, personally identifiable information (PII), intellectual property, and protected health information (PHI). If you are looking for tools to fight against cyber threats, then Techwave’s tools & technologies with adequate controls will help your organization stay protected.
Cyber-attacks are an alarming threat to all types of businesses & organizations.The risk of a cyber-attack is not just a risk to your company but also to your privacy.Hence, cybersecurity is crucial for every business. Cybersecurity protects critical data from cyber attackers. This includes sensitive data, governmental and industry information, personal information, personally identifiable information (PII), intellectual property, and protected health information (PHI). If you are looking for tools to fight against cyber threats, then Techwave’s tools & technologies with adequate controls will help your organization stay protected.
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
Executive Summary
No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. Evaluating cyber risk in industrial control system (ICS) networks is difficult, considering their complex nature. For example, an evaluation can consider (explicitly or implicitly) up to hundreds of millions of branches of a complex attack tree modelling of cyberattacks interaction with cyber, physical, safety and protection equipment and processes. This paper was written to assist cyber professionals to understand and communicate the results of such risk assessments to non-technical business decision-makers.
This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyberattacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
Chuck D. BROOKS, President of Brooks Consulting International
Mr. Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles.
In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck has been a featured speaker at dozens of conferences and webinars (Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity). and has published more than 200 articles and blogs on cybersecurity, homeland security and technology issues. His writings have appeared on AT&T, IBM, Microsoft, General Dynamics, Xerox, Cylance, Checkpoint, and many other blogs.
Troels Ørting Jørgensen, Chairman at Bullwall, Expert Member at INTERPOL
Mr. Ørting is a globally recognized Cyber Security Expert. He has been working in cybersecurity ‘first line’ for over 4 decades. Throughout career, Mr. Ørting has been working with governments and corporations to advise on how they react to the increasing international cyber threats, and worked closely with law enforcement, intelligence services and cyber security businesses.
Formerly, with the Danish National Police, first as Director, Head of the Serious Organised Crime Agency and then as Director of Operations, Danish Security Intelligence Service; Deputy Head, ICT Department and Deputy Head, OC Department, Europol, EU’s Police Agency; Head of European Cybercrime Centre and Head of Europol Counter Terrorist and Financial Intelligence Centre. 2015-18, Group Chief Information Security Officer (CISO), Barclays. Chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has very strong experience in cyber security. Since 2018, Head of the Centre for Cybersecurity, World Economic Forum. Chairman of the Board of World Economic Forum Centre for Cybersecurity (C4C).
Troels Oerting
“WE, IN SECURITY, SHOULD NOT PROMOTE FEAR – BUT PROTECT HOPE”
BEFORE THE GLOBAL PANDEMIC HIT THE WORLD IN SPRING 2020, the digital transformation increased speed and magnitude. Fuelled by super-drivers like mobile/5G, IoT, Cloud and AI the number of users, applications, storage, connections and algorithms outpaced what we had seen before. The huge possibilities provided by the Internet created a ‘tech’ environment attracting the best brains the World could produce and geopolitical tensions between China, Russia, EU and US intensified the regional competition on ‘who controls the Internet’ and the subsequent influence, growth and wealth.
THE GLOBAL COVID PANDEMIC FORCED US TO MOVE APPROXIMATELY 1.2 BN WORKERS FROM THEIR OFFICES to work from homes in order to keep the wheels spinning. Internet enabled communication tools substituted physical meetings, teaching, marketing, trading, reading, accounting, watching and demand for online services surged and Accenture has estimated that globally we went through 3 years normal speedy digital transformation in just 3 months. This will continue. We will not go back to the ‘old days’ even after we get a vaccine. We will continue to work remotely – not necessarily from home but from anywhere. Both employers and employees have seen the benefits of this new flexible work-regime providing support from working both from offices and from anywhere.
“In the future everything will be connected, everything will be sensing, everything will be stored and everything will be used, sold or utilised in other ways”
THE FUTURE will provide more positive opportunities for the global, and connected, citizen – for businesses, education, healthcare, sustainability, climate, transparency and democracy. But it will also present challenges to security, privacy...
Own Your Future!
“It is time for us all to stand and cheer for the doer, the achiever - the one who recognizes the challenges and does something about it.” Vince Lombardi
ONLY talents! NO ranking here!
With the global skills shortage, it is crucial to encourage talents who dedicate their life and career to cybersecurity.
This special edition spotlights remarkable cybersecurity and industry 4.0 professionals. Top Cyber News Magazine is pleased to unveil a constellation of young and devoted men and women: amabasadors, erudites, and influencers.
All, part and inspiring force behind the global Cybersecurity Awareness movement. These talented experts and brilliant people coming from nineteen countries and five continents.
I invite you to discover these wonderful people. Speak about them. See the light in others and you will be stunned how this light comes back to you! Enjoy reading! Share! Learn!
40 under 40! Move to the Front Lines!
Editorial by Steve KING
Managing Director at CyberTheory
As the gap expands between supply and demand in cybersecurity skills, we now see over 70 online eLearning courses available that focus across a wide range of upskilling opportunities from data privacy to compliance to risk and vulnerability assessment and audit. As we celebrate our newest class of 40 under 40, we are optimistic that this generation of cybersecurity enthusiasts are interested in the actual battle zones upon which our current war is being fought and not on preparation for the administrative roles which are also necessary in battle, yet not feeling the pressure from the current skills gap.
In our work with our own eLearning platform, CyberEd.io, we have discovered that the key employment opportunities lie along the front lines of deployment, where trained cyber-warriors are so necessary not just to defend our critical assets but to serve as a deterrent to the flood of cyber-criminals assaulting our fortresses. Every CISO we talk to confirms this requirement with both anecdotal and empirical evidence that is leading to almost daily breaches across all industrial sectors with specific threats to banking, education, healthcare, military and industrial control systems in automated factories (OT).
The cyber-warrior education career path starts with a solid grasp of network engineering fundamentals, followed by security architecture & engineering with an emphasis on Cloud/SysOps/*nix (*Unix/Linux Linux, FreeBSD, and Mac OS X), ICS/IoT, identity access management, security assessment & testing, current threat profiles and malware infrastructure and architecture, vector identification, incident detection, security operations with forensics and incident handling, pen testing, and exploitation.
Without properly trained resources in advanced cyber-warfare, we will never prevail in our constant challenge to protect and defend, let alone being able to take the threat to the enemy. As more and more entry candidates choose training to prepare them for ...
Margo KONIUSZEWSKI’s motto in tackling cyber challenges is « Cybersecurity education is like a marathon, not a sprint. It calls for a sustained effort, crosscutting approach and questions that lead to novel thinking and action! »
She champions digital literacy, cybersecurity and lifelong learning as the new imperatives of Economy 4.0, from junior to senior.
