05.11.2024 Views

The Cyber Defense eMagazine November Edition for 2024

Cyber Defense eMagazine November Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225+ page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225+ page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

Boost Operational Resilience: Proactive<br />

Security with CORA Best Practices<br />

12 Ways to Protect Your Business from<br />

Hackers During Remote Work<br />

Ransomware Tactics Are Shifting.<br />

Here’s How to Keep Up<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


`<br />

CONTENTS<br />

Welcome to CDM’s <strong>November</strong> <strong>2024</strong> Issue----------------------------------------------------------------- 8<br />

Boost Operational Resilience: Proactive Security with CORA Best Practices -------------------- 39<br />

By Matt Malarky, VP Strategic Alliances, Titania<br />

12 Ways to Protect Your Business from Hackers During Remote Work ----------------------------- 43<br />

By Michelle Moore, Ph.D., Academic Director and Professor, University of San Diego’s Innovative<br />

Online Master of Science in <strong>Cyber</strong> Security Operations and Leadership Program<br />

Ransomware Tactics Are Shifting. Here’s How to Keep Up -------------------------------------------- 46<br />

By Kerri Shafer-Page, Arctic Wolf Vice President of Incident Response<br />

<strong>The</strong> Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software<br />

Supply Chain Threats --------------------------------------------------------------------------------------------- 48<br />

By Ken Zalevsky, MedTech Expert and CEO of Vigilant Ops, Inc.<br />

14 million Victims of Malware Breaches In <strong>The</strong> U.S. Healthcare Sector ---------------------------- 52<br />

By Rhoda Aronce and Ashwini Bhagwat, Senior Threat Researchers at SonicWall<br />

Why <strong>The</strong> Open Web Application Security Project (OWASP) Mobile Application Security (MAS)<br />

Project Is Critical -------------------------------------------------------------------------------------------------- 56<br />

By George McGregor, Vice President of Marketing, Approov, Inc.<br />

A CISO’s Guide to Managing <strong>Cyber</strong> Risk in Healthcare -------------------------------------------------- 60<br />

By Gaurav Banga, Founder and CEO of Balbix<br />

Beyond Buzzwords: <strong>The</strong> Real Impact of AI on Identity Security --------------------------------------- 63<br />

By Israel Duanis, Co-Founder and CEO, Linx Security<br />

Beyond the Firewall: Protecting Your Marketing Department from <strong>Cyber</strong> Threats and<br />

Safeguarding Digital Assets ------------------------------------------------------------------------------------- 67<br />

By Mushegh Hakobjanyan, CEO, Andava Digital<br />

Preparing <strong>for</strong> the EU’s DORA amidst Technical Controls Ambiguity --------------------------------- 71<br />

By Martin Greenfield, CEO of Quod Orbis<br />

Securing Linux Systems in the Age of AI: Unified Security Strategies <strong>for</strong> Modern Enterprises 75<br />

By Inna Ushakova, CEO at AI EdgeLabs<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Digital Trans<strong>for</strong>mation Failures: A National Security Crisis in the Making ------------------------- 83<br />

By Joe Crist, CEO, Trans<strong>for</strong>m 42<br />

Top Recommendations <strong>for</strong> Data Retention and Deletion ----------------------------------------------- 89<br />

By Leon Butler, Head of Data Security, Quorum <strong>Cyber</strong><br />

Protecting CISOs and CSOs in an Era of Personal Liability --------------------------------------------- 92<br />

By Amanda Fitzsimmons, Head of Legal at Salt Security<br />

Mapping a Future without <strong>Cyber</strong> Attacks -------------------------------------------------------------------- 95<br />

By Chetan Conikee, Founder and CTO, Qwiet AI<br />

Beyond Tick Boxes: An Auditor's Perspective on In<strong>for</strong>mation Security Compliance ------------ 98<br />

By James Rees, Managing Director, Razorthorn Security<br />

Strengthening <strong>Cyber</strong>security in Healthcare: Protecting Patient Data and Ensuring Regulatory<br />

Compliance in a Digital Age ----------------------------------------------------------------------------------- 103<br />

By Roshan Patin, Sr. Researcher, SNS Insider Pvt. Ltd.<br />

Why the <strong>Cyber</strong>security Talent Shortage is a Global Threat ------------------------------------------- 107<br />

By Dan Vigdor, Co-Founder, Co-CEO and Executive Chairman, ThriveDX<br />

Deepfakes: <strong>The</strong> <strong>Cyber</strong>security Pandora’s Box ----------------------------------------------------------- 113<br />

By Luke Dash, CEO, ISMS.online<br />

Geopolitical <strong>Cyber</strong> Threats in <strong>2024</strong>: Navigating Emerging Risks with OSINT (Open-Source<br />

Intelligence) ------------------------------------------------------------------------------------------------------- 117<br />

By Andy Grayland, CISO, Silobreaker<br />

<strong>The</strong> Threat of Privilege Abuse in Active Directory ------------------------------------------------------- 121<br />

By Francois Amigorena, CEO & Founder, IS Decisions<br />

Customer Authentication Challenges That Impact Your Organization's Security Posture -- 125<br />

By Jim Verducci, CEO, Wristban<br />

Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance<br />

Plan ------------------------------------------------------------------------------------------------------------------ 130<br />

By Juliana Spof<strong>for</strong>d, General Counsel and Chief Privacy Officer, Aidentified<br />

<strong>Cyber</strong>security Awareness Month <strong>2024</strong>: Insights from Industry Experts --------------------------- 133<br />

<strong>Cyber</strong>security Awareness Month: Industry Experts on Securing Our Digital Lives Together 140<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AsyncRAT Malware Campaign Found Targeting South American Hotels ------------------------- 146<br />

By Ryan Estes, Intrusion Analyst, WatchGuard Technologies<br />

From <strong>Cyber</strong>security Awareness to Action: Industry Experts on Building a Safer Digital Future<br />

------------------------------------------------------------------------------------------------------------------------ 149<br />

Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation --------------------- 156<br />

By Corey Bodzin, Chief Product Officer, GreyNoise Intelligence<br />

Learning from the Inevitable ---------------------------------------------------------------------------------- 159<br />

By Stephanie Aceves, Senior Director of Product Management, Tanium<br />

Navigating Holiday Threats: Strengthening PC Resilience with Desktops as a Service (DaaS)<br />

------------------------------------------------------------------------------------------------------------------------ 162<br />

By Amitabh Sinha, CEO & Co-Founder of Workspot<br />

Rethinking NHI Security: <strong>The</strong> Essential Shift to Zero Trust Security and Ephemeral Identities<br />

------------------------------------------------------------------------------------------------------------------------ 165<br />

By Ofir Har-Chen, Co-Founder & CEO, Clutch Security<br />

Revolutionizing Third Party Risk Management: <strong>The</strong> Future with Autonomous Pen-Testing-- 169<br />

By Arun Kumar Krishna, Chief Technology Officer, Sennovate INC<br />

<strong>The</strong> Hidden Dangers of Free Messaging Apps: Security Risks and Data Mining Threats ------ 176<br />

By Nicole Heron, Marketing Manager at Salt Communications<br />

Security Through Collaboration: France and Saudi Arabia ------------------------------------------- 180<br />

By Jacques de la Riviere, CEO, Gatewatcher<br />

Industry Experts on Sustaining Vigilance <strong>for</strong> A Secure Digital Future ----------------------------- 183<br />

<strong>The</strong> Best <strong>Defense</strong> Against BEC Attacks: A Threat Intensified by AI And Digitalization -------- 190<br />

By Robert Haist, CISO, TeamViewer<br />

<strong>The</strong> Critical Importance of Securing Mobile Identities ------------------------------------------------ 194<br />

By David Natker, Vice President of Global Partners and Alliances, Zimperium<br />

<strong>The</strong> Critical Role of Due Diligence in Mergers and Acquisitions ------------------------------------ 197<br />

By Charlie Wood, Executive Vice President, FoxPointe Solutions In<strong>for</strong>mation Risk Management<br />

division of <strong>The</strong> Bonadio Group<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Internet of Things Privacy Review ---------------------------------------------------------------------- 200<br />

By Milica D. Djekic<br />

<strong>The</strong> Looming Quantum Threat: Safeguarding Our Digital Future ------------------------------------ 202<br />

By Rahul Tyagi, CEO and Founder at SECQAI<br />

<strong>The</strong> #1 Reason Employers Ditch <strong>The</strong>ir CISO (A Recruiter's Take) ----------------------------------- 206<br />

By Owanate Bestman, Founder, Bestman Solutions<br />

<strong>The</strong> Rise of Impersonation Scams Targeting Individuals & How to Protect Yourself ---------- 209<br />

By Fred Kwong, Vice President & Chief In<strong>for</strong>mation Security Officer, DeVry University<br />

<strong>The</strong> Role of AI in <strong>Cyber</strong>security and Identity Management ------------------------------------------- 212<br />

By Steve Moore, Chief Security Strategist, Co-Founder TEN18, Exabeam<br />

Using AI And Machine Learning to Detect and Respond To Contact Center Security Threats In<br />

Real-Time ---------------------------------------------------------------------------------------------------------- 215<br />

By Jerry Dotson, Vice President of U.S. Federal, Avaya Government Solutions<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

In this early edition of the <strong>November</strong> <strong>Cyber</strong> <strong>Defense</strong> Magazine, I would like to recognize the dedication<br />

and professionalism of the CISOs and others who are participating in the <strong>Cyber</strong><strong>Defense</strong>Con <strong>2024</strong>.<br />

https://cyberdefenseconferences.com/<br />

While Florida still deals with the aftermath of Hurricane Milton, we are <strong>for</strong>tunate to be able to continue<br />

our work together, and at the same time support the hospitality industry in this stricken community.<br />

In addition to the many supporters of our Conference, I’m pleased to note that we continue to receive<br />

positive responses to new and valuable initiatives we offer <strong>for</strong> the benefit of our readers and followers.<br />

Please see many new “Spotlight” articles on the magazine’s home page, under the “Spotlight” nav bar:<br />

https://www.cyberdefensemagazine.com/spotlight/<br />

Note they are identified as “Publisher’s Spotlight” and “Innovator’s Spotlight,” depending on which of our<br />

professionals submitted the article.<br />

In the varied offerings of <strong>Cyber</strong> <strong>Defense</strong> Media Group, we continue on our principal mission - to share<br />

cutting-edge knowledge, real-world stories and awards on the best ideas, products, and services in the<br />

in<strong>for</strong>mation security industry to help you on this journey.<br />

Finally, I would like to congratulate our Black Unicorn Finalists and Winners, Top InfoSec Innovator<br />

Winners, Women in cyber winners including our scholarship recipients, and Top Global CISOs Winners<br />

this year. Congratulations to all, found online at https://www.cyberdefenseawards.com/<br />

Warmest regards,<br />

Gary S. Miliefsky, fmDHS, CISSP®<br />

CEO/Publisher/Radio/TV Host<br />

P.S. When you share a story or an article or<br />

in<strong>for</strong>mation about CDM, please use #CDM and<br />

@<strong>Cyber</strong><strong>Defense</strong>Mag and @Miliefsky – it helps<br />

spread the word about our free resources even<br />

more quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@ cyberdefensemag<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media<br />

Group and distributed electronically via opt-in Email, HTML,<br />

PDF and Online Flipbook <strong>for</strong>mats.<br />

EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

yan.ross@cyberdefensemagazine.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

https://www.cyberdefensemagazine.com<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP<br />

1717 Pennsylvania Avenue NW, Suite 1025<br />

Washington, D.C. 20006 USA<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

https://www.cyberdefensemagazine.com/about-our-founder/<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

PROFESSIONALS<br />

12 YEARS OF EXCELLENCE!<br />

Providing free in<strong>for</strong>mation, best practices, tips, and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

Magazine is your go-to-source <strong>for</strong> In<strong>for</strong>mation Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

WIRE<br />

CYBERDEFENSECONFERENCES<br />

WEBINARS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>November</strong> <strong>2024</strong> Issue<br />

From the Editor-in-Chief<br />

With this near year end publication, our <strong>November</strong> issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine, we are pleased to<br />

coordinate our work following the gathering of <strong>Cyber</strong><strong>Defense</strong>Con <strong>2024</strong> in Orlando Florida last week and<br />

the release of our annual Black Unicorn Report <strong>for</strong> <strong>2024</strong>, at: https://cyberdefenseawards.com/the-blackunicorn-report-<strong>for</strong>-<strong>2024</strong>/<br />

Our publication is the central point of a concentrated ef<strong>for</strong>t to bring to the cybersecurity community of<br />

professionals the most relevant and up-to-date articles on topics of vital interest. As always, we are<br />

grateful to our many authors and their organizations <strong>for</strong> their contribution to this ef<strong>for</strong>t.<br />

At the same time, we would be remiss not to recognize and promote the broad range of services to<br />

cybersecurity professionals offered by our parent organization, <strong>Cyber</strong> <strong>Defense</strong> Media Group. Together,<br />

we bring to the world of cybersecurity a unique environment in which to make our readers and participants<br />

aware of the best and most relevant developments in the industry.<br />

Not only do our authors serve the needs of CISOs and other cyber security professionals, but also provide<br />

valuable in<strong>for</strong>mation to a growing cadre of vendors and suppliers and clientele of the entire range of cyber<br />

risk management providers.<br />

As always, we strive to be the best and most actionable set of resources <strong>for</strong> the CISO community in<br />

publishing <strong>Cyber</strong> <strong>Defense</strong> Magazine and broadening the activities of <strong>Cyber</strong> <strong>Defense</strong> Media Group.<br />

Wishing you all success in your cybersecurity endeavors!<br />

Yan Ross<br />

Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & U.S. Editor-in-Chief of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine. He is an accredited author and educator and has provided<br />

editorial services <strong>for</strong> award-winning best-selling books on a variety of topics. He<br />

also serves as ICFE's Director of Special Projects, and the author of the Certified<br />

Identity <strong>The</strong>ft Risk Management Specialist ® XV CITRMS® course. As an<br />

accredited educator <strong>for</strong> over 20 years, Yan addresses risk management in the<br />

areas of identity theft, privacy, and cyber security <strong>for</strong> consumers and organizations<br />

holding sensitive personal in<strong>for</strong>mation. You can reach him by e-mail at<br />

yan.ross@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


s<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


out <strong>The</strong> Black Unicorn Report<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Boost Operational Resilience: Proactive Security with CORA<br />

Best Practices<br />

In today’s fast-evolving cyber threat landscape, maintaining operational resilience is critical<br />

By Matt Malarky, VP Strategic Alliances, Titania<br />

On almost a monthly basis, the US <strong>Cyber</strong>security & Infrastructure Security Agency (CISA) publishes<br />

advisories about the latest cybersecurity risks, attacks and vulnerabilities to help organizations defend<br />

and protect themselves against sophisticated cyber actors. Despite this, on a nearly equal cadence,<br />

there’s news of another major cyber breach.<br />

Earlier this year, Change Healthcare, a subsidiary of United Health Group, suffered a ransomware attack<br />

that shut down operations, causing nearly $874 million in financial losses and significant disruptions in<br />

patient care. As healthcare is a key part of the nation’s critical national infrastructure (CNI), the US federal<br />

government, led by HHS, launched an investigation to ensure continuity of operations, protect consumer<br />

data, and assist the FBI in identifying the culprits behind the attack.<br />

In the case of Change Healthcare, it transpired that multifactor authentication (MFA) was not required to<br />

access a server that contained medical in<strong>for</strong>mation on up to a third of the American population. This<br />

highlights the importance of ensuring that critical systems that contain sensitive data are correctly<br />

secured and are prioritized <strong>for</strong> risk assessments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Whilst this incident was another blow to a commercial CNI company, the US Department of <strong>Defense</strong><br />

(DoD) has taken a step towards mitigating such a breach by focusing their cyber security ef<strong>for</strong>ts on those<br />

systems that are mission critical and also most at risk of attack. This reflects a mindset shift from tick-box<br />

compliance to operational resilience assessments, represented by the launch of the <strong>Cyber</strong> Operational<br />

Readiness Assessment (CORA) program.<br />

CORA provides a critical approach <strong>for</strong> the DoD towards achieving operational readiness by prioritizing<br />

reducing the attack surface of their cyber terrain and enhancing security measures where it matters most,<br />

ensuring continuity of operations. It’s not just about reacting to threats but anticipating and neutralizing<br />

risk be<strong>for</strong>e operations are disrupted.<br />

Whether in the DoD or commercially run CNI, one of the most effective ways to enhance the resilience<br />

of network infrastructure is viewing software vulnerabilities and misconfigurations using MITRE<br />

ATT&CK’s Techniques, Tactics, and Procedures (TTPs) to prioritize remediation workflows. This<br />

approach systematically targets and addresses the most exploitable vulnerabilities first, which are often<br />

the first points of entry <strong>for</strong> attackers. But ad hoc risk-focused assessments in and of themselves are not<br />

sufficient.<br />

<strong>The</strong> Importance of Proactive Security<br />

A recent report, Emerging Best Practice in the Use of Proactive Security Solutions, highlights a significant<br />

shift in how organizations approach cybersecurity. Over 70% of businesses have increased their<br />

investment in proactive cyber defense, outpacing spending on both preventative and reactive strategies.<br />

In particular, security-mature organizations are deploying these solutions to improve attack surface<br />

management and optimize security controls.<br />

<strong>The</strong> CORA program aligns with these best practices and is crucial <strong>for</strong> validating current, future, and<br />

emerging technologies that will help organizations continuously monitor and assess terrain to assess and<br />

mitigate their risk. By integrating proactive security solutions that leverage frameworks like MITRE<br />

ATT&CK, into their tech stacks, organizations can gain real-time visibility into their security posture and<br />

stay ahead of potential threats.<br />

Best Practices <strong>for</strong> Implementing Proactive Security<br />

To effectively implement proactive security, organizations should focus on:<br />

1. Prioritizing vulnerability and configuration management. Proactive vulnerability and configuration<br />

management (VM/CM) solutions are essential <strong>for</strong> minimizing attack surfaces. Every device on the<br />

network should be assessed regularly, particularly if it’s in a critical segment of the network or protecting<br />

Important Business Systems (IBS). However, the research shows many organizations fall short, often<br />

only assessing devices monthly or only evaluating a sample of devices. Best practices call <strong>for</strong> more<br />

frequent, automated assessments to identify and mitigate risks in near real-time. Addressing visibility<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


gaps <strong>for</strong> certain device types, like those exposed by the China-backed Volt Typhoon incident, is also<br />

crucial <strong>for</strong> strengthening critical infrastructure.<br />

2. Enhancing continuous monitoring. Continuously monitoring <strong>for</strong> configuration drift is central to any<br />

proactive security strategy. In practice, if not automated effectively, continuous monitoring can result in<br />

an overwhelm of repeat data. Enhancing continuous monitoring with proactive assessment capabilities<br />

means changes – that could be an indicator of compromise – are assessed in near-real-time, between<br />

scheduled audits, to determine whether they have resulted in unintended network risk.<br />

3. Integrating exposure monitoring. Automation is key to scaling proactive security ef<strong>for</strong>ts and ensuring<br />

the organization is working with up-to-the-minute exposure intelligence. High-maturity organizations<br />

increasingly use proactive security solutions that overlay misconfiguration data onto attack frameworks<br />

like MITRE ATT&CK. This allows <strong>for</strong> more comprehensive incident discovery and incident response,<br />

essential <strong>for</strong> maintaining an effective security posture.<br />

4. Prioritizing remediation with risk-based metrics. CORA emphasizes using risk-based metrics to<br />

guide assessments and remediation. Organizations should automate similar practices, using metrics that<br />

dynamically analyze exposure to TTPs and prioritize remediation accordingly. This approach ensures the<br />

vulnerabilities at greatest risk of exploit are addressed first, reducing overall exposure.<br />

Moving Towards a Proactive Security Culture<br />

<strong>The</strong> shift to proactive security isn’t just about technology—it’s a strategic overhaul requiring continuous<br />

improvement. As organizations adopt these best practices, they must also foster a culture of security<br />

awareness and accountability. Employees should understand the importance of proactive measures and<br />

be equipped to anticipate and mitigate threats. Research shows that reducing the opportunity <strong>for</strong> threats<br />

(47%) and shortening the time to remediate known vulnerabilities (41%) are top priorities <strong>for</strong><br />

organizations. <strong>The</strong>se priorities must be brought to action.<br />

Coupling risk-prioritized assessments, as outlined through CORA, with proactive security measures<br />

represents a significant evolution in cybersecurity. By investing in security solutions and adhering to best<br />

practices, organizations can enhance the operational resilience and readiness of their critical<br />

infrastructure. As threats evolve, staying several steps ahead will be crucial to safeguarding operations<br />

and ensuring long-term success.<br />

<strong>The</strong> future of cybersecurity lies in risk-focused, proactive measures that go far beyond prevention and<br />

reaction. By continuously improving exposure visibility, leveraging proactive assessment automation, and<br />

prioritizing a risk-based approach to remediation, organizations can build and maintain a security posture<br />

that addresses current threats and anticipates future risks. A journey towards operational resilience is<br />

relentless and ever-changing, but those committed to this security path will be best positioned to thrive<br />

in an increasingly challenging cyber landscape.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Matt Malarkey is VP, Strategic Alliances at Titania. Matt identifies strategic<br />

opportunities and manages relationships with key partners, particularly within<br />

regulated industries and the U.S. government.<br />

Prior to joining Titania, he spent six years at the British embassy in Washington,<br />

D.C., where he acted as a liaison between the UK government and key<br />

stakeholders in the U.S. defense community. Malarkey has also advised U.S.<br />

policymakers on national security issues in Russia and the <strong>for</strong>mer Soviet Union.<br />

Matt can be reached online at our company website titania.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


12 Ways to Protect Your Business from Hackers During Remote<br />

Work<br />

By Michelle Moore, Ph.D., Academic Director and Professor, University of San Diego’s Innovative<br />

Online Master of Science in <strong>Cyber</strong> Security Operations and Leadership Program<br />

Remote work is here to stay, with nearly a quarter of the U.S. work<strong>for</strong>ce (22%) expected to be working<br />

remotely by 2025. In fact, 42% of office employees have stated they would accept a 10% salary cut in<br />

exchange <strong>for</strong> the flexibility to work remotely. While this type of working environment has become the<br />

norm <strong>for</strong> many, it also increases the risk of cybersecurity threats.<br />

If you’re looking to enhance remote work security <strong>for</strong> yourself and your employees, or if you’re curious<br />

about the latest threats, keep reading to learn how to protect your business.<br />

<strong>The</strong> Evolving Threat Landscape<br />

<strong>Cyber</strong>security measures have greatly evolved in just the last few years but un<strong>for</strong>tunately, so have<br />

hackers' methods and techniques. Social engineering, <strong>for</strong> example, is a newer tactic used by criminals<br />

to manipulate people into revealing sensitive in<strong>for</strong>mation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Malware, phishing and ransomware attacks are not only on the rise but also becoming increasingly<br />

complex. Spear phishing targets individuals with highly tailored and convincing messages, often<br />

appearing to be from colleagues or trusted sources.<br />

Hackers are also executing supply chain attacks and business email compromise scams. In <strong>2024</strong> alone,<br />

some of the largest data breaches have included well-known entities such as AT&T, Ticketmaster, Dell<br />

and Bank of America.<br />

12 Ways to Protect Your Business<br />

With so many new and evolving cyberattack strategies, taking the right precautions is more important<br />

than ever. Here are 12 important ways to enhance your cybersecurity and safeguard your business during<br />

remote operations.<br />

1. Create strong, unique passwords: It’s a tip that you’ve probably heard <strong>for</strong> years, but it continues<br />

to hold true. Microsoft recommends creating a password that’s at least 12 characters and a<br />

combination of uppercase and lowercase letters, numbers and symbols. Google suggests using<br />

a song or poem lyric, a series of words that’s meaningful to you or an abbreviation only you know.<br />

Don’t use your birthday or phone number.<br />

2. Connect via a Virtual Private Network (VPN): A VPN conceals your network’s IP address and<br />

creates a private, encrypted connection.<br />

3. Enable multi-factor authentication: Multi-factor authentication requires you to provide at least<br />

two pieces of in<strong>for</strong>mation in order to gain access to a particular account or application. This could<br />

be a code sent to your email or cell phone, a secret question or a password.<br />

4. Install antivirus software: If your work computer isn’t equipped with antivirus software, ask your<br />

IT department if your company has a subscription or recommends a particular brand. Antivirus<br />

software can detect, block and remove viruses and warn you about dangerous websites and links.<br />

5. Keep software updated: Software is only as good as its updates. Make sure all devices and<br />

software are in line with the latest security patches.<br />

6. Use secure Wi-Fi connections. Remote work doesn’t necessarily mean working from home.<br />

You may enjoy working at a coffee shop, library or co-working space, but regardless of your<br />

environment, make sure you use secure, password-protected Wi-Fi networks and avoid using<br />

public internet connections.<br />

7. Avoid using personal devices <strong>for</strong> work: Stick to work-approved devices such as laptops,<br />

computers and cell phones <strong>for</strong> business-related tasks. If you do need to use a personal device<br />

<strong>for</strong> work, make sure you follow your company’s security policies, such as using secure<br />

connections, installing approved security software and protecting sensitive data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


8. Back up data on a regular basis: Encrypt and back up all important business data to a secure,<br />

off-site location. Additionally, consider implementing an email archiving solution to digitally store<br />

emails and attachments within a secure, centralized location <strong>for</strong> long-term retention.<br />

9. Deploy a “zero trust” policy: More and more businesses are implementing a “zero trust”<br />

framework, which treats everyone as a potential threat until verified.<br />

10. Control who can access sensitive in<strong>for</strong>mation: Only employees with a specific need <strong>for</strong><br />

sensitive in<strong>for</strong>mation should be granted access.<br />

11. Report any suspicious incidents immediately: Do not click on links or open emails that seem<br />

suspicious. Report these incidents to your IT department right away so they can warn others.<br />

12. Participate in security training: Ensure that your company provides regular cybersecurity<br />

awareness training. If your IT department lacks the capacity <strong>for</strong> this, consider utilizing online<br />

resources or hiring a cybersecurity training company to implement a comprehensive education<br />

program.<br />

Whether you’ve been working remotely <strong>for</strong> years or are just starting a new work-from-home role, these<br />

tips and strategies will help protect you and your business, ensuring your cybersecurity remains strong<br />

and resilient against potential threats.<br />

About the Author<br />

Michelle Moore is a academic director and professor <strong>for</strong> the University of San<br />

Diego’s Innovative Online Master of Science in <strong>Cyber</strong> Security Operations and<br />

Leadership Program. She is also a researcher and author with over two decades<br />

of private-sector and government experience as a cybersecurity expert.<br />

Michelle can be reached online at mmoore@sandiego.com and at our company<br />

website https://onlinedegrees.sandiego.edu/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ransomware Tactics Are Shifting. Here’s How to Keep Up<br />

By Kerri Shafer-Page, Arctic Wolf Vice President of Incident Response<br />

It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median<br />

demands rising 20% year-over-year across virtually all industries. But it's not only the ransom sums<br />

themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and<br />

techniques to extort their victims. It’s imperative that IT leaders and businesses without the resources to<br />

fight back against attackers understand what to do in the face of these new strategies.<br />

<strong>The</strong> reason that small- and medium-sized organizations need to re-up their incident response plan is that<br />

low-profile and locally owned businesses are no longer invisible to cyberattacks. Threat actors have<br />

historically gone after targets like healthcare centers, banks and other places that hold highly sensitive<br />

data because that data, when encrypted, is worth more money in a potential ransom. But even momand-pop<br />

stores are starting to see ransomware cases rise, with 60% of SMB’s reporting that ransomware<br />

was a concern <strong>for</strong> them last year.<br />

<strong>The</strong> reason is simple; it's easier <strong>for</strong> attackers to scare local businesses into fulfilling their demands than<br />

large enterprises that likely have dedicated security resources and incident response plans in place. In<br />

many cases, it’s impossible to prosecute these cyber criminals because they’re anonymous and<br />

operating from countries with no extradition agreements with the U.S. So without the risk of any real<br />

legal consequences, they can employ similar tactics that car dealership salespeople use with new<br />

customers, which is to throw out a high price and hope the buyer –– or SMB owner –– doesn’t see through<br />

their bluff.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In other cases, attackers can threaten violence or use AI to spoof voice clips, video clips or social media<br />

accounts that imply physical harm could be done if they’re not paid. None of these threats are legitimate,<br />

as these attackers are halfway across the world, but they can be scary to an unsuspecting business<br />

owner.<br />

If mom-and-pop shops deal with these types of attacks on their own, they might think there’s no way out<br />

of their mess without paying. But thankfully, as attackers evolve, so do incident response techniques<br />

designed to thwart them. IR practitioners know that the more they can delay any action in communicating<br />

with cyber criminals, the higher the likelihood that the threat actor will either lower the ransom or drop it<br />

entirely and move onto their next target. Practitioners also understand that the scare tactics they employ<br />

on their victims are hollow threats, and pushing back on these threats discourages threat actors from<br />

upping their demands. Many of these threat actors inflate their demands because they’re indebted to the<br />

developers of the ransomware they’re using, and taking that into context helps security experts<br />

understand how to <strong>for</strong>ce an attacker to lower their price.<br />

Crucially, however, businesses should also mitigate the effectiveness of ransomware attacks by acquiring<br />

a cyber insurance policy that meets their needs. <strong>Cyber</strong> insurance policies act as liability insurance that<br />

can assist with paying expenses in the event of an actual cyber incident, including remediation, data<br />

restoration and potentially a ransom payment.<br />

<strong>Cyber</strong> insurance policies also serve as motivation <strong>for</strong> businesses to review and update their security<br />

posture in general, because the more secure they are, the lower the cost of their insurance premium.<br />

That means implementing identity access management measures like multi-factor authentication, using<br />

VPN’s, requiring strong passwords and regular security awareness trainings all play a role in saving a<br />

security-savvy business money on their insurance policy.<br />

Taking on threat actors can be a daunting experience <strong>for</strong> an average organization, which is why it’s<br />

always a good idea to reach out to a cybersecurity vendor or law en<strong>for</strong>cement when a cybersecurity<br />

incident occurs. With outside help to reduce cyber risk, SMB’s can worry less about ransomware and<br />

spend more time on growing their business.<br />

About the Author<br />

Kerri Shafer-Page is Vice President of Incident Response at Arctic Wolf.<br />

Previously, Kerri served as the Global <strong>Cyber</strong> Claims Practice Leader at AIG and<br />

held several roles at IBM, most recently X-Force Incident Response, Global<br />

Operations Lead. Consistently, Kerri has been responsible <strong>for</strong> overseeing<br />

cybersecurity business direction and managing teams responsible <strong>for</strong> keeping<br />

customers safe. At Arctic Wolf, Kerri and her team work alongside teams like<br />

insurance, threat intelligence, security services and beyond to ensure that<br />

customers are protected and supported on all fronts. She maintains and enhances the incident response<br />

processes in place and constantly looks <strong>for</strong> new ways to bolster security across Arctic Wolf and its<br />

customers environments.<br />

Kerri can be reached at our company website https://arcticwolf.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Critical Role of Sboms (Software Bill of Materials) In<br />

Defending Medtech From Software Supply Chain Threats<br />

By Ken Zalevsky, MedTech Expert and CEO of Vigilant Ops, Inc.<br />

Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of<br />

cybersecurity, especially in medical devices. As these devices become more and more interconnected<br />

and dependent on complex software ecosystems, the potential <strong>for</strong> exploitation through the supply chain<br />

has grown exponentially. One powerful tool in the fight against these attacks is the Software Bill of<br />

Materials (SBOM). SBOMs enable greater transparency, security, and compliance by offering a<br />

comprehensive inventory of all software components. In this article, we will explore how SBOMs can be<br />

leveraged to prevent software supply chain attacks, with a focus on the medical device industry.<br />

