02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

It is no longer the case that the "it will never happen to us" attitude is accurate. In fact, to the contrary, as<br />

every 39 seconds, there is a new attack somewhere on the web, and the rapidly rising cost of global<br />

cyber hacks rising every year around 15 per cent.<br />

Testing your resilience: Attack yourself.<br />

It is now more vitally important than ever be<strong>for</strong>e to test the company's resilience to ensure that critical<br />

data is secure and vulnerabilities are identified. These vulnerabilities can also include programming<br />

errors, or improper computer or security configurations which can be then be exploited by hackers who<br />

discover these unintentional flaws and use these an opportunity <strong>for</strong> cyberattacks which are known as<br />

zero day attacks. To address this, the software developers have to release updated software patches.<br />

However, since they have just learned of the flaws, they have “zero days” to fix the problem and protect<br />

the users.<br />

A secure way to achieve the testing of resilience is by evaluating your company's vulnerabilities through<br />

being breached voluntarily. There<strong>for</strong>e, attack yourself be<strong>for</strong>e hackers do, and assess what weaknesses<br />

in your IT infrastructure would make them successful and proactively fix them. You stand a significant<br />

chance to reduce the impact of an attack, provided you have a robust response plan and that it is<br />

consistently tested.<br />

Most security leaders do not know how their team would react to a cyber breach. These exercises are<br />

critical to help provide an understanding of the capabilities of your team and your existing technology and<br />

are great <strong>for</strong> building muscle memory and assessing where to invest budgets.<br />

Fortunately, there are several ways and methods to do this today, from tabletop exercises to penetration<br />

testing and simulation exercises such as red teaming.<br />

Why choose proactive simulation<br />

Penetration testing identifies possible vulnerabilities and security holes but is highly dependent on the<br />

skill of the pentester. This is where immersive solutions such as red teaming have a massive advantage.<br />

It presents you with a heart-pounding, first-hand experience that reproduces the real impact of an attack.<br />

It helps prepare your teams to respond and enables you to understand how competent your response is<br />

and how fluent you are in your response incident response plan.<br />

It is also crucial <strong>for</strong> the business to view cyber security as a shared responsibility, not simply the IT head's<br />

sole responsibility. Instead, everyone has a role in ensuring the organisation remains cyber secure.<br />

Response plans will have assigned responsibilities <strong>for</strong> the key decision makers such as the CEO, CIO,<br />

CHRO etc and simulation exercises guarantee that all protocols are fully understood by all parties and<br />

strengthen the cybersecurity bench providing critical in a low-risk, low-cost way to learn from your failures.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!