Her Cybersecurity Challenge, that took place despite the COVID crisis, was the world’s first competition to bring together multi-disciplinary “tiger groups” - student teams from IT/engineering, business, law, medicine and military academies in tackling a massive and far-reaching cyber-crisis.
Building on this success she launched a Regional Cyber Labs network run by students for students and the wider community as centers of cyber competence to raise awareness and educate.
The project went worldwide with the Global Cyber Lab to promote cross-sectoral action between the private/public sectors, academia, and diplomats. Her « New Roadmap for Cybersecurity Education » report was adopted and commended by the United Nations Open Ended Working Group on Cybersecurity as a benchmark in cyber capacity-building for all 193 Member States to take-up to boost their cybersecurity landscape.
She then organized the first Global Cybersecurity Roadshow 2021-22 event as part of a year-long program of exchanges between university students from all continents and world class cybersecurity champions. She is now touring Poland with events and conferences around her new audiobook: “Striptease in the age of apps and algos” on technology and how the digital transformation is impacting every aspect of our lives.
For Margo, cybersecurity is too important to leave in the hands of bureaucrats or technicians. We must get everyone on board!
------------------------------------
Adam KONIUSZEWSKI is Adam Koniuszewski serves as President of the Warsaw Security Hub of the Swiss Embassy in Poland and as Executive in Residence at the Geneva Center for Security Policy (GCSP), an international think-tank on global affairs diplomacy to promote security and cooperation.
A social entrepreneur and philanthropist, he launched The Bridge Foundation with his wife Margo to promote awareness and cooperative action on pressing security, economic and social challenges.
Adam has extensive experience in a wide range of sectors including Big Four, Fortune 100, and global non-profit in close cooperation with the United Nations and international organizations. For close to a decade, he worked with President Mikhail Gorbachev as executive director of his international initiative to address global security and sustainability. He was particularly successful in developing partnerships with the private sector to implement development projects around the world.
Adam is actively engaged with the CPA and CFA organizations to promote the highest ethical standards and professional compliance for their members.
Adam holds a Graduate Diploma and ...
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTopCyberNewsMAGAZINE
Dr. Bradford L. Sims became Capitol Technology University's eighth president on June 1, 2017. An educator, administrator and construction project manager, Dr. Sims has extensive experience both in academia and industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from Purdue University, which is also his undergraduate alma mater; he received his B.S. in Building Construction Management there in 1990. He also holds a master's of science degree in Building Construction from the University of Florida. He is a member of the Sigma Lambda Chi International Construction Honor Society and the American Institute of Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10 Most Influential Educational Leaders of 2021. He leads Capitol Technology University with an education laser-focused on STEM or Management of STEM careers which uniquely positions students for top roles in the region's booming tech hub.
‘The education of the next generation of Cyber experts must start now’, include all those that have historically been limited to be part of this defence of our ways of life. ~ Dr. Ian McAndrew
Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award-winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized cybersecurity degrees, with SC Media naming the university’s cybersecurity program as the 2020 Best Cybersecurity Program and the Chair of Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
Since 2003, the Department of Homeland Security (DHS) and the National Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university will mentor hundreds of institutions offering cybersecurity programs across 14 states and the District of Columbia to develop or enhance their cybersecurity programs.
This new title allows Capitol Tech to continue mentoring other universities in cyber program creation in addition to opportunities the preexisting CAE designation afforded the university. These include being selected by the NSA to supplement their development program for new security engineers with master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars, and by the National Science Foundation (NSF) for two major multi-year grants to address the shortage of cybersecurity professionals.
Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are immersed in a hands-on education led by industry experts to learn in-demand skills. Undergraduate students learn UNIX O/S, C programming, networking, virtual machines, vulnerability scanning, packet capture and analysis,
Thomas Harrer holds the title of Distinguished Engineer and the Chief Technology Officer Server & Storage EMEA at IBM. He is a member of the IBM Academy of Technology (AoT), (Board) Member TEC DACH, and a computer scientist with a strong background in mathematics, computer architecture and application architecture.
In the mid-nineties, through his groundbreaking diploma thesis, he combined the world of genomics and Artificial Intelligence by leveraging the power of neural networks for analysing genes in the human genome. He is very open-minded and especially interested in cross-collaboration between different areas of expertise.
Since 1995, Thomas Harrer has been working with IBM as a client engineer and architect focused on infrastructure architecture helping clients to innovate with technology increasing cross-platform efficiency.
Starting 2017, Thomas has taken over the responsibilities of Chief Technology Officer for IBM Servers and Storage for Europe and more recently extended them to EMEA. In this technical leadership role, Thomas Harrer and his team deliver innovation with hybrid clouds and AI, leveraging all types of data and evolving the technology that enables clients to achieve business success.
With a strong foundation in computer/data science and extensive experience in IT infrastructure and technology, Thomas enjoys bringing different elements together to build the architecture of the future. He loves to discuss technology, trends, AI, data, blockchains and architectures for mission-critical hybrid cloud solutions.
Officer of the Order of the British Empire for Business (OBE), Christiane Wuillamie OBE started her technology career in 1980 after working for UNCHR setting up a resettlement camp for Vietnamese refugees.
Christiane has done every job in IT from coding, to running a software house, to being CIO in Financial Services. A transformational leader, she built and operationalised a strong, high performance culture in every role and every turnaround project.
She leverages technology to solve business challenges through developing people and joined-up process that deliver a competitive advantage. Her cyber security and technology management skills make her a valued Board member and advisor on digital transformation.
In the fast-changing cyber world, Christiane believes that only a strong culture of collaboration, transparency and responsible leadership can deliver safety and security for all.
Besides being a Non-Executive Board member, Christiane is the co-founder of a technology firm, PYXIS Culture Technologies that is quantifying the linkage between corporate culture, leadership and business results and helping senior leaders understand how culture impacts cyber security, safety, conduct risk, innovation and customer satisfaction.
“It’s time for the role of the CISO to change from information security to enterprise security.”
Christiane WUILLAMIE OBE
PYXIS Culture Technologies, Ltd is your business partner for cyber security. We differ from traditional consulting firms in two important areas. We combine over 40 years of experience in how culture impacts performance with deep operational experience in technology management, digital transformation, cyber security, and business turnarounds.
At PYXIS Culture Technologies we have pioneered an ecosystem modelling approach for understanding, measuring, and managing cyber security risks to improve business performance. Using systems analytics and proprietary algorithms along with internal company data, we can identify and map the causal factors inside your organization that have a significant impact on cyber security and business performance.