Understanding Software Supply Chain Attacks in Medical Devices<br />

<strong>The</strong> Nature of Software Supply Chain Attacks<br />

Software supply chain attacks occur when malicious actors infiltrate the software development or<br />

distribution process, introducing vulnerabilities or malware into the final product. <strong>The</strong>se attacks can target<br />

various supply chain stages, from code development and integration to software updates and third-party<br />

component inclusion. <strong>The</strong> impact of such attacks can be devastating, leading to data breaches, system<br />

failures, and even harm to patients in the context of medical devices.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Medical Devices: A Prime Target<br />

Medical devices, such as infusion pumps, pacemakers, and patient monitors are particularly vulnerable<br />

to software supply chain attacks due to their critical nature and the sensitive data they handle. <strong>The</strong>se<br />

devices often rely on a multitude of software components sourced from various vendors, increasing the<br />

attack surface. Additionally, the stringent regulatory environment and the need <strong>for</strong> constant software<br />

updates make it challenging to maintain robust security throughout the device lifecycle.<br />

High-Profile Incidents<br />

Several high-profile incidents have underscored the seriousness of software supply chain attacks in the<br />

medical device industry. For example, the 2017 WannaCry ransomware attack affected numerous<br />

healthcare facilities worldwide, compromising medical devices and disrupting critical services.<br />

More recently, the SolarWinds attack in 2020, which was a sophisticated supply chain attack that<br />

compromised the software update mechanism of SolarWinds, a broadly used IT management software,<br />

demonstrated the far-reaching impact of supply chain vulnerabilities. This attack had potential<br />

implications <strong>for</strong> healthcare organizations using the compromised software, as it could have allowed the<br />

bad actors to gain unauthorized access to data and systems.<br />

Also, in 2020, a ransomware attack on the University Hospital Dusseldorf led to the diversion of<br />

emergency patients causing delay in treatment and contributing to a patient’s death. <strong>The</strong> German<br />

authorities treated this incident as a case of negligent homicide due to the link between the cyberattack<br />

and the patient’s death.<br />

<strong>The</strong> Role of SBOMs in Preventing Supply Chain Attacks<br />

What is an SBOM?<br />

A Software Bill of Materials (SBOM) is a detailed inventory that records all components, including<br />

software libraries, dependencies, licenses, and versions, used in the creation of a software application.<br />

This comprehensive documentation allows organizations to gain a clear understanding of their software’s<br />

composition, helping them to identify potential vulnerabilities, manage dependencies, and ensure<br />

compliance with regulatory standards.<br />

Enhancing Transparency and Traceability<br />

One of the primary benefits of an SBOM is enhanced transparency and traceability. By maintaining an<br />

accurate and up-to-date inventory of all software components, organizations can trace the origin of each<br />

component and monitor any changes or updates. This transparency is important in identifying and<br />

mitigating risks associated with third-party components, which are often the weakest link in the supply<br />

chain.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Vulnerability Management<br />

SBOMs play a vital role in vulnerability management. By knowing exactly what components are present<br />

in their software, organizations can quickly identify and address vulnerabilities as they are discovered.<br />

Automated tools can scan SBOMs against known vulnerability databases, alerting organizations to<br />

potential risks and enabling timely remediation. This proactive approach greatly decreases the window<br />

of opportunity <strong>for</strong> attackers.<br />

Compliance and Regulatory Considerations<br />

For medical device manufacturers, compliance with regulatory requirements is paramount. Regulatory<br />

bodies, such as the U.S. FDA (Federal Drug Administration) and the EMA (European Medicines Agency),<br />

have recognized the importance of SBOMs in ensuring the security and safety of medical devices. For<br />

instance, the FDA's guidance on cybersecurity <strong>for</strong> medical devices emphasizes the need <strong>for</strong><br />

comprehensive documentation of software components, which can be effectively managed through<br />

SBOMs.<br />

Regulatory and Compliance <strong>for</strong> Medical Device Manufacturers<br />

FDA Guidance on <strong>Cyber</strong>security<br />

<strong>The</strong> FDA has issued several guidelines to address the cybersecurity risks associated with medical<br />

devices. In its "<strong>Cyber</strong>security in Medical Devices: Quality System Considerations and Content of<br />

Premarket Submission" guidance, the FDA now has legal authority to require specific cybersecurityrelated<br />

documentation from the Medical Device Manufacturer community. This move reflects the FDA’s<br />

recognition of the growing threat landscape, where increasingly complex and interconnected medical<br />

devices are more vulnerable to cyberattacks. As part of this regulatory framework, the FDA emphasizes<br />

the importance of incorporating cybersecurity measures throughout the product lifecycle, from design<br />

and development to post-market surveillance.<br />

One of the critical components of this guidance is the inclusion of an SBOM in premarket submissions.<br />

<strong>The</strong> SBOM serves as a foundational element in identifying and managing cybersecurity risks. <strong>The</strong> FDA's<br />

requirement <strong>for</strong> an SBOM is not just about listing software components; it’s about promoting a culture of<br />

transparency and accountability within the medical device industry.<br />

European Union's Medical Device Regulation (MDR)<br />

Similarly, the European Union's Medical Device Regulation (MDR) mandates that manufacturers ensure<br />

the safety and per<strong>for</strong>mance of their devices throughout their lifecycle. This includes en<strong>for</strong>cing measures<br />

to protect against unauthorized access and tampering. An SBOM supports these requirements by offering<br />

a transparent view of software components, enabling manufacturers to monitor and secure their devices<br />

effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Global Harmonization<br />

<strong>The</strong>re is a growing trend toward global harmonization of cybersecurity regulations <strong>for</strong> medical devices.<br />

Initiatives like the International Medical Device Regulators Forum (IMDRF) and the Global Diagnostic<br />

Imaging, Healthcare IT & Radiation <strong>The</strong>rapy Trade Association (DITTA) are working to align<br />

cybersecurity requirements across different jurisdictions. SBOMs are likely to play a central role in these<br />

ef<strong>for</strong>ts, providing a standardized approach to documenting and managing software components, thereby<br />

facilitating compliance with international regulations.<br />

Conclusion<br />

<strong>The</strong> importance of strong cybersecurity measures in the medical device industry cannot be overstated.<br />

Software supply chain attacks pose a considerable risk, but by leveraging SBOMs, organizations can<br />

enhance the transparency and traceability of supplied software, improve vulnerability management, and<br />

ensure compliance with regulatory requirements. SBOMs provide a clear and comprehensive view of<br />

software components, enabling organizations to identify and mitigate risks proactively, ultimately<br />

safeguarding medical devices' integrity and safety. Embracing SBOMs is not just a best practice but a<br />

crucial step towards a more secure and resilient healthcare ecosystem.<br />

About the Author<br />

Ken Zalevsky is a MedTech expert and CEO at Vigilant Ops. He is a<br />

passionate advocate <strong>for</strong> the application of advanced technology to improve<br />

cybersecurity across all industries.<br />

He has collaborated with the U.S. Food and Drug Administration (FDA),<br />

the U.S. Department of Homeland Security (DHS), and the National<br />

Telecommunications and In<strong>for</strong>mation Administration (NTIA) on various<br />

cybersecurity initiatives, including cyber simulation exercises, industry<br />

guidance documents, and most recently, SBOM initiatives.<br />

Ken has been a featured speaker at numerous cybersecurity conferences<br />

over the years and actively participates in various cybersecurity industry working groups. He has<br />

authored numerous cybersecurity whitepapers, blogs, and magazine articles, and his work has been<br />

published in various industry journals, where he has advised medical device manufacturers on<br />

cybersecurity best practices and coached hospitals as they continually struggle with record numbers of<br />

breaches.<br />

Ken can be reached on LinkedIn and at our company website https://www.vigilant-ops.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


14 million Victims of Malware Breaches In <strong>The</strong> U.S. Healthcare<br />

Sector<br />

Critical need <strong>for</strong> multi-layered cybersecurity strategy<br />

By Rhoda Aronce and Ashwini Bhagwat, Senior Threat Researchers at SonicWall<br />

Healthcare is a data-driven business, storing vast amounts of sensitive personal and medical in<strong>for</strong>mation,<br />

such as social security numbers, medical histories, and financial data, making them attractive targets <strong>for</strong><br />

exploitation and extremely valuable on the black market. This year alone, over 14 million people were<br />

affected by data breaches caused by malware targeting the U.S. healthcare industry. Given the rapid<br />

adoption of digital tools, AI, and plat<strong>for</strong>ms during and after the COVID-19 pandemic, the attack landscape<br />

of healthcare organizations has become increasingly broad and highly attractive to those with ill-intent.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Due to their critical operations and the high probability of financial gain, healthcare organizations have<br />

thus become prime targets <strong>for</strong> ransomware. However, disrupting access to patient data or medical<br />

systems can have life-threatening consequences. Because of this, healthcare organizations are more<br />

likely to pay ransoms to restore operations quickly and avoid any disruption to care or service to patients<br />

who could be adversely affected.<br />

91% of Healthcare Breaches Involve Ransomware<br />

In <strong>2024</strong>, ransomware was leveraged in an alarming 91% of malware-related data breaches in the<br />

healthcare sector, with Lockbit emerging as one of the most notorious ransomware groups targeting this<br />

industry. Lockbit claimed responsibility <strong>for</strong> the high profile breaches of LivaNova and Panorama Eyecare,<br />

a medical device manufacturer, affecting over 180,000 U.S. patients, and an eyecare company affecting<br />

close to 400,000 individuals.<br />

Another significant group, BlackCat (ALPHV), was implicated in the Change Healthcare data breach,<br />

where a $22 million ransom was paid under false pretenses, leading to a subsequent ransom demand<br />

by another group, RansomHub.<br />

Both Lockbit and BlackCat (ALPHV) operate as Ransomware-as-a-Service (RaaS), allowing them to<br />

scale their operations by recruiting affiliates who carry out attacks in exchange <strong>for</strong> a cut of the ransom<br />

payments. This evolving model enables even those with limited technical expertise to launch<br />

sophisticated ransomware attacks, increasing the frequency, scale, and impact of these incidents.<br />

Digital Systems Creating Multiple Access Points<br />

<strong>The</strong> increasing integration of digital systems, such as electronic health records, telemedicine plat<strong>for</strong>ms,<br />

and the Internet of Medical Things (IoMT) devices, has created multiple access points <strong>for</strong> attackers. For<br />

example, the Cl0p Ransomware group exploited a zero-day vulnerability in MOVEit (CVE-2023-34362),<br />

a secure file transfer application, to inject SQL commands and access customer databases. This breach<br />

leaked sensitive healthcare in<strong>for</strong>mation, including treatment plans, from CareSource, a non-profit<br />

organization that manages Medicaid, Medicare, and Marketplace programs.<br />

Rise in Phishing and Social Engineering Attacks<br />

Healthcare workers’ focus on patient care often makes them susceptible to phishing and social<br />

engineering attacks. <strong>Cyber</strong>criminals exploit this by crafting targeted campaigns that maliciously trick<br />

unsuspecting employees into revealing credentials or downloading malware, as seen in the <strong>2024</strong> Los<br />

Angeles County Department of Mental Health breach.<br />

Overall, in <strong>2024</strong>, ransomware groups targeting the healthcare sector have exploited several critical<br />

vulnerabilities, leveraging well-known flaws to infiltrate networks, escalate privileges, and deploy<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ansomware. Our data shows about 60% of vulnerabilities leveraged by threat actors against healthcare<br />

targeted Microsoft Exchange.<br />

Best <strong>Defense</strong> Against Threats<br />

To defend against cyber threats, healthcare organizations must implement a multi-layered cybersecurity<br />

strategy, focusing on regular updates, strong access controls, and 24x7x365 monitoring.<br />

• Regular updates and patch management: Regularly updating operating systems, applications,<br />

and security tools ensures that the latest security patches are applied. For example, vulnerabilities<br />

like ProxyShell and ProxyLogon in Microsoft Exchange Server were exploited because many<br />

organizations delayed applying patches.<br />

• Strong access controls and authentication protocols: Implementing multi-factor<br />

authentication (MFA) reduces the risk of unauthorized access from compromised credentials.<br />

Additionally, using Zero-Trust Network Access (ZTNA) and secure SD-WAN, makes sure that<br />

only the right people can get into sensitive healthcare systems, cutting down the chances <strong>for</strong><br />

attacks<br />

• Continuous monitoring: Continuous 24x7x365 monitoring is vital <strong>for</strong> healthcare organizations<br />

to detect and respond to cyber threats in real-time, minimizing the risk of data breaches and<br />

service disruptions. With healthcare systems under constant attack, around-the-clock monitoring<br />

ensures that any suspicious activity is quickly identified and mitigated be<strong>for</strong>e it escalates into a<br />

major incident.<br />

• Enlist a Trusted Security Vendor: Engage with a reputable Managed Security Service Provider<br />

(MSSP), highly adept at stopping evasive threats and blocking attacks and equipped with the<br />

most up-to-date security threat in<strong>for</strong>mation and innovative solutions to thwart the same.<br />

Bad actors never sleep; thus, your security protocols should constantly be vigilant, monitoring round-theclock<br />

<strong>for</strong> any untoward activity. <strong>Cyber</strong> threats are not a matter of if but when and those healthcare<br />

companies best prepared to deal with the same—with the right measures, protocols, monitoring, and<br />

trusted security partners—will be the ones that weather the severe ramifications of bad actors' intent on<br />

exploiting any and all vulnerabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Authors<br />

Rhoda Aronce and Ashwini Bhagwat serve as Senior Threat<br />

Researchers at cybersecurity leader SonicWall. SonicWall’s<br />

security solutions, including advanced firewalls and threat<br />

detection tools, have successfully prevented over 26,000<br />

attacks in <strong>2024</strong> by providing real-time threat intelligence and<br />

rapid response capabilities. To learn more about SonicWall's<br />

findings in its <strong>2024</strong> SonicWall Threat Brief, please visit<br />

www.sonicwall.com/threat-reportXXX.<br />

Rhoda Aronce and Ashwini Bhagwat can be reached directly at raronce@SonicWall.com and<br />

abhagwat@SonicWall.com respectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why <strong>The</strong> Open Web Application Security Project (OWASP)<br />

Mobile Application Security (MAS) Project Is Critical<br />

And Why Apple, Google, And Huawei Need to Participate<br />

By George McGregor, Vice President of Marketing, Approov, Inc.<br />

<strong>The</strong> OWASP MAS project continues to lead the way in mobile application security. This article describes<br />

the resources and tools which have recently been added to OWASP MAS, which provides mobile app<br />

security guidance and tools <strong>for</strong> developers and security professionals alike. Also, we will argue that<br />

OWASP really deserves to receive the full support of the major mobile plat<strong>for</strong>m and device vendors.<br />

OWASP MAS has announced new tools in August <strong>2024</strong>.<br />

As developers and organizations continue to create mobile applications, and as regulations such as the<br />

EU DMA and the UK DMCC take effect, it's essential to ensure that best practices <strong>for</strong> mobile app security<br />

are widely available to the developer community. OWASP MAS is in a position to play this community<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ole and has a long list of corporate sponsors. But there is a need <strong>for</strong> everyone to contribute – it would<br />

be nice if Apple, Google and Huawei were on that list of sponsors, but they are not.<br />

New Updates from OWASP MAS<br />

OWASP continues to update and rein<strong>for</strong>ce the Mobile Application Security guidelines and tools. As we<br />

pointed out in our previous blogs on the topic, OWASP MAS received a major update last year. In<br />

addition, at the beginning of <strong>2024</strong> the OWASP Mobile Top Ten was also brought up to date.<br />

<strong>The</strong> momentum continues with the latest news from the OWASP MAS team announcing a redesign of<br />

the testing guide and new tools.<br />

OWASP MAS offers a comprehensive suite of tools and resources, the most important being:<br />

• <strong>The</strong> verification standard (MASVS) which describes at a high level of abstraction the controls or<br />

attack surfaces which should be protected<br />

• <strong>The</strong> testing guide (MASTG) which delves deep into IOS and Android, providing detailed<br />

in<strong>for</strong>mation on actual tests<br />

Last year's update saw the publication of the new MASVS v2.0 document which drove a major<br />

simplification and clarification of the overall security categories and controls.<br />

However, this left a gap between the high-level MASVS categories and the detailed MASTG which was<br />

not updated at the same time and was structured around the previous version of MASVS.<br />

This has now been addressed as the MAS team reframed the MASTG to be easier to navigate and better<br />

aligned with MASVS v2.0, making clear the link between controls and specific tests.<br />

<strong>The</strong> MASTG is now structured in a way that makes it easy to navigate between tests, techniques and<br />

tools. This promotes reusability. For example, you can open a test and see what tools and techniques<br />

are being used, and the intent is that eventually this will work in reverse too so everything is crossreferenced:<br />

you will be able to open a tool or technique and see all the tests that use it.<br />

Also added to MASTG are new demonstrations: practical demonstrations that include working code<br />

samples and test scripts.<br />

In addition, a brand new initiative called the new Mobile App Security Weakness Enumeration (MASWE)<br />

has been launched, designed to fill the gap between high-level MASVS controls and low-level MASTG<br />

tests. <strong>The</strong> MASWE identifies specific weaknesses in mobile applications, similar to Common Weakness<br />

Enumerations (CWEs).<br />

This all sounds great but there is much work to be done. <strong>The</strong>se tools are not final and there are a number<br />

of empty templates in the new MASWE. This is a community project after all, so the OWASP MAS team<br />

is seeking help from everyone with a stake in the game, saying: “You can also contribute to the project<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


y creating new weaknesses, tests, techniques, tools, or demos. We welcome all contributions and<br />

feedback, and we look <strong>for</strong>ward to working with you to make the MAS project the best it can be.”<br />

Meanwhile Apple, Google and Huawei Pursue a Proprietary Approach to App Security<br />

While OWASP MAS champion’s best-practice sharing and collaboration, the major mobile plat<strong>for</strong>m<br />

providers like Apple, Google, and Huawei are pursuing proprietary security solutions.<br />

<strong>The</strong>se approaches, come with significant drawbacks:<br />

• Vendor Lock-in: Developers become tethered to plat<strong>for</strong>m-specific security implementations,<br />

limiting flexibility and portability.<br />

• Reduced Innovation: Closed ecosystems can stifle the cross-pollination of ideas and slow the<br />

pace of security advancements.<br />

• Fragmentation: Disparate security standards across plat<strong>for</strong>ms increase complexity <strong>for</strong><br />

developers targeting multiple ecosystems.<br />

<strong>The</strong> Way Forward – It's Time to Engage with OWASP MAS<br />

To truly advance mobile app security, the industry must move towards a model of open standards and<br />

collaboration. This approach would:<br />

• Leverage the collective expertise of the global security community<br />

• Reduce fragmentation and complexity in security implementations<br />

• Foster an environment of continuous improvement and innovation<br />

OWASP MAS is well positioned to play this role and everyone in the mobile community should find a way<br />

to contribute.<br />

Finally, it would be great to see Apple, Google and Huawei throw their weight behind OWASP MAS too.<br />

<strong>The</strong>y have much they can contribute, and they could play a pivotal role in shaping a more secure mobile<br />

ecosystem <strong>for</strong> all – rather than continuing to defend their “walled gardens.”<br />

Mobile app security is too important to be siloed within proprietary ecosystems. As the digital landscape<br />

evolves, collaboration and open standards will be key to staying ahead of emerging threats and ensuring<br />

the safety of mobile users worldwide.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

George McGregor is based in the Bay Area and has an extensive<br />

background in cyber-security, cloud services and communications<br />

software. Be<strong>for</strong>e joining Approov he held leadership positions in<br />

Imperva, Citrix, Juniper Networks and HP.<br />

George can be reached online at george.mcgregor@approov.io, on<br />

LinkedIn at https://www.linkedin.com/in/gmcgregor/, or through the<br />

Approov website at https://www.approov.io/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A CISO’s Guide to Managing <strong>Cyber</strong> Risk in Healthcare<br />

By Gaurav Banga, Founder and CEO of Balbix<br />

Now more than ever be<strong>for</strong>e, our healthcare data is under attack. Of all of the sensitive in<strong>for</strong>mation<br />

available on the dark web, medical records are among the most expensive, costing on average $1,000 -<br />

compared to just $1 <strong>for</strong> a Social Security Number. It's clear that our healthcare system has become a hot<br />

spot <strong>for</strong> phishing scams, unpatched vulnerabilities, ransomware, and patient data exposures, as most<br />

recently evidenced by the Change Healthcare data breach earlier this year. For Chief In<strong>for</strong>mation Security<br />

Officers (CISOs) on the frontlines of the fight, these staggering increases have sent an unequivocal<br />

message about the urgent state of data protection in the United States: <strong>The</strong> time <strong>for</strong> action is now.<br />

But where do we start? As cyber threats to our healthcare ecosystem reach a critical juncture, CISOs are<br />

facing mounting pressure to reimagine data protection and cyber risk practices <strong>for</strong> the modern era. Even<br />

<strong>for</strong> the most seasoned CISO, this can be seen as a daunting task, requiring careful oversight of HIPAA<br />

compliance, IoT medical devices, and distributed data management. One wrong turn and your entire<br />

system could be at risk.<br />

With data breaches involving Protected Health In<strong>for</strong>mation (PHI) costing nearly $11 million on average,<br />

time is of the essence <strong>for</strong> healthcare CISOs to mitigate cyber risks be<strong>for</strong>e they turn into a full-blown crisis.<br />

Here are three best practices to keep in mind.<br />

Build a Robust Data Governance Framework<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To help manage regulatory compliance and reduce cyber risk, CISOs should begin by regularly updating<br />

and reviewing data protection policies from the top down. This also includes regularly running risk<br />

assessments to identify and prioritize high-impact vulnerabilities across systems and IoT devices to<br />

ensure quicker remediation times. Worse, this past August nearly 9 million individuals were affected by<br />

a healthcare data breach due to compromises with network servers, email, and electronic medical<br />

records. By embedding agility and consistent vulnerability scanning directly into any data governance<br />

framework, CISOs can remain flexible during times of change, and more easily make their case to the<br />

Board <strong>for</strong> updated data security standards as a tool, not a hindrance, with security teams and developers<br />

ultimately bringing them to life.<br />

More, CISOs can (and should) consider regularly engaging third-party auditors, who can ensure<br />

regulatory adherence from an unbiased perspective. When it comes to sensitive healthcare data, you<br />

can never be too careful, so it’s always better to err on the side of safety and prioritize high-risk<br />

vulnerabilities rather than pay <strong>for</strong> the consequences of indifference down the line. At the end of the day,<br />

developing a truly robust data governance framework can also enhance data security and create a culture<br />

of risk prioritization.<br />

Embrace Next-Gen AI Solutions<br />

Generative artificial intelligence (GenAI) has taken the world by storm in recent years <strong>for</strong> its ability to<br />

revolutionize laborious processes with efficiency in mind. And its impact on healthcare data protection is<br />

no exception. In fact, GenAI can play a significant role in addressing cybersecurity concerns in healthcare<br />

by providing CISOs with risk articulation, allowing security teams to better understand inbound threats<br />

based on location, teams, departments, and assets. <strong>The</strong>se next-gen tools can interact directly with<br />

security operations personnel in natural language, enabling them to quickly find relevant data and IP<br />

addresses in order to triage red flags and speed up investigations.<br />

Additionally, GenAI can automate traditionally time-intensive ticketing and operational tasks, streamlining<br />

remediation and patching processes. In doing so, security teams can spend time doing what they do<br />

best: thinking strategically, and innovatively, about how best to protect their company’s data. Of course,<br />

it’s no secret that bad actors – especially in the healthcare space – have gotten more elusive in recent<br />

years. Equipped with the latest in GenAI technology, however, healthcare CISOs now have an arsenal<br />

of tools at their disposal to best them at every turn.<br />

Turn Mistakes into Mastery<br />

Make no mistake: In the world of cybersecurity, there’s strength in numbers, and the mistakes of one<br />

CISO can easily be turned into “lessons learned” <strong>for</strong> another. Accordingly, by breaking down barriers<br />

impeding knowledge sharing and promoting cross-collaboration between companies, cybersecurity<br />

teams can learn from the past and ensure that they’re adequately prepared <strong>for</strong> the future. For better or<br />

worse, under new SEC guidelines, companies are now required to disclose material cybersecurity<br />

incidents they experience, as well as regularly share in<strong>for</strong>mation regarding their cybersecurity risk<br />

management, strategy, and governance. By tapping into this publicly available in<strong>for</strong>mation, healthcare<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CISOs can ensure they remain one-step ahead of the curve, applying strategic learnings to rein<strong>for</strong>ce the<br />

protection of PHI and personally identifiable in<strong>for</strong>mation (PII).<br />

Where We Go from Here<br />

Ready or not, large-scale cyberattacks in the healthcare space aren’t going anywhere anytime soon. No<br />

longer can cybersecurity teams take a reactionary approach to data protection, simply waiting <strong>for</strong> risks to<br />

appear be<strong>for</strong>e acting on them. On the contrary, healthcare CISOs must always be ready <strong>for</strong> the<br />

unexpected, employing (and en<strong>for</strong>cing) precautionary measures that anticipate potential threats be<strong>for</strong>e<br />

they happen. By following the steps outlined above, CISOs can create a new cybersecurity playbook <strong>for</strong><br />

the healthcare sector, ensuring that private healthcare in<strong>for</strong>mation stays private and protected.<br />

About the Author<br />

Gaurav Banga is the CEO and Founder of Balbix, an AI-powered<br />

cybersecurity risk management plat<strong>for</strong>m. Be<strong>for</strong>e Balbix, Gaurav was the<br />

Co-founder & CEO of Bromium and led the company from inception <strong>for</strong><br />

over 5 years. Earlier in his career, he served in various executive roles at<br />

Phoenix Technologies and Intellisync Corporation, and was Co-founder<br />

and CEO of PDAapps, acquired by Intellisync in 2005. Dr. Banga started<br />

his industry career at NetApp. Gaurav has a PhD in CS from Rice<br />

University, and a B.Tech. in CS from IIT Delhi. He is a prolific inventor<br />

with over 50 patents. You can learn more about Balbix at<br />

https://www.balbix.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Beyond Buzzwords: <strong>The</strong> Real Impact of AI on Identity Security<br />

By Israel Duanis, Co-Founder and CEO, Linx Security<br />

Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted<br />

as the answer to many of today’s pressing challenges. In the cybersecurity space, especially in identity<br />

security, AI is frequently positioned as a game-changer, promising to automate tasks, reduce risks, and<br />

increase efficiency. But as with any emerging technology, we must carefully separate the hype from the<br />

real, tangible benefits.<br />

As someone deeply embedded in the cybersecurity industry, I’ve seen the immense potential of AI<br />

firsthand. Yet, I’ve also observed how AI is sometimes oversold by vendors eager to capitalize on the<br />

excitement. While AI is not a magical solution that will solve all security problems overnight, when<br />

deployed thoughtfully and strategically, it can indeed trans<strong>for</strong>m identity security in ways that are both<br />

practical and powerful.<br />

AI’s Practical Role in Identity Security<br />

AI’s strengths are most evident in environments where complexity is increasing. With the shift toward<br />

cloud-based systems and the growing reliance on SaaS applications, managing access rights and<br />

permissions has become more challenging than ever. <strong>The</strong> traditional, rule-based approaches to identity<br />

governance simply cannot keep up with the scale and complexity of modern digital environments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This is where AI shines. Machine learning algorithms can analyze patterns in user behavior, automatically<br />

adjusting access rights based on real-time data. This dynamic approach enables faster and more<br />

accurate decisions on who should have access to what. It also reduces human error—errors that can<br />

result in over-provisioning or under-provisioning access, both of which pose significant security risks.<br />

However, AI-based identity systems have challenges. For these systems to work effectively, they need<br />

high-quality, diverse data. If the data is incomplete or biased, the AI’s conclusions can be flawed, leading<br />

to inaccurate decisions. <strong>The</strong> key to success lies in overcoming data quality issues, such as ensuring that<br />

human resources, identity providers, and application data are all synchronized and well-maintained.<br />

Vendors that crack this code (and it sure is solvable) are best positioned to maximize the benefits of AI<br />

in identity security.<br />

AI and Anomaly Detection: Beyond the Basics<br />

One of the most commonly touted benefits of AI in identity security is its ability to detect anomalous<br />

behavior. By continuously analyzing large datasets, AI can identify deviations from normal patterns, such<br />

as an employee logging in from an unusual location or attempting to access systems they typically don’t<br />

interact with. <strong>The</strong>se anomalies could indicate compromised accounts or insider threats.<br />

While AI’s anomaly detection capabilities are impressive, they are not perfect. Not every anomaly<br />

represents a threat, and AI can sometimes misinterpret legitimate behavior as suspicious. This can lead<br />

to alert fatigue, where security teams are overwhelmed by a flood of false positives. A key factor in<br />

reducing these false positives is ensuring that AI models are tuned to the organization’s specific risk<br />

profile and fed with the right datasets. <strong>The</strong> more accurate the data, and the more it is suited to your<br />

environment - the fewer unnecessary alerts and the better the results.<br />

That said, when anomaly detection is done well, AI can detect potential threats faster than any human<br />

could, providing a crucial layer of defense in modern cybersecurity strategies.<br />

AI as an Augmenter, Not a Replacement<br />

One of the biggest misconceptions surrounding AI in identity security is the notion that it will eventually<br />

replace human judgment. We are not there just yet. AI excels at handling routine, repeatable tasks like<br />

access management and anomaly detection, but it often lacks the context to make complex decisions.<br />

For example, AI might flag an executive’s login from overseas as suspicious, but it won’t always know<br />

that the executive is on a pre-scheduled business trip. This is where human oversight is critical. Security<br />

professionals must interpret AI’s findings and decide whether further action is warranted. In this way, AI<br />

augments human expertise, rather than replacing it. As AI technology continues to evolve, the balance<br />

between AI-driven automation and human decision-making will only become more refined.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Bridging the Skills Gap with AI as a Force Multiplier<br />

Another exciting area where AI is making an impact is in addressing the cybersecurity skills gap. <strong>The</strong><br />

shortage of skilled professionals has been a long-standing challenge, and AI offers a solution by<br />

automating repetitive, time-consuming tasks.<br />

Consider the case of a global retail company facing a surge in seasonal hiring. During this period,<br />

thousands of new employees needed immediate access to systems. <strong>The</strong> manual process of provisioning<br />

and de-provisioning accounts overwhelmed the IT department. By implementing AI-driven identity<br />

governance, the company was able to automate the entire process. AI analyzed historical patterns and<br />

real-time data to automatically assign access rights, detect anomalies, and streamline account<br />

management. What would have taken days of manual work was completed in minutes—without<br />

compromising security.<br />

In this example, AI acted as a <strong>for</strong>ce multiplier, allowing the security team to manage a complex, highvolume<br />

workload with ease. AI doesn’t replace human judgment, but it enhances it by providing real-time<br />

insights and reducing the burden of routine decisions. This is the future of AI in identity security—<br />

empowering professionals to focus on more strategic tasks and respond to threats more quickly and<br />

effectively.<br />

<strong>The</strong> Future: Harnessing the Full Potential of AI<br />

Looking ahead, AI’s role in identity security will only expand. It’s not just about automating tasks or<br />

detecting anomalies anymore. <strong>The</strong> future of AI is about building self-healing systems that can<br />

autonomously predict and respond to threats in real-time. Imagine AI-driven systems that can detect a<br />

compromised account and instantly revoke access or isolate a threat, all without waiting <strong>for</strong> human<br />

intervention.<br />

While these advancements are exciting, responsible adoption is key. AI needs to be implemented<br />

thoughtfully, with strong governance and ethical oversight. Organizations must remain involved in guiding<br />

these systems, especially in complex situations where human judgment is crucial.<br />

<strong>The</strong> future of AI is bright and is a key element in the mission of promising smarter, more secure identity<br />

infrastructures.<br />

Conclusion: <strong>The</strong> Dawn of a New Era in Identity Security<br />

AI is not just trans<strong>for</strong>ming identity security—it is redefining it. While it’s crucial to remain realistic about<br />

the technology's limitations, the advancements we’re seeing today are just the beginning. AI has the<br />

potential to revolutionize how we secure digital identities, from automating complex processes to<br />

predicting and mitigating threats be<strong>for</strong>e they even materialize.<br />

