02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110<br />

former governor, this bill also fights predators. The intentions of the Act are to provide residents with a<br />

suite of rights, including the rights to:<br />

• Know what personal data is being collected about them.<br />

• Know whether their personal data is sold or disclosed and to whom.<br />

• Refuse the sale of their personal data.<br />

• Access their personal data.<br />

• Request a business to delete any personal information collected on them.<br />

• Sue companies which collected data that was later stolen or breached.<br />

• Protection against discrimination for exercising such privacy rights.<br />

Much like GDPR, the CCPA will impact businesses far beyond its immediate geographic borders. Any<br />

company which serves California residents and has at least $25 million in annual revenue will need to<br />

comply with the law. In addition, companies that have personal data on at least 50,000 people or that<br />

collect more than half of their revenues from the sale of personal data will also be required to comply.<br />

From an IT perspective, the CCPA will necessitate that security teams work closely with database<br />

administrators. Tools for dealing with the issue will need to have full visibility into data stored across a<br />

range of the internal corporate environment, while still ensuring that access to such data is properly<br />

secured. If the data is stored on the cloud, the problem becomes even more complicated. But hey, your<br />

companies will have a whole 30 days to figure that out before it can be fined for violations. And it’s only<br />

up to $7,500 per record. So, if you meet the minimum threshold of 50,000 people that’ll only cost around…<br />

375… million… dollars…<br />

The 2020 Elections<br />

Hoo boy, here’s a big one. Election fraud has been gaining an increasingly acute level of scrutiny,<br />

especially following accusations of Russian meddling in 2016. While paper ballots have significant pros<br />

over electronic ones, it seems that many electorates are all aboard the electric train, so we need to find<br />

ways to prepare to roll with the punches. As Bruce Lee said, “Be water, my friend.”<br />

In an act that is unprecedented in U.S. history, seven government agencies have issued a joint statement<br />

warning that foreign powers intend to manipulate the 2020 elections. While your SecOps team might not<br />

be responsible for protecting voting booths, if your organization is tasked with stewarding any appreciable<br />

volume of personally identifiable information, you could still come under attack. Any sort of personal<br />

information could be used by malicious actors to target groups or areas that may be crucial in the<br />

upcoming election. While this threat may not imply some sort of qualitative break with the past, it means<br />

that the threat level we can expect for the next year to be higher, putting an even greater level of pressure<br />

and responsibility on cybersecurity teams.<br />

SecOps teams should be on the lookout for DDOS attacks , phishing, and malware attacks against<br />

infrastructure and networks that may be deemed critical to the elective process. While these are standard<br />

threats that cyber analysts have been dealing with for years, their level of sophistication is increasing,<br />

and the channels for attack are sure to multiple alongside the spread of 5G and IoT.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!