Find out more about PYXIS at www.pyxisculture.com
Or contact: info@pyxisculture.com
John R Childress is a pioneer in the field of leadership and corporate culture, advising CEOs and senior teams on the impact of company culture on business performance for almost 40 years.
Born in the Cascade Mountains of Oregon, he lived in Carmel Highlands, California during most of his early business career, before moving to London, England in 1996. John is a Phi Beta Kappa scholar with a BA degree (Magna cum Laude) from the University of California, a Masters Degree from Harvard University and was a PhD candidate at the University of Hawaii before deciding on a career as a business entrepreneur in the mid-70s. In 1968-69 he attended the American University of Beirut and it was there that his interest in cultures, leadership and group dynamics began to take shape.
Stewart A. Skomra is a rare individual defining the adage “experience trumps theory.”
He has immersed himself deep within myriad industries spanning multiple initiatives, cultures, and countries; accumulating knowledge and experience ‘walking-the-walk’ to support ‘talking-the-talk’ with a deep conviction of an ever-brighter, technology-enhanced, continually improving human experience.
Our collaboration on topics ranging from the sanctity of the individual to macro cyclical trends resulting from the confluence of Societal-Economic-Technology factors has enabled each of us to advance our thinking much further than we ever could have individually.
I look forward to continuing our journey to realize the vision of an ever-expanding, continually vibrant future.
We welcome all individuals oriented toward the pursuit of good built on a foundation of truth to join with us.
Top Cyber News Magazine. Carmen Marsh
The technologies of tomorrow are at the heart of our daily life and work, touching all aspects of our lives in countless ways. Organizations and individuals that prioritize digital innovation are achieving remarkable results. The advancement of technologies has seen new digital highways emerge, and on these highways, we desperately need to foster greater cybersecurity. Digitalization and cybersecurity must evolve hand in hand.
Cybersecurity is becoming the most important security topic of the future. The threat landscape is changing constantly and, probably, by the time you have finished reading this article, a new vulnerability was discovered. It is for this reason that the foundation of knowledge and best strategies is so important, and the need for skilled cybersecurity professionals is more crucial than ever.
In cybersecurity, and in tech in general the need to gather diverse input and perspective to meet cyber-threats and technology road-blocks grows by the minute.
To close industry’s skills gap, to continue developing the world’s cyber workforce of the future, we must make cybersecurity education an integral part of our culture, taught and evangelized across genders, ages, and organizational sectors. For statistically, global shortages in talent affecting 82% of organizations.
Now is the time for women to step into emerging technologies and cybersecurity industries. Reskilling is a great issue. Inclusion is as important as innovation. We will have to go into learning mode, be willing to be taught.
Founded by Carmen Marsh, 100 Women in 100 Days Cybersecurity Career Accelerator creates more career pathways for women wanting to further build security expertise, advance their security knowledge or start a career in cybersecurity.
Talented and highly qualified technologist, born leader and role model, Mrs. Carmen March invests her passion, knowledge and faith to educate and mentor women in cybersecurity.
The brightest stars are those who shine for the benefit of others. Carmen Marsh is this star.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
Top Cyber News Magazine Daniel Ehrenreich
1. MAGAZINE
TOP CYBER NEWS
OCTOBER EDITION
HOW DANIEL EHRENREICH IS DEDICATING HIS EXPERTISE FOR TRAINING ENGINEERS ON INDUSTRIAL CYBER SECURITY, AS NEEDED FOR
DEPLOYING AND MAINTAINING MODERNIZED SYSTEMS AND PROCESSES, REACHING HIGHER PRODUCTIVITY AND ASSURANCE OF
OPERATING SAFETY, RELIABILITY AND PRODUCTIVITY (SRP).
FUTURE OF
INDUSTRIAL
CYBERSECURITY
THE
GLOBAL TREATY FOR CRITICAL
INFRASTRUCTURE PROTECTION
EXCLUSIVE ARTICLE BY EMILIO IASIELLO
DANIEL EHRENREICH
CHIEF SECURITY OFFICER
SECURE COMMUNICATIONS
& CONTROL EXPERT
HOW TO IMPROVE IT, OT AND INDUSTRIAL
CONTROL SYSTEMS SECURITY
2. ERASE
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 2
BARRIERS
REMOVE
TRUST
FUTURE
GAPS
RAISE UP
4. About Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 4
Daniel Ehrenreich, BSc. is a leading Industrial Control System
(ICS) expert and acting as consultant and lecturer at Secure
Communications and Control Experts (SCCE) consulting entity,
based in Israel.
Periodically conducting workshop sessions via Internet and in
person for educating international participants on ICS cyber
security risks and defense measures for a broad range of ICS
verticals.
Studied CISSP in 2014 and is certified as a Lead Auditor for the
ISO 27001-2013 standard by the Israeli Institute of Standards.
Daniel has over 30 years of engineering experience with ICS for:
electricity, water, oil and gas and power plants as part of his
activities at: Tadiran Electronics, Motorola Solutions, Siemens and
Waterfall Security.
Reselected as the Chairman for the 6th ICS Cybersec AI&ML 2021
hybrid conference, organized by People and Computers. This year
the conference is scheduled to take place in Israel on 27-10-2021.
5. The current pace at which we have
been embracing technology in our
professional & personal life demands
‘cognitive agility’ on our part i.e. a
reasonably good speed with which
we can change and adapt to the new
norms. I am hopeful that few pointers
below will help position ourselves
better:
The manifold increase in
disinformation and deepfake
media across the digital world will
test our abilities to separate voice
from noise. Our ‘common sense
approach’ to cybersecurity and
attempts to stay safe online will be
put to test, by lazy and creative
cybercriminals, who will be better
armored with automated tools &
techniques.
“Trust will be one of most valuable
& difficult instincts to find and part
with”; eventually assessing our
abilities to conduct ‘due diligence’
and verify.
We are at a juncture in this
‘transition’ where awareness and
adoption of cybersecurity basics
will help us navigate more swiftly &
safely through the dynamic digital
world ahead.
Recent cyber incidents illustrate the
fluidity and ease with which
cybercriminals(Nation-
state/Other)have dented the well-
connected and ever-sensitive critical
infrastructure ecosystem. These
events serve as important cues for
both private and government
stakeholders to cohesively work
towards improving the cyber
resilience of critical infrastructure
systems across the globe.
Just as protection of 'natural
chokepoint straits' along the global
shipping lines is vital for an efficient
global supply chain/trade of essential
commodities, the security of critical
infrastructure resources is
imperative to the well-being of
citizens across nations.
Heightened alert and awareness of
threats facing Critical
infrastructure combined with
collaboration and trust among
stakeholders to improve the cyber
resilience of critical infrastructure
networks is an inevitable need during
these times.
