02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Quite often the perpetrator claims to be calling or emailing from a government agency with urgent need<br />

to get in<strong>for</strong>mation to maintain the target’s benefits or tax status; of course, Social Security and the Internal<br />

Revenue Service are the agencies most often cloned by the criminals.<br />

Also common is the hyperlink which appears to come from a legitimate source, often a company where<br />

the target already has an account, but directed to a bogus website where the target’s username and<br />

password are collected by the criminals; this in<strong>for</strong>mation is then used to hijack the target’s real accounts.<br />

Privacy<br />

As identity theft threats have developed, an important aspect of the legal and regulatory response has<br />

arisen out of privacy concerns and consumer rights. This response started with the adoption of privacy<br />

laws by States and has become a focal point <strong>for</strong> federal action.<br />

In addition to setting standards and requirements <strong>for</strong> holders of protected sensitive in<strong>for</strong>mation, broader<br />

provisions have been created, such as disclosure and notification standards and even private rights of<br />

action. Under private rights of action, affected parties whose sensitive in<strong>for</strong>mation has been<br />

compromised due to failure on the part of the holders, can sue <strong>for</strong> damages directly rather than waiting<br />

<strong>for</strong> government fines or punitive actions.<br />

It’s easy to see how any failures in cybersecurity practices resulting in data breaches involving protect<br />

personal in<strong>for</strong>mation can trigger the provisions and penalties of privacy laws and regulations.<br />

As a result, privacy initiatives have become a major driver with immediate effect on cyber practices. It’s<br />

worth noting that even compliance with privacy laws may not provide a complete shield against liability<br />

in the event of a breach.<br />

In the view of the ICFE, in identity theft risk management, substantial coverage of privacy issues is a<br />

necessity, especially as they affect vulnerable demographics, such as seniors, children, and veterans.<br />

ICFE is pleased to report that this emphasis on privacy issues has resulted in the acceptance <strong>for</strong> CE<br />

credit by the leading organization in the field, the International Association of Privacy Professionals.<br />

Enter <strong>Cyber</strong> Attacks and <strong>Cyber</strong>security<br />

By the time of the most recent update to the CITRMS® XV course, cybersecurity had developed to the<br />

point that the ICFE included a whole section on the topic. We were <strong>for</strong>tunate enough to count on Gary<br />

Miliefsky, Publisher of <strong>Cyber</strong> <strong>Defense</strong> Magazine, to provide that content <strong>for</strong> the course.<br />

At this juncture, ICFE is undertaking to launch an update and expansion of the CITRMS® course.<br />

This will include an enhanced section on <strong>Cyber</strong>security, developments in the attack vectors, public and<br />

private responses, and the implications <strong>for</strong> consumers, businesses, and organizations with the<br />

responsibility of maintaining the confidentiality, integrity, and accessibility of sensitive in<strong>for</strong>mation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!