<strong>The</strong> real power of AI lies in its ability to empower security professionals by taking on the heavy lifting of<br />

repetitive tasks, allowing them to focus on high-level strategy and critical decision-making. As AI<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


continues to evolve, it will not only enhance security teams but also elevate the entire cybersecurity<br />

industry to new heights.<br />

<strong>The</strong> future of AI in identity security is one of increased agility, proactivity, and precision. As AI systems<br />

become more sophisticated, they will move beyond detection and into the realm of real-time response,<br />

creating a security landscape where threats are neutralized be<strong>for</strong>e they can cause harm. AI will enable<br />

organizations to be more resilient, adaptive, and prepared in an ever-changing threat landscape.<br />

<strong>The</strong> optimistic view is clear: AI is a catalyst <strong>for</strong> positive change, and its full potential is still ahead of us.<br />

Those who embrace AI responsibly, with the right mix of human oversight and strategic vision, will lead<br />

the charge toward a more secure, efficient, and <strong>for</strong>ward-thinking digital world. <strong>The</strong> path ahead is bright,<br />

and AI will be at the <strong>for</strong>efront of a smarter, safer future in identity security.<br />

About the Author<br />

Israel Duanis is the Co-Founder and CEO of Linx Security, an identity solution<br />

that bridges the gaps between identity security, identity governance, and identity<br />

access management.<br />

Already working with large-scale companies across a large variety of industries<br />

such as financial services, retail, real estate, technology, and others, Linx is<br />

helping them dramatically shrink their identity attack surface and close major<br />

gaps in compliance—by enabling them to finally get control over the whole<br />

identity lifecycle.<br />

Israel can be reached via email israel@linxsecurity.io or LinkedIn<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Beyond the Firewall: Protecting Your Marketing Department<br />

from <strong>Cyber</strong> Threats and Safeguarding Digital Assets<br />

By Mushegh Hakobjanyan, CEO, Andava Digital<br />

Digital media created more opportunities <strong>for</strong> companies to engage with consumers than ever be<strong>for</strong>e, but<br />

such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting<br />

not only a company’s IT systems but also departments with valuable data and web pages. Is yours on<br />

the list?<br />

<strong>The</strong> cultivation of strong cybersecurity habits is key <strong>for</strong> all employees, as Apu Pavithran rightly noted in<br />

his <strong>Cyber</strong> <strong>Defense</strong> Magazine article Fortifying <strong>The</strong> Digital Frontier: Everyday Habits That Shape Your<br />

Company’s <strong>Cyber</strong>security Posture. You must also take a closer look at the specific weaknesses of<br />

marketing teams because they are directly affected by online usage and there<strong>for</strong>e in a constant state of<br />

deliverable pressure. That makes them ideal targets <strong>for</strong> cyber-criminals.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Marketing Department: A Hacker's Happy Hunting Ground<br />

Why are marketing groups seemingly putting on LEDs announcing, "Hack Me!"? Let’s unpack it:<br />

• Imagine marketing teams as honeypots teeming with all that sweet, sweet customer data. Names,<br />

email addresses, phone numbers, maybe even your most embarrassing online shopping list—all<br />

of it, just waiting <strong>for</strong> grabs. This stuff makes the scammers salivate. <strong>The</strong>y can steal it <strong>for</strong> identity<br />

theft, devise convincing phishing attacks, or even swindle it off to the highest bidder on the dark<br />

web.<br />

• Brand marketers are virtual every moment of every day. <strong>The</strong>y are running social media plat<strong>for</strong>ms,<br />

coding emails, and diving right into online advertising. <strong>The</strong>y’re like the ‘Hey hackers, over here!’<br />

<strong>The</strong>y’re like sending a giant warning all the time. That kind of internet presence renders them<br />

vulnerable to an entire menu of online menaces.<br />

• Marketing isn’t easy to get right. And they want those sales, engagements, and amazing<br />

conversion metrics. This unrelenting tug can get even the best marketer to feel the pressure. An<br />

email offer that is going to give you a magical lift in traffic? A near-miss deal <strong>for</strong> the best tools in<br />

the market? <strong>The</strong>n, the "click here" button suddenly becomes incredibly desirable and hey presto<br />

– they’ve run right into a well-trodden rabbit hole.<br />

Common Scams Targeting Marketers<br />

Hackers use many methods to exploit these vulnerabilities. <strong>The</strong>se are some of the many digital marketing<br />

scams that most commonly plague marketing departments:<br />

• Guaranteed top rankings in search of a dubious minimal price. <strong>The</strong>se scams tend to be in the<br />

<strong>for</strong>m of black-hat SEO that can affect your website’s reputation and result in a search engine<br />

penalty.<br />

• Methods that guarantee explosive followers or interactions through infected accounts, bots, or<br />

other tricks. <strong>The</strong>y can damage your brand as well as violate the policies of social networks.<br />

• <strong>The</strong>se companies promise you premium leads but provide inaccurate, out-of-date, or even fake<br />

contact details. It is time-, money-, and cost-consuming and also can hurt your sales pipeline.<br />

• Emails or messages cloaking genuine emails from trusted contacts in order to trick marketers into<br />

giving away private data such as passwords or banking in<strong>for</strong>mation.<br />

<strong>The</strong> Crippling Consequences of <strong>Cyber</strong>attacks<br />

Falling victim to online scams can inflict devastating damage on businesses, leaving lasting<br />

repercussions that extend far beyond financial loss. <strong>The</strong>se attacks can cripple a company's reputation,<br />

disrupt operations, and erode customer trust. Let's delve into the specific consequences businesses often<br />

face:<br />

• <strong>The</strong> immediate financial impact can be substantial. Direct losses from the scam itself, coupled<br />

with the expenses of data recovery, system restoration, and potential legal battles, quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


accumulate. Businesses may also face regulatory fines and increased insurance premiums in the<br />

aftermath of an attack.<br />

• A cyberattack can severely tarnish a company's reputation. Negative publicity, loss of customer<br />

confidence, and brand erosion can have long-term consequences <strong>for</strong> revenue and market share.<br />

Rebuilding trust after a breach is a challenging and often expensive undertaking.<br />

• <strong>Cyber</strong>attacks can bring business operations to a grinding halt. <strong>The</strong> time and resources required<br />

to investigate the attack, implement damage control measures, and restore normal operations<br />

can be significant. This disruption can lead to lost productivity, missed deadlines, and dissatisfied<br />

customers.<br />

• Scammers may gain control of a company's online properties, including websites, social media<br />

accounts, and promotional materials. This can be used to spread misin<strong>for</strong>mation, redirect<br />

customers to malicious sites, or further damage the company's reputation.<br />

In today's interconnected world, safeguarding against cyber threats is paramount. Businesses must<br />

prioritize cybersecurity measures and educate employees about potential risks to mitigate the devastating<br />

consequences of falling victim to online scams.<br />

Digital Asset Management: Wrangling Your Marketing Assets and Locking Out the <strong>Cyber</strong> Bandits<br />

Consider the following scenario: your marketing department is a bustling saloon in the Wild West. Design<br />

assets are being sent through the air like tumbleweed, copyrights are being smuggled around like gold<br />

dust, and access is stolen like during a dusty pub fight. This disorganized environment is inefficient and<br />

leaves your business susceptible to cyberattacks.<br />

That’s where Digital Asset Management (DAM) shows up: a local sheriff who takes his town back. DAM<br />

is the concrete hut <strong>for</strong> all your precious sales collateral – photos, videos, logos, <strong>for</strong>ms, you name it. It<br />

offers a unified plat<strong>for</strong>m to store, catalog, and manage these assets so that they can’t be accessed,<br />

accidentally deleted, or abused.<br />

Why DAM is Your Secret Weapon Against <strong>Cyber</strong>attacks<br />

DAM is your two-layered protection from the cyber-gangsters:<br />

• No need to hunt the internet <strong>for</strong> that newer version of that logo or that approved marketing picture.<br />

DAM becomes the master data warehouse, the one point of access to all your assets. This helps<br />

ensure that all members of your group are pulling in<strong>for</strong>mation from the same place and with the<br />

latest and approved materials.<br />

• DAM stores all edits done to an asset so that if you lose sight of it, you can always jump to the<br />

most recent version. In addition, you can configure special permissions to enable access to or<br />

edit sensitive documents only by authorized staff.<br />

• Want to find that photo from last year’s campaign? DAM’s got you covered. Metadata and tags<br />

are well-equipped to search, organize, and map your assets. This saves you time, as well as<br />

letting you know about any suspicious activity or misuse.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


DAM and the Third-Party Posse<br />

Even with third parties, DAM is your security guard protecting your investments:<br />

• Create Specific Instructions and Rules: If you have assets you are sharing with freelancers,<br />

agencies, or other third parties, have very strict rules about who can view, use, and share your<br />

assets. This eliminates any confusion and keeps everyone on the same page.<br />

• Secure Your Equipment: Think of watermarks as your brand’s cow brand, telling the world what<br />

equipment is yours. Create access controls, encryption, and other protections that can keep your<br />

intellectual property safe from theft or dissemination.<br />

• Audit Access and Permissions Regularly: Never just leave it to do later! You will get busy and<br />

<strong>for</strong>get – we all do. Always review who is on your assets and who has what permissions regularly.<br />

This allows you to see if there are any security holes and who has access to your precious<br />

documents. And when someone leaves, remove their permissions immediately.<br />

Now cybersecurity doesn’t just fall under the IT department. Likewise, marketing departments should be<br />

on guard, seeing the specific ways they could fall victim and doing what they can to secure themselves<br />

and their companies. Understanding the common frauds targeting marketers, adopting strong digital<br />

asset management strategies, and developing a cyber-savvy culture will help companies beef up security<br />

and protect their valuable digital assets.<br />

About the Author<br />

Mushegh Hakobjanyan is the Founder and CEO of Andava Digital, with 10+<br />

years of experience in digital marketing and a focus on SEO and organic<br />

channels that drive traffic. Graduate with a degree in Management of<br />

In<strong>for</strong>mation Systems, Game <strong>The</strong>ory enthusiast, and Management 3.0 follower.<br />

Mushegh can be reached online at Hello@andava.com, LinkedIn, and at our<br />

company website https://www.andava.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Preparing <strong>for</strong> the EU’s DORA amidst Technical Controls<br />

Ambiguity<br />

By Martin Greenfield, CEO of Quod Orbis<br />

<strong>The</strong> financial sector is bracing <strong>for</strong> a significant shift in its digital landscape as the EU’s Digital Operational<br />

Resilience Act (DORA) prepares to take effect in January 2025.<br />

This new regulation is set to trans<strong>for</strong>m the approach of financial institutions - including banks, insurers,<br />

and investment firms - towards their IT infrastructure and data security protocols. At the heart of DORA<br />

lies Article 3, which aims to bolster "the capacity of financial entities to construct, ensure, and evaluate<br />

their operational integrity and reliability."<br />

In the years following the 2008 global financial crisis, there was a notable surge in attention to IT security<br />

and digital resilience. However, this focus gradually waned over time. Now, with cybercrime emerging as<br />

the world's third-largest economy, surpassed only by the United States and China, DORA seeks to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


address this escalating cyber threat head-on. EU member states face potentially severe consequences<br />

if they fail to comply with these new regulations by January 2025. Non-compliant institutions could be<br />

subject to substantial penalties, including fines of up to 2% of their global annual turnover or 1% of their<br />

worldwide average daily turnover.<br />

Despite the urgency of the situation, many institutions are experiencing delays in their preparatory ef<strong>for</strong>ts.<br />

While new technical standard documents were submitted to the commission in July of this year, affected<br />

entities continue to grapple with significant hurdles in their DORA readiness plans.<br />

As the deadline looms, businesses cannot af<strong>for</strong>d a wait-and-see approach. In the absence of concrete<br />

guidance, firms must take proactive steps based on the in<strong>for</strong>mation currently at their disposal.<br />

Transparency is the cornerstone of DORA compliance<br />

<strong>The</strong> importance of comprehensive visibility cannot be overstated. DORA places a strong emphasis on<br />

this aspect, particularly in relation to data transparency and actionable evidence. <strong>The</strong> regulation shines<br />

a spotlight on critical areas that have traditionally lacked robust frameworks and are consequently more<br />

susceptible to risks. <strong>The</strong>se include third-party risk management, operational resilience, and thorough<br />

testing protocols.<br />

A pivotal aspect of DORA is its requirement <strong>for</strong> uninterrupted monitoring. This marks a significant<br />

departure from conventional periodic assessments, ushering in an era of constant vigilance. Under this<br />

new rule, organisations are tasked with implementing systems that offer real-time insights into their digital<br />

operational resilience. Such systems must enable swift identification and response to emerging threats<br />

or vulnerabilities.<br />

<strong>The</strong> financial sector, in particular, faces the challenge of ensuring security and compliance across its<br />

entire supply network. This obligation extends beyond immediate suppliers, potentially encompassing a<br />

wide array of third-party providers and even their subcontractors. As a result, the process of evaluating<br />

cybersecurity practices may ripple through multiple layers of the supply chain, creating a complex and<br />

resource-intensive compliance environment. While the full extent of this cascading effect remains to be<br />

determined, organisations would be prudent to prepare <strong>for</strong> extensive reporting requirements that could<br />

span several tiers of their supply network.<br />

Enhanced security testing<br />

While the Payment Card Industry (PCI) standards have long focused on safeguarding credit card<br />

in<strong>for</strong>mation, requiring annual penetration testing and assessments after significant changes, the<br />

regulatory landscape is evolving towards more frequent and comprehensive evaluations. <strong>The</strong> U.S.<br />

National Institute of Standards and Technology <strong>Cyber</strong>security Framework (NIST CSF) has already<br />

expanded the scope, addressing additional crucial aspects such as recovery processes, thus filling some<br />

gaps left by PCI standards.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


DORA takes this a step further, mandating organisations to implement exhaustive testing protocols that<br />

leave no stone unturned. This includes systems previously deemed too critical or sensitive <strong>for</strong> regular<br />

assessment. This regulatory shift signals a paradigm change, calling <strong>for</strong> a more rigorous and frequent<br />

testing regimen across the entire technological infrastructure, irrespective of a system's perceived<br />

operational importance.<br />

<strong>The</strong>se emerging regulations are driving organisations towards a proactive stance on security. <strong>The</strong><br />

emphasis is now on continuous monitoring to detect and address weaknesses be<strong>for</strong>e they escalate into<br />

significant risks. This approach aims to minimise the development of vulnerabilities and ensures that<br />

organisations maintain an up-to-the-minute awareness of their security posture.<br />

Preparing your business <strong>for</strong> the DORA era<br />

DORA's emphasis on continuous threat monitoring and results-oriented risk management signifies a<br />

significant shift in the regulatory landscape. Soon, authorities will have the power to request data and<br />

assess compliance, making preparation crucial.<br />

To begin this journey, organisations should establish a dedicated working committee with clearly defined<br />

roles and responsibilities. This committee will play a vital role in conducting a comprehensive gap<br />

analysis, identifying areas <strong>for</strong> improvement both within their operations and across their supply chain.<br />

Such an analysis will not only highlight necessary changes but also in<strong>for</strong>m critical budget discussions<br />

and resource allocation decisions.<br />

It's important to note that approaching the five pillars of DORA as a chronological, step-by-step checklist<br />

will prove ineffective. Instead, organisations should focus on key areas such as third-party risk<br />

management and reporting, which are interwoven across all pillars of the regulation.<br />

With the deadline looming, it's critical to update and strengthen risk management strategies. DORA<br />

assumes firms already have a robust risk management framework in place. However, it's crucial to<br />

understand that existing certifications, such as ISO27001, while valuable, may not ensure full DORA<br />

compliance due to the regulation's extensive third-party risk management requirements integrated into<br />

every pillar.<br />

Despite any potential delays in implementation guidance, DORA is imminent, and businesses must be<br />

prepared. Rather than viewing this regulation solely as a compliance requirement, <strong>for</strong>ward-thinking<br />

organisations should see it as an opportunity to enhance their overall security posture. By focusing on<br />

continuous monitoring and effective threat management, businesses can not only meet regulatory<br />

standards but also achieve a higher level of protection across their networks, potentially gaining a<br />

significant competitive advantage in the process.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Martin Greenfield is the CEO of Continuous Controls Monitoring solutions<br />

provider, Quod Orbis. He has over two decades in the cyber security space.<br />

With his team, Martin helps deliver complete cyber controls visibility <strong>for</strong> our<br />

clients via a single pane of glass, through Quod Orbis’ Continuous Controls<br />

Monitoring (CCM) plat<strong>for</strong>m. <strong>The</strong>ir clients can see and understand their<br />

security and risk posture in real time, which in turn drives their risk investment<br />

decisions at the enterprise level.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Securing Linux Systems in the Age of AI: Unified Security<br />

Strategies <strong>for</strong> Modern Enterprises<br />

By Inna Ushakova, CEO at AI EdgeLabs<br />

Introduction<br />

In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has<br />

emerged as a trans<strong>for</strong>mative advancement. This is particularly true in the realm of Linux-based systems,<br />

where AI is reshaping how we approach security. As the CEO of AI EdgeLabs, the company<br />

revolutionizing cybersecurity <strong>for</strong> Linux-based environments and assets, I am honored to share insights<br />

on best practices <strong>for</strong> implementing AI-based unified security solutions tailored <strong>for</strong> Linux environments.<br />

<strong>The</strong> Strategic Importance of Linux Security<br />

Linux systems are the backbone of many enterprise environments due to their robustness, flexibility, and<br />

open-source nature. <strong>The</strong>y power critical infrastructure, support cloud environments, and are foundational<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


to many of the world’s largest and most complex IT ecosystems. <strong>The</strong> adoption of Linux is not limited to<br />

servers and data centers; it extends to embedded systems, IoT devices, and edge computing<br />

environments. This widespread usage makes Linux an attractive target <strong>for</strong> cybercriminals, necessitating<br />

a strategic approach to security.<br />

<strong>The</strong> inherent strengths of Linux—its modularity, transparency, and the vast ecosystem of open-source<br />

tools—also present unique challenges. <strong>The</strong> diversity of Linux distributions, the customization options<br />

available to administrators, and the decentralized nature of open-source development can lead to<br />

inconsistent security practices. Moreover, the perception that Linux is inherently secure can sometimes<br />

lead to complacency, leaving critical vulnerabilities unaddressed.<br />

In this context, the integration of AI into cybersecurity frameworks offers a revolutionary approach to<br />

safeguarding Linux systems. AI-driven security solutions can provide the automation, intelligence, and<br />

scalability needed to address the complex and dynamic threats targeting Linux environments.<br />

<strong>The</strong> Role of AI in Modern <strong>Cyber</strong>security<br />

Artificial Intelligence, including next-generation models like Large Language Models (LLMs), Deep<br />

Learning, and Rein<strong>for</strong>cement Learning, has the potential to revolutionize cybersecurity. Leveraging these<br />

advanced AI models, particularly through Machine Learning (ML), enables the analysis of vast amounts<br />

of data in real-time, allowing <strong>for</strong> the detection of patterns and anomalies that may indicate a cyber threat.<br />

This capability is particularly valuable in the context of Linux security, where the complexity of the<br />

environment can make it difficult to identify potential vulnerabilities and threats using traditional methods.<br />

AI’s ability to learn and adapt over time allows it to predict and respond to emerging threats in ways that<br />

were previously unimaginable. For example, AI can be used to detect zero-day vulnerabilities—previously<br />

unknown security flaws that can be exploited by attackers—be<strong>for</strong>e they are widely recognized. This<br />

proactive approach to threat detection is crucial <strong>for</strong> maintaining the security of Linux systems, which are<br />

often at the core of critical infrastructure.<br />

However, the integration of AI into cybersecurity is not without its challenges. <strong>The</strong> same capabilities that<br />

make AI a powerful tool <strong>for</strong> defense can also be exploited by attackers. Adversarial AI, where attackers<br />

use AI to enhance their own capabilities, is an emerging threat that must be addressed. This creates a<br />

dynamic and rapidly evolving battlefield where defenders and attackers are constantly seeking to<br />

outmaneuver each other.<br />

Best Practices <strong>for</strong> Implementing AI-Based Unified Security in Linux Environments<br />

Implementing AI-based unified security in Linux environments requires a comprehensive approach that<br />

takes into account the unique characteristics of both AI and Linux. Below are some best practices that<br />

can help organizations maximize the effectiveness of their AI-driven security strategies.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Adopt a Unified Security Approach<br />

Traditional security models often operate in silos, with separate tools and processes <strong>for</strong> network security,<br />

endpoint security, and application security. This fragmented approach can create gaps in coverage,<br />

leaving vulnerabilities exposed. In contrast, a unified security approach integrates multiple layers of<br />

defense, providing a holistic view of the threat landscape.<br />

For Linux environments, this means integrating AI-driven tools across all layers of security, from Network<br />

Detection and Response (NDR) to Endpoint Detection and Response (EDR) and Intrusion Prevention<br />

Systems (IPS). A unified security approach allows <strong>for</strong> seamless communication between these tools,<br />

enabling them to share threat intelligence and coordinate responses in real-time.<br />

2. Leverage AI <strong>for</strong> Enhanced Threat Detection<br />

AI’s ability to analyze vast amounts of data in real-time makes it an invaluable tool <strong>for</strong> threat detection.<br />

By continuously monitoring network traffic, system logs, and user behavior, AI can identify patterns and<br />

anomalies that may indicate a cyber threat. This enables earlier detection of sophisticated attacks,<br />

including zero-day vulnerabilities and advanced persistent threats (APTs), which are often missed by<br />

traditional signature-based methods.<br />

In Linux environments, where the complexity and diversity of the system can make it difficult to detect<br />

potential threats, AI’s pattern recognition capabilities are particularly valuable. For example, AI can be<br />

used to detect unusual patterns of file access, privilege escalation, or network traffic that may indicate a<br />

compromised system.<br />

3. Implement Predictive Analytics and Preemptive <strong>Defense</strong><br />

One of the most powerful aspects of AI is its ability to predict potential threats based on historical data<br />

and emerging trends. By analyzing past incidents, AI can identify patterns that may indicate a future<br />

attack. This predictive capability allows organizations to proactively defend against new attack vectors<br />

be<strong>for</strong>e they become widespread.<br />

In the context of Linux security, predictive analytics can be used to identify vulnerabilities in software<br />

packages, configurations, or network architectures that could be exploited by attackers. This allows<br />

organizations to address these vulnerabilities be<strong>for</strong>e they can be exploited, reducing the risk of a<br />

successful attack.<br />

4. Automate Incident Response <strong>for</strong> Faster Remediation<br />

AI-driven automation can streamline incident response processes, reducing the time between detection<br />

and remediation. This is particularly important in Linux environments, where the complexity of the system<br />

can make manual incident response time-consuming and error-prone.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AI-powered tools can automatically isolate compromised systems, apply patches, or even counteract<br />

threats without human intervention. For example, if a Linux server is compromised, AI can automatically<br />

detect the breach, quarantine the affected system, and apply security patches to prevent further<br />

exploitation. This rapid response capability is crucial in minimizing the impact of a breach and preventing<br />

the spread of the attack.<br />

5. Mitigate the Risks of Adversarial AI<br />

While AI offers significant advantages in enhancing Linux security, it also introduces new risks.<br />

Adversaries are increasingly using AI to develop more sophisticated malware, automate phishing<br />

campaigns, and identify vulnerabilities at scale. This creates an AI arms race, where defenders and<br />

attackers are constantly evolving to outmaneuver each other.<br />

To mitigate the risks of adversarial AI, organizations must invest in advanced AI-driven security tools that<br />

can detect and counteract AI-driven attacks. This includes developing AI models that are resilient to<br />

adversarial manipulation, as well as continuously monitoring and refining AI algorithms to ensure they<br />

remain effective against evolving threats.<br />

6. Ensure High-Quality Data <strong>for</strong> AI Training<br />

AI systems are only as good as the data they are trained on. Poorly managed AI can introduce biases,<br />

generate false positives, or overlook genuine threats. For organizations using AI-driven solutions <strong>for</strong><br />

Linux security, ensuring high-quality data is paramount.<br />

This involves collecting and curating large datasets that accurately represent the threat landscape, as<br />

well as continuously updating these datasets to reflect new and emerging threats. Additionally,<br />

organizations should implement rigorous testing and validation processes to ensure that AI models are<br />

per<strong>for</strong>ming as expected and are not introducing unintended biases.<br />

7. Enhance Collaboration and Threat Intelligence Sharing<br />

<strong>The</strong> effectiveness of AI-driven security solutions is greatly enhanced by collaboration and the sharing of<br />

threat intelligence. By pooling resources and knowledge, organizations can leverage collective insights<br />

to develop more effective AI models and respond to threats more quickly.<br />

In the Linux security community, where open-source collaboration is a core value, there are numerous<br />

opportunities to share threat intelligence and collaborate on AI-driven security initiatives. For example,<br />

organizations can contribute to open-source AI models, share threat intelligence through community<br />

<strong>for</strong>ums, and participate in joint security initiatives.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


8. Prioritize Ethical AI Usage<br />

As AI becomes more integrated into security protocols, ethical considerations must be a priority. This<br />

includes ensuring that AI is used responsibly, avoiding unintended consequences that could harm users<br />

or introduce biases. Organizations must be vigilant in monitoring the ethical implications of their AI-driven<br />

security practices, ensuring that they do not inadvertently exacerbate existing vulnerabilities or create<br />

new risks.<br />

In the context of Linux security, this means being mindful of the open-source nature of the plat<strong>for</strong>m and<br />

ensuring that AI-driven tools are developed and deployed in a way that aligns with the values of<br />

transparency, collaboration, and community-driven innovation.<br />

<strong>The</strong> Security Industry vs. the Hacking Industry: A Dynamic Battle<br />

<strong>The</strong> integration of AI in cybersecurity has trans<strong>for</strong>med the landscape, creating a dynamic interplay<br />

between the security industry and the hacking industry. Both defenders and attackers are leveraging AI<br />

to enhance their capabilities, leading to a constant battle <strong>for</strong> dominance.<br />

1. Security Industry Adoption of AI<br />

<strong>The</strong> cybersecurity industry is rapidly adopting AI and machine learning technologies to improve threat<br />

detection, automate responses, and enhance overall security posture. AI-driven tools are becoming more<br />

prevalent in areas such as threat intelligence, endpoint security, and network monitoring.<br />

For Linux environments, this means the development of AI-driven tools specifically designed to address<br />

the unique challenges of Linux security. <strong>The</strong>se tools leverage AI to provide real-time threat detection,<br />

automated incident response, and predictive analytics, helping organizations stay ahead of emerging<br />

threats.<br />

2. Hacking Industry Utilization of AI<br />

Hackers are also increasingly using AI to enhance their capabilities. This includes automating attack<br />

vectors, creating sophisticated phishing schemes, and developing malware that can evade traditional<br />

detection methods. AI is making it easier <strong>for</strong> attackers to scale their operations and launch more targeted<br />

and effective attacks.<br />

For example, attackers may use AI to develop malware that can adapt to different Linux distributions,<br />

making it more difficult <strong>for</strong> defenders to detect and mitigate. Additionally, AI can be used to automate the<br />

process of identifying vulnerabilities in Linux systems, allowing attackers to exploit these vulnerabilities<br />

more quickly and efficiently.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3. <strong>The</strong> AI Arms Race<br />

<strong>The</strong> use of AI by both defenders and attackers has led to an AI arms race, where each side is constantly<br />

developing more advanced AI systems to outmaneuver the other. This escalation has made cybersecurity<br />

more complex and challenging, requiring constant vigilance and innovation from defenders.<br />

In this environment, the ability to quickly adapt and innovate is critical. Organizations must continuously<br />

refine their AI-driven security solutions, ensuring they remain ahead of increasingly sophisticated threats.<br />

This involves not only technological advancements but also adopting a proactive security mindset that<br />

emphasizes agility, collaboration, and continuous learning.<br />

Future of AI-Based Unified Security <strong>for</strong> Linux Systems<br />

<strong>The</strong> future of AI-based unified security <strong>for</strong> Linux systems will be characterized by several key<br />

developments that will further enhance the effectiveness of AI in protecting Linux environments.<br />

1. Enhanced AI-Driven Threat Intelligence<br />

AI will continue to revolutionize threat intelligence, moving beyond traditional reactive approaches to more<br />

predictive and preemptive capabilities. Future AI systems will be capable of correlating data across global<br />

threat landscapes, identifying emerging attack patterns, and predicting potential vulnerabilities be<strong>for</strong>e<br />

they are exploited. This will allow organizations to take preventive measures, reducing the attack surface<br />

and mitigating risks proactively.<br />

2. Advanced Collaboration and Knowledge Sharing<br />

<strong>The</strong> open-source nature of Linux creates a unique opportunity <strong>for</strong> collaboration among security<br />

professionals, developers, and the broader cybersecurity community. By fostering a culture of knowledge<br />

sharing, organizations can leverage collective intelligence to improve AI models, share threat intelligence,<br />

and develop innovative defense strategies. <strong>The</strong> future will likely see increased use of open AI models<br />

trained on shared datasets, allowing organizations to benefit from community-driven advancements in<br />

AI-based security.<br />

3. AI-Augmented Human Intelligence<br />

While AI is a powerful tool, human expertise remains invaluable in cybersecurity. <strong>The</strong> future will see<br />

greater integration of AI and human intelligence, where AI handles routine tasks and large-scale data<br />

analysis, allowing human analysts to focus on more complex and strategic decision-making. This AIaugmented<br />

approach will enhance the overall effectiveness of security operations centers (SOCs),<br />

improving both detection and response capabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4. Integration with Edge Computing and IoT Security<br />

As edge computing and the Internet of Things (IoT) continue to expand, the attack surface <strong>for</strong> Linux<br />

systems grows. Future AI-based security solutions will need to integrate seamlessly with edge devices<br />

and IoT environments, providing unified security that extends from centralized data centers to the farthest<br />

edge of the network. AI will play a crucial role in real-time threat detection and response, ensuring that<br />

all connected devices are continuously monitored and protected.<br />

5. Development of Adversarial AI <strong>Defense</strong> Mechanisms<br />

As attackers become more sophisticated in using AI <strong>for</strong> malicious purposes, developing AI models that<br />

are resilient against adversarial attacks will be crucial. Future AI systems will need to incorporate<br />

techniques such as adversarial training, anomaly detection, and robust model validation to ensure they<br />

can withstand attacks designed to manipulate or bypass AI defenses. Continuous research and<br />

innovation will be essential to stay ahead in the AI arms race.<br />

6. Ethical AI and Regulatory Compliance<br />

As AI becomes more pervasive in cybersecurity, ethical considerations and regulatory compliance will<br />

become increasingly important. Organizations will need to ensure that their AI-driven security solutions<br />

are transparent, accountable, and free from biases. <strong>The</strong> future will likely see the development of ethical<br />

frameworks and standards <strong>for</strong> AI in cybersecurity, guiding organizations in responsible AI usage and<br />

fostering trust among stakeholders.<br />

7. Integration of eBPF <strong>for</strong> Kernel-Level Observability and Security<br />

<strong>The</strong> extended Berkeley Packet Filter (eBPF) is poised to become a game-changer in Linux security.<br />

eBPF enables safe and efficient execution of code directly in the Linux kernel, providing deep<br />

observability and fine-grained monitoring of system behavior without significant per<strong>for</strong>mance overhead.<br />

By integrating eBPF with AI-based security solutions, organizations can achieve unprecedented visibility<br />

into kernel-level activities, such as system calls, network traffic, and process behavior. This enables more<br />

precise threat detection, real-time anomaly identification, and faster response to sophisticated attacks,<br />

enhancing the overall security posture of Linux environments.<br />

Conclusion<br />

<strong>The</strong> integration of AI into unified security solutions <strong>for</strong> Linux systems is trans<strong>for</strong>ming the cybersecurity<br />

landscape. As both defenders and attackers harness the power of AI, the stakes are higher than ever.<br />