Kris® K ✔, MBA, MS - Cybersecurity,
IT Service Management, InfoSec and
Project Management Professional
Industrial Control Systems (ICS)
Cyber Security
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 5
Editorial by Kris K.
Cybersecurity Management professional
6. Understanding
Industrial Control Systems
Cyber-Attacks and Defense Measures
Introduction
The growing number of cyber-attacks on Industrial Control Systems (ICS)
operating in broad range of industrial, communications, utility and
manufacturing applications is raising an important question: Do we correctly
understand the cyber-attack surface and the potential risks to our
organizations? Who might initiate an attack, why a specific victim might be
selected, what resources are required and how motivation of an attacker may
be created?
Cyber security experts know well that it is impossible protecting all facilities
and all zones in each facility with the strongest defense measure. Therefore,
organizations shall hire experts and allocate resources to understand the
possible attack environment.
Figure 1 below is outlining the risk evaluation process for defending specific
zones in a plant. The goal of this paper is to help the reader understanding the
organization environment and select the strongest, most affordable and
justifiable cyber defense for each zone.
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 6
Figure 1. Risk evaluation process for industrial facilities
Author: Daniel Ehrenreich
7. Understanding ICS Cyber-Attacks and Defense Measures
Analyzing The Risk Map
We all know that physical and cyber security are strongly linked to business risks and to
operation safety. Understanding the risk map outlined above helps analyzing the actual risk
factors and help selecting specific cyber defense measured aimed to assure business
continuity and safety to people. The center of the map is outlining the risk assessment
process such as outlined by the Lockheed Martin Cyber Kill Chain, the MITRE Adversarial
Tactics, Techniques, and Common Knowledge (ATT&CK) process, etc. On the left side of
the grey-colored cloud are shown the Security Levels (SL), as defined by the ISA 62443
international standard. Further on left side are outlined specific targets of an attacker and on
the right side of the chart are listed possible impacts caused by a cyber-attack on an
industrial facility.
IT Oriented Goal of Attackers
The IT systems must protect the Data, Privacy and Money through the
Confidentiality, Integrity and Availability (CIA) Triad. However, on many occasions we
get surprised seeing IT systems which are not accurately documented, not updated to
prevent exploitation of published vulnerabilities and critical findings and conclusions from
the recent cyber security assessment were not implemented. It reflects on the negligent way
how organizations are referring to cyber security risks.
ICS Oriented Goal of Attackers
When dealing with cyber security for industrial plants, such as described above, we shall
not rotate the CIA letters as often proposed by IT experts, but we shall point to the Safety,
Reliability, Productivity (SRP) Triad. To comply with the SRP, the design must assure
that authorized employees or attackers cannot damage the machines and machines can not
hurt people. Meeting these goals require in-depth understanding of security guidelines such
as defined by the ISA 62443 standard.
Internally Generated cyber attacks
Although the impact can be similar, experts must clearly differentiate among internally
and externally generated cyber-attacks. Important to realize that operation safety can not
be assured without cyber security and furthermore, cyber security can not be assured
without physical security. Therefore, physical security is a strong precondition for
preventing internally generated attacks and risk to safety.
Externally Generated cyber attacks
In contrary to above, externally generated attacks start with Social Engineering, such as
phishing, spear phishing, etc. The initial goal of attackers is to penetrate to the IT system,
stay there for 150-200 days, collect detailed information on the ICS process, compromise
the barrier between the IT and the ICS zones and finally manipulate the process to generate
outage or damage and harm people.
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 7
8. Understanding ICS Cyber-Attacks and Defense Measures
Supply-Chain Originated cyber attacks
The supply chain related risks were recently added to the list of attack vectors, side by side
with internally and externally generated cyber-attacks. These risks are referring to suppliers
of control devices, who might ship malwaretized devices or programs. Furthermore, during
COVID-19 we must refer to risks caused by external service providers who are allowed to
connect remotely to the industrial zone.
Practical ICS Cyber defense measures
The well-known sentence says:” There is no Silver Bullet for protecting computerized
and communications-based systems” and therefore you must deploy layered defense.
According to the People, Policies, Technologies (PPT) Triad, employees must be trained for
higher level of awareness and enhanced capability to detect cyber-attacks, minimize
damages, deployment of effective and enforceable policies and finally implement
technologies suitable for defending each zone in the organization.
To minimize the risk, system designers may deploy encryption and authentication of
connecting service computers and authenticating the connecting service engineers.
Among specific technologies they may consider deployment of Intrusion Detection
Systems (IDS), Unidirectional Diodes, ICS oriented Next Generation Firewalls (NGFW),
Whitelisting, Security Intrusion Event Management (SIEM) and deploy connection to the
Security Operation Center (SOC) operated by the organization or an external service
provider. When relying on 3rd party maintenance, operators must request that remote
connection shall be supervised and allowed only by using a service computer which is not
used for other purposes.
Summary and Conclusions
“The consequences of cyber security risks are very much different between IT
and ICS, and therefore, the cyber security risks assessment methods must be
different as well.
The broadly used CyberPHA methodology offers a “consequence driven method” to assess
industrial security risks. It is a more rigorous method compared to those used for IT
systems. It aligns with the ISA/IEC 62443 standard Section 3-2 and provides clearly-to-see
links to hazard analysis and consequences of cyber-attacks. Adherence to adapted methods
and applicable best practices may help you achieving stronger cyber security by being a big
step ahead of hostile attackers. Senior management in every organization must allocate
resources for training of employees, business continuity assurance and for operating safety
assurance in their facilities.
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 8
9. Adding AI & ML
Enhance of Weaken the ICS Cyber Security?
Author: Daniel Ehrenreich
Introduction
Industry experts worldwide are enthusiastically talking about modernizing their
operations towards achieving higher quality and productivity. This trend is so
clear, that we can hardly think of anyone who might question the validity of the
Industry 4.0 methodology. However, in order doing that correctly, this process
must start with correctly defined goals and shall be conducted by joint efforts
of IT and Industrial Control Systems (ICS)/Operation technology (OT),
vendors and expert integrators.
Deployment of Industry 4.0 related solutions requires upgrading the capacity of
the computing process, adding sensors and field controllers, upgrading the
Automation Servers (AS) and more. Furthermore, it requires adding many
Industrial Internet of Things (IIoT) devices for collecting more granular and
accurate data.
Adding Artificial Intelligence (AI) and Machine learning (ML) solution to the
ICS architecture is aimed to enhance that overall productivity, detect failure
conditions faster, detect cyber attackers who already penetrated to the system.
