Cyber Defense eMagazine December 2019
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
110<br />
former governor, this bill also fights predators. The intentions of the Act are to provide residents with a<br />
suite of rights, including the rights to:<br />
• Know what personal data is being collected about them.<br />
• Know whether their personal data is sold or disclosed and to whom.<br />
• Refuse the sale of their personal data.<br />
• Access their personal data.<br />
• Request a business to delete any personal information collected on them.<br />
• Sue companies which collected data that was later stolen or breached.<br />
• Protection against discrimination for exercising such privacy rights.<br />
Much like GDPR, the CCPA will impact businesses far beyond its immediate geographic borders. Any<br />
company which serves California residents and has at least $25 million in annual revenue will need to<br />
comply with the law. In addition, companies that have personal data on at least 50,000 people or that<br />
collect more than half of their revenues from the sale of personal data will also be required to comply.<br />
From an IT perspective, the CCPA will necessitate that security teams work closely with database<br />
administrators. Tools for dealing with the issue will need to have full visibility into data stored across a<br />
range of the internal corporate environment, while still ensuring that access to such data is properly<br />
secured. If the data is stored on the cloud, the problem becomes even more complicated. But hey, your<br />
companies will have a whole 30 days to figure that out before it can be fined for violations. And it’s only<br />
up to $7,500 per record. So, if you meet the minimum threshold of 50,000 people that’ll only cost around…<br />
375… million… dollars…<br />
The 2020 Elections<br />
Hoo boy, here’s a big one. Election fraud has been gaining an increasingly acute level of scrutiny,<br />
especially following accusations of Russian meddling in 2016. While paper ballots have significant pros<br />
over electronic ones, it seems that many electorates are all aboard the electric train, so we need to find<br />
ways to prepare to roll with the punches. As Bruce Lee said, “Be water, my friend.”<br />
In an act that is unprecedented in U.S. history, seven government agencies have issued a joint statement<br />
warning that foreign powers intend to manipulate the 2020 elections. While your SecOps team might not<br />
be responsible for protecting voting booths, if your organization is tasked with stewarding any appreciable<br />
volume of personally identifiable information, you could still come under attack. Any sort of personal<br />
information could be used by malicious actors to target groups or areas that may be crucial in the<br />
upcoming election. While this threat may not imply some sort of qualitative break with the past, it means<br />
that the threat level we can expect for the next year to be higher, putting an even greater level of pressure<br />
and responsibility on cybersecurity teams.<br />
SecOps teams should be on the lookout for DDOS attacks , phishing, and malware attacks against<br />
infrastructure and networks that may be deemed critical to the elective process. While these are standard<br />
threats that cyber analysts have been dealing with for years, their level of sophistication is increasing,<br />
and the channels for attack are sure to multiple alongside the spread of 5G and IoT.