Organizations must embrace a proactive, innovative, and collaborative approach to AI-based security,<br />

ensuring they stay ahead of evolving threats and protect their critical Linux environments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


By adopting best practices such as unified security, enhanced threat detection, predictive analytics,<br />

automated incident response, and ethical AI usage, organizations can build a resilient defense posture<br />

that leverages the full potential of AI. As the AI arms race continues, the future will belong to those who<br />

can adapt, innovate, and leverage AI to its fullest potential, creating a safer and more secure digital world.<br />

About the Author<br />

Inna Ushakova is a pioneering tech entrepreneur who has built two<br />

successful and recognized companies, Scalarr and AI EdgeLabs, in<br />

the fields of AI-driven fraud prevention and cybersecurity.<br />

In 2016, Inna co-founded Scalarr, an AI-driven company specializing<br />

in mobile ad fraud prevention through machine learning, helping<br />

clients save millions. Building on this success, she launched AI<br />

EdgeLabs, which provides autonomous, AI-powered Linux-based<br />

cybersecurity solutions to protect critical infrastructure from any<br />

threats, with advanced detection and automated response capabilities<br />

<strong>for</strong> edge computing, hybrid cloud, and distributed environments.<br />

Under Inna Ushakova's leadership, AI EdgeLabs has been recognized as a finalist <strong>for</strong> the Edge Startup<br />

of the Year award, and she herself has been shortlisted <strong>for</strong> the Edge Woman of the Year award. Her<br />

vision <strong>for</strong> the future of edge computing emphasizes the importance of robust security measures to protect<br />

against increasing cyber threats as the adoption of edge technologies continues to grow<br />

Inna Ushakova can be reached online at iu@edgelabs.ai and https://www.linkedin.com/in/innaushakova/<br />

and at our company website https://edgelabs.ai/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Digital Trans<strong>for</strong>mation Failures: A National Security Crisis in the<br />

Making<br />

<strong>The</strong> Role of <strong>Cyber</strong>security Challenges in the Digital Trans<strong>for</strong>mation Failures<br />

By Joe Crist, CEO, Trans<strong>for</strong>m 42<br />

In the hyperconnected world, digital trans<strong>for</strong>mation has become synonymous with progress, efficiency<br />

and innovation. For governments, business and defense organizations alike, the ability to leverage the<br />

power of digital technologies isn’t just a competitive edge – it’s an existential imperative. But as<br />

organizations are scrambling to modernize, there is a disturbing trend emerging more than 70 per cent<br />

of digital trans<strong>for</strong>mation programs are failing to deliver the results <strong>for</strong> which they were designed. Although<br />

this might sound like a business statistic, the implications go far beyond lost revenue opportunities or<br />

technological obsolescence, particularly in critical sectors such as defense, energy and national<br />

infrastructure.<br />

<strong>The</strong> failure of digital trans<strong>for</strong>mation has a particularly perverse effect on cybersecurity and helps to turn<br />

a technical problem into a national security crisis. As defense organizations, government agencies and<br />

critical infrastructure operators strive to weave modern technologies into legacy, often highly complex<br />

architectures, cyber vulnerabilities multiply. Failed digital trans<strong>for</strong>mation – where systems will not work<br />

as planned or are incomplete – not only erodes operational effectiveness: it also leaves intact legacy<br />

systems open to attack. In a cyber-threat landscape that shows no signs of abating, the stakes are high.<br />

A failed digital trans<strong>for</strong>mation in a critical system means more than a wasted investment. It means<br />

opening the door to cyberattack, spying, and even sabotage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Multifaceted Causes of Digital Trans<strong>for</strong>mation Failures<br />

<strong>The</strong> first step to fixing the problem of digital trans<strong>for</strong>mation failure is to understand why so many attempts<br />

fail. Although every industry has its own unique problems, the defense and national infrastructure sectors<br />

face distinctive challenges that can make failure more likely. <strong>The</strong> main causes of digital trans<strong>for</strong>mation<br />

failure include:<br />

1. Vision and leadership buy-in the lack of clear, well-communicated vision and executive buy-in<br />

may prove to be the most damning characteristic of digital trans<strong>for</strong>mation ef<strong>for</strong>ts. In many cases,<br />

organizations put themselves on a path to digital trans<strong>for</strong>mation without having clearly defined a<br />

vision <strong>for</strong> what success looks like, a strategic roadmap <strong>for</strong> how they intend to get there, or the<br />

buy-in from leadership that would be necessary to guide the trans<strong>for</strong>mation. Layered bureaucracy,<br />

which characterizes many defense sectors, can also slow decision-making and hinder leaders’<br />

ability to focus on the right priorities.<br />

2. Overestimating Simplicity: Old legacy systems, especially in the defense and government sphere,<br />

are decades old. <strong>The</strong>se systems are not only old but complex. <strong>The</strong>y were designed <strong>for</strong> a predigital<br />

world. Connecting new technologies – be it cloud computing, AI or data analytics – to legacy<br />

systems is a complex process in itself. Organizations often underestimate the time, money and<br />

resources required to modernize and end up with projects that fail to deliver on either cost or time.<br />

3. Cultural Resistance: Digital trans<strong>for</strong>mation is as much about cultural change as it is about<br />

technology. <strong>The</strong> top-down structures and efficient chain-of-command protocols of the defense<br />

sector can be resistant to the inclusive, free-thinking environments required <strong>for</strong> digital<br />

trans<strong>for</strong>mation success. Employees and managers might resist new tools and processes,<br />

especially if they feel that these threaten their roles or workflows.<br />

4. Siloed Operations and Poor Communication: Effective digital trans<strong>for</strong>mation projects require<br />

seamless collaboration between IT, operations and leadership. In large, hierarchical<br />

organizations such as defense agencies or infrastructure operators, siloed operations and poor<br />

communication, often hinder such cross-functional collaboration. If departments do not align, or<br />

do not communicate effectively, digital trans<strong>for</strong>mation projects can be fractured, with partial or<br />

incomplete implementations.<br />

5. Omission of cybersecurity: <strong>The</strong> most troubling omission might be the lack of emphasis on<br />

cybersecurity. It is common <strong>for</strong> organizations to see cybersecurity as an afterthought, to be<br />

attended to only after the new systems and technologies have been put in place. This means<br />

there is a ‘window of vulnerability’ as the transition to new systems takes place. This is especially<br />

important <strong>for</strong> organizations in the defense and national infrastructure sectors that might not<br />

survive a cyberattack. <strong>The</strong>y hold industry and government in<strong>for</strong>mation, command-and-control<br />

capabilities and critical operational systems.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> <strong>Cyber</strong>security Risks of Failed Trans<strong>for</strong>mations<br />

Underlying every digital trans<strong>for</strong>mation is the introduction of new technologies that improve efficiencies,<br />

generate data and automate processes. However, the new technologies that underpin digital<br />

trans<strong>for</strong>mation also exponentially increase exposure to cyberattacks, particularly if not handled properly.<br />

Each stage of digital trans<strong>for</strong>mation entails digitizing processes, moving to cloud environments, and<br />

linking previously isolated systems – presenting an entirely new attack surface <strong>for</strong> cybercriminals and<br />

nation-state adversaries to exploit.<br />

And in the defense and national infrastructure sectors this risk is heightened. Ineffective or failed digital<br />

trans<strong>for</strong>mation programs can result in:<br />

1. Exposure of Critical Data: <strong>Defense</strong> organizations depend on secure systems to handle highly<br />

sensitive data about military strategies, personnel data and classified communications. Failed<br />

digital trans<strong>for</strong>mation can expose this data to hacks. Hackers or nation-state actors can exploit<br />

openings in new systems that are integrated or partially modernized to breach firewalls and gain<br />

access to strategic defense data. Stolen or altered data can erode national security by letting an<br />

adversary know sensitive in<strong>for</strong>mation about military operations or defense capabilities.<br />

2. Crippled Command-and-Control: Digital networks are the critical infrastructure that enables realtime<br />

communications and coordination in modern defense systems. If digital trans<strong>for</strong>mation fails,<br />

command-and-control systems are broken or exposed to cyberattack. Adversaries could intercept<br />

military communications or create confusion during a war, rendering friendly commands<br />

inoperable or untrustworthy. Or worse, hostile <strong>for</strong>ces could commandeer defense systems. A<br />

particularly ominous example is an attack on command-and-control systems that could disable<br />

drones, missiles or other automated technologies, or even seize control.<br />

3. <strong>Cyber</strong> Sabotage of Critical Infrastructure: National security is not just the concern of defense<br />

ministries. Critical infrastructure such as energy grids, transport networks and water supplies are<br />

also strategic assets that, if compromised, could have serious consequences. Digital<br />

trans<strong>for</strong>mation failures in these sectors can lead to vulnerabilities in operational technology (OT)<br />

systems that, if attacked, could lead to large-scale power outages, supply chain disruptions or<br />

even environmental disasters. Real-world cases such as the 2015 cyberattack on the power grid<br />

of Ukraine illustrate the stakes involved in securing critical infrastructure <strong>for</strong> countries that fail to<br />

do so.<br />

4. Insider Threats and System Misconfigurations: Not all cyber vulnerabilities stem from outside of<br />

an organization. Digital trans<strong>for</strong>mations can result in insider threats and system misconfigurations<br />

as well. Employees may not be trained well enough on a new system to understand the<br />

in<strong>for</strong>mation they are working with, or the security of the system. Poorly configured systems – a<br />

result of a rushed or incomplete trans<strong>for</strong>mation – can become exploitable vulnerabilities, easily<br />

acted upon by malicious actors. In defense, where data and operational integrity are vital, these<br />

‘soft’ vulnerabilities can cause harm.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Case Studies: <strong>The</strong> Real-World Impact of Digital Trans<strong>for</strong>mation Failures<br />

Consequences of digital trans<strong>for</strong>mation failure are more than just hypothetical. A number of examples<br />

from the real world reveal the actual dangers that arise when digital trans<strong>for</strong>mations get it wrong –<br />

especially in areas of national security.<br />

Case Study 1: <strong>The</strong> 2015 Ukrainian Power Grid <strong>Cyber</strong>attack<br />

In late December 2015, the country of Ukraine suffered a massive cyberattack against its power grid,<br />

resulting in blackouts across much of the nation and cutting power to a quarter of a million people.<br />

Security experts concluded that the intruders, a highly coordinated army of cybercriminals, hacked their<br />

way into the country’s energy infrastructure using malware. <strong>The</strong> 2015 blackouts in Ukraine graphically<br />

illustrate how outdated (or improperly secured) critical infrastructure systems can be vulnerable to attack.<br />

Ukraine had been undertaking the task of digitizing parts of its energy infrastructure, but security gaps<br />

were exploited by the attackers, demonstrating that even incomplete digital trans<strong>for</strong>mation can bring real<br />

risks.<br />

For other states with similarly old infrastructure, it is a warning: unless digital transition is managed<br />

securely throughout, from the core to the periphery, then critical infrastructure is vulnerable to sabotage,<br />

both civilian and military.<br />

Case Study 2: <strong>The</strong> 2020 SolarWinds <strong>Cyber</strong>attack<br />

Since the 2020 SolarWinds breach – which saw a nation-state-backed hacker inserting malicious code<br />

into a software update <strong>for</strong> the Orion software used by government agencies and Fortune 500 businesses,<br />

making it the most significant cyberattack on a private company in recent years – we have become<br />

painfully aware of the digital vulnerabilities that can be used as attack vectors.<br />

<strong>The</strong> scope of the attack, which compromised systems at the U S Department of Homeland Security, the<br />

Pentagon and countless other targets, wasn’t completely clear, but it certainly showed the consequences<br />

of rushing a digital trans<strong>for</strong>mation without investing in cybersecurity. Today, as organizations push to<br />

modernize, every layer of the digital infrastructure needs to be secure – or the breach could have similar<br />

national security implications.<br />

Why <strong>Cyber</strong>security Must Be Central to Digital Trans<strong>for</strong>mation<br />

<strong>The</strong> case <strong>for</strong> trans<strong>for</strong>mation is straight<strong>for</strong>ward: to compete, to be efficient and effective, to thrive in a<br />

digital world, organizations must digitalize. But digitalization is not a goal in itself; it is a means to an end.<br />

When it comes to national security, the digital trans<strong>for</strong>mation must be in support of, and never at the cost<br />

of, cybersecurity.<br />

1. A proactive, not reactive approach to security: In the past, cybersecurity was often relegated to<br />

the backseat; thought of after every other part of the process was completed and, even then, only<br />

if there was a threat. In the future, organizations will need to adopt a proactive approach to<br />

security, and this must be built into every phase of the digital trans<strong>for</strong>mation process, from<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


designing a system to implementing it and maintaining it, with encryption, multi-factor<br />

authentication, real-time threat detection, and incident response protocols.<br />

2. Investment in cybersecurity talent: the pace of digital trans<strong>for</strong>mation is picking up and<br />

organizations need to recruit and train skilled cybersecurity professionals to help ensure new<br />

systems are hardened. This is particularly true in the defense industry, where many of the systems<br />

are more complex and the data, they process is highly sensitive. Investment in the recruitment<br />

and retention of cybersecurity talent is critical to defense organizations.<br />

3. Continuous monitoring and adaptation: Digital trans<strong>for</strong>mation is not a one-time event; it is a<br />

continuous process. When organizations adopt new technologies, they must also continuously<br />

monitor <strong>for</strong> new security vulnerabilities and adjust security measures to stay ahead of security<br />

risks. <strong>The</strong> threat landscape continues to evolve, and organizations must remain vigilant to thwart<br />

newly emerging cyber threats.<br />

4. Cross-Sector Collaboration: In addition to the existing relationship between government and<br />

defense organizations, industry and commercial sector companies need to increase cross-sector<br />

collaboration to share best practices, intelligence and cybersecurity solutions. Public-private<br />

partnerships can help ensure that digital trans<strong>for</strong>mations are both successful and secure. When<br />

organizations pool resources and knowledge, they also pool the tools to defend against the everevolving<br />

cyberthreats that aim to breach national security.<br />

<strong>The</strong> dismal record of digital trans<strong>for</strong>mation ef<strong>for</strong>ts offers a concrete and urgent national security issue. In<br />

sectors such as defense, energy and critical infrastructure, failures translate not just into embarrassing<br />

outages and lost revenues, but also to their own cyberattacks, data breaches and sabotage – all of which<br />

can have potentially deadly consequences. As national systems modernize, they should realize that<br />

security does not just follow from digital trans<strong>for</strong>mation – it is a prerequisite.<br />

By building cybersecurity into digital trans<strong>for</strong>mation at the very beginning, governments and<br />

organizations can better support national security through proactive, integrated security, targeted<br />

investment in cybersecurity talent, and collaboration across sectors.<br />

It is no longer enough <strong>for</strong> a nation to innovate to stay secure; it must also innovate securely to remain<br />

viable in an increasingly hostile cyber landscape, where failure is no longer an option. Digital<br />

trans<strong>for</strong>mation must succeed, or we collectively risk losing.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Joe Crist is a seasoned Digital Trans<strong>for</strong>mation Expert and the Founder of<br />

Trans<strong>for</strong>m 42 Inc. With a 14-year military background in the U.S. Navy and<br />

U.S. Army National Guard, Joe brings a wealth of experience in resilience and<br />

strategic leadership. He transitioned from military service to working with top<br />

firms, tackling high-stakes projects <strong>for</strong> defense, government, finance, and<br />

healthcare sectors.<br />

Driven by the challenges he observed in businesses struggling to adapt to<br />

digital changes, Joe developed the hyper-scaling blueprint, a comprehensive<br />

strategy that focuses on aligning people, processes, and technology <strong>for</strong><br />

sustained business growth. His method emphasizes agility, innovation, and<br />

outcome-based strategies, helping organizations become more customer-centric and adaptive to market<br />

demands.<br />

In addition to leading Trans<strong>for</strong>m 42 Inc., Joe is expanding his thought leadership through a podcast<br />

featuring industry leaders and a <strong>for</strong>thcoming book that dives deeper into strategies <strong>for</strong> navigating digital<br />

trans<strong>for</strong>mation.<br />

Joe can be reached online at Joe.crist@trans<strong>for</strong>m42inc.com or his many plat<strong>for</strong>ms at<br />

https://linktr.ee/trans<strong>for</strong>m42 and at our company website https://www.trans<strong>for</strong>m42inc.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Top Recommendations <strong>for</strong> Data Retention and Deletion<br />

By Leon Butler, Head of Data Security, Quorum <strong>Cyber</strong><br />

<strong>The</strong> tremendous value that data holds <strong>for</strong> organizations also comes with the responsibility to properly<br />

address its storage, governance, and security. How can businesses tackle this significant task? This<br />

article will review the top strategies.<br />

Should you be concerned with having too much data? It is best not to focus on a single figure of data, to<br />

say that something is bad. <strong>The</strong> concern should be understanding the make-up of this data; how much<br />

data is sensitive, business-critical, and what proportion is redundant, obsolete, or trivial.<br />

Over-retention of redundant data adds to the operational cost of data, and introduces risk—if you do not<br />

need it, why keep it? As a Data Processor or Controller, one should always understand where sensitive<br />

data is stored so that it can be processed within the confines of regulation and law.<br />

“Knowing your data” is the key part in assessing when, where, and why content is processed.<br />

Understanding this will, in turn, help an organization to understand how much is too much — <strong>for</strong> example,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


over-retention of personally identifiable in<strong>for</strong>mation (PII) or a high volume of intellectual property (IP) that<br />

is not adequately protected by security controls.<br />

Understanding what data should be deleted is unique to every organization, and is determined by a<br />

combination of regulatory, judicial, and organizational requirements. An organization needs to ensure it<br />

understands the type of data it processes as part of its day-to-day operations and how to govern it through<br />

an effective Retention Schedule and Policy. An agreed Retention Schedule will identify the different types<br />

of content (physical, electronic) and classifications (PII, IP, financial, records) that apply to processed<br />

content and how it should be handled (<strong>for</strong> example, deleted after seven years). Organizations must<br />

appreciate that a one-size-fits-all method is not always appropriate, and that different types of content<br />

require discrete handling (<strong>for</strong> example, PII under General Data Protection Regulation (GDPR)).<br />

Effective data retention not only improves regulatory compliance posture, but also enhances productivity<br />

by reducing data duplication and improving knowledge management. By systematically eliminating<br />

redundant, obsolete, trivial, and duplicated data, organizations can streamline their data storage, making<br />

it easier to locate and access relevant in<strong>for</strong>mation.<br />

However, not managing data effectively can lead to several significant risks <strong>for</strong> organizations:<br />

• Data Leakage: Poor data management increases the risk of unauthorized access to<br />

inappropriately retained content. Breaches can result in significant financial losses, damage to<br />

reputation, and regulatory consequences.<br />

• Compliance Violations: Failure to comply with data privacy and protection regulations such as<br />

GDPR can lead to substantial fines and legal penalties.<br />

• Lost Productivity: Inefficient data management processes can waste valuable time and<br />

resources. An organization's employees may spend excessive time searching <strong>for</strong> data, correcting<br />

errors, and dealing with data-related issues.<br />

• Financial Loss: Data breaches and compliance violations can result in significant financial losses<br />

due to remediation costs, legal fees, and regulatory fines.<br />

• Reputation Damage: Poor data management can damage an organization’s reputation, leading<br />

to a loss of customer trust and business opportunities.<br />

It is highly recommended that organizations of any size in any sector develop a strategy <strong>for</strong> data lifecycle<br />

management. Partnering with business stakeholders is an intrinsic part of developing a retention<br />

schedule that represents the data map <strong>for</strong> the organization and provides governance over how it should<br />

be processed. IT alone cannot create such a policy. Once a robust documented policy is in place covering<br />

physical, digital, structured, and unstructured data, the next steps are to adopt a people, process, and<br />

technology-centric solution that en<strong>for</strong>ces it.<br />

In conclusion, a data management strategy is not just a regulatory necessity, but it is a strategic<br />

advantage. By partnering with key stakeholders to devise and adopt robust retention schedules and<br />

classification models, an organization can mitigate risks, enhance productivity, and ensure compliance.<br />

Effective data governance helps streamline operations, reduce costs, and protect sensitive in<strong>for</strong>mation,<br />

ultimately fostering a more secure and efficient business environment. Embracing these strategies will<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


enable organizations to harness the full potential of their data while safeguarding their reputation and<br />

resources.<br />

About the Author<br />

As the Head of Data Security at Quorum <strong>Cyber</strong> and an ex-Microsoft<br />

Technical Specialist, Leon Butler has spent over a decade as a technical<br />

SME, championing digital trans<strong>for</strong>mation through cloud services in sectors<br />

like manufacturing and finance. Leon specializes in guiding organizations<br />

towards robust regulatory compliance and in<strong>for</strong>mation security. With an<br />

in-depth understanding of Microsoft 365's security features and industry<br />

best practices, he oversees customer integrations and deployments. Leon<br />

can be reached online at leon.butler@quorumcyber.com and at<br />

https://www.quorumcyber.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protecting CISOs and CSOs in an Era of Personal Liability<br />

By Amanda Fitzsimmons, Head of Legal at Salt Security<br />

Chief In<strong>for</strong>mation Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented<br />

pressures, not only from the evolving threat landscape but also from a legal environment that increasingly<br />

seeks to hold them personally liable <strong>for</strong> data breaches. This shift toward personal accountability places<br />

immense pressure on these leaders to ensure their organizations’ security postures are robust and<br />

compliant with ever-tightening data protection laws, all while balancing the needs to protect both<br />

themselves and their organizations in environments that often have limited resources.<br />

<strong>The</strong> Personal Liability Landscape<br />

CISOs and CSOs are being held personally accountable <strong>for</strong> breaches <strong>for</strong> a multitude of reasons. Stricter<br />

data protection laws, such as the General Data Protection Regulation (GDPR) in Europe and various<br />

state laws in the U.S., often contain provisions that penalize individuals <strong>for</strong> non-compliance. We’ve also<br />

seen in the past couple of years, increasing interest by the U.S. Department of Justice and the Securities<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and Exchange Commission to hold CISOs and CSOs criminally liable <strong>for</strong> security breaches. This shift<br />

toward individual accountability stems in part from the common perception that without personal liability,<br />

companies will never take their responsibilities <strong>for</strong> security seriously.<br />

At the same time, shareholders are also demanding accountability. A data breach can lead to a plummet<br />

in stock value, reputational harm, brand damage, and other negative consequences, prompting<br />

shareholders to seek someone to blame. CISOs and CSOs, as the guardians of their organization’s<br />

security posture, are logical targets. Public awareness of data breaches has also increased, which has<br />

led to an environment where consumers increasingly resort to the civil courts to hold CISOs and CSOs<br />

responsible.<br />

Given these developments, some organizations have started incorporating clauses in employment<br />

contracts that explicitly make CISOs and CSOs liable <strong>for</strong> data breaches, regardless of their personal<br />

culpability.<br />

Navigating Legal Implications<br />

With the pressures increasing, the CISO and CSO’s job is rapidly expanding from securing their<br />

organization to protecting themselves from these increasing personal risks. CISOs and CSOs now must<br />

stay abreast of industry best practices <strong>for</strong> data security not only to mitigate the risks of a data breach but<br />

also to establish their due diligence in fulfilling this role.<br />

CISOs and CSOs must now maintain comprehensive records of decisions and actions taken in the<br />

interest of cybersecurity since such documentation can serve as powerful evidence in the defense of a<br />

negligence claim. Furthermore, CISOs and CSOs must now understand their contractual commitments,<br />

consult with legal counsel be<strong>for</strong>e signing employment agreements, and consider acquiring insurance in<br />

order to shield themselves from the potential legal and financial ramifications of personal liability.<br />

Staying Ahead of the Curve<br />

All of this means that it is imperative <strong>for</strong> CISOs and CSOs to stay ahead of the curve by implementing<br />

the latest available cybersecurity measures in their organizations and being prepared to justify their<br />

decisions when they don’t.<br />

One such area that CISOs and CSOs can no longer af<strong>for</strong>d to ignore is API security. In the last year, 34%<br />

of data breaches stemmed from API vulnerabilities, and 92% of organizations experienced an API-related<br />

security incident, according to research from Salt Security. And with the proliferation of APIs set to<br />

explode with advancements in artificial intelligence, the threat posed by APIs is only expected to increase.<br />

To protect their organizations and themselves, CISOs should prioritize API security as a fundamental<br />

component of their cybersecurity strategy. By proactively implementing measures to protect APIs and<br />

other emerging threat vectors, CISOs can demonstrate a commitment to security that not only reduces<br />

the likelihood of a breach but also strengthens their legal defense should a breach occur.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Best Practices<br />

To minimize the risk of personal legal repercussions following a breach, CISOs and CSOs should:<br />

• Stay in<strong>for</strong>med about the latest cybersecurity threats and regulations.<br />

• Conduct regular risk assessments and have a process to address identified risks.<br />

• Document decision-making processes to demonstrate diligence.<br />

• Advocate <strong>for</strong> necessary resources and document any refusals.<br />

• Collaborate with the leadership team and board of directors to ensure alignment on cybersecurity<br />

risks.<br />

• Thoroughly understand their employment agreements and consult legal counsel be<strong>for</strong>e signing.<br />

• Consider obtaining personal liability insurance.<br />

Conclusion<br />

As the cybersecurity landscape continues to evolve, CISOs and CSOs must adapt to meet the demands<br />

of their roles. By prioritizing best practices, documenting decisions, and understanding the legal<br />

implications, CISOs and CSOs can better protect not only their organizations but also themselves in this<br />

challenging environment.<br />

About the Author<br />

Amanda Fitzsimmons is the Head of Legal at Salt Security, whose API<br />

Protection Plat<strong>for</strong>m empowers organizations to secure their APIs through<br />

discovery, posture management, and run-time threat protection. Amanda has<br />

more than 15 years of experience, specializing in data privacy, cybersecurity,<br />

and legal compliance matters. Prior to her time at Salt Security, Amanda<br />

advised numerous clients through some of the most significant data breaches<br />

in recent history.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mapping a Future without <strong>Cyber</strong> Attacks<br />

By Chetan Conikee, Founder and CTO, Qwiet AI<br />

After countless attacks across a multitude of organizations, the cyber security industry has a fairly good<br />

grasp of how adversaries work, the vulnerabilities they take advantage of, and of course, how to prevent<br />

these attacks from causing serious damage. Despite all this in<strong>for</strong>mation, the cybersecurity industry<br />

continues to rely on detect and respond – an endless game of cat and mouse where developers see the<br />

vulnerabilities in their code and spend countless development cycles attempting to address the issue<br />

be<strong>for</strong>e another one pops up.<br />

Fortunately, with the advent of AI-based solutions, application security teams have a path <strong>for</strong>ward and<br />

this begins at the code level. Today, security teams have access to some of the most powerful AI solutions<br />

but to be effective, it is critical teams leverage solutions that can contextualize cybersecurity<br />

vulnerabilities, look at code through a holistic lens and understand how vulnerabilities interact with the<br />

entirety of your application.<br />

<strong>The</strong> power of context<br />

For developers to get ahead of cyber threats, they must look beyond simply deploying a fix and<br />

understand how attackers take advantage of their application’s vulnerabilities. To retrace an attacker’s<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


steps, developers need context – valuable in<strong>for</strong>mation that reveals potential attack vectors and how<br />

deeply rooted an issue could be. Critical in<strong>for</strong>mation such as data flows, control dependencies and other<br />

critical details can all be revealed with a Code Property Graph (CPG).<br />

CPGs can be described as a unified representation of software systems that combines various aspects<br />

of code. Think of a CPG as a roadmap of your application’s code. Picture a map application on your<br />

phone and a destination you want to reach. When you plot your current location and the destination, you<br />

are presented with a map with rich contextual in<strong>for</strong>mation. In<strong>for</strong>mation about accidents, roadwork, traffic<br />

and more. All of this enables you to take alternate routes and change your travel plans but none of this<br />

would have been possible without the contextual in<strong>for</strong>mation that the map provides.<br />

From an attacker’s point of view, they look at an application’s map to determine the best route to success.<br />

With a CPG, application security scanning tools can digest your application’s code, map it out and provide<br />

in<strong>for</strong>mation on API points, points in your code that interact with caches and other points of access that<br />

can be abused. All this in<strong>for</strong>mation enables application security teams to find weaknesses and classify<br />

parts of the map as vulnerabilities that need to be addressed.<br />

Keeping developers in a flow state<br />

What is exciting about the graph-based nature of CPGs is that you can easily apply machine learning<br />

and deep learning techniques. This turns scanning solutions into a powerful tool that can help uncover<br />

hidden patterns within code, predict vulnerabilities and provide context that legacy application security<br />

tools might overlook. But what does this all mean to a developer?<br />

In a recent study of over 1000 developers, developers are spending up to a third of their time chasing<br />

vulnerabilities and fixing bugs instead of writing code. A staggering 38.5% also indicated that they spend<br />

up to 60 minutes a day searching <strong>for</strong> solutions. <strong>Cyber</strong> attacks continue to be a plague and developers<br />

are being asked to do more with fewer resources and greater time restraints.<br />

For IT teams to remain competitive in this constantly evolving cyber threat landscape, they will need<br />

every tool at their disposal to help keep them focused on what matters most – writing secure code. So<br />

how do we immunize applications against emerging cyber threats while ensuring the productivity of IT<br />

Teams?<br />

<strong>The</strong> perfect remedy could lie with the advent of AI solutions. By integrating AI capabilities into application<br />

security tools, organizations can dramatically increase productivity across development teams. With the<br />

appropriate AI tool, developers can take an issue that could have required two to three hours to fix into a<br />

simple 5-minute scan where the vulnerability is identified, contextualized against the entirety of your<br />

application and addressed with an automatic code suggestion leveraging generative AI.<br />

AI and the develope<br />

AI solutions are powerful but what is important to remember is that these solutions are not meant to<br />

replace the skills of developers and should be approached as complementary assets that assist your<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


development teams to be more efficient and productive. A human element will still be required to not only<br />

guide the overall direction of code development but also ensure the final application coherently comes<br />

together while also supporting business goals.<br />

About the Author<br />

Chetan Conikee is the Founder and CTO of Qwiet AI. He is a serial<br />

entrepreneur with over 20+ years of experience in software<br />

engineering. His expertise includes building web-scale distributed<br />

infrastructure, virtualization and machine learning. He was most<br />

recently Chief Data Officer and GM Operations at CloudPhysics. Prior<br />

to CloudPhysics he was part of early founding teams at CashEdge<br />

(acquired FiServ), Business Signatures (acquired Entrust) and<br />

EndForce (acquired Sophos). Chetan earned his M.S. in Computer<br />

Engineering from Iowa State University and B.S in Computer Science<br />

and Engineering from Bangalore University.<br />

Chetan can be reached online at X - @conikeec and at our company website https://qwiet.ai/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Beyond Tick Boxes: An Auditor's Perspective on In<strong>for</strong>mation<br />

Security Compliance<br />

By James Rees, Managing Director, Razorthorn Security<br />

Introduction<br />

As cyber threats evolve and regulatory requirements tighten, businesses face increasing pressure to<br />

protect their sensitive data and strengthen security practices. This blog will give you some helpful insights<br />

from an auditor's perspective (mine!) auditing organisational in<strong>for</strong>mation security, exploring the<br />

challenges, best practices and the common pitfalls I encounter. Whether your organisation is just<br />

beginning its security journey or striving to optimise an established programme, understanding these<br />

dynamics is crucial <strong>for</strong> ensuring a successful compliance audit.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Your Security Strategy Maturity<br />

As an auditor, I get to see a good amount of organisational in<strong>for</strong>mation security practices. Some<br />

organisations have a well-<strong>for</strong>med in<strong>for</strong>mation security function: this may be a single person or a group.<br />