But on the other hand, adding of new components and processes, which are not
directly essential to the industrial process, might increase the cyber-attack
surface.
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 9
10. Adding AI & ML Enhance of Weaken the ICS Cyber Security?
Briefly on AI & M: From an expert/researcher/system architect point of view,
AI is a set of algorithms that can analyze specific input values and conditions
and may create intelligent results that enhance the ICS operating performance.
AI-based processes can act fast, and initiate and perform tasks intelligently,
even without being requested. Utilizing ML and Computerized Vision, an AI-
based industrial operation may act similarly to humans.
The ML is a subset of AI, and it defines the ability to learn from monitored
behavior, rather than just instructions. Its algorithms may automatically learn,
create updated baselines and steadily improve the effectiveness industrial
plants. The ML process is constantly learning by analyzing the available data
from devices and ICS processes and comparing it with previously collected data
for better supporting the AI process.
The Future of AI related to ICS
The breakthrough innovations created by AI and ML have emerged to a huge
hope for organizations across the world. The integration of Industrial Internet of
Things (IIoT), AI and ML originated processes into the ICS operating
architecture, allows for big data analytics thus it is positively impacting the
process and machine-based industrial operations.
As these trends continue evolving, they will have strong impact on achieving
higher productivity, production quality and profitability of plants. Organizations
may enhance their existing processes and generate new processes such as were
unavailable before. Achieving higher production rate and quality may help
increasing the selling prices and the overall profitability.
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 10
11. Adding IIoT devices to the ICS architecture
Consequently, ICS architectures must be expanded with many IIoT devices,
which increase the cyber-attack surface and cyber security risks. To evaluate the
increased probability of an attack caused by adding these devices, we must
review the following risk factors:
1. Which of the IIoT units are installed inside or outside the secured perimeter?
2. Are they logically and physically connected to a single zone or multiple zones?
3. Are these IIoT devices directly connected to the ICS, or they reside in the cloud?
4. Are these IIoT allowed communicating each with other or always through ICS?
5. Which IIoT devices are part of the critical process, and which are not?
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 11
When scrolling through the questions listed above, we realize, that the ICS has
no longer a solid hierarchical structure as described by the Purdue Model.
Therefore, ICS experts shall review the cyber defense and safety-related
challenges and critical topics (partial list):
1. Are the benefits achieved by deploying new IIoT devices outperform the
increased risks?
2. Are these IIoT deployed securely in a way they do not increase the cyber-attack
surface?
3. Can the IIoT security challenges be reduced by cost-effective complementing
measures?
12. Can AI evolve the cyber defense?
Cyber defense measures and mechanisms such as Deep Packet Inspection (DPI), Data Leak
Prevention (DLP) and Intrusion Detection systems (IDS) may perform analysis of the
transferred data among zones which have different level of criticality. Their efficiency can
be enhanced by availability of highly granular process data.
The output data available from AI processes can upgrade the detection capabilities of cyber
defense measures and reduce the number of False Positive indications. Furthermore,
important mentioning, that adding AI based processes may specifically upgrade the cyber
defense for legacy installations without affecting their process.
Can AI weaken the cyber defense?
This title sound like contradicting to the previous paragraph, which listed the positive
contribution of the AI to stronger cyber defense. ICS cyber security experts know-well, that
every software-based defense or a new device or process can be compromised.
For example, if the AI based process is targeted for manipulation, it might lead to
unexpected shutdown even if no harm happened or it might create hiding of a cyber-attack
or an internal sabotage. Consequently, to compensate for these weaknesses, the cyber
defense architect must add new compensating defense measures.
Maintaining Cyber Secured operation
Process improvement and Industry 4.0 modernization are important initiatives and therefore
are granted strong support by the management. However, none is allowed to introduce these
solutions if they increase the cyber security risk beyond acceptable level.
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 12
13. Cyber Consequently, organizations must adhere to best practices,
such as listed below:
1. Maintain in-depth understanding of the ICS process and the internal sessions among zones.
2. Physical security of ICS facility and IIoT devices is a strong precondition to cyber security.
3. Correctly designed ICS architecture and cyber defense are strong preconditions to safety.
4. The ICS data may converge with the IT data, but the IT and OT networks must not converge.
5. Perform periodic trainings a drills to all involved employees and external service providers.
6. Maintain close collaboration and cross team assistance among ICS and IT security experts.
7. Make sure that all devices and network components are properly updated and patched.
8. Adhere to Secure Development (SD) for ICS and AI based and cyber defense processes.
9. Perform segregation among zones which are not required communicating each with other.
10. Perform encryption of channels which are communicating ICS related critical data.
11. Perform strong authentication of all connected devices, including service computers.
12. Perform cyber security and risk assessment according to the ISA/IEC 62443 standard
13. Deploy Business continuity (BCP) and disaster recovery (DRP) processes.
14. Deploy Incident response (IR) processes and conduct periodic drill for the assigned team.
15. Above action shall prepare you organization for effectively responding to the unexpected…
Summary and Conclusions
The deployment of modernized AI based industrial operations is a highly important
initiative and organization must plan for that ahead of time. Handling of Industry 4.0
related processes must be in line with the ISA-IEC 62443 cyber security regulations. IT and
ICS teams must closely collaborate during modernization of the processes and make sure
that modernization is not creating cyber security risks. The management in industrial
organizations must adhere to ISO 27001-2013 section 5 para 1 and provide the needed
resources and budgets for maintaining a strongly secured industrial operation.
Author: Daniel Ehrenreich
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 13
14. Exceptional Cyber
Threats Call for
Exceptional Cyber Security Leadership
Author: Alex Antar
“Ultimately, responsibility for security of the company’s crown jewels lays on
the hands of the Board, the CEO and the senior leaders in that order.”
- Alex Antar, Global Audit Platform Programme Manager at Mazars, Global IT Innovation
Business Partner at Unilever
There is sadly a broad consensus that these are
clearly tough times for political, business and cyber
security leaders both in the public and private
sectors because their cyber security postures are
proving again and again to be a no match for
cybercriminals. So much so that it’s so stressful and
heart breaking to sit on the ejection seat/chair of a
CISO today. So, admittedly, leaders across all
business sectors are undergoing soul searching to
raise the standards and maturity of their cyber
security postures. And there are indeed some signs
of hope out there because recent research shows that
the “dwell time” – an important KPI measuring how
long a malicious criminal or malware has been
hiding inside the network - has been decreasing
drastically over the recent decade. The global
median cyber-attack dwell time is about 24 days
according to Mandiant’s 2020 report. However, the
staggering high number of cybercrimes hurting
indiscriminately all kinds of firms worldwide
including deep pocket corporations and state
agencies, indicates that cyber security defence
postures based on conventional frameworks are not
enough. It is safe to say that, in this ever-ending
evolutionary cat and mouse chase drama, business
leaders can only be the losers here because they are
far too slower at adapting new security defence
technologies and standards than even the
nonprofessional cybercriminals; never mind the
advanced state funded groups. It’s a fact.
Understandably, holding internationally recognised
cyber security certifications such as ISO 27001,
NIST CSF, SOC2, etc are a good 1st impression
about the maturity of a cyber security posture. Yet,
these certifications, even when they are audited by
external independent auditors, can be considered
kind of like the cover of a book; Except that smart
cybercriminal do not judge the book by its cover.
The fact of owning those security certifications or
lack of major cyber-attack incidents within a
company do not by any means constitute
invincibility. They often provide a false positive
confidence. A breach is simply a matter of time.
There are also numerous other factors impacting the
efficacy of security operations such as the high
internal technical & organizational complexity, lack
of skilled resources, siloed heterogenous IT & ICS
systems; not to mention the high number of daily
timewasting false positive security alerts. On the
opposite side there is the relentless sophistication in
cyber-attacks combined with a worldwide
availability of free & cheap hacking tools.
It’s a no brainer that implementing a cyber security
posture that is well staffed and that closely tracks
and adopts the latest tools, vulnerability mitigating
solutions, techniques, tactics and procedures (TTPs)
is not an option for any respectful business leader
today. Hence the relevance of for instance
implementing “adversarial” led defence frameworks
such as MITRE ATT&CK as the basis for building
cyber threat & vulnerability heatmaps and related
mitigating measures as well as CTI, purple, red and
blue teaming, etc.
Knowledge is power. The strength of adversarial
oriented frameworks such as MITRE ATT&CK
comes from an intricate knowledge of the TTPs used
in every single cybercrime discovered in the real
world. Business leaders must acknowledge the fact
that exceptional sophisticated cyber-attacks call for
exceptional cyber defence measures due to the ever-
growing distributed nature the attack surface, users,
networks, endpoints.
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 14
15. So, here after are some of my tips from the cyber
security trenches:
1. Zero Trust must be implemented throughout all
endpoints, physical and logical IT environments;
2. Adopt Secure Access Service Edge (SASE). Your
SASE architecture must overlay zero trust across all
the relevant data service layers: Firewall as a Service
(FAAS), Secure Web Gateway (SWG), Cloud Access
Secure Broker (CASB), Data Loss Prevention (DLP),
Zero Trust Network Access, Browser Isolation, DNS
security, etc. These must be orchestrated from an all-
in-one integrated platform;
3. Adversarial TTP centric defence posture (the
MITRE ATT&CK framework is highly recommended)
to be combined with demonstrable and auditable
security compliance certifications based on robust
frameworks such as ISO27001 and NIST CSF;
4. Dedicated CTI teams with frequent threat hunting
exercises using red, purple and blue teaming using
MITRE ATT&CK;
5. Build & share the cybersecurity heatmaps (based
on the latest MITRE ATT&CK TTPs) with the board
& senior leadership;
6. For data privacy compliance, implementing an
existing mature internationally recognizable auditable
privacy framework is a must. For companies already
familiar with ISO 27001, it makes sense to implement
the ISO 27701 extension as it is a natural expansion as
the formatting of ISO 27701 requirements and controls
maps directly to the ISO 27001 standard. Also, there
are other quite mature candidate data privacy
frameworks such as the BS10012 or the NIST Privacy
Framework;
7. Reduce attack surface as much as possible and
regularly assess it using the MITRE ATT&CK;
8. Complexity and siloed monitoring systems must
be avoided at all cost by implementing fully integrated
SASE & SOAR, ICS and Cloud specific monitoring &
threat detection based on adversary behaviours as per
the MITRE ATT&CK matrix to enable a live and
contextual cyber kill chain framework;
9. Develop cyber-attack recovery plans & play
books as part of business continuity and make sure to
frequently practice attacks against them;
10. Regularly update your incident response
playbooks and practice attack against them;
11. Provide innovative training and awareness
campaigns to all employees on at least a monthly,
quarterly and annual basis;
12. Implement encryption and anonymisation
solutions for both data at rest and in transaction;
Alex Antar, Global Audit
Platform Programme Manager at
Mazars, Global IT Innovation
Business Partner at Unilever
Let’s be honest, IT transformational changes are
notoriously challenging and cyber security
programmes are even harder for one obvious reason:
It’s the usual mistake of building weak security
defense postures that is unforgiving at multiple
levels. Do we need to say more? Ladies &
Gentlemen, these the words of Alex Antar, a true
outstanding global IT leader who has earned a
reputation for spearheading game changing IT
initiatives in cyber security, cloud technology, ERP,
IT infrastructure, data centres, Data Analytics, AI,
ML, IoT…Alex leads global multidisciplinary teams
& programmes for companies in high-tech, banking,
retail, insurance, healthcare and other industries.
He’s been doing this for over 20 years across five
continents. His clients include PwC and other
Fortune 500 companies such as Dell EMC2,
PepsiCo, Mazars, Unilever, Amadeus, etc.
Alex is known for his pragmatic strategic and
tactical planning, risk mitigation, quality assurance,
unparalleled team leadership and expert navigation
through complexity and high pressure. He is passion
for sharing his knowledge and experience led him to
several IT conference events as a guest speaker. In
the process, he also authored & published an IT
book “The Art of Benefits Realization
Management” available on Amazon.com. Alex’s
next book “Resilient Cyber Security Postures” is in
the pipeline and he’s hoping to release it in the
coming weeks.
Alex hobby passion is advocacy for eco-action
around the world. By the way, all the proceeds from
his books go to planting trees programs in support
for our ailing mother Earth under his own green
“Ethical Panda” company. His green Ethical Panda
Logo looks cool! And he’s proud of it.
Under his belt has a number of impressive IT
certifications such CISM® Certified Information
Security Manager / CRISC® Certified in Risk &
Information System Control / MITRE ATT&CK
Defender™ SOC Assessment / ATT&CK Cyber
Threat Intelligence / AGILE SAFe Scrum Master /
ITIL4 / PRINCE2 / Portfolio, Programme and
Project Offices (P3O®) / COBIT 2019 / 6 Sigma
(6σ) Black Belt. Simply drop Alex a message and he
will be happy to help.
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 15
16. Time to Protect
Critical Infrastructures
from Ransomware Attacks in India
Author: Colonel Inderjeet Singh
“IT and OT network boundaries have increasingly blurred. Though, OT networks rarely
require any outside network connectivity to operate seamlessly, however, they are
frequently connected for updates and patches, and pose real risk and threats to the OT
networks against cyber-attacks if overlooked.”