<strong>The</strong>se entities have established policies and procedures and conduct their governance effectively. While<br />

there is always room <strong>for</strong> improvement - as is the case <strong>for</strong> most departments in any business - one of the<br />

key elements auditors look <strong>for</strong> is continuous improvement and the intent to optimise the in<strong>for</strong>mation<br />

security department's capabilities.<br />

Well-functioning departments are typically supported by the business and, on the whole, per<strong>for</strong>m<br />

admirably, often with limited or restricted budgets. Contrary to popular belief, auditors do not seek<br />

perfection; as any experienced professional will attest, perfection is an unattainable goal. But they do<br />

their best.<br />

In contrast, there are organisations at the beginning of their in<strong>for</strong>mation security strategy journey. While<br />

the intent is present, they may lack resources or are still working on reaching a more advanced level of<br />

security. <strong>The</strong> path from minimal security to a more advanced state is lengthy and complex. It's important<br />

to recognise that this is a journey: progress is not instant. It takes time to establish robust cybersecurity<br />

measures, gain business acceptance <strong>for</strong> policies, and build out an efficient and effective defence in depth<br />

strategy.<br />

Regardless of which situation you find yourself in, this is what auditors want to see. Even those<br />

organisations in early security stages have essential components present. A significant bedding-in period<br />

is necessary to refine and achieve the desired state, assuming you have completed the required tasks.<br />

In these cases, you are likely to pass an audit or possibly pass with recommendations <strong>for</strong> improvement.<br />

This is a fact of life in the auditing process.<br />

Key Considerations <strong>for</strong> Auditors<br />

Most auditors do not audit to the letter of the requirement; instead, we look to ensure the requirement is<br />

being met based on its underlying intent. While we still need to make sure that controls are in place, as<br />

long as the intent is sound and the necessary items are present, you should have no problems or, at<br />

least, very few that cannot be remediated. As auditors, we also understand the challenges that<br />

organisations face in ensuring in<strong>for</strong>mation security. It is not an easy task, especially <strong>for</strong> those just<br />

beginning their journey towards a more secure environment. However, this does not mean that these<br />

organisations are failing or not doing enough to meet security standards.<br />

In fact, auditors appreciate the ef<strong>for</strong>t and dedication put into establishing and improving in<strong>for</strong>mation<br />

security measures. We know that it takes time, resources and continuous learning to achieve a certain<br />

level of security. We also understand that security teams are often thrown curve balls, as there will always<br />

be new threats emerging and vulnerabilities discovered.<br />

<strong>The</strong>re<strong>for</strong>e, what we really look <strong>for</strong> during audits is not flawless security systems or policies, but rather the<br />

organisation's commitment to improving their current security posture. We want to see evidence of a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


proactive approach towards identifying and effectively mitigating risks. We want to see how effective the<br />

organisation's incident management processes are and their ability to learn from these incidents to<br />

prevent future occurrences.<br />

But most importantly, we want to see how organisations integrate in<strong>for</strong>mation security into their business<br />

operations. It should not be seen as a separate function or an afterthought, but rather an integral part of<br />

the organisation's culture and strategy.<br />

<strong>The</strong> Importance of Continuous Improvement<br />

So, if you are part of an organisation working hard on your in<strong>for</strong>mation security, do not feel discouraged<br />

if you are not where you want to be yet. Remember, that it is a journey filled with challenges and learning<br />

opportunities. As long as you are committed to improving your security posture and have the right<br />

mindset, you are on the right path. As auditors, we are here not just to evaluate your current state but<br />

also to provide guidance <strong>for</strong> improvement based on best practices and industry standards. From our<br />

perspective, it's better to have an organisation actively working on enhancing its security measures than<br />

one that is merely box-ticking.<br />

Keep moving <strong>for</strong>ward in your journey towards better in<strong>for</strong>mation security - every step counts, no matter<br />

how small it might seem at the moment. What I have described above is what good in<strong>for</strong>mation security<br />

programmes and business functions look like.<br />

<strong>The</strong> Misconception of In<strong>for</strong>mation Security as an IT Issue<br />

Conversely, there exists another category of organisations: those that merely pay lip service to security<br />

requirements or lack a genuine intent to meet them. <strong>The</strong>se entities often perceive security as an<br />

impediment to organisational operations. Regrettably, I have seen situations (more times than I care to),<br />

where individuals are given the role of a CISO without the necessary security skills or experience, simply<br />

due to their background in IT, compliance or risk management. In<strong>for</strong>mation security is a specific discipline:<br />

protecting people, processes and technology through layered and blended protection and training<br />

requires years of specific skill development.<br />

A common misconception in some organisations is that in<strong>for</strong>mation security is solely an IT issue. Often,<br />

the compliance or security frameworks they are obligated to follow have not been thoroughly reviewed,<br />

and the team may be unaware that these are often contractual or legislative requirements. This lack of<br />

understanding regarding their obligations leads to errors, omissions or refusal to implement necessary<br />

measures. While they may possess some relevant knowledge, they lack the intricate understanding of<br />

the profession, potentially overlooking critical factors due to their different professional background.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Challenges in Auditing<br />

As you might imagine, auditing organisations like this presents significant challenges. If the intent to meet<br />

requirements is not there, and it's evident that the organisation does not fully comprehend the security<br />

framework and relevant legislation, a trained auditor cannot pass them.<br />

As an auditor, we have to be objective and impartial when conducting audits. We have to ensure that<br />

organisations are compliant with all applicable regulations and standards, and to highlight any issues so<br />

that they can be addressed. In most in<strong>for</strong>mation security frameworks and legislation, an organisation is<br />

usually required to:<br />

1. Understand the standard<br />

2. Understand your obligations and<br />

3. Maintain your knowledge as it evolves.<br />

Typically, organisations are given ample time - usually a year or more - to understand and implement the<br />

necessary changes to meet new versions of the standard.<br />

An experienced auditor will invariably pick up on these points very early on in the auditing process.<br />

Key Advice <strong>for</strong> Passing an Audit<br />

To pass an audit, it's there<strong>for</strong>e extremely important <strong>for</strong> organisations to take in<strong>for</strong>mation security<br />

seriously. It's not just about ticking boxes or meeting regulatory requirements - it's about protecting<br />

sensitive data and ensuring that business operations are secure. In<strong>for</strong>mation security is a crucial aspect<br />

of any organisation and it should be treated with <strong>for</strong>ethought, and as a priority. Organisations need to<br />

invest in appropriate in<strong>for</strong>mation security measures and ensure that they have skilled professionals<br />

overseeing their security ef<strong>for</strong>ts.<br />

If you're not sure where to start or how to improve your current in<strong>for</strong>mation security posture, it is advisable<br />

to engage a consultant or seek professional advice. <strong>The</strong>re are plenty of resources available out there -<br />

take advantage of them.<br />

As I said - auditors do not expect perfection. We understand that every organisation has its own unique<br />

challenges and constraints when it comes to in<strong>for</strong>mation security.<br />

What we really want to see is a genuine commitment towards improving in<strong>for</strong>mation security, continuous<br />

learning and improvement, and a proactive approach towards managing risks.<br />

A Holistic Approach to In<strong>for</strong>mation Security<br />

Good in<strong>for</strong>mation security extends beyond robust systems and policies. It's also about having the right<br />

people with the right skills managing these systems and policies effectively. And most importantly, it's<br />

about integrating in<strong>for</strong>mation security into the core business operations and culture of the organisation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


It is the un<strong>for</strong>tunate truth that so many organisations, regardless of size, do not understand the<br />

implications of operating without a fully functioning in<strong>for</strong>mation security department. This persists despite<br />

the extensive media coverage of high profile breaches in recent years. Some companies have gone out<br />

of business as a result of one single security incident, while others have had to spend millions in fines,<br />

PR and recovery costs.<br />

<strong>The</strong> evidence of this is there <strong>for</strong> all to see.<br />

Conclusion<br />

Finally, remember this: security doesn't need to be expensive - it needs to be effective. It is less expensive<br />

to create a robust security strategy than deal with the financial and reputational costs of a security breach.<br />

About the Author<br />

James Rees CISM, PCI DSS QSA, PCIP, ISO 27001 LA<br />

Managing Director, Razorthorn Security<br />

James, MD and Principal Security Consultant at Razorthorn<br />

Security, brings 25+ years of expertise in in<strong>for</strong>mation security and<br />

consultancy. Having delivered CISO services to global giants, he<br />

possesses vast PCI DSS advisory and audit experience. James<br />

excels in crafting robust in<strong>for</strong>mation security infrastructures and<br />

implementing intelligence-driven strategies to combat cyber threats.<br />

His experience solidifies him as an authority at the nexus of<br />

intelligence, cybersecurity and business protection.<br />

Beyond his role at Razorthorn Security, James is a recognised leader in the field. He hosts the popular<br />

cybersecurity podcast, Razorwire, providing insights and interviews with industry experts. As a published<br />

author and journalist, James's contributions extend to being a regular contributor in the dynamic realm of<br />

in<strong>for</strong>mation security. His commitment to advancing the industry and sharing knowledge underscores his<br />

influential presence and impact in the cybersecurity landscape.<br />

James Rees can be reached online at https://www.linkedin.com/in/jamesrees and at our company<br />

website at https://www.razorthorn.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Strengthening <strong>Cyber</strong>security in Healthcare: Protecting Patient<br />

Data and Ensuring Regulatory Compliance in a Digital Age<br />

Enhancing Healthcare <strong>Cyber</strong>security: Key Challenges, Technological Solutions, and Regulatory<br />

Developments to Protect Patient Data<br />

By Roshan Patin, Sr. Researcher, SNS Insider Pvt. Ltd.<br />

<strong>Cyber</strong>security in Healthcare<br />

As healthcare increasingly relies on digital technologies, the urgency <strong>for</strong> robust cybersecurity measures<br />

has never been more pronounced. This industry tackles challenges including the security of patient data,<br />

regulatory compliance and ensuring the critical infrastructure that supports the delivery of care is safe.<br />

Disturbing pattern, due to ef<strong>for</strong>ts by government and advances in technology.<br />

Key Uses of <strong>Cyber</strong>security in Healthcare<br />

Security technologies can prevent costly breaches and save patient data from being shared internally or<br />

exposed externally, as well as other external threats to medical devices. Because of the widespread<br />

digitization in processes like electronic health records, telemedicine and connected medical devices,<br />

there has been a growing focus on cybersecurity threats to the healthcare industry. Channel sacroiliitis<br />

cybersecurity has a great channel security <strong>for</strong> healthcare as it assists in keeping patient data safe which<br />

is related to HIPAA (Health Insurance Portability and Accountability Act) compliance, lest you <strong>for</strong>get<br />

hospital networks. IoT Medical devices such as Gateway Security-enabled IoT Device and make sure<br />

that the connections done from outside are also secure if coming inside.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This comes amid growing scrutiny on healthcare cybersecurity more generally. Some examples include<br />

Cisco and Palo Alto Networks launching healthcare-focused AI cybersecurity software <strong>for</strong> real-time threat<br />

detection and response. A health industry cybersecurity framework initiative, <strong>for</strong> example, between IBM's<br />

X-Force and healthcare organizations themselves aims to help healthcare providers better arm defenses<br />

against ransomware, alongside other infosec threats.<br />

Meanwhile, measures are underway which will further secure healthcare on the cybersecurity front. <strong>The</strong><br />

U.S. Department of Health and Human Services (HHS) has implemented en<strong>for</strong>cement measures under<br />

new compliance guidelines <strong>for</strong> the HIPAA Security Rule, while the U.S. <strong>Cyber</strong>security and Infrastructure<br />

Security Agency (CISA) issued recommendations to healthcare providers regarding patient data<br />

limitations. HHS data show more than 700 reported data breaches in 2022 exposing in<strong>for</strong>mation of some<br />

52 million individuals. An increase in breaches highlights the pressing requirement of strong cybersecurity<br />

measures in healthcare.<br />

Greater cooperation among governments and the private sector in this area, matched with developments<br />

in technology are helping healthcare bodies to safeguard patient data confidentiality more effectively and<br />

mitigate the threats of cyber-attacks.<br />

Trends in <strong>Cyber</strong>security Breaches in Healthcare<br />

<strong>The</strong> analysis of reported cybersecurity breaches in healthcare underscores the critical need <strong>for</strong> robust<br />

cybersecurity measures in a sector that handles highly sensitive patient in<strong>for</strong>mation. <strong>The</strong> upward trend<br />

in breaches until 2021, followed by a slight decline, highlights both the vulnerabilities inherent in rapidly<br />

digitizing healthcare and the potential <strong>for</strong> improvement through targeted security initiatives.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As the healthcare sector continues to embrace technology, organizations must prioritize cybersecurity to<br />

protect patient data from increasingly sophisticated cyber threats. Investments in advanced technologies,<br />

staff training, and incident response plans are essential. Moreover, collaboration with government<br />

agencies and adherence to regulatory frameworks can further strengthen defenses against cyberattacks.<br />

<strong>The</strong> healthcare industry must remain vigilant and proactive, understanding that the threat landscape will<br />

continue to evolve. By fostering a culture of security awareness and investing in comprehensive<br />

cybersecurity strategies, healthcare organizations can enhance their resilience and safeguard patient<br />

trust in an increasingly digital world.<br />

Key Trends Shaping Healthcare <strong>Cyber</strong>security<br />

Increased Regulatory Scrutiny: Governments worldwide are tightening regulations surrounding data<br />

privacy and cybersecurity. In the U.S., the Health Insurance Portability and Accountability Act (HIPAA)<br />

continues to evolve, requiring healthcare entities to implement stricter measures to protect patient data.<br />

<strong>The</strong> European Union’s General Data Protection Regulation (GDPR) also emphasizes stringent data<br />

protection, prompting organizations to reassess their compliance strategies.<br />

Adoption of Advanced Technologies: <strong>The</strong> integration of Artificial Intelligence (AI) and Machine<br />

Learning (ML) in cybersecurity is on the rise. <strong>The</strong>se technologies can analyze patterns and detect<br />

anomalies in real-time, enhancing threat detection capabilities. For instance, AI-driven security plat<strong>for</strong>ms<br />

are now being utilized to monitor network traffic and identify potential breaches be<strong>for</strong>e they occur.<br />

Government Initiatives and Support<br />

Governments are playing a crucial role in enhancing healthcare cybersecurity. <strong>The</strong> U.S. <strong>Cyber</strong>security<br />

and Infrastructure Security Agency (CISA) launched initiatives such as the Healthcare <strong>Cyber</strong>security<br />

Initiative, aimed at providing resources and guidance to healthcare organizations. This includes threat<br />

intelligence sharing, incident response support, and cybersecurity training programs.<br />

In Canada, the government’s <strong>Cyber</strong> Security Strategy emphasizes collaboration between public and<br />

private sectors to bolster cybersecurity measures across critical infrastructure, including healthcare.<br />

Recent investments in cybersecurity technology reflect a commitment to safeguarding patient in<strong>for</strong>mation<br />

and maintaining public trust.<br />

Latest News<br />

In 2023, several high-profile cyberattacks targeted healthcare organizations, underscoring the urgent<br />

need <strong>for</strong> enhanced security protocols. Notably, a major ransomware attack disrupted operations at a<br />

prominent hospital network, resulting in significant operational downtime and compromised patient data.<br />

This incident prompted a nationwide call <strong>for</strong> healthcare organizations to bolster their cybersecurity<br />

frameworks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Additionally, partnerships between healthcare providers and cybersecurity firms are becoming more<br />

common. A notable collaboration between a leading hospital system and a cybersecurity provider has<br />

led to the implementation of comprehensive security assessments and incident response plans,<br />

significantly reducing vulnerability to attacks.<br />

Conclusion: <strong>The</strong> Path Forward<br />

<strong>The</strong> healthcare industry is at a pivotal juncture where the integration of technology must be met with<br />

equally robust cybersecurity measures. As cyber threats continue to evolve, healthcare organizations<br />

must prioritize cybersecurity investments and embrace innovative technologies to protect sensitive<br />

patient data.<br />

With increasing regulatory scrutiny and government support, the future of cybersecurity in healthcare<br />

looks promising. By fostering a culture of security awareness and collaboration, the industry can build<br />

resilience against cyber threats, ensuring the safety and privacy of patient in<strong>for</strong>mation in an increasingly<br />

digital world.<br />

Key Takeaways<br />

• <strong>Cyber</strong>attacks in healthcare have surged, with the sector facing unique challenges.<br />

• Advanced technologies like AI and ML are essential <strong>for</strong> threat detection.<br />

• Regulatory frameworks are tightening, necessitating compliance from healthcare organizations.<br />

• Government initiatives are crucial in supporting cybersecurity ef<strong>for</strong>ts across the industry.<br />

About the Author<br />

Roshan Patil is the Sr. Researcher of SNS Insider Pvt. Ltd., specializing in<br />

market research and analysis. With a post-graduate degree in MBA and<br />

over 4 years of experience in the Healthcare Industry, he contributes to<br />

insightful reports that aid strategic decision-making, helping clients stay<br />

competitive.<br />

Roshan can be reached online at roshan.patil@snsinsider.com,<br />

https://www.linkedin.com/in/roshan-patil-193ab2235/, and at our company<br />

website https://snsinsider.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why the <strong>Cyber</strong>security Talent Shortage is a Global Threat<br />

By Dan Vigdor, Co-Founder, Co-CEO and Executive Chairman, ThriveDX<br />

In the era of digital trans<strong>for</strong>mation, where data flows across borders and devices, data security is<br />

paramount. <strong>Cyber</strong>attacks are no longer isolated incidents but global challenges that affect economies,<br />

industries, and national security. <strong>The</strong> most pressing vulnerability in the fight against these threats is the<br />

global shortage of cybersecurity talent. This shortage is not just a work<strong>for</strong>ce problem but a systemic issue<br />

that poses a severe risk to economic stability, societal safety, and international security.<br />

<strong>The</strong> Global Rise of <strong>Cyber</strong>security Threats<br />

Over the past few years, cyberattacks have become more frequent, sophisticated, and damaging.<br />

According to the 2023 IBM Cost of a Data Breach report, the average cost of a data breach has reached<br />

$4.45 million, a 15% increase over the past three years. Additionally, 83% of organizations in the report<br />

experienced more than one data breach in the last year, illustrating just how common these attacks have<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ecome. Moreover, 2023 saw a significant rise in ransomware attacks targeting critical industries like<br />

healthcare, financial services, and energy infrastructure.<br />

A notable example is the <strong>2024</strong> MGM Resorts ransomware attack, which affected the company's hotel<br />

systems <strong>for</strong> days. Reservation systems, digital room keys, ATMs, and slot machines were brought down,<br />

disrupting operations and causing millions in losses. <strong>The</strong> incident highlighted the vulnerabilities in the<br />

hospitality sector’s digital infrastructure and emphasized the need <strong>for</strong> a skilled cybersecurity work<strong>for</strong>ce to<br />

combat such sophisticated threats.<br />

In 2022, Costa Rica experienced one of the most severe government cyberattacks in history. <strong>The</strong> attack,<br />

launched by the Conti ransomware group, shut down the country’s entire public sector, causing economic<br />

losses estimated at $30 million per day during the peak of the crisis. Attacks like these, whether statesponsored<br />

or financially motivated, highlight the significant gaps in global cybersecurity defenses, many<br />

of which can be attributed to the growing skills shortage.<br />

However, the most pressing issue we face is not just the increase in the frequency or sophistication of<br />

these attacks, but the fact that we lack the manpower to defend against them.<br />

<strong>The</strong> <strong>Cyber</strong>security Skills Gap: A Growing Crisis<br />

As cyber threats increase, the need <strong>for</strong> skilled professionals to mitigate these risks has become critical.<br />

Yet, there is a stark imbalance between the demand <strong>for</strong> cybersecurity talent and the available supply.<br />

According to (ISC)²’s 2023 <strong>Cyber</strong>security Work<strong>for</strong>ce Study, the global cybersecurity work<strong>for</strong>ce is short<br />

by approximately 3.5 million professionals. This number represents a sharp increase from previous years,<br />

reflecting the widening gap between the supply of skilled workers and the demand <strong>for</strong> robust<br />

cybersecurity measures.<br />

<strong>The</strong> same report found that 70% of organizations struggle to hire and retain cybersecurity professionals,<br />

especially in cloud security, threat intelligence, and incident response roles. <strong>The</strong> lack of qualified<br />

personnel leaves organizations more vulnerable to breaches and less capable of responding effectively<br />

when incidents occur.<br />

In recent years, the cybersecurity skills gap has continued to widen due to several factors:<br />

1. <strong>The</strong> Rapid Pace of Technological Change: As businesses adopt cloud computing, Internet of<br />

Things (IoT) devices, and AI-driven applications, cybercriminals' attack surface has expanded.<br />

Each new technology requires security expertise, but the cybersecurity work<strong>for</strong>ce has not grown<br />

at the same rate.<br />

2. Increased <strong>Cyber</strong>attacks: <strong>The</strong> COVID-19 pandemic accelerated the adoption of remote work and<br />

digital services, providing cybercriminals with new vulnerabilities to exploit. This surge in attacks<br />

has further strained already overworked cybersecurity teams.<br />

3. Complexity of <strong>Cyber</strong>security: <strong>Cyber</strong>security is a multifaceted field requiring deep knowledge in<br />

areas like network security, encryption, ethical hacking, and threat intelligence. As attacks<br />

become more sophisticated, the need <strong>for</strong> specialized knowledge grows, making<br />

finding individuals with the right expertise harder.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4. Lack of Awareness and Training: Despite the growing need <strong>for</strong> cybersecurity professionals,<br />

there is still a lack of awareness among students and career-changers about the opportunities in<br />

this field. Educational institutions often lack the resources or up-to-date curricula to prepare<br />

individuals <strong>for</strong> the realities of modern cybersecurity work.<br />

A Global Threat to Economic Stability<br />

<strong>The</strong> cybersecurity talent shortage is not just a technical or organizational problem; it is a global economic<br />

threat. <strong>Cyber</strong>attacks have far-reaching financial implications, costing businesses trillions of dollars each<br />

year. <strong>Cyber</strong>crime is expected to cost the world $10.5 trillion annually by 2025, according to a report by<br />

<strong>Cyber</strong>security Ventures. This figure represents a dramatic increase from the $3 trillion lost in 2015 and<br />

underscores the accelerating scale of financial losses driven by cyberattacks.<br />

Industries such as healthcare and financial services are especially vulnerable. In 2023, 58% of healthcare<br />

organizations reported experiencing at least one ransomware attack. <strong>The</strong> average cost of a ransomware<br />

breach in the healthcare sector was nearly $10 million, according to Sophos. As healthcare systems<br />

globally becoming more interconnected and dependent on digital technology, the sector faces immense<br />

risk.<br />

In the financial sector, cybercrime remains a top concern. <strong>The</strong> rise of digital banking has created new<br />

vulnerabilities <strong>for</strong> cybercriminals to exploit. For example, a 2023 World Economic Forum report<br />

emphasized the growing importance of cybersecurity in financial institutions, warning that significant<br />

disruptions in this sector could lead to systemic risk and economic instability.<br />

Beyond individual industries, the global economy as a whole is at risk. As nations become more<br />

interconnected through trade, supply chains, and digital commerce, a cyberattack on one country or<br />

organization can have cascading effects worldwide.<br />

National Security Implications<br />

<strong>The</strong> cybersecurity talent shortage also poses significant risks to national security. Governments<br />

worldwide rely on secure networks and systems to protect their military operations, intelligence agencies,<br />

and critical infrastructure. As cyber warfare becomes an increasingly common tool <strong>for</strong> state actors, the<br />

need <strong>for</strong> skilled cybersecurity professionals within defense departments and national agencies has never<br />

been more urgent.<br />

Countries like the United States, the United Kingdom, and China have all recognized the importance of<br />

bolstering their cybersecurity capabilities. However, they face the same talent shortages as the private<br />

sector. Without the necessary personnel, governments may struggle to defend against cyber espionage,<br />

sabotage, and other <strong>for</strong>ms of cyber warfare.<br />

Moreover, the lines between private and public sector security are increasingly blurred. State-sponsored<br />

cyberattacks often target private companies to steal intellectual property or disrupt critical industries. For<br />

example, the SolarWinds attack, believed to be perpetrated by a <strong>for</strong>eign nation-state, compromised<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


private businesses and government agencies, illustrating the interconnected nature of cybersecurity<br />

threats.<br />

<strong>The</strong> Need <strong>for</strong> a Global Response<br />

Addressing the cybersecurity talent shortage requires a coordinated, global response. No single<br />

organization, country, or industry can solve this issue alone. Instead, collaboration between governments,<br />

educational institutions, private companies, and cybersecurity organizations is essential to building a<br />

skilled and diverse cybersecurity work<strong>for</strong>ce.<br />

1. Educational Initiatives and Training Programs<br />

One of the most effective ways to address the cybersecurity skills gap is to invest in education and<br />

training. Governments and private organizations need to work together to develop comprehensive<br />

training programs that equip individuals with the necessary skills to enter the cybersecurity field. This<br />

includes both university-level programs and shorter, more flexible certification programs that can quickly<br />

upskill individuals.<br />

Moreover, we need to raise awareness about the career opportunities in cybersecurity. Many students<br />

and career changers are unaware of the diverse roles available, from ethical hackers to threat analysts<br />

to security architects. By promoting cybersecurity as a viable and rewarding career path, we can<br />

encourage more people to pursue this field.<br />

2. Diversity and Inclusion<br />

Building a strong cybersecurity work<strong>for</strong>ce also means embracing diversity. Historically, the cybersecurity<br />

industry has struggled with a lack of diversity, which has hindered its ability to attract top talent. Women,<br />

minorities, and other underrepresented groups remain underrepresented in the field, even though their<br />

inclusion is critical to creating innovative solutions to complex problems.<br />

By promoting diversity and inclusion, organizations can not only fill talent gaps but also benefit from<br />

diverse perspectives that enhance their ability to defend against threats. Initiatives focusing on outreach,<br />

mentorship, and support <strong>for</strong> underrepresented groups should be prioritized.<br />

3. Public-Private Partnerships<br />

Collaboration between the public and private sectors is essential <strong>for</strong> addressing the cybersecurity talent<br />

shortage. Governments should work closely with businesses to develop initiatives that incentivize<br />

individuals to enter the field, such as scholarships, grants, and tax incentives <strong>for</strong> companies that invest<br />

in cybersecurity training.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Furthermore, private companies should take a proactive role in cybersecurity education. Internships,<br />

apprenticeships, and mentorship programs can provide students and young professionals with hands-on<br />

experience and exposure to real-world cybersecurity challenges. By offering practical learning<br />

opportunities, businesses can help cultivate the next generation of cybersecurity professionals.<br />

4. Global Collaboration<br />

<strong>Cyber</strong>security is a global challenge that requires a global response. Nations should collaborate on<br />

initiatives that promote cybersecurity education, research, and development. International partnerships<br />

can also help standardize cybersecurity training and certification programs, ensuring that professionals<br />

worldwide have the skills needed to combat global cyber threats.<br />

Organizations such as the United Nations, the European Union, and the World Economic Forum can play<br />

a crucial role in facilitating this collaboration. By working together, countries can share knowledge,<br />

resources, and best practices, strengthening global cybersecurity defenses.<br />

<strong>The</strong> Role of Automation and AI<br />

While addressing the talent shortage is critical, technology can also help alleviate the burden on<br />

cybersecurity teams. Automation and artificial intelligence (AI) have the potential to revolutionize the way<br />

we approach cybersecurity by reducing the need <strong>for</strong> manual intervention in certain tasks.<br />

AI-powered tools can help identify vulnerabilities, detect threats, and respond to incidents in real-time.<br />

By automating routine tasks, cybersecurity professionals can focus on more strategic initiatives and<br />

complex challenges. However, automation is not a substitute <strong>for</strong> human expertise but rather a tool to<br />

augment the capabilities of cybersecurity teams.<br />

An Industry-Wide Call to Action<br />

<strong>The</strong> cybersecurity talent shortage is more than just a work<strong>for</strong>ce issue—it is a global threat that affects<br />

economic stability, national security, and the safety of individuals worldwide. As cyberattacks continue to<br />

grow in frequency and sophistication, the need <strong>for</strong> skilled cybersecurity professionals has never been<br />

more urgent.<br />

Addressing this crisis requires a multifaceted approach that includes education, diversity, public-private<br />

partnerships, and global collaboration. By working together, we can build a cybersecurity work<strong>for</strong>ce<br />

capable of defending against the threats of tomorrow and safeguarding our digital future.<br />

As we look ahead, it is imperative that businesses, governments, and educational institutions prioritize<br />

cybersecurity talent development. <strong>The</strong> security of our economies, our infrastructure, and societies<br />

depends on it.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Dan Vigdor, Co-Founder, Co-CEO, and Executive Chairman,<br />

ThriveDX<br />

Dan Vigdor is a serial entrepreneur with over 30 years of experience<br />

cultivating innovative ideas and developing mission-driven<br />

businesses that disrupt industries. His proven track record<br />

showcases his ability to adapt and succeed in an array of global<br />

business environments. With an unwavering belief in impact<br />

investing and making a difference, Dan has become well-known <strong>for</strong><br />

his ability to turn ambitious ideas into thriving organizations. His<br />

entrepreneurial expertise, coupled with his commitment to making a<br />

difference, lays the foundation <strong>for</strong> continued success.<br />

In his previous ventures, Dan has demonstrated a remarkable ability<br />

to innovate across industries. As the founder of BornFree Holdings,<br />

he revolutionized the baby bottle market by introducing the first fully BPA-free (toxin-free) baby bottle line<br />

in America. BornFree quickly became the preferred choice <strong>for</strong> mothers across the country, leading the<br />

FDA to change the law and ban BPA in all baby bottles in the USA. Vigdor also serves as a board member<br />

<strong>for</strong> Eyesafe.com, a company that has established itself as the best-in-class blue light protection and<br />

management solution <strong>for</strong> the world's leading device manufacturers.<br />

Beyond his professional accomplishments, Dan is a proud father and a long-time Miami resident. He is<br />

deeply committed to making Miami a thriving community and a better place <strong>for</strong> all its residents. This<br />

dedication extends to his involvement in YPO and the Jewish community, where he actively gives back<br />

and emphasizes the importance of philanthropy to his children.<br />

Through ThriveDX, Dan aims to solve the rapidly growing cyber skills gap by reskilling and upskilling<br />

people to meet the demands of the rapidly evolving tech landscape. By providing pathways to stable,<br />

lifelong careers in cybersecurity, ThriveDX is actively combating some of the most pressing issues facing<br />

the nation today – a cybersafe society. Dan's steadfast belief in empowering individuals from underresourced<br />

communities has been a driving <strong>for</strong>ce behind the success of ThriveDX. Recognizing the vast<br />

untapped potential in these communities, Dan has made it his mission to create opportunities <strong>for</strong> people<br />

who may not have otherwise had access to careers in the burgeoning field of cybersecurity. For more<br />

in<strong>for</strong>mation on ThriveDX, visit https://thrivedx.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Deepfakes: <strong>The</strong> <strong>Cyber</strong>security Pandora’s Box<br />

Unveiling the Rising Threat of AI-Manipulated Media in <strong>Cyber</strong>security<br />

By Luke Dash, CEO, ISMS.online<br />

<strong>The</strong> meteoric rise of artificial intelligence (AI) has not only revolutionized industries but also unleashed a<br />

Pandora's box of potential threats. Among the most insidious is the emergence of deepfakes, AIgenerated<br />

synthetic media that can convincingly mimic real people, their voices, and their actions.<br />

From white papers issued by <strong>The</strong> Department of Homeland Security detailing the increasing threat of<br />

deepfakes to false images of Taylor Swift prompting the EU to get real about AI, deepfakes have garnered<br />

significant attention <strong>for</strong> their potential to spread disin<strong>for</strong>mation and manipulate public opinion.<br />

<strong>The</strong> implications of deepfakes to the cybersecurity community cannot be underestimated. Phishing<br />

continues to be the number one attack vector <strong>for</strong> cyber-attacks, showing that despite years of knowledge<br />

and training, most cyber-attacks still take place presenting false in<strong>for</strong>mation to trick a user.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In an era where distinguishing between reality and fabrication is getting harder, deepfakes present a<br />