- Colonel Inderjeet Singh, the Chief Cyber Security Officer & Head of the
Cyber Security Center of Excellence @ Vara Technology
Last decade, we have seen unprecedented growth in
India’s infrastructure across various sectors - Power
generation and transmission, Transportation,
Railways, Seaports, manufacturing,
telecommunications networks, to name a few. Intact,
all sectors have significantly witnessed
enhancements. This has augmented and contributed
to the Indian growth story. This has brought in
opportunities and challenges. It is imperative and of
utmost importance to safeguard these critical
infrastructures from cyber threats. To ensure this, the
Indian Government has declared them as critical
infrastructure and has put adequate plans in place to
secure them from cyber-attacks as they paramount
important for national security.
IT and OT network boundaries have increasingly
blurred. Though, OT networks rarely require any
outside network connectivity to operate seamlessly,
however, they are frequently connected for updates
and patches, and pose real risk and threats to the OT
networks against cyber-attacks if overlooked.
While we see an increase in Ransomware attacks
increasing multi-fold all over the world, Indian
Critical Infrastructure too is vulnerable. Recently,
Recorded Future, a cyber-security firm based out of
Massachusetts, raised the concern of an increase in
cyber intrusions attempts from China to target
India’s critical infrastructure – electric power
generation and transmission, and seaports. China-
linked threat activity group ‘RedEcho’, targeted the
Indian electric power grid sector and seaports
through malware conducted many campaigns to
target them.
This type of deliberate targeting of India’s power
grids and financial infrastructure by China is very
unusual and concerning.
Cyber-attacks on Indian critical infrastructure are
not new, in the recent past, Kudankulam Nuclear
Power Plant was cyber-attacked by a suspected
North Korea-based Lazarus hackers group in
September 2019 was intended specifically for cyber
espionage. India has to now really work on a fast-
track mode to safeguard its critical infrastructure
from cyber-attacks. There may also be a need to
look into the likely supply chain attacks on critical
infrastructure. In case, anyone in the complete
supply chain is hacked, entire systems would be
compromised.
At the national level, the Indian government has
created National Critical.
Information Infrastructure Protection Centre
(NCIIPC) and is the National Nodal Agency in
respect of Critical Information Infrastructure
Protection. NCIIPC has broadly identified the
following as “Critical Infrastructure”.
Power & Energy
Banking, Financial Services & Insurance
Telecom
Transport
Government
Strategic & Public Enterprises
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 16
17. Unfortunately, staff who are responsible for
managing cybersecurity OT networks often overlook
the security implications of unpatched and not
updated System Applications and Operating Systems
(OS) in sectors such as energy, manufacturing,
healthcare, transport considering these networks to
be already air-gapped and void of getting cyber
attacked.
However, with the paradigm shift towards disruptive
technologies in OT networks and the proliferation of
Industrial IoT (IIoT) devices in the last couple of
years, we are seeing a growth in the number of
connected devices that have accelerated the
convergence of the once air-gapped IT and OT
Networks.
It is required to immediately have a look at the
cybersecurity of OT networks and protect Critical
Infrastructure from cyber threats. An opportune time
to leverage Artificial Intelligence and Machine
Learning that can assist in automating the detection
and response to improve cyber defenses. Newer
innovations in cybersecurity solutions for endpoints,
firewalls, antivirus and anti-malware software, and
encryption can also be factored in to harden critical
assets against attacks.
The one suggested option is to install a data diode
firewall between IT and OT networks, which would
ensure the required air gap between IT and OT
networks and at the same time permitting the staff to
carry out Software patching, OS, and Application
updating, Historian and Active Directory Backup
and remote view of OT networks as and when
required without much of hassle. In addition, harden
the OT networks and control systems against risks
and vulnerabilities that can be introduced through IT
networks, else OT networks would remain at
indefensible levels of cyber risks.
Colonel Inderjeet Singh
Chief Cyber Security officer, Vara
Technology Pvt Ltd
Colonel Inderjeet Singh is the Chief Cyber Security
Officer and Head of the Cyber Security Center of
Excellence at Vara Technology. In this role, he is
instrumental in building the Cyber Security Business
Unit for the Group. He is working on the disruptive
technologies in the Cyber Security Space for
securing IT networks, Smart cities, and Critical
Information Infrastructure.
Colonel Inderjeet Singh served in the Indian Armed
Forces, is an Alumnus of Indian Institute of
Technology, Kharagpur and Symbiosis Institute of
Management, Pune.
He is an experienced Information Systems
professional with experience of more than 29+ years
across a wide spectrum of areas spanning
cybersecurity operations leadership and influencing
policy level decisions in multiple organizations.
Throughout his career, he has parlayed his extensive
background in security and deep knowledge to help
organizations build and implement strategic
cybersecurity solutions.
Inderjeet has held prestigious appointments while in
the Indian Army and has also served in the United
Nations Mission in the Democratic Republic of
Congo. Later, he has been a CIO of an E-Commerce
Company.
Colonel Singh is visionary for Start-Up Incubation,
Entrepreneurship Development, Strategic
Consulting, and New Technology Evaluation for
commercial viability. He is a Subject Matter Expert
on the latest Disruptive Technologies.
Prominent Cybersecurity leader, Colonel Inderjeet
Singh has consistently delivered mission-critical
results in the field of Information Security
Management, Cyber Security, Cyber Warfare and
Cyber Risk Management, Blockchain, Data Science,
and Smart Cities.
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 17
18. Critical infrastructures remain high-value targets for hostile cyber actors whose operations
support a wide variety of activities meant to extort money, steal data, and/or interrupt their
operations. Their assets, systems, and networks are considered vital to supporting civilian
populations, and as such, any potential disruption to ICS activities can cause far-reaching
impacts to industry supply chains.
The U.S. Department of Homeland Security (DHS) has identified sixteen sectors that
fall under the rubric of critical infrastructure, the degradation of which could affect the
public safety, economic security, and/or national security. The attacks against these vital
systems continues to increase, a worrisome development as more actors seek to exploit
ICS to support their various activities.
Cyber criminals have turned to critical infrastructure organizations in order to exploit for
substantial financial profit. These criminal elements have engaged in “big game hunting” –
a term defining these actors attempts of going after large organizations for the purpose of
stealing high-value assets or data. Ransomware gangs gained notoriety in this capacity,
compromising critical infrastructure organizations and stealing their data before encrypting
systems. They post some of the data on a leak site in an attempt to further coerce victims
into paying large ransom demands or else risk exposing the data to the public. Russian
ransomware gangs in particular garnered substantial attention after compromising two U.S.
companies – Colonial Pipeline and JBS – eliciting attention from the highest levels of the
U.S. government. These incidents served as catalysts for U.S. President Biden to meet with
his Russian counterpart in June 2021 and hand him a list of 16 sectors that Russian
ransomware gangs should not target.