<strong>for</strong>midable challenge <strong>for</strong> cyber pros who are already wresting with complex roles that are often<br />

underfunded and hyper scrutinized.<br />

<strong>The</strong> Escalating Deepfake Threat<br />

Much like a phishing email a decade ago was easy to spot because of a mis-spelled sender’s name or a<br />

badly photoshopped banking logo, deepfakes used to be crude and easily detectable. Now they have<br />

evolved into sophisticated attacks capable of deceiving even the most discerning eye. This rapid<br />

progression poses a significant challenge, as traditional methods of authentication and verification – even<br />

live video – may no longer suffice.<br />

We don’t need to imagine a scenario where a deepfake video of a company executive authorizes a<br />

fraudulent wire transfer. That happened earlier this year, when a finance worker <strong>for</strong> at UK engineering<br />

firm, Arup, was tricked into transferring $25 million by a video conference request from the organization’s<br />

CFO that turned out to be an AI-manipulated version of existing video.<br />

And, research continues to show that AI-driven deepfake attacks are more common than we know. Third<br />

party research from my own company shows that deepfakes had been experienced by 35% of cyber<br />

pros, making them the second most common cybersecurity indecent encountered by businesses in the<br />

past 12 months. Other reports show that the cost of deepfakes will grow from $12.3 billion in 2023 to<br />

$40 billion in 2027.<br />

Deepfakes and the <strong>Cyber</strong>security Landscape<br />

<strong>Cyber</strong>security is a constantly changing landscape that wears down even the most committed and<br />

passionate practitioners. <strong>The</strong> introduction of deepfakes risks enhances the burnout these professionals<br />

feel as these threats truly blur the lines between reality and deception. While we long ago learned that<br />

trust is not a generally accepted term in the cybersecurity business, even employing a zero-trust policy<br />

is a challenge in a deepfake world. Consider the challenges these attacks pose <strong>for</strong> our cyber teams:<br />

• Circumventing Security Protocols: Deepfakes can be leveraged to bypass security measures<br />

that rely on biometric authentication, such as facial or voice recognition. This could enable<br />

unauthorized access to sensitive systems and data, potentially leading to devastating breaches.<br />

• Sophisticated Social Engineering: As the Arup example above shows us, deepfakes can be<br />

used to create highly convincing phishing scams or impersonate trusted individuals, manipulating<br />

victims into taking actions that compromise security. <strong>The</strong> realism of deepfakes makes these<br />

attacks particularly insidious and difficult to detect.<br />

• Weaponizing Disin<strong>for</strong>mation: Deepfakes can be used to spread false in<strong>for</strong>mation, sow discord,<br />

and manipulate public opinion, potentially leading to social unrest, political instability, or even<br />

impacting the outcomes of elections. In a global environment that is already highly heated, adding<br />

unwanted fuel to the fire is entirely unwanted.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Reputational Warfare: Deepfakes can be used to tarnish reputations, undermine trust, and<br />

cause significant harm to individuals and organizations. <strong>The</strong> potential <strong>for</strong> deepfakes to be used in<br />

smear campaigns, to ward buyers off a competitive brand, or to discredit individuals is a serious<br />

concern.<br />

Building a Robust <strong>Defense</strong><br />

Deepfakes are a serious problem, but hope is not lost, and we are able to take steps to effectively combat<br />

them.<br />

As is always the case when working to thwart cyber risks of any kind, security practitioners must adopt a<br />

proactive and multi-layered defense strategy. Employees can only recognize what they are aware of, so<br />

raising awareness about deepfakes, and putting plans in place to report suspicious activity is paramount.<br />

Since deepfakes are so similar in nature to phishing campaigns and social engineering programs, take<br />

steps to ensure your security awareness training programs include content about deepfakes.<br />

Additionally, organizations should implement multi-factor authentication and other robust verification<br />

processes that go beyond simple biometric checks. This could include behavioral biometrics such as a<br />

signature or handwriting sample, knowledge-based authentication that asks questions like “who was your<br />

third-grade teacher,” or even the use of hardware tokens. Investing in advanced detection technologies<br />

that can help identify deepfakes based on subtle inconsistencies or artifacts is an important consideration.<br />

Machine learning algorithms, as well, can be trained to recognize patterns and anomalies that distinguish<br />

deepfakes from genuine media.<br />

Collaboration between industry partners, researchers, and government agencies is critical to developing<br />

effective countermeasures and staying ahead of the evolving threat. Both state and federal government<br />

agencies are working to put governance in place around AI to help prevent usage like deepfakes, but the<br />

U.S. is not yet at a place to give clear instruction on how AI should be built or used. Because of this,<br />

enterprises can help themselves by working with existing standards like ISO 27001 <strong>for</strong> in<strong>for</strong>mation<br />

security and ISO 42000 <strong>for</strong> responsible AI usage.<br />

<strong>The</strong> Unending Battle<br />

<strong>The</strong> deepfake threat is not a passing fad; much like ransomware, it is an ongoing challenge that will<br />

continue to morph and will require constant vigilance and adaptation. <strong>Cyber</strong>security professionals must<br />

remain proactive in their defense strategies, continually updating their knowledge and tools to keep pace<br />

with the rapid advancements in deepfake technology.<br />

By raising awareness, strengthening authentication, investing in advanced detection, fostering<br />

collaboration, and considering legislative measures, we can mitigate the risks posed by deepfakes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Luke Dash is the CEO of ISMS.online. Prior to this, they were the Chief<br />

Operating Officer and Chief Revenue Officer at ISMS.online, overseeing<br />

operational leadership, support, and driving revenue channels.<br />

Be<strong>for</strong>e joining ISMS.online, Luke was the Sales Director at Lead<br />

Forensics, where they integrated with major CRM plat<strong>for</strong>ms and<br />

maximized ROI on sales and marketing ef<strong>for</strong>ts. Luke also worked as the<br />

Chief Commercial Officer at <strong>The</strong> Indigo Group, providing end-to-end<br />

solutions <strong>for</strong> contractors, freelancers, and agencies. Luke's experience<br />

also includes their role as a Sales Director at Ascential, where they were<br />

responsible <strong>for</strong> providing construction project sales leads and industry data.<br />

Luke began their career at IQPC, where they served as a Divisional Sales Director and Sponsorship<br />

Manager, driving sales growth and managing events and conferences <strong>for</strong> global corporations.<br />

Throughout their career, Luke has demonstrated strong leadership skills and a focus on achieving<br />

strategic and per<strong>for</strong>mance goals in various industries. Luke can be reached on LinkedIn and at our<br />

company website https://www.isms.online/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Geopolitical <strong>Cyber</strong> Threats in <strong>2024</strong>: Navigating Emerging Risks<br />

with OSINT (Open-Source Intelligence)<br />

By Andy Grayland, CISO, Silobreaker<br />

Geopolitical tensions worldwide can have a <strong>for</strong>eseeable impact on an organisation’s physical operations,<br />

but they can also heighten the risk of cyberattacks. <strong>The</strong>se cyber threats are often linked to or triggered<br />

by events such as armed conflicts, elections and the agendas of nation-states. Malicious actors excel at<br />

exploiting these geopolitical events to advance their objectives.<br />

For example, the ongoing conflict in Ukraine has precipitated a spike in cyberattacks, targeting Ukrainian<br />

and Russian entities alongside their supporters. Similarly, the current US presidential race is likely to see<br />

an uptick in cyberattacks aimed at political campaigns and government agencies. Even remote conflicts<br />

can disrupt supply chains, critical infrastructure and digital services. In this context, open-source<br />

intelligence (OSINT) is proving to be a vital tool, providing essential insights <strong>for</strong> comprehending and<br />

mitigating both cyber threats and geopolitical risks.<br />

Organisations can significantly improve their situational awareness by monitoring real-time OSINT, which<br />

enables them to better comprehend the intricacies of modern cyber conflict and devise proactive defence<br />

strategies. This enhanced understanding bolsters operational resilience and response planning.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


However, to maximise the potential of OSINT, it is crucial to first establish baseline scenarios <strong>for</strong> major<br />

geopolitical risks. Baseline scenarios outline the expected risks within a particular region, based on<br />

existing intelligence and historical trends. This article will explore these scenarios in key geopolitical<br />

hotspots, including China-related conflicts and the Ukraine war.<br />

Chinese <strong>Cyber</strong> Operations<br />

Baseline risks<br />

China continues to be a dominant <strong>for</strong>ce in the realm of cyber espionage, with its operations primarily<br />

targeting Western businesses and government institutions to gather intelligence and steal intellectual<br />

property. <strong>The</strong>se activities necessitate a re-evaluation of business partnerships and security postures to<br />

mitigate risks.<br />

Potential risks<br />

Several key scenarios involving China are particularly noteworthy:<br />

• Adoption of hybrid warfare approach: Financially motivated cyber-attacks targeting US allies<br />

in the Asia-Pacific region could increase if China adopts a hybrid warfare strategy like Russia’s.<br />

This strategy would blend traditional military tactics with probing cyber attacks aimed at critical<br />

infrastructure and in<strong>for</strong>mation systems as well as economic warfare through financially motivated<br />

cyberattacks to achieve strategic objectives without direct confrontation.<br />

• US-Taiwan defence agreement: Any <strong>for</strong>malised defence agreement between the US and<br />

Taiwan could lead to China launching disruptive cyber campaigns against Taiwanese targets in<br />

retaliation. <strong>The</strong>se campaigns could involve the use of data wiper malware and data encryption<br />

malware, significantly impacting Taiwanese businesses and critical services.<br />

• Taiwanese elections: <strong>The</strong> election of a pro-sovereignty government in Taiwan could provoke<br />

China to intensify its disin<strong>for</strong>mation campaigns and hacktivist activities. Such ef<strong>for</strong>ts would aim to<br />

undermine the new government and destabilise the region, impacting US and Taiwanese<br />

businesses. Potential attacks could range from website defacements and Distributed Denial of<br />

Service (DDoS) attacks.<br />

Russia and Ukraine Risks: Complex <strong>Cyber</strong> Warfare<br />

Baseline risks<br />

<strong>Cyber</strong>attacks are a cornerstone of Russia’s military strategy against Ukraine. Russia is employing a<br />

variety of tactics including disin<strong>for</strong>mation, cyber espionage and disruptive attacks. One example is the<br />

use of the UAC-0184 remote access trojan to target Ukrainian companies in Finland. <strong>The</strong>se cyber<br />

operations are largely aimed at gathering intelligence on Western support <strong>for</strong> Ukraine and understanding<br />

sanctions policies.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Despite the low probability of a catastrophic attack on critical infrastructure in the west, Russian cyber<br />

actors are still probing Western critical infrastructure <strong>for</strong> vulnerabilities.<br />

Potential risks<br />

However, several alternative scenarios could alter the threat landscape:<br />

• Substantial Russian losses in Ukraine: If Russia faces significant losses in the conflict, it might<br />

intensify cyberattacks, potentially disguising them as actions by cybercriminals or hacktivist<br />

groups. <strong>The</strong>se attacks could target critical infrastructure and financial systems to destabilise the<br />

West. Russian threat actors may also adopt a more aggressive cyber strategy, including the<br />

development and deployment of destructive data wiper malware.<br />

• Conflict with NATO: <strong>The</strong> looming threat of a NATO-Russia war could lead to intensified Russian<br />

cyber operations against Western nations. Increasingly disruptive cyberattacks could prompt<br />

cyber insurers, following Lloyds' example from 2023, to introduce state-sponsored cyber<br />

exclusion policies, negating coverage <strong>for</strong> attacks attributed to governments. If faced with<br />

increasing challenges in its military operations, Russia could turn to more aggressive cyber<br />

tactics. This might include the use of self-replicating data malware strains that can spread rapidly<br />

through networks to disrupt and damage systems, causing widespread chaos and economic loss.<br />

Russia could further extend the impact of their cyberattacks by targeting supply chains.<br />

• Reduction in hostilities: A decrease in hostilities between Ukraine and Russia might shift<br />

Russia’s cyber focus towards financially motivated attacks and ef<strong>for</strong>ts to cause reputational<br />

damage through in<strong>for</strong>mation operations.<br />

Leveraging OSINT <strong>for</strong> Enhanced <strong>Cyber</strong> Defence<br />

When it comes to anticipating potential threats arising from geopolitical events, real-time OSINT is<br />

indispensable. And while the sheer volume of open-source data can be overwhelming, advanced tools<br />

and AI are trans<strong>for</strong>ming how organisations can harness OSINT to dynamically evaluate both standard<br />

and alternative risk scenarios.<br />

By automating data collection, analysis, and dissemination, threat intelligence plat<strong>for</strong>ms can empower<br />

businesses to swiftly identify risks, understand threat actors, and make in<strong>for</strong>med decisions. <strong>The</strong>se tools<br />

make it possible to extract valuable insights from OSINT, identifying emerging threats and the actors<br />

involved.<br />

Armed with real-time intelligence, organisations can spot risks early and make in<strong>for</strong>med decisions to<br />

manage threats. This proactive approach is essential <strong>for</strong> navigating the cyber risks posed by an everevolving<br />

geopolitical landscape.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Andy Grayland, CISO, Silobreaker. Andy has over 12 years of in<strong>for</strong>mation<br />

security experience. A dedicated digital trans<strong>for</strong>mation strategist and security<br />

consultant, Andy specialises in developing and implementing effective<br />

in<strong>for</strong>mation security programmes with a focus on aligning them to business<br />

objectives. Prior to Silobreaker, Andy was CISO at the Scottish Local<br />

Government’s Digital Office. He holds a PhD in Computer Science from the<br />

University of St. Andrews, and a PGC in <strong>Cyber</strong> Defence and In<strong>for</strong>mation<br />

Assurance from Cranfield University.<br />

Andy can be reached at our company website https://www.silobreaker.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Threat of Privilege Abuse in Active Directory<br />

Lessons From the Change Healthcare Breach<br />

By Francois Amigorena, CEO & Founder, IS Decisions<br />

In early <strong>2024</strong>, the BlackCat ransomware attack against Change Healthcare caused massive disruption<br />

across the U.S. healthcare sector. It later emerged that the cause of this major national incident was<br />

traced back to compromised credentials used to remotely access a Change Healthcare Citrix portal.<br />

Access to the portal wasn’t secured with multi-factor authentication (MFA).<br />

Using this access, the attackers moved laterally within Change Healthcare’s systems to exfiltrate data<br />

and, eventually, deploy ransomware — with consequences that continue to impact millions of Americans.<br />

<strong>The</strong> incident is one of many recent attacks highlighting Active Directory vulnerabilities, underlining why<br />

managing the threat of privilege abuse in Windows Active Directory (AD) is essential to securing today’s<br />

networks.<br />

Without the right protections, attackers can compromise any standard user account in AD and elevate<br />

privileges to gain far more powerful and dangerous access.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


On-Premise Active Directory Security Vulnerabilities<br />

For adversaries, no target has more value than Windows Active Directory, the foundation of most<br />

organization’s identity and access management systems. Although the Change Healthcare breach is a<br />

well-known incident, it’s hardly the only example. Numerous other cyberattacks have exploited similar<br />

weaknesses in AD.<br />

Un<strong>for</strong>tunately, one reason <strong>for</strong> AD security vulnerabilities is that the size and complexity of the plat<strong>for</strong>m<br />

mean that many aspects of securing AD are not straight<strong>for</strong>ward. This is especially true <strong>for</strong> on-premise<br />

AD accounts, where organizations must assemble security on their own.<br />

Attackers try to compromise non-privileged AD accounts to get inside the network. Once they’re in, they<br />

can open Pandora’s box of tools and techniques to further manipulate AD from within. As the Change<br />

Healthcare example underlines, the most exposed part of this is through user accounts and credentials.<br />

This issue of credential and user compromise is central to AD security. This makes the way accounts are<br />

managed, monitored, and secured a fundamental part of defending AD.<br />

Good AD defense isn’t only about stopping attackers at the initial access point. It’s also about making it<br />

difficult to move laterally inside the network if they do get in.<br />

Exploiting and Elevating Privileges in Active Directory<br />

<strong>The</strong> idea of privileges in AD is easy to misunderstand. Normally, we think of privileged access as relating<br />

exclusively to special accounts such as those operated by admins that confer system-level powers.<br />

Actually, AD has an array of privileged user accounts. Each has slightly different access rights, including<br />

enterprise admins, domain admins, schema admins, group policy admins, backup admins, account<br />

admins, and application service accounts. In some cases, an administrative account might per<strong>for</strong>m more<br />

than one of these roles.<br />

Why have so many admin types? <strong>The</strong> answer is that, as with network management in general, good AD<br />

administration is based on the principle of least privilege security. Every account should only have the<br />

privileges needed to do the job assigned to it. This is especially important where those privileges confer<br />

admin-level powers.<br />

This raises the important fact that all accounts in AD — including the humblest user accounts — have<br />

some privileges. In AD, even the most basic privilege is a privilege that poses a risk and there<strong>for</strong>e needs<br />

to be controlled.<br />

<strong>The</strong> soft underbelly of AD is the ability of an attacker to elevate privileges. Attackers routinely compromise<br />

an ordinary Active Directory user account and elevate its privileges to reach more sensitive areas of the<br />

network. This reminds us not to underestimate the importance of securing all AD accounts.<br />

How do attackers elevate privileges? Numerous techniques exist, including exploiting software<br />

vulnerabilities or internal misconfigurations and hijacking internal AD processes. But today’s attackers<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


just as often use network tools to identify and target privileged account credentials. <strong>The</strong> attackers then<br />

assume the privileges of these accounts to expand their access.<br />

How to Stop Privilege Abuse and Secure Active Directory Access<br />

Securing AD requires multiple layers of security, including defending against phishing attempts, en<strong>for</strong>cing<br />

strong passwords, and securing all accounts using MFA.<br />

It’s key to monitor and audit privileged account access and admin actions and to set up alerts if an admin<br />

account modifies policies. This protects against external attacks and insider threats alike.<br />

However, because AD management is never one-size-fits-all — even <strong>for</strong> privileged users —admins must<br />

be able to apply policies granularly so that this type of account can be permitted either to “read” or view<br />

group properties or members without changing them, or to “write” and modify them.<br />

Apply MFA on User Account Control (UAC) Prompts<br />

By default, UAC (user account control) prompts at the admin level require only a password. Adding MFA<br />

to this hugely reduces the vulnerability of the attack surface and packs a strong punch in the fight against<br />

privilege abuse and AD compromise. If you can set up alerts on UAC prompts, you’ll also more quickly<br />

detect threat actors trying to move through the network.<br />

Defending Active Directory Does Not Stop at the Logon<br />

Defending AD isn’t easy. It’s a large and complex plat<strong>for</strong>m that assumes organizations will assemble<br />

additional layers of security. To succeed, defenders must address wide-ranging threats including<br />

credential compromise, lateral movement, privilege abuse, insider threats, and more.<br />

Critically, defenders must stop onboarding solutions solely to check off compliance and cyber insurance<br />

requirements. <strong>The</strong>y also must ensure their solutions offer the security necessary to prevent the above<br />

threats. Some solutions check boxes, others offer effective security that also happens to check boxes —<br />

the latter are harder to find.<br />

What’s the takeaway here? Even if you’ve implemented MFA to secure the logon, ensure you can control<br />

and monitor what happens once a user gains access.<br />

Organizations don’t dedicate as much ef<strong>for</strong>t to defending internal actions inside AD as they do initial<br />

access. Real-world cyberattacks tell us this is a mistake. What happens after an attacker gains access<br />

is just as important as the initial compromise.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

François Amigorena is the founder and CEO of IS Decisions, a global<br />

software company specializing in access management and MFA <strong>for</strong><br />

Microsoft Windows and Active Directory environments. After a career at IBM<br />

and a subsidiary of la Société Générale, Francois became an entrepreneur<br />

in 1989 and has never looked back. François can be reached online at X -<br />

@FrenchCEO and at https://www.isdecisions.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Customer Authentication Challenges That Impact Your<br />

Organization's Security Posture<br />

By Jim Verducci, CEO, Wristband<br />

Introduction<br />

In today's cybersecurity landscape, CISOs face the challenge of securing data while managing costs<br />

effectively. As cyber threats become more sophisticated, traditional user authentication methods often<br />

prove inadequate or prohibitively expensive, particularly <strong>for</strong> smaller businesses. Understanding the<br />

difference between internal employee authentication and CIAM (Customer Identity and Access<br />

Management) is crucial in this context. While internal IAM secures an organization's work<strong>for</strong>ce, CIAM<br />

focuses on securing customer interactions. CISOs must ensure that their organization’s products<br />

maintain a strong security posture, protecting both internal systems and customer data. At the same time,<br />

they must balance the budget to implement cost-effective security solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Critical Role of Customer-Facing Authentication<br />

CIAM is crucial <strong>for</strong> managing authentication of external users — such as customers and partners — who<br />

interact with a company's digital plat<strong>for</strong>ms. Unlike internal IAM, which deals with employees, CIAM must<br />

cater to a broad spectrum of customer needs, scale efficiently, and meet stringent security standards.<br />

For CISOs, it’s vital to integrate internal security practices with CIAM strategies, as strong user<br />

authentication is the first line of defense against breaches. With the increasing costs of breaches and<br />

regulatory pressures, adopting secure and scalable CIAM solutions that ensure strict data isolation<br />

between customers is crucial to safeguarding both external interactions and internal systems.<br />

<strong>The</strong> Regulatory Landscape<br />

As regulatory requirements tighten, CISOs must prioritize robust authentication to meet compliance<br />

standards. Regulations such as GDPR and CCPA emphasize the need to secure customer identities and<br />

protect personal data, making strong authentication not just a security measure but a legal obligation.<br />

This shift poses significant challenges <strong>for</strong> smaller businesses, which are now held to the same rigorous<br />

compliance standards as larger organizations. <strong>The</strong> expanding regulatory landscape requires businesses<br />

to implement robust CIAM solutions in order to safeguard customer data and mitigate risks of penalties<br />

and reputational damage. <strong>The</strong>re<strong>for</strong>e, investing in scalable CIAM solutions that ensure both security and<br />

compliance is crucial <strong>for</strong> adhering to evolving regulatory standards.<br />

<strong>The</strong> Role of CISOs in CIAM Tool Selection<br />

CISOs play a pivotal role in shaping their organization's CIAM strategy. Although they might not make<br />

the final purchase decisions, their influence is crucial throughout the selection and implementation<br />

process. CISOs must collaborate closely with developers during the proof-of-concept phase to ensure<br />

the CIAM tool aligns with the company's security posture and integrates smoothly with existing systems.<br />

This partnership is key to addressing two major challenges: the cost of CIAM solutions and the technical<br />

complexities of achieving robust data isolation in multi-tenant environments.<br />

Addressing the Cost Barrier: <strong>The</strong> SSO Tax<br />

One of the critical considerations in CIAM tool selection is the cost, particularly the high price associated<br />

with essential features like Single Sign-On (SSO), often referred to as the "SSO tax." This premium<br />

pricing can be a significant barrier <strong>for</strong> many organizations, especially smaller businesses (SMBs) and<br />

startups, which might lack the budget <strong>for</strong> expensive authentication solutions <strong>for</strong> their customers.<br />

Furthermore, when high costs limit access to robust authentication solutions, organizations could be<br />

<strong>for</strong>ced to opt <strong>for</strong> less secure or inadequate options. This compromises their security, increasing<br />

vulnerability to breaches and elevating the risk of incurring regulatory fines.<br />

<strong>The</strong> <strong>Cyber</strong>security and Infrastructure Security Agency (CISA) has underscored the gravity of this issue<br />

in recent reports, stating that "Consumers should not need to pay premium pricing, hidden surcharges,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


or additional fees <strong>for</strong> basic security hygiene." This sentiment highlights the pressing need <strong>for</strong> CIAM<br />

solutions that provide necessary security features without excessive costs.<br />

To address these challenges, organizations should seek CIAM solutions that balance af<strong>for</strong>dability with<br />

robust security features. By selecting plat<strong>for</strong>ms that provide essential capabilities, such as MFA and SSO,<br />

at a reasonable cost, businesses can ensure that secure and scalable CIAM tools are accessible to<br />

organizations of all sizes.<br />

Addressing the Technical Barrier: <strong>The</strong> Data Isolation and Developer Support Gap<br />

Data isolation is key to reducing breach risks, as it prevents unauthorized access to sensitive in<strong>for</strong>mation<br />

across different customer environments. Achieving this level of security is particularly challenging when<br />

dealing with multiple customers or partners on shared systems.<br />

Multi-tenancy, a core feature of modern SaaS architectures, supports this need by allowing multiple<br />

organizations to share a single software instance while keeping their data strictly separated. However,<br />

implementing secure multi-tenancy can be complex, especially when many traditional authentication<br />

systems are not designed <strong>for</strong> this architecture. Even with a premium CIAM tool, complex integration can<br />

lead to high opportunity costs, as developers may spend excessive time troubleshooting issues instead<br />

of focusing on essential projects.<br />

Additionally, if a CIAM tool lacks intuitive design, comprehensive documentation, or adequate support,<br />

developers could inadvertently introduce vulnerabilities or misconfigurations, compromising security.<br />

Poor integration can also result in suboptimal user experiences, damaging the brand’s reputation.<br />

Selecting a CIAM tool that integrates seamlessly with existing security infrastructure and ensures strict<br />

data isolation is essential. Additionally, the plat<strong>for</strong>m should be intuitive and come with comprehensive<br />

documentation and support to prevent misconfigurations that could introduce vulnerabilities.<br />

Key Features of an Effective CIAM Solution<br />

Given the financial and technical challenges of CIAM solutions, it's crucial to focus on key features that<br />

address security and scalability needs. Prioritizing critical aspects like support <strong>for</strong> industry standards —<br />

such as OAuth 2.0, OpenID Connect, and JWT— can ensure your plat<strong>for</strong>m meets complex requirements<br />

while providing a robust foundation <strong>for</strong> secure data isolation in CIAM implementations.<br />

1. Comprehensive Support <strong>for</strong> User and Machine Authentication: Modern security strategies<br />

demand a solution that supports both user and machine authentication, essential <strong>for</strong> upholding a<br />

Zero Trust model. Machine authentication is particularly vital in environments utilizing<br />

microservices, where automated processes require secure identity verification. En<strong>for</strong>cing strict<br />

authentication protocols across both users and machines ensures that all access is validated,<br />

significantly reducing the risk of unauthorized entry and rein<strong>for</strong>cing Zero Trust principles.<br />

2. Enterprise Security Features: To safeguard against unauthorized access, a robust<br />

authentication plat<strong>for</strong>m should include enterprise-level security capabilities such as Multi-Factor<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Authentication (MFA) and Single Sign-On (SSO). <strong>The</strong>se features not only ensure that sensitive<br />

customer data is accessible only to legitimate users, reducing the likelihood of breaches, but also<br />

address password sprawl by enabling users to access multiple services with a single set of<br />

credentials.<br />

3. Multi-Tenant Architecture: A well-structured multi-tenant system <strong>for</strong>tifies overall security,<br />

minimizes breach risks, and provides a scalable foundation <strong>for</strong> future expansion. It is essential to<br />

employ a CIAM solution with a native multi-tenant architecture that prevents cross-tenant access<br />

and ensures compliance with data protection regulations. Each tenant should have the capability<br />

to easily configure their customers' identity providers, allowing <strong>for</strong> tailored authentication flows<br />

that meet specific security and compliance needs.<br />

4. Cross-Tenant Management: A modern solution should offer cross-tenant management features<br />

such as provisioning dedicated admin and account representative tenants. <strong>The</strong>se specialized<br />

tenants allow <strong>for</strong> efficient management of customer accounts without switching contexts,<br />

preventing tracking and accountability issues that can arise from classic user impersonation. This<br />

approach provides a secure, dedicated space <strong>for</strong> administrative tasks, ensuring clear visibility,<br />

traceability, and strong compliance.<br />

5. Signing Key Granularity: A critical aspect of securing access tokens in authentication and<br />

authorization is the management of signing keys. Having a system where each application within<br />

a customer’s environment has its own unique signing keys enhances security by ensuring that a<br />

breach in one application doesn’t compromise others or affect other customers. This level of<br />

granularity limits the potential impact of a security incident, thereby reducing the blast radius and<br />

improving overall containment.<br />

6. Fine-Grained Access Control: To align with the Principle of Least Privilege, a robust access<br />

control system is essential. A key component of effective access control is Role-Based Access<br />

Control (RBAC), which is a staple <strong>for</strong> providing granular control over user permissions. By defining<br />

specific roles and access levels <strong>for</strong> each tenant, organizations can tailor permissions to match<br />

their needs. This targeted approach ensures users access only the resources necessary <strong>for</strong> their<br />

roles, thereby minimizing the risk of unauthorized access and potential security breaches.<br />

7. Role Mapping <strong>for</strong> Consistent Access Control: Building on access control, role mapping<br />

elevates secure user management by aligning roles from a customer’s identity provider with<br />

custom roles in your application. This synchronization ensures consistent and appropriate access<br />

across all customer-facing applications, simplifying user lifecycle management. When<br />

organizational roles change, access levels can be swiftly updated within the application,<br />

enhancing responsiveness. Role mapping also strengthens audit capabilities and centralizes<br />

control, rein<strong>for</strong>cing security and compliance throughout the organization.<br />

8. Cost-Effective Scalability: As an organization grows, its authentication solution should scale<br />

efficiently to accommodate increasing demands without escalating costs. Look <strong>for</strong> solutions with<br />

transparent pricing structures that align with your growth trajectory and support a growing user<br />

base while maintaining optimal per<strong>for</strong>mance. Effective scalability ensures that you can expand<br />

your user base and adapt to changing needs without compromising on security or per<strong>for</strong>mance,<br />

making it a key element <strong>for</strong> sustainable, long-term success.<br />

9. API-First Flexibility and Developer Control: An API-first solution empowers development<br />

teams to customize authentication processes, meeting diverse customer needs with flexibility and<br />

control. This approach enables seamless integration into existing workflows, ensuring a secure<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and consistent user experience across plat<strong>for</strong>ms. By prioritizing an API-first architecture,<br />

organizations can maintain robust security while adapting to unique business requirements,<br />

enhancing both efficiency and security.<br />

Conclusion<br />

In today’s rapidly evolving cybersecurity landscape, CISOs are tasked with the critical challenge of<br />

balancing robust security measures with cost-effectiveness. Collaborating closely with development<br />

teams is vital in selecting a CIAM solution that not only secures customer interactions but also scales<br />

linearly with organizational growth. As new CIAM solutions emerge, avoiding the "SSO tax" — where<br />

essential features like Single Sign-On come with inflated costs — can significantly impact an<br />

organization’s security posture. By choosing cost-effective, scalable solutions that provide robust features<br />

such as multi-tenancy, signing key granularity, and fine-grained access control, CISOs can ensure<br />

stronger data protection, enhanced regulatory compliance, and better preparedness <strong>for</strong> future growth.<br />

This strategic approach not only <strong>for</strong>tifies security but also maintains resilience in a competitive market,<br />

proving that af<strong>for</strong>dability and advanced capabilities can go hand in hand.<br />

About the Author<br />

Jim Verducci is the Co-Founder and CEO of Wristband. He has 17 years of<br />

experience in tech consulting, cloud-based systems, microservices, and<br />

APIs. He has experience collaborating with engineering teams and business<br />

stakeholders at mid to late stage B2B startups, focusing on designing and<br />

scaling distributed software architectures. His background in authentication<br />

and identity management has shaped his focus on addressing the<br />

complexities and costs of auth solutions. When not immersed in tech, Jim<br />

enjoys spending time with his wife and their two active young boys.<br />

Jim can be reached online at https://www.linkedin.com/in/jim-verducci/ and at our company website<br />

https://www.wristband.dev/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Embracing the AI Revolution: How to Incorporate Generative AI<br />

into Your SOC 2 Compliance Plan<br />

By Juliana Spof<strong>for</strong>d, General Counsel and Chief Privacy Officer, Aidentified<br />