Critical Infrastructure
Protection Needs
an International Treaty Like Cybercrime
Author: Emilio Iasiello
“Ransomware attacks increased by over 300% last year as companies
switched to remote work. Today, ransomware gangs are becoming more
aggressive: stealing and/or leaking data or locking your systems or files in
exchange for ransom payments”
~ Dr. Nikki Robinson
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 18
19. Critical Infrastructure Protection Needs an International Treaty Like Cybercrime
The tactic has been viewed as questionable, as it suggests that any other target is “viable”
for Russian ransomware gangs, so far it has proven successful. BlackMatter, a new
Russian ransomware gang that emerged shortly after the meeting published a manifesto that
it would not target organizations in nuclear power, power, oil and gas, healthcare, or
government institutions. Although BlackMatter did exploit NEW Cooperative, a U.S. food
and agriculture organization, the organization’s industry was not on the “no attack” list
provided by BlackMatter, indicating the gang would honor its commitment. While this
sounds promising, any deviation from their list depends on the group’s intent, as such lists
are subject to modification due to a variety of motivating factors including U.S.-Russia
geopolitical relations. Nevertheless, it appears a promising détente, but one that is only
reserved for Russian ransomware actors and not those of other nationalities.
But such understanding with part of the cyber criminal ecosystem does not include other
hostile actors operating in cyberspace. The biggest threat to critical infrastructure and ICS
stems from nation state actors whose intentions are to exploit these vital networks for the
purposes of maintaining a presence for further exploitation, data modification, disruption of
activities, or destruction of ICS components. For example, in early 2021, Chinese cyber
espionage activity dubbed “RedEcho” compromised several power entities for the purpose
of maintaining access that could be used for further exploitation or disruptive attacks. In
2020, suspected Iranian actors exploited Israeli water treatment facilities, and in one
instance, tried to modify chlorine levels in the water supplied to Israeli homes. In 2015,
Russian cyber actors executed attacks that impacted Ukraine’s power sector, causing power
outages for civilians. Finally in 2010, alleged U.S.-Israeli join operations successfully
deployed Stuxnet for the purposes of damaging centrifuges used in the nuclear enrichment
process.
What is clear is that critical infrastructure will remain a popular option for cyber
malfeasance for both state and nonstate actors largely because the success of their
operations satisfies the intent and motivation of the actors.
The complexities of the networks, legacy systems, and lack of any meaningful
standardization of cyber security measures, incentivization for infrastructure owners, or
penalties for those not maintaining proper cyber security hygiene has created an
environment rich for targeting. It seems that while the majority of the world views critical
infrastructures as vital to their respective state securities, there has been little headway in
trying to come together in an effort to create a treaty to address the various cyber attacks
suffered by critical infrastructures. The more critical infrastructures are victimized without
meaningful repercussion, the more emboldened actors will be in pushing the envelope with
their activities.
by Emilio Iasiello
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 19
20. Critical Infrastructure Protection Needs an International Treaty Like Cybercrime
If the 2021 Biden-Putin summit continues to yield positive results, a similar one-on-one
approach may be applied against other governments that seemingly have influence over
their respective hacking communities. China immediately comes to mind, but so do other
authoritarian states that are either sponsored by the government or operate on the basis of
patriotism or nationalism. As a result of the 2021 summit, the United States and Russia
have engaged in cybersecurity talks, an encouraging development between two of the
world’s leading cyber powers. More discussions may reduce uncertainty of activities
attributed to either government, and decrease potentials of more disruptive follow-on cyber
activities. Ultimately, time will judge if this engagement yields fruit or fails short of its
goals, and the proof will be in how the cyber crime ecosystem responds to these behind-
closed-door meetings.
Regardless, “the timing is right to bring likeminded international stakeholders together to
collaborate on finding ways to harmonize their national laws and improving fast and
efficient joint investigations of incidents against critical infrastructures.”
The Council of Europe’s Convention on Cybercrime can provide a good model on how
such a treaty could start to be formulated. By establishing a “common criminal policy” that
focuses on critical infrastructure, states will be better able to codify the threats, and develop
the conditions necessary to protect them. This will help formulate how states will be able to
“legally” target critical infrastructures in the future, particularly when it comes to self-
defense and proportional response. All states in the world are reliant on critical
infrastructure, so it behooves everyone to find common ground on reducing hostile cyber
activity directed against these assets. This should be an easy win, and one that feeds larger
world discussions on controversial topics such as cyber sovereignty, Internet governance,
and the elusive state norms of behavior in cyberspace.
Failing to make any progress in this area is a serious misstep. Critical infrastructure attacks
are becoming far too common, and the impacts are increasingly becoming more dangerous.
The last thing any country needs is to convey a sentiment of acceptance in allowing the
victimization of their critical infrastructures. Once that Pandora box is open, it will be
impossible to close.
by Emilio Iasiello
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 20
Cyber Intelligence Consultant & Published Author, Emilio has nearly 20-
years’ experience in cyber intelligence & cyber threat analysis having
worked in both the public & private sectors. He currently supports a large
multinational energy company. A fervent advocate of applying strategic
thought to countering cyber threats, Emilio fervently believes that
understanding past activity & TTPs are the best way to anticipate future
activity. Applying a behavioral approach to cyber security is instrumental in
understanding the mindset and TTPs of hostile actors. This can be taught to
end users to increase organizations security training, inform threat hunting
teams, and enrich C-suite understanding of the threat. Embracing intelligence-driven measures such as
cognitive and behavioral analysis will complement the technical. Only multifaceted defense solutions
will help organizations achieve cyber resiliency over the next few years. A tireless student of the global
environment, Emilio stresses geopolitics as a driving force behind state-backed cyber activity.
22. MAGAZINE
TOP CYBER NEWS
CYBER FOR GOOD
We communicate
Technology, Innovation, and Cybersecurity
TOP CYBER NEWS MAGAZINE - October 2021 - All rights reserved 22
“As leaders, we must use technology correctly if we are to meet the
expectations of our new stakeholders. Yet we have seen how technology
is open to abuse, misuse and malicious intent.
And, with the benefit of historical perspective, we have seen how many
of the noble uses to which technology has initially been put have given
rise to unwelcome and unforeseen consequences”
‘Tech for Life’ by Jim HAGEMANN SNABE,
Chairman at Siemens and A. P. Moller Maersk
Tech-Utopia or Tech-Dystopia?