Generative AI (Gen AI) has emerged as a trans<strong>for</strong>mative <strong>for</strong>ce. From streamlining operations to<br />

enhancing customer experiences, AI-powered solutions offer unprecedented opportunities <strong>for</strong><br />

businesses of all sizes. However, these advancements also introduce new challenges—especially when<br />

it comes to cybersecurity. As companies embrace Gen AI, staying compliant with industry standards like<br />

SOC 2 is more critical than ever. In fact, Gen AI products are making it increasingly difficult to maintain<br />

a secure environment, which could significantly impact your business. This article explores how to<br />

integrate Gen AI into your SOC 2 compliance strategy, ensuring you stay ahead of the curve while<br />

mitigating risks.<br />

<strong>The</strong> New Frontier of <strong>Cyber</strong>security Challenges<br />

As Gen AI-driven products flood the market, they offer countless benefits but also expose companies to<br />

heightened security vulnerabilities. Gen AI solutions, while innovative, are often not fully mature when it<br />

comes to cybersecurity. <strong>The</strong>se tools can unintentionally introduce security and privacy risks—such as<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


unauthorized data use with respect to input and output data, security vulnerabilities and other compliance<br />

failures—that can compromise the security of your organization.<br />

If Gen AI hasn't yet played a role in your SOC 2 compliance review, it's time to start integrating Gen AI<br />

products and services into your plan. Failing to address Gen AI's impact could put your company's data<br />

security and reputation at risk.<br />

Incorporating Generative AI into Your SOC 2 Compliance Plan<br />

Here are actionable steps to incorporate Gen AI into your SOC 2 plan:<br />

Develop a Gen AI-Specific Use Policy: As with any new technology, your first step should be to establish<br />

a Gen AI usage policy. This policy should clearly outline how Gen AI products and services will be used<br />

within your company (with prohibited and accepted use cases), the risks associated with it, and the<br />

controls in place to mitigate those risks. Implementing periodic Gen AI use training programs are also a<br />

must to raise employee awareness.<br />

Conduct Written AI Risk Assessments: Gen AI brings both known and un<strong>for</strong>eseen risks. A thorough,<br />

documented risk impact assessment should be conducted, focusing on areas like what data is being<br />

ingested by the Gen AI engine, whether the output is being monitored, whether use of Gen AI is creating<br />

data privacy or IP issues, and an in-depth review of the Gen AI system’s security integrity. This<br />

assessment will serve as the foundation <strong>for</strong> your Gen AI security controls and must be updated regularly<br />

as Gen AI technologies evolve.<br />

Prepare <strong>for</strong> Gen AI Scrutiny in Audits: SOC 2 auditors are becoming increasingly focused on how<br />

companies manage new technologies, especially Gen AI. What might have been acceptable last year<br />

may no longer suffice as your company matures. For example, certain departments within your company<br />

may be using software with Gen AI capabilities that could be processing customer data or other<br />

confidential or sensitive data, so make sure you have reviewed all aspects of possible Gen AI use in your<br />

company. Auditors are expecting a more robust, in-depth review of all Gen AI-powered functionality within<br />

your company’s systems. <strong>The</strong>se expectations will only intensify with Gen AI's growing role in business<br />

processes.<br />

Planning <strong>for</strong> the Future<br />

When your company undergoes its next SOC 2 audit, auditors will likely hold you accountable <strong>for</strong> how<br />

you incorporate Gen AI into your compliance framework. <strong>The</strong>y'll make recommendations <strong>for</strong><br />

improvements, which will serve as a roadmap <strong>for</strong> what needs to be accomplished in the coming year.<br />

For instance, your auditors may flag issues such as gaps in your Gen AI risk assessments or insufficient<br />

controls over Gen AI-powered processes. Rather than viewing these findings as setbacks, consider them<br />

opportunities to strengthen your security posture and stay compliant.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


For small and emerging businesses, staying compliant with SOC 2 while adopting Gen AI-driven solutions<br />

may seem daunting. Having navigated the process to earn SOC 2 attestation at Aidentified, we have<br />

learned that it is important to involve your SOC 2 auditor early in your Gen AI onboarding process to get<br />

their input prospectively on Gen AI technology implementations. With a proactive approach and a<br />

commitment to continually improving your security practices, you can successfully navigate the<br />

complexities of Gen AI while keeping your company secure and your SOC 2 process updated.<br />

About the Author<br />

Juliana Spof<strong>for</strong>d has over 30 years of experience providing legal advice to<br />

data services and in<strong>for</strong>mation technology companies, such as NetProspex,<br />

Inc. (sold to Dun & Bradstreet) and Generate, Inc. (sold to Dow Jones). Prior<br />

to joining Aidentified, Juliana was the global Chief Privacy Officer at Dun &<br />

Bradstreet where she was responsible <strong>for</strong> their global privacy compliance<br />

program. Juliana can be reached at https://www.aidentified.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Awareness Month <strong>2024</strong>: Insights from Industry<br />

Experts<br />

<strong>Cyber</strong>security Awareness Month is observed every October to bring attention to the emerging threats we<br />

face online. To highlight the importance of maintaining awareness and proactivity to reduce cyber risks,<br />

we’ve compiled insights from leading industry experts on the latest trends, best practices, and<br />

recommendations <strong>for</strong> successfully navigating the evolving cybersecurity landscape.<br />

Jose Seara, CEO and Founder, DeNexus:<br />

Many companies know they are targets (nobody is immune to cyber attacks), but they rarely know<br />

whether they spend enough on cybersecurity and whether their protection ef<strong>for</strong>ts are targeted to the right<br />

places.<br />

This year’s theme <strong>for</strong> <strong>Cyber</strong> Awareness Month, “Secure Our World," highlights the need <strong>for</strong> increased<br />

cyber protection in all aspects of our personal and professional digital lives, including industrial systems—<br />

the connected equipment and systems that control factory floors in manufacturing, the buildings hosting<br />

data centers, power generation sites, electricity distribution networks, or even the tarmacs and boarding<br />

areas in airports.<br />

Given the gap in cybersecurity resources and the flattening of cybersecurity budgets, cybersecurity<br />

leaders need to take a step back and assess where to allocate scarce resources and limited budgets to<br />

achieve the greatest return on investment, which, <strong>for</strong> cybersecurity, is to reduce the probability of material<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


cyber incidents. This starts by identifying and measuring cyber risks in financial terms, the probability and<br />

severity of potential cyber incidents due to weaknesses in cyber defenses.<br />

Boaz Gorodissky, Chief Technology Officer, XM <strong>Cyber</strong>:<br />

<strong>Cyber</strong>security Awareness Month serves as a reminder to organizations that protecting critical assets<br />

requires a much more comprehensive approach to exposure management. Organizations typically have<br />

around 15,000 exposures scattered across their environments that skilled attackers could potentially<br />

exploit, and yet, CVE-based vulnerabilities account <strong>for</strong> just a small percentage of this massive exposure<br />

landscape. Even when looking only at exposures affecting their most critical assets, CVEs represent only<br />

a small part of the risk profile. While organizations are focused on patch management and vulnerability<br />

management to address CVEs, the maturity to mobilize teams and remediate issues such as<br />

misconfigurations and weak credentials is low, leaving organizations exposed.<br />

This disconnect between the traditional cybersecurity focus and the real-world threatscape demands a<br />

paradigm shift in security strategies.<br />

This <strong>Cyber</strong>security Awareness Month, organizations should use the opportunity to ensure a<br />

comprehensive and proactive approach to cybersecurity. <strong>The</strong>y should ensure they get a continuous and<br />

complete view to secure all critical assets (on-prem and cloud), to holistically safeguard their digital assets<br />

in today’s increasingly-complex threat landscape.<br />

Doug Murray, CEO, Auvik:<br />

Last year, CISA announced that the enduring theme <strong>for</strong> all future <strong>Cyber</strong>security Awareness Months<br />

(which occurs each year in October), would be “Secure Our World.” This theme evokes the sentiment<br />

that security is a shared responsibility between individuals, businesses and governments alike. Even<br />

within a specific organization, security is a shared responsibility.<br />

Consider the issue of infrastructure sprawl – both CISOs and CIOs are purchasing and managing tools<br />

that support either cybersecurity objectives or serve a particular IT function. A big concern here is the<br />

cybersecurity risks involved in infrastructure sprawl, as the proliferation of tools and vendors has gotten<br />

out of control <strong>for</strong> many IT teams.<br />

Another increasing area of risk is shadow IT and shadow AI, which involves the use of IT systems,<br />

devices, software, and services without explicit approval from the IT department. SaaS shadow IT is<br />

probably one of the biggest hidden risk factors that IT leaders face today, particularly at a time when<br />

employees are experimenting with emerging AI tools. Most people who utilize shadow IT tend to think<br />

that they’re just using a productivity tool. However, organizations have found shadow IT adoption can<br />

open vulnerabilities.<br />

In purchasing a combination of different tools – some that provide multiple functions and others that are<br />

point solutions – companies easily end up with huge overlaps. For example, it’s common <strong>for</strong> a company<br />

to have multiple firewall providers operating within their network all at the same time. This is not only<br />

redundant but could actually be introducing even more cybersecurity risk to the business unnecessarily.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How can we manage some semblance of consolidation to drive up efficiency and lower costs? Every<br />

vendor that gets added <strong>for</strong> more firewall or endpoint security protections introduces new security<br />

concerns in terms of business process integration and daily IT management. What’s needed is a network<br />

management plat<strong>for</strong>m that gives us a federated view of everything that IT uses <strong>for</strong> its daily processes,<br />

systems, and management. Business leaders must then work together to determine which tools to keep<br />

and which they can do without, in order to reduce sprawl and overall risk exposure.<br />

Jason Scott, CISO, Sectigo:<br />

A study conducted by the A. James Clark School of Engineering at the University of Maryland, there are<br />

more than 2,200 cyberattacks per day, which equates to one attack every 39 seconds. This means that<br />

we have around 800,000 cyberattacks per year. To put this in relative terms, there were only 11 major<br />

battles during the Vietnam War and 20 major battles during World War II, both lasting multiple years.<br />

Obviously, there were many more minor skirmishes unaccounted <strong>for</strong>. Still, the point is that we are being<br />

(cyber) attacked daily with no pauses or time to recover. It has become cliché, but the statement still<br />

holds; “we have to get it right 100% of the time, but the adversaries only have to get it right once.”<br />

Getting it right matters. <strong>Cyber</strong>crime is predicted to cost the world $9.5 trillion in <strong>2024</strong> and the global<br />

average cost of a data breach in 2023 was $4.45 million per incident, a 15% increase from the previous<br />

three years. If we don’t get it right, not only does the business lose, but as we all know, costs are passed<br />

onto the consumer or taxpayer when governments are involved.<br />

We must be vigilant in our cybersecurity journey and can’t af<strong>for</strong>d to get the basics wrong. <strong>The</strong> basics are<br />

those core IT and security functions that must be done in every organization regardless of size and<br />

budget. Some include using strong passwords stored in fully encrypted password managers, using multifactor<br />

authentication on all applications, rigorous anti-phishing training, and ensuring software and<br />

systems are patched.<br />

<strong>The</strong>se “basics” sound simple and are not difficult to implement, but we (IT, Security teams, and the<br />

Business) routinely fail at it. We tend to focus on the fancy new tool, the shiny new dashboard, quarterly<br />

profits, or even the latest analytical application. Yes, these are important and have their place, but we<br />

should ensure we have the “basics” down to protect the business so it can focus on profit and growth.<br />

Using patching as an example, if we can patch our prioritized vulnerabilities promptly, we reduce our<br />

threat landscape, which, in turn, offers attackers fewer doors and windows into our environment. <strong>The</strong><br />

term may seem a little dated, but defense in depth is a solid method used to defend our often-porous<br />

environments. Using multiple levels of security, such as strong passwords, multi-factor authentication,<br />

resilience training, and patching strategies, makes it harder <strong>for</strong> threat actors, so they tend to move to<br />

another target with weaker defenses.<br />

Dena Bauckman, Senior Vice President of Product, Sectigo:<br />

In the 21 st year of the Annual <strong>Cyber</strong>security Month, I can’t help but think that the themes <strong>for</strong> this year<br />

seem the same ones we have been talking about <strong>for</strong> years: use strong passwords and a password<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


manager, turn on multifactor authentication, recognize and report phishing, and update software. So why<br />

after all these years are we still having to remind everyone to do these? I am convinced that in both our<br />

personal and professional lives, we are all trying to move so fast that we don’t do the simple things we<br />

know we should. <strong>The</strong>se four themes are basic security measures, but they do take time to implement. I<br />

was once told that “sometimes you need to slow down to speed up”, and I think that is the case here.<br />

Taking the time to setup a password manager and creating strong and unique passwords across all<br />

accounts and combining that with multifactor authentication (MFA) on all systems, would greatly reduce<br />

the compromised accounts that are part of so many attacks. With AI improving the effectiveness of<br />

phishing emails, we all need to slow and think about who is sending us an email and why. And with the<br />

constant release of new software updates, we need to take the time to implement the updates and,<br />

wherever possible, automate the updates. If we can slow down long enough to implement these basic<br />

themes, we can go faster by spending less time recovering from cybersecurity attacks that should never<br />

have happened.<br />

John Anthony Smith, CSO and Founder, Conversant Group:<br />

At the start of <strong>2024</strong>, the Identity <strong>The</strong>ft Resource Center (ITRC) reported a 490% increase in data breaches<br />

in the first half of the year compared to the same period in the previous year. As the frequency of attacks<br />

continues to rise year over year, the focus must shift from “what if it happens” to “how do we respond<br />

when it happens”. While awareness and breach resistance are important when it comes to cyber-attacks,<br />

recovery is even more critical.<br />

In an increasingly digital world, robust recovery capabilities are not just a safety net but a strategic<br />

advantage and a tactical MUST. <strong>The</strong> actions taken be<strong>for</strong>e [survivable, usable, and timely recoverable<br />

backups] and after [verified, tested, and readied brownfield recovery] a breach are what truly matter to<br />

reduce the costliest impacts—business interruption. By taking thoughtful and decisive steps, you can<br />

regain control and minimize damage and business disruption. Here are some proactive steps to consider:<br />

• Assess your recovery capabilities <strong>for</strong> survivability, usability, and timely recovery against the<br />

technical realities of threat actor behavior [what they are willing and able to do]<br />

• Ready your environment <strong>for</strong> secure brownfield recovery, and test it often!<br />

• Create a detailed incident response plan that outlines the steps to take immediately after a breach<br />

and test it!<br />

• Invest and constantly realign recovery and resistance capabilities to what threat actors can, will,<br />

and are doing [in breach].<br />

• Ready your incident response partners: Know your contacts, Know their Processes, Have the<br />

contract pre-negotiated, Incorporate them into your IR plan, and Test your interactions with and<br />

through them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Organizations deserve the peace of mind that comes with assured recovery when the breach occurs. By<br />

investing in an assured recovery program that prioritizes resiliency and recovery, organizations not only<br />

take a proactive approach to cyber protection, but also gain a competitive edge. This approach ensures<br />

business continuity, minimizes downtime, and protects valuable data and assets.<br />

Kris Bondi, CEO and Co-Founder, Mimoto:<br />

Deepfakes and ransom-as-a-service have put sophisticated tools in the hands of unsophisticated bad<br />

actors. In the innovation race, bad actors have an advantage because they’re faster to adapt than many<br />

organizations. <strong>The</strong> only way to course correct is to focus on the core problems, not only how to improve<br />

approaches that are no longer effective. Making a password process more cumbersome doesn’t help if<br />

a bad actor comes in through a reverse shell.<br />

To start next month more secure than today, organizations must look at what current vulnerabilities<br />

they’re ignoring. Impersonations within their system that aren’t caught and acted upon quickly are a core<br />

component to account takeovers, ransomware attacks, data extraction, and insider threats. Coupled with<br />

this should be timing and context. This enables companies to respond in real-time to a breach, be<strong>for</strong>e it<br />

is weaponized, and to know what to prioritize with their likely limited resources. This will enable teams to<br />

find and stop what has already gotten into the protected perimeter, be<strong>for</strong>e the damage is done.<br />

Ensuring Continuous <strong>Cyber</strong>security Vigilance and Education<br />

Although <strong>Cyber</strong>security Awareness Month only lasts 31 days, the importance of proper cybersecurity<br />

protocol and education is unceasing. As the threat landscape continues to evolve and cybercriminals<br />

become more innovative, it is more essential than ever <strong>for</strong> organizations to have the resources and plans<br />

in place to protect their people and data from the threats that lurk in all corners of our digital world.<br />

About the Authors<br />

Jose Seara, CEO, DeNexus<br />

Jose M. Seara is the founder and CEO of DeNexus, a leader in cyber risk<br />

quantification and management <strong>for</strong> operational technology (OT) and<br />

industrial control systems (ICS). Jose was previously the President &<br />

CEO of NaturEner USA (now BHE Montana) & NaturEner Canada.<br />

Prior to his time at NaturEner, Seara was a founding partner and member<br />

of the board of directors at DeWind Co. Jose was also a founding partner<br />

and principal at PROYDECO Ingenieria y Servicios SL, and a partner and<br />

director at Proyectos de Cogeneración SL.<br />

He holds an Executive Program degree from Singularity University in the<br />

field of Exponential Technologies, as well as a Master of Science in Naval<br />

& Marine Engineering from Universidad Politécnica de Madrid.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Boaz Gorodissky, Chief Technology Officer at XM <strong>Cyber</strong><br />

Boaz Gorodissky is a 30-year veteran of the Israeli Intelligence<br />

Community, most recently serving as Head of the Technology. In this role,<br />

he re-organized and headed technology divisions, overseeing thousands<br />

of engineers and a large-scale budget. Gorodissky currently serves as<br />

Chief Technology Officer at XM <strong>Cyber</strong> where he oversees all technology<br />

and product development. As CTO, his responsibilities start with<br />

identifying customer needs and working with product management to<br />

define detailed requirements and a technology roadmap aligned to the XM<br />

<strong>Cyber</strong> vision. This includes anticipating what capabilities will be critical <strong>for</strong><br />

organizations to have in place to strengthen their security posture, while also delivering features that<br />

solve immediate pain points based on customer feedback and industry trends.<br />

Doug Murray, CEO, Auvik<br />

Doug Murray is the Chief Executive Officer of Auvik where he drives<br />

company strategy, culture, and growth. Murray has over 25 years of<br />

network and security industry experience, including two years as the CEO<br />

of cloud cyber security company Valtix (acquired by Cisco), as well as<br />

seven years as CEO of SDN pioneer Big Switch Networks (acquired by<br />

Arista Networks). He previously held leadership positions at Juniper<br />

Networks, Sun Microsystems and AT&T, and was a finalist <strong>for</strong> the EY<br />

Entrepreneur of the Year Northern Cali<strong>for</strong>nia in 2017. Doug holds a BA<br />

in History from Colgate University and an MBA from Johns Hopkins<br />

University.<br />

Jason Scott, CISO, Sectigo<br />

Jason Scott brings to Sectigo his experience from his time in the United<br />

States military. He held the rank of Colonel and was most recently<br />

entrusted with the role of Executive Director <strong>for</strong> a crucial unit responsible<br />

<strong>for</strong> the U.S. Army’s cybersecurity. His military career is complemented by<br />

his substantial commercial experience in high-level in<strong>for</strong>mation security<br />

roles at well-known companies such as Capgemini and Chevron. Jason<br />

is also a Certified In<strong>for</strong>mation Security Manager (CISM). He is in charge<br />

of managing all facets of cybersecurity at Sectigo, which includes data,<br />

infrastructure, network, and applications/products.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Dena Bauckman, Senior Vice President of Product, Sectigo<br />

Dena Bauckman heads up Sectigo's Product Management & Product<br />

Marketing functions. As an accomplished product development<br />

strategist, Dena possesses a deep understanding of both business and<br />

technical software components. She specializes in driving revenue<br />

growth through effective product development and management,<br />

building innovative solutions based on market insights, and leveraging<br />

her cybersecurity expertise. Her leadership focus centers on<br />

empowering teams to solve practical engineering challenges, and her<br />

unique perspective, spanning sales, marketing, and engineering, has<br />

led to impactful business-enhancing products.<br />

John Anthony Smith, CSO and Co-founder, Conversant Group<br />

John Anthony Smith is CSO and Co-founder of Conversant Group and its family<br />

of IT infrastructure and cybersecurity services businesses. He is the founder of<br />

three technology companies and, over a 30-year career, has overseen the<br />

secure infrastructure design, build, and/or management <strong>for</strong> over 400<br />

organizations. He is currently serving as vCIO and trusted advisor to multiple<br />

firms.<br />

A passionate expert and advocate <strong>for</strong> cybersecurity nationally and globally who<br />

began his IT career at age 14, John Anthony is a sought-after thought leader,<br />

with dozens of publications and speaking engagements. In 2022, he led the<br />

design and implementation of the International Legal Technology Association’s (ILTA’s) first annual<br />

cybersecurity benchmarking survey.<br />

John Anthony studied Computer Science at the University of Tennessee at Chattanooga and holds a<br />

degree in Organizational Management from Covenant College, Lookout Mountain, Georgia.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Awareness Month: Industry Experts on Securing<br />

Our Digital Lives Together<br />

October marked the arrival of <strong>Cyber</strong>security Awareness Month, a pivotal time <strong>for</strong> individuals and<br />

organizations to reflect on the importance of safeguarding our digital interactions. As technology<br />

continues to advance and integrate into every aspect of our daily routines, the need <strong>for</strong> robust<br />

cybersecurity measures has never been more critical. October served as a reminder that cybersecurity<br />

is not just the responsibility of IT departments but a collective ef<strong>for</strong>t that involves everyone.<br />

Throughout <strong>Cyber</strong>security Awareness Month, experts from across the industry came together to share<br />

insights, strategies, and best practices to help organizations and citizens stay one step ahead of cyber<br />

threats. From protecting digital identities and securing APIs to managing the complexities of cloud and<br />

SaaS environments, the focus is on building a resilient digital ecosystem. By raising awareness and<br />

promoting proactive security measures, we can empower individuals and organizations to navigate the<br />

digital landscape with confidence and peace of mind.<br />

Kern Smith, VP Americas, Zimperium<br />

Digital identity is one of the most valuable assets in corporate IT. Organizations continue to invest in ways<br />

to protect their user identity, from multi factor authentication, rotating and random passwords facilitated<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


y password managers, and anti-phishing filters and user training to name a few, and attackers continue<br />

to innovate with new and novel techniques to ultimately gain access to a user's identity.<br />

Increasingly attackers have shifted their focus to targeting iOS and Android devices given those devices<br />

are typically the nexus of personal and corporate identity. This is because mobile devices are where the<br />

multi factor resides, where users keep their passwords, and where users are much more susceptible to<br />

mobile phishing campaigns due to the number of un protected phishing avenues available to attackers,<br />

such as SMS, QR Codes, third party messaging apps, and more that most organizations have no<br />

protections <strong>for</strong>. This does not even account <strong>for</strong> the explosion of mobile malware attacks and risks with<br />

third party apps that could expose user credentials on iOS and Android devices.<br />

All of this creates a landscape where the barrier to entry <strong>for</strong> attackers has lowered, and attacks have<br />

skyrocketed. No longer does it take an advanced exploit to gain valuable data, when an attacker can<br />

simply send a targeted message or link to gain access to the data they want, either through a simple<br />

Mishing campaign, off the shelf malware, or even abusing vulnerabilities in third party apps or SDK’s.<br />

It is essential that organizations have a strategy to address these challenges. This includes the ability to<br />

identify and prevent mobile phishing attacks, detect <strong>for</strong> mobile malware, and identify risks in third party<br />

applications or device configurations that could potentially expose credentials and compromise user<br />

identity.<br />

Eric Schwake, Director of <strong>Cyber</strong>security Strategy, Salt Security<br />

October is <strong>Cyber</strong>security Awareness Month, which reminds us of the critical need to secure our<br />

increasingly interconnected world. As we enjoy the convenience of digital services, we must also<br />

recognize the growing attack surface and evolving threat landscape. APIs, the invisible threads<br />

connecting our applications and data, are a prime target <strong>for</strong> malicious actors.<br />

Organizations must adopt a comprehensive approach to API security to effectively secure our digital<br />

ecosystem. This begins with thorough API discovery, gaining complete visibility into all APIs across the<br />

development lifecycle. Understanding the full scope of your API landscape is the crucial first step in<br />

identifying potential vulnerabilities and misconfigurations.<br />

Next, robust API posture governance is essential to ensure that APIs adhere to security best practices<br />

and comply with industry regulations. This includes implementing strong authentication and authorization<br />

mechanisms, en<strong>for</strong>cing data validation rules, and proactively managing API access controls.<br />

Finally, organizations need advanced API behavioral threat protection to detect and prevent malicious<br />

activity in real-time. This involves analyzing API traffic patterns to identify anomalies and uncover hidden<br />

threats that may bypass traditional security measures. Organizations can proactively defend against<br />

attacks and safeguard their critical assets by pinpointing actual malicious traffic within these anomalies.<br />

In conclusion, "Secure Our World," the theme of this year's <strong>Cyber</strong>security Awareness Month, resonates<br />

deeply with the need <strong>for</strong> robust API security. Organizations can strengthen their defenses by prioritizing<br />

API discovery, posture governance, and behavioral threat protection and contribute to a safer digital world<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>for</strong> everyone. Every click, connection, and digital interaction relies on the security of these underlying<br />

APIs. Recognizing their critical role and taking proactive steps to secure them is essential to safeguarding<br />

our interconnected world.<br />

Justin Kestelyn, Head of Product Marketing and Hacker Community Marketing, Bugcrowd<br />

This year, <strong>Cyber</strong>security Awareness Month is incredibly relevant <strong>for</strong> consumers and workers who need<br />

to be vigilant about the constant barrage of phishing and data breach risk.<br />

<strong>The</strong> global hacker community can in fact be a massive net positive <strong>for</strong> those consumers and workers,<br />

and <strong>for</strong> the security teams tasked with protecting them. For example, the existence of a chronic talent<br />

shortage in the cybersecurity industry has been well documented <strong>for</strong> years. But that shortage calls the<br />

definition of the “talent pool” into question, because the reality is that the hacker community is an<br />

endlessly elastic source of capacity and skills <strong>for</strong> augmenting and extending security teams on demand<br />

— if you know how to engage in a mutually trusted, productive, and scalable way.<br />

Security leaders who can do that will have access to a “crowd cloud” <strong>for</strong> meeting almost any security<br />

testing requirement, with the results going beyond what automated tools can achieve and with all the<br />

utilization benefits of an as-a-service model. That’s a fact deserving more awareness in the security<br />

industry!<br />

Omri Weinberg, Co-Founder and CRO, DoControl<br />

As we kick off <strong>Cyber</strong>security Awareness Month, the theme "Secure Our World" feels especially timely. In<br />

today's hyper-connected digital landscape, securing our world means securing our data - and that's<br />

becoming increasingly complex as organizations rapidly adopt cloud and SaaS technologies. But it's not<br />

just about corporate responsibility; individuals play a crucial role too.<br />

<strong>The</strong> shift to remote and hybrid work has dramatically expanded the use of SaaS applications, creating<br />

new security blind spots and risks. Employees are sharing, accessing, and storing sensitive data across<br />

dozens of cloud apps, often without proper oversight. This "SaaS sprawl" has made it incredibly<br />

challenging <strong>for</strong> security teams to maintain visibility and control.<br />

What's more, the lines between personal and professional digital lives are blurring. Even something as<br />

simple as a social media post can open up an individual - and by extension, their organization - to<br />

potential attacks. <strong>Cyber</strong>criminals are increasingly sophisticated in how they use publicly available<br />

in<strong>for</strong>mation <strong>for</strong> social engineering and targeted phishing attempts.<br />

It is vital to have a comprehensive approach to SaaS security, coupled with ongoing employee education.<br />

It's not enough to just focus on network perimeters or endpoints anymore. Organizations need granular<br />

visibility into user activities, data flows, and third-party app connections across their entire SaaS<br />

ecosystem. And employees need to understand how their online actions can impact overall security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Securing our world in <strong>2024</strong> and beyond requires a mindset shift. We need to move beyond the old "castle<br />

and moat" security model to one that embraces Zero Trust principles, continuous monitoring, and<br />

individual accountability. Every access request, every data transfer, every third-party integration - and<br />

yes, even every social media post - needs to be approached with security in mind.<br />

This <strong>Cyber</strong>security Awareness Month, I encourage organizations to take a hard look at their SaaS<br />

security posture and their employee education programs. Do you have full visibility into how your<br />

sensitive data is being accessed and shared across cloud apps? Are you able to detect and respond to<br />

insider threats or compromised accounts in real-time? Can you automatically en<strong>for</strong>ce consistent security<br />

policies across your entire SaaS ecosystem? And crucially, do your employees understand their role in<br />

maintaining security?<br />

By focusing on these areas, implementing robust SaaS Security Posture Management, and fostering a<br />

culture of security awareness at all levels, we can take meaningful steps towards truly securing our digital<br />

world. <strong>The</strong> threats may be evolving, but with the right approach, tools, and collective responsibility, we<br />

can stay one step ahead.<br />

Nicole Carignan, VP of Strategic <strong>Cyber</strong> AI, Darktrace:<br />

Both consumers and organizations rely on email as a primary communication tool so raising awareness<br />

of email-based attacks is critical during <strong>Cyber</strong>security Awareness Month. However, despite increasing<br />

focus on cybersecurity awareness training, email phishing remains of the greatest threats to<br />

organizations globally. In fact, between December 2023 and July <strong>2024</strong>, we detected 17.8 million phishing<br />

emails across our customer fleet. As sophistication of phishing attacks continue to grow, organizations<br />

cannot rely on employees to be the last line of defense against these attacks. Instead, organizations must<br />

use machine learning-powered tools that can understand how their employees interact with their inboxes<br />

and build a profile of what activity is normal <strong>for</strong> users, including their relationships, tone and sentiment,<br />

content, when and how they follow or share links, etc. Only then can they accurately recognize suspicious<br />

activity that may indicate an attack or business email compromise.<br />

While email has long been the vector of choice <strong>for</strong> carrying out phishing attacks, threat actors continue<br />

to adapt and evolve their tactics to increase success of these attacks. For example, we’ve seen a rise in<br />

the abuse of commonly used services and plat<strong>for</strong>ms, including Microsoft Teams and Dropbox <strong>for</strong> phishing<br />

campaigns in recent months. A proactive security stance which monitors anomalous activity patterns and<br />

privileged access paths is essential to stay ahead of these kinds of attacks. Consistent governance<br />

spanning all technology portfolios is now table stakes <strong>for</strong> robust cyber resilience.”<br />

<strong>The</strong> ability <strong>for</strong> attackers to use generative AI to produce deepfake audio, imagery, and video to deceive<br />

employees is another growing concern <strong>for</strong> organizations this <strong>Cyber</strong>security Awareness Month, as<br />

attackers are increasingly using deepfakes to start sophisticated social engineering attacks. Deepfakes<br />

are on the rise to facilitate initial access or assist in financial cybercrimes. In response, organizations will<br />

need to evolve their security awareness training from a focus on how to “spot” a phishing email to focusing<br />

on implementing layered and out-of-band verification practices <strong>for</strong> IT, help desks, security, and financial<br />

activities. In addition, we believe we will see increasing adoption of multi-layered security solutions<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


including multi-factor authentication, cross-domain visibility, and AI-augmented detection and response<br />

to better defend against these attacks.<br />

Damon Tompkins, President, Pathlock<br />

As we observe <strong>Cyber</strong>security Awareness Month, it’s essential to highlight the importance of identity<br />

security in protecting our digital environments. Identity security involves safeguarding individual and<br />

system identities within an organization from unauthorized access or malicious exploitation. This includes<br />

implementing robust identity and access management systems, which control who has access to what<br />

within the organization, and continuously monitoring these identities to detect and respond to any unusual<br />

activity. By ensuring that every access request is verified and validated, identity security acts as a critical<br />

defense against potential security breaches.<br />

Prioritizing identity security helps organizations enhance their security posture, protect sensitive<br />

in<strong>for</strong>mation, and comply with regulatory requirements. Effective identity security practices, such as<br />

adopting a Zero Trust model, ensure that every access request is scrutinized, regardless of its origin.<br />

This approach not only safeguards data but also supports operational efficiency by ensuring that users<br />

have the appropriate level of access at all times. As we navigate an increasingly digital world, robust<br />

identity security measures are more crucial than ever in defending against cyber threats and maintaining<br />

a secure and compliant access environment.<br />

Embracing Innovation and Proactive Strategies <strong>for</strong> a Secure Digital Tomorrow<br />

<strong>Cyber</strong>security Awareness Month serves as a crucial reminder of the ever-evolving threats in our digital<br />

landscape and the importance of staying vigilant. <strong>The</strong> insights shared by leading experts underscore the<br />

need <strong>for</strong> robust strategies to protect digital identities, secure APIs, and manage the complexities of SaaS<br />

environments. As we navigate an increasingly interconnected world, both organizations and individuals<br />

must prioritize cybersecurity measures to safeguard sensitive data and maintain trust. By embracing<br />

comprehensive security practices and fostering a culture of awareness, we can collectively contribute to<br />

a safer digital future far beyond the month of October<br />

About the Authors<br />

Kern Smith, VP Americas, Zimperium<br />

Kern Smith is a mobile security expert and Technical Sales Leader at<br />

Zimperium, the global leader in mobile security. He is highly experienced with<br />

selling and deploying mobile security solutions into large enterprise and<br />

government accounts, while building, training, and leading high per<strong>for</strong>ming<br />

technical sales teams, to support and drive company growth, and drive value<br />

<strong>for</strong> customers.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Eric Schwake, Director of <strong>Cyber</strong> Security Strategy at Salt Security<br />

Eric Schwake is the Director of <strong>Cyber</strong> Security Strategy at Salt Security,<br />

where he focuses on developing innovative strategies to protect<br />

organizations from evolving cyber threats. With extensive experience in<br />

cybersecurity, Eric leverages his expertise to enhance security measures<br />

and ensure robust defense mechanisms. His leadership in the field<br />

emphasizes proactive security approaches and collaboration across teams<br />

to safeguard critical data.<br />

Justin Kestelyn, Head of Product Marketing and Hacker Community<br />

Marketing, Bugcrowd<br />

Justin Kestelyn is a full-stack product/technical marketing leader with 20<br />

years of experience in developer, technical, and product marketing. He<br />

holds a unique track record of driving adoption and consideration by<br />

technical champions and economic buyers alike, with deep experience in<br />

data plat<strong>for</strong>ms, cybersecurity, cloud computing, and ML/AI.<br />

Omri Weinberg, Co-Founder & CRO at DoControl<br />

Omri Weinberg is the Co-Founder and Chief Revenue Officer (CRO) at<br />

DoControl, where he drives the company's growth and revenue strategies.<br />

With a strong background in cybersecurity and SaaS, Omri is dedicated to<br />

helping organizations secure their data in real time. His expertise in sales<br />

and business development has been pivotal in establishing DoControl as a<br />

leader in data security solutions.<br />

Damon Tompkins, President, Pathlock<br />

Damon Tompkins is the President of Pathlock. With over 25 years of<br />

experience in the technology industry, Tompkins has a proven track record<br />

of successfully building and leading high-per<strong>for</strong>mance teams and<br />

implementing strategies <strong>for</strong> better organizational integration.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AsyncRAT Malware Campaign Found Targeting South American<br />

Hotels<br />

Campaign uses new AsyncRAT derivative; illustrates how cybercriminals adopt new techniques<br />

to breach systems<br />

By Ryan Estes, Intrusion Analyst, WatchGuard Technologies<br />

A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality<br />

industry, demanding the attention of travelers and cybersecurity professionals.<br />

<strong>The</strong> campaign employs a new derivative of AsyncRAT, which is an open-source remote access trojan<br />

(RAT) that operates primarily as a credential-stealer and loader <strong>for</strong> other malware. This latest use case<br />

of the malware illustrates how cybercriminals are adopting new techniques to breach computer systems<br />

and steal sensitive data.<br />

Below, we walk through how this malware campaign was discovered and analyzed, its likely connection<br />

to a known threat group, and provide tips <strong>for</strong> organizations to combat this malware threat effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> discovery and analysis<br />

Security researchers discovered this new AsyncRAT derivative while analyzing a simple malware sample<br />

– a JavaScript (JS) file that appeared to be malicious – and its infection chain. Closer investigation of the<br />

sample showed the malware was a downloader of a malicious PowerShell script – obscured to look like<br />

a PDF – that was hosted on a compromised web domain. <strong>The</strong> “PDF” dropped two files: one being a<br />

helper dynamic-link library (DLL) and the other being AsyncRAT.<br />

Consistent with how threat actors often distribute AsyncRAT, attackers typically deliver this malware<br />

derivative via a phishing email, which will likely contain a hyperlink that downloads a ZIP file from an S3<br />

bucket. Interestingly, research showed the URL hosting the ZIP file ended with a query to Google. This<br />

is likely to redirect users to Google after downloading the file, making it appear that nothing out of the<br />

ordinary happened. This can also trick network filters that separate URLs with trusted domains.<br />

<strong>The</strong>re<strong>for</strong>e, if your network explicitly allows a URL containing “Google.com,” it would miss this.<br />

Further inspection of the malware file showed how the “PDF” operates in the malware's infection chain.<br />

<strong>The</strong> malicious PowerShell script, shrouded as a PDF, contains two binaries, minor obfuscation, and<br />

algorithmic bit manipulation. Additional analysis confirmed the malware is a dropper. Among the<br />

indicators of compromise were web domains and URLs associated with hotels in South American<br />

countries, particularly Brazil and Chile.<br />

Link to known threat group<br />

Broader research indicated this AsyncRAT malware campaign is associated with the threat group TA558.<br />

<strong>The</strong> group, which is believed to operate from Brazil, has a history of hijacking domains and using trusted<br />

content delivery networks (CDNs) to distribute loaders and droppers. Email phishing appears to be the<br />

group’s preferred attack vector. <strong>The</strong> group has historically employed myriad RATs, while favoring<br />

AsyncRAT recently.<br />

In this malware use case, the threat actor’s methods to obfuscate its downloaders and droppers isn’t<br />

novel. <strong>The</strong>y use file manipulation that bypasses basic filters, but once their attacks execute, they tend to<br />

be “loud.” <strong>The</strong> threat actor’s use of “Google.com” queries in the stage 1 download, leveraging<br />

compromised domains, and masking PDFs as droppers are attempts to keep the noise down.<br />

How to combat this latest AsyncRAT campaign<br />

A notable characteristic of AsyncRAT malware is its use of encryption and obfuscation methods to avoid<br />

detection, which this latest campaign employs. <strong>The</strong>re<strong>for</strong>e, it’s important <strong>for</strong> organizations to adopt a<br />

defense-in-depth approach to repel this malware threat.<br />

Organizations must conduct user awareness training to counter phishing and spear-phishing attacks.<br />

Gamification methods can make security training more effective and help lessons stick with end users.<br />

As always, security training should emphasize the risks of downloading documents or email attachments<br />

from unknown sources. Additionally, organizations must leverage advanced endpoint detection and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


esponse solutions that can quickly respond to stop the execution of malicious attacks. Using security<br />

solutions at the network and host-based levels is crucial to effective security.<br />

Furthermore, it’s critical <strong>for</strong> IT and security teams to regularly update software and install security patches,<br />

use strong access controls and passwords, and routinely back up data. Should an AsyncRAT attack get<br />

past initial defenses, containment is important. If a system or device becomes infected, isolate it from the<br />

rest of the network and make sure the threat is contained.<br />

While the methods employed in this latest AsyncRAT malware campaign aren’t novel, they have proven<br />

to be effective, which is why threat actors continue to use them. <strong>The</strong> most effective way to prevent<br />

AsyncRAT malware attacks is to train users to be skeptical of emails sent from unknown senders and to<br />

never open strange email attachments from external entities unless users are certain of the sender and<br />

its content. Even the most educated people can fall victim to email phishing tactics, which underscores<br />

the importance of having a multilayered security posture.<br />

About the Author<br />

Ryan Estes is an intrusion analyst at WatchGuard Technologies. His<br />

research focuses on malware analysis, malware reverse engineering and<br />

ransomware threats, and he frequently covers these topics as a contributor<br />

to WatchGuard’s Secplicity blog. During his time in the cybersecurity field,<br />

he has earned 12 certifications from organizations such as (ISC)²,<br />

CompTIA, Offensive Security, CWNP, and Saint Louis University (SLU).<br />

Ryan holds a bachelor’s in computer science from Southern Illinois<br />

University Edwardsville (SIUE), a master’s in cybersecurity from SLU, and<br />

is pursuing an MBA with a focus in management in<strong>for</strong>mation systems at<br />

SIUE.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 148<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


From <strong>Cyber</strong>security Awareness to Action: Industry Experts on<br />

Building a Safer Digital Future<br />

October was <strong>Cyber</strong>security Awareness Month, a time when organizations and individuals came together<br />

to highlight the importance of digital security. Since 2004, this initiative has sparked essential discussions<br />

on cyber threats and the need to “Secure Our World.” In <strong>2024</strong>, the primary focus was on addressing the<br />

cyber skills gap, balancing AI innovation with security, and adopting multi-faceted defense strategies.<br />

In response to last month’s call to action, experts shared their insights, highlighting the importance of<br />

transitioning from awareness to ongoing action. By committing to proactive measures and fostering a<br />

culture of cybersecurity, we can collectively build a safer digital future.<br />

Rob Rashotte, Vice President, Global Training & Technical Field Enablement, Fortinet<br />

Since 2004, the U.S. government and the cybersecurity industry have recognized October as<br />

<strong>Cyber</strong>security Awareness Month. This collaborative ef<strong>for</strong>t between the government and the industry<br />

generates discussion on cyber threats and enhances cybersecurity awareness with the goal to Secure<br />

Our World. Looking at the cyber landscape in <strong>2024</strong>, the cyber skills gap continues to be a top concern.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> challenge is twofold: too few cybersecurity professionals in the field, and a lack of adequate skills <strong>for</strong><br />

those in IT and security positions. We’ve seen the real-world impact of this skills gap: 58% of respondents<br />

to Fortinet's <strong>2024</strong> <strong>Cyber</strong>security Skills Gap Global Research Report revealed that insufficient skills and<br />

a lack of properly trained IT/security staff are the prime causes of breaches, and 70% of respondents<br />

revealed that the cybersecurity skills shortage creates additional risks <strong>for</strong> their organization.<br />

<strong>The</strong> stakes are high <strong>for</strong> organizations when it comes to cybersecurity. Breaches take a financial toll,<br />

disrupt business operations, and erode customer and partner trust. Closing risk management strategy<br />

gaps, including prioritizing skills development and proper staffing, is vital to protect any organization.<br />

At Fortinet, we’re dedicated to helping address the cyber skills gap head-on by providing training and<br />

certification programs and security awareness training to help organizations cultivate a more cyber-aware<br />

work<strong>for</strong>ce. We’re on a mission to build a diverse and skilled work<strong>for</strong>ce and empower the next generation<br />

of cybersecurity professionals with the training and tools they need to succeed, including a 5-year span<br />

pledge to train 1 million people in cybersecurity by the end of 2026 as part of this commitment.<br />

Collaboration across the public and private sectors to address these challenges is key, including<br />

initiatives like <strong>Cyber</strong>security Awareness Month. Together, let’s take action this October, tackling the cyber<br />

skills gap and increasing cyber resilience.<br />

Dana Simberkoff, Chief Risk, Privacy, and In<strong>for</strong>mation Security Officer, AvePoint<br />

This coming year, organizations will continue to be challenged with balancing AI innovation with secure<br />

implementation – all while navigating an increasingly complex regulatory landscape. <strong>The</strong> market <strong>for</strong> AI<br />

technology is moving incredibly fast, with new open-source tools being created and spread every day. In<br />

2025, global governments will look to increase regulation around AI tools, to ensure that the technology<br />

is being used ethically and safely by organizations and citizens alike. To prepare <strong>for</strong> tighter regulations<br />

around AI use and creation, security leaders should urgently prioritize the adoption of a comprehensive<br />

data strategy, including robust data management, governance, and protection policies. Effective AI<br />

implementation is only as good as the quality of data used – everyone now needs a data strategy <strong>for</strong> AI<br />

use, whether they’re ready to implement the tech company-wide or not.<br />

AI technology has tremendous potential to be used <strong>for</strong> innovation, optimization and advancement – but<br />

on the other side of the coin, bad actors will also be using these tech advancements to carry out cyberattacks.<br />

CISOs and security leaders should keep in mind that security is everyone’s job in the<br />

organization. This <strong>Cyber</strong>security Awareness Month, all employees should take the opportunity to educate<br />

themselves on how AI is using their data, how the changing regulatory environment will affect their use<br />

of the tech, and what cyberthreats pose danger to their teams.<br />

Patrick Harr, CEO, SlashNext Email+ Security<br />

<strong>The</strong> explosion of AI in recent years has made it easier <strong>for</strong> cybercriminals to execute effective phishing<br />

scams and other attacks on users. As a result, we’ve seen a dramatic increase in attacks across various<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 150<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


communication channels such as email, SMS, social media plat<strong>for</strong>ms, collaboration tools like Slack and<br />

Microsoft Teams, messaging apps like Signal and WhatsApp, as well as voice and video calls. <strong>The</strong>re has<br />

also been growth in the use of 3D phishing—a sophisticated approach where cybercriminals target<br />

victims through multiple channels to establish credibility, instill urgency, and enhance their chances of<br />

successfully deceiving the target. By combining multiple modes of deception across different channels—<br />

such as starting with an email request and then following up with a phone call or a message—the<br />

attackers can launch very believable scams that are hard <strong>for</strong> the average person to detect, allowing them<br />

to bypass traditional security measures.<br />

<strong>Cyber</strong>security Awareness Month is a reminder that the methods used by cybercriminals continue to<br />

evolve, making it imperative <strong>for</strong> organizations to have the resources and plans in place to prevent these<br />

attacks be<strong>for</strong>e they result in data compromise and other security concerns. To stay one step ahead of<br />

these sophisticated tactics, organizations must adopt a multi-faceted defense approach, which includes<br />

utilizing AI to combat AI-based scams. Even with continuous training to help employees recognize the<br />

hallmarks of email and message-based scams, many are still unable to evade complex schemes like 3D<br />

phishing. However, while humans may struggle to recognize these threats on their own, AI-based security<br />

plat<strong>for</strong>ms can detect unusual activities associated with 3D phishing attempts.<br />

Darren Guccione, CEO and Co-Founder, Keeper Security<br />

October <strong>2024</strong> marks the 21st anniversary of ‘<strong>Cyber</strong>security Awareness Month’. However, over the past<br />

two decades, as we’ve witnessed a surge in cyber attacks and the continued emergence of new and<br />

evolving threats, it’s become increasingly clear that awareness alone is not enough. A recent survey<br />

revealed that a staggering 92% of IT and security leaders have reported an increase in cyber attacks<br />

year-over-year.<br />

It’s time <strong>for</strong> us to move from awareness to action.<br />

So, how can we trans<strong>for</strong>m <strong>Cyber</strong>security Awareness Month into <strong>Cyber</strong>security Action Month? <strong>The</strong> key<br />

lies in prioritizing straight<strong>for</strong>ward, yet often overlooked, cybersecurity best practices.<br />

One effective strategy is deploying a Privileged Access Management (PAM) solution, which enhances<br />

security by controlling access to sensitive systems and data. This reduces the risk of unauthorized access<br />

and data breaches, and minimizes the impact of a breach if one occurs.<br />

Additionally, creating strong, unique passwords <strong>for</strong> each account remains a critical first line of defense<br />

against unauthorized access. Utilizing a password manager can significantly improve security by<br />

generating and storing high-strength, random passwords <strong>for</strong> every website, application and system.<br />

Strong and unique passwords help prevent the domino effect in which the compromise of one account<br />

leads to further unauthorized access.<br />

When selecting a password manager, look <strong>for</strong> providers that offer transparent security architecture, zeroknowledge<br />

and zero-trust infrastructure, and hold certifications like SOC 2, ISO 27001, 27017 and 27018,<br />

as well as FedRAMP Authorization. This ensures the highest level of protection <strong>for</strong> your sensitive<br />

in<strong>for</strong>mation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Don’t get hacked. This <strong>Cyber</strong>security Action Month, let’s commit to proactive measures and adopt<br />

fundamental cybersecurity practices to significantly reduce our vulnerability to cyber threats.<br />

Ratan Tipirneni, President and CEO, Tigera<br />

<strong>Cyber</strong>security Awareness Month highlights the importance of implementing stronger defense<br />

mechanisms that protect organizations and citizens from increasing cybercrime. Kubernetes and<br />

containerized environments underpin digital innovation and are at the core of modern application<br />

development. While these environments boast significant advantages, offering scalability, efficiency, and<br />

flexibility, they are also subject to various security risks. This includes vulnerabilities, misconfigurations,<br />

network exposures, and both known and zero-day malware threats. <strong>The</strong> distributed nature of<br />

microservices, the dynamic scaling of workloads, and the ephemeral nature of containers introduce<br />

unique security challenges.<br />

Traditional approaches to risk assessment whereby vulnerabilities, misconfigurations, and threats are<br />

identified and prioritized in isolation - and each generates its own set of alerts and priorities - are<br />

insufficient <strong>for</strong> the unique nature of Kubernetes. To effectively protect your Kubernetes environment, it is<br />

essential to adopt an interconnected security approach that accounts <strong>for</strong> how these risks interact. Many<br />

security risks are associated with specific services. By understanding the relationships between services,<br />

security teams can better assess the potential blast radius of risks if left unmitigated. This will enable<br />

more accurate and timely risk assessment, prioritization, and mitigation.<br />

This <strong>Cyber</strong>security Awareness Month, organizations should work to deploy tactics that help evaluate risks<br />

holistically and implement controls such as default-deny network policies, workload isolation, IDS/IPS<br />

and WAFs. <strong>The</strong>se tactics will reduce their risk of exploitation, limit lateral movement in the event of a<br />

breach, and block known threats be<strong>for</strong>e they can manifest.<br />

Narayana Pappu, Founder and CEO, Zendata<br />

As AI becomes central to business operations, it also introduces significant security risks, such as<br />

concerns about unauthorized data usage, AI model hacking, and training data leaks. Protecting sensitive<br />

and proprietary in<strong>for</strong>mation is critical and requires strategies like maintaining a clear data bill of materials<br />

and ensuring that AI models are trained only <strong>for</strong> intended purposes.<br />

To mitigate these risks, deploying AI systems on-premise or in Virtual Private Clouds (VPCs) can offer<br />

better control, while domain-specific and smaller language models reduce exposure. Role-based access<br />

controls, data fingerprinting, and ensuring training data remains sealed to its rightful owner are essential<br />

<strong>for</strong> preventing data leakage and external threats.<br />

Strong security measures are crucial to safeguard AI systems and sensitive in<strong>for</strong>mation as AI evolves.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Dan Ortega, Security Strategist, Anomali<br />

In the Age of AI – it’s all about the data – how you manage it, and then action it to protect and drive your<br />

business. Un<strong>for</strong>tunately, many companies don’t have a strong data plan in place; in<strong>for</strong>mation is coming<br />

in too fast, and with the pervasive use of AI, it has accelerated immensely – and as a result, companies<br />

tend to manage it in the most expensive, inefficient, complex, and disparate way possible. This creates<br />

unnecessary risk across all business operations. This includes the way that security teams approach<br />

threat intelligence data – which is often siloed and not integrated holistically across all security and IT<br />

functions.<br />

This year, <strong>for</strong> <strong>Cyber</strong>security Awareness Month – I encourage security and IT teams to focus on three key<br />

areas: 1) auditing their Security Operations Center – to ensure that the tools in use are providing a truly<br />

comprehensive view of the business, and encouraging the flow of data across systems (e.g. ensuring<br />

that teams or tools don’t silo threat intelligence data and is providing value), 2) Cleaning up internal<br />

processes to ensure that security technology is being used to solve business challenges, maximize talent<br />

capacity, integrate security into business and simplify underlying processes, and 3) take a hard look at<br />

how AI is being used in your organization. Does everyone use whatever version of AI is convenient<br />

without oversight from IT? What could possibly go wrong?<br />

Sustaining <strong>Cyber</strong>security Momentum<br />

As <strong>Cyber</strong>security Awareness Month comes to a close, it’s crucial to carry <strong>for</strong>ward the momentum gained<br />

in October. By embracing a culture of cybersecurity, we can mitigate risks and protect our valuable digital<br />

assets. <strong>The</strong> focus on bridging the cyber skills gap, integrating AI responsibly, and implementing<br />

comprehensive defense strategies must extend beyond this month. Every individual and organization<br />

has a role to play in securing our interconnected world. Let’s commit to ongoing education, robust security<br />

practices, and collaborative ef<strong>for</strong>ts to ensure a safer digital future <strong>for</strong> all.<br />

Together, we can trans<strong>for</strong>m awareness into action and build a resilient digital ecosystem that stands<br />

strong against evolving cyber threats. <strong>The</strong> journey to “Secure Our World” is ongoing, and with collective<br />

ef<strong>for</strong>t, we can achieve a secure and trustworthy digital environment.<br />

About the Authors<br />

Rob Rashotte, Vice President, Global Training & Technical Field<br />

Enablement, Fortinet<br />

Rob Rashotte is the Vice President of the Fortinet Training Institute as well<br />

as all Fortinet Technical Field Enablement Programs. He has 20 years of<br />

experience developing training and education strategies <strong>for</strong> startups as<br />

well as complex global organizations. He also has 15 years of experience<br />

working with some of the most innovative, fast-paced companies in the<br />

cybersecurity field. Rob has an Executive MBA from the University of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 153<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate<br />

impact.<br />

Patrick Harr, CEO, SlashNext<br />

SlashNext CEO Patrick Harr directs a work<strong>for</strong>ce of security professionals<br />

focused on protecting people and organizations from phishing anywhere.<br />

Be<strong>for</strong>e joining SlashNext, Harr was CEO of Panzura, which he trans<strong>for</strong>med<br />

into a SaaS company and led to a successful acquisition in 2020. Harr has<br />

also held senior executive and GM positions at Hewlett-Packard Enterprise,<br />

VMware, and BlueCoat, and he was the CEO of multiple security and<br />

storage start-ups, While at HPE, Harr scaled the Americas cloud business<br />

19X and generated over $1.5B in revenue in five years. He has extensive<br />

startup and Fortune 500 vendor experience across cloud, storage, security,<br />

and networking. Harr received his MBA from the University of Maryland and<br />

a BA from Tulane University in Political Economy and Russian.<br />

Darren Guccione, CEO and Co-Founder, Keeper Security<br />

Darren Guccione is the CEO and Co-Founder of Keeper Security, Inc., the<br />

creator of Keeper, the world’s most popular password manager and secure<br />

digital vault. Keeper software is used globally by millions of people and<br />

thousands of businesses.<br />

Prior to Keeper, Darren served as an advisor to NinthDecimal (f/k/a JiWire),<br />

the leading media and technology service provider <strong>for</strong> the Wi-Fi industry.<br />

Prior to that, Darren was the CFO and Co-founder of Apollo Solutions, Inc.,<br />

which was acquired by CNET Networks (now CBS Interactive).<br />

Darren is an engineer and a CPA. He holds a Master of Science in Accountancy with Distinction from the<br />

Kellstadt School of Business at DePaul University and a Bachelors of Science in Mechanical and<br />

Industrial Engineering from the University of Illinois at Urbana-Champaign. Darren is an Evans Scholar<br />

and received the Distinguished Alumnus Award presented by <strong>The</strong> Department of Industrial & Enterprise<br />

Systems Engineering.<br />

Darren is a community board member of the Chicago Entrepreneurial Center (1871) which fosters the<br />

development of early-stage companies and an advisor to TechStars – a Chicago-based technology<br />

incubator <strong>for</strong> innovative startups. Formerly, Darren served on the Committee of Technology Infrastructure<br />

under Mayor Richard Daley.<br />

Darren has been named Cutting Edge CEO of the Year in 2019 and Publisher’s Choice Executive of the<br />

Year in 2020 by <strong>Cyber</strong> <strong>Defense</strong> Magazine’s InfoSec Awards. He is regularly featured on local and national<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 154<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


news programs to report on cybersecurity events and topics. He serves as a panelist and keynote<br />

speaker in various technology events around the world.<br />

Ratan Tipirneni, President and CEO, Tigera<br />

Ratan Tipirneni is President & CEO at Tigera, where he is responsible<br />

<strong>for</strong> defining strategy, leading execution, and scaling revenues. Ratan is<br />

an entrepreneurial executive with extensive experience incubating,<br />

building, and scaling software businesses from early stage to hundreds<br />

of millions of dollars in revenue. He is a proven leader with a track<br />

record of building world-class teams.<br />

Narayana Pappu, Founder and CEO at Zendata<br />

Narayana Pappu started in Data Science at Fannie Mae be<strong>for</strong>e the term<br />

existed. He was tasked to build a better home price index than what was<br />

available in the market. For 15 years after that at PayPal, Coinbase, and<br />

Doctor on Demand, he built and scaled low-latency and high-volume internal<br />

investigation, graph, and entity resolution tools <strong>for</strong> risk management and<br />

compliance. He also launched consumer/merchant lending solutions in the<br />

US, UK, and Germany with over 5 billion dollars in annual transaction<br />

volumes each. And drove projects around data monetization with<br />

partnerships between PayPal, advertising, and payment networks; his<br />

expertise lies in building complex data solutions that are easy to implement,<br />

use, and generate incremental value.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 155<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data Is a Dish Best Served Fresh: “In the Wild” Versus Active<br />

Exploitation<br />

By Corey Bodzin, Chief Product Officer, GreyNoise Intelligence<br />

<strong>The</strong> term “In the Wild” is broadly used to refer to any activity that has been observed outside of a<br />

controlled environment. It’s an important metric in security because criminals don’t typically duplicate<br />

their ef<strong>for</strong>ts over and over in the exact same way– if they did, it would be much easier to create effective<br />

security software. But in reality, there’s always going to be something new and unpredictable.<br />

<strong>The</strong>re are many vulnerability prioritization solutions that label their in<strong>for</strong>mation “In the Wild,” but<br />

un<strong>for</strong>tunately, most of these attributes (in addition to CVSS Base Scores, Vendor bulletins, etc.) are<br />

based on regurgitated in<strong>for</strong>mation from other sources, and are already stale be<strong>for</strong>e they are even<br />

received by a security team.<br />

Just because something was once observed “in <strong>The</strong> Wild” doesn’t mean that it’s happening right at this<br />

moment. A hard-to-exploit race condition that requires a lot of time and ef<strong>for</strong>t might be “In the Wild,” but<br />

that doesn’t require the same urgency to fix as something an actor is actively exploiting today.<br />

However, if attackers are currently up to no good using software with bugs that you know you possess,<br />

then you have a big problem – one that is urgent enough to risk a temporary lack of business continuity<br />

to solve.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 156<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Question of Urgency<br />

Combating internet-wide opportunistic exploitation is a complex problem, with new vulnerabilities being<br />

weaponized at an alarming rate. In addition to the staggering increase in volume, attackers are getting<br />

better at exploiting zero-day vulnerabilities via APTs and criminals or botnets at much higher frequency,<br />

on a massive scale. <strong>The</strong> amount of time between disclosure of a new vulnerability and the start of active<br />

exploitation has been drastically reduced, leaving defenders with little time to react and respond. On the<br />

internet, the difference between one person observing something and everyone else seeing it is often<br />

quantified in just minutes. When a new vulnerability is discovered and announced, cyber criminals race<br />

to see who can find vulnerable servers first. Now, we are seeing situations in which attackers are actually<br />

starting to exploit be<strong>for</strong>e the software manufacturers are even aware that there is an issue.<br />

For example, the Progress MOVEit Transfer SQL Injection Vulnerability (CVE-2023-34362) was publicly<br />

disclosed on May 31, 2023 by Progress Software. However, it had already been exploited in the wild <strong>for</strong><br />

several weeks be<strong>for</strong>e disclosure. GreyNoise saw early activity on this tag within just a few hours, and it<br />

continued <strong>for</strong> the remainder of 2023.<br />

<strong>The</strong> level of automation associated with AI makes it easier than be<strong>for</strong>e to find vulnerabilities in<br />

software. <strong>The</strong> consequences of not keeping pace with the newest trends has never been bigger, and<br />

they are continuing to grow. If you don’t have a cohesive vulnerability prioritization strategy in place, it’s<br />

only a matter of time be<strong>for</strong>e your network is compromised.<br />

Software Vendors Crying Wolf<br />

In a world where cybersecurity teams are constantly barraged with critical alerts from multiple software<br />

vendors, it can be very difficult to determine what constitutes an actual emergency. Vulnerability<br />

management vendors need to understand the time limitations their customers are facing and be more<br />

judicious about what they label as a critical vulnerability. <strong>The</strong>y also need to find a way to incorporate<br />

knowledge about attacker behavior into their risk calculations, rather than assuming that risk is something<br />

static and immutable. Knowledge about current activity is often difficult to come by, but risk changes all<br />

the time, and our understanding needs to change, as well.<br />

One way to investigate what’s happening “In the Wild” – whether it’s people scanning <strong>for</strong> software,<br />

enumerating that software, checking <strong>for</strong> the presence of software, or actually exploiting software – is to<br />

use a proxy. This helps to determine if anyone has the capacity to exploit this vulnerability and is<br />

attempting to do so.<br />

Generally speaking, a lot of work goes into weaponizing a software vulnerability. It’s deeply challenging<br />

and requires advanced technical skill. We tend to sometimes <strong>for</strong>get that attackers are deeply motivated<br />

by profit, just like businesses are. If attackers think something is a dead end, they won’t want to invest<br />

their time. So, investigating what attackers are up to via proxy is a good way to understand how much<br />

you need to care about a specific vulnerability.<br />

In the second quarter of 2023, GreyNoise researchers observed a substantial change in the behavior of<br />

some regular internet scanning idioms. Inventory scans—where both benign and malicious actors<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 157<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


per<strong>for</strong>m regular checks <strong>for</strong> a given technology or specific vulnerability—significantly reduced in frequency<br />

and scale. <strong>The</strong> vast majority of these types of scans now come from benign sources. This, along with the<br />

speed at which organizations are compromised after the announcement of a new vulnerability, strongly<br />

suggests more capable attacker groups have their own <strong>for</strong>m of “attack surface monitoring,” and use it to<br />

avoid tripping existing defenses.<br />

<strong>The</strong>se targeted attacks threaten to circumvent existing defense capabilities and expose organizations to<br />

a new wave of disruptive breaches. In order to adequately protect their networks, defenders must evolve<br />

in response.<br />

Ultimately, there is no such thing and a set-and-<strong>for</strong>get single source of truth <strong>for</strong> cybersecurity data.<br />

However, there are definitely some great resources out there to help you prioritize and cut through the<br />

noise:<br />

• <strong>The</strong> <strong>Cyber</strong>security & Infrastructure Security Agency’s Known Exploited Vulnerabilities<br />

(CISA KEV) Catalog is an authoritative source of vulnerabilities that have been exploited in the<br />

wild as a resource <strong>for</strong> vulnerability management prioritization.<br />

• <strong>The</strong> Exploit Prediction Scoring System (EPSS) is a data-driven predictive vulnerability<br />

management framework that helps security teams anticipate and mitigate threats.<br />

• <strong>The</strong> Common Vulnerability Scoring System (CVSS) measures the inherent severity of<br />

vulnerabilities based on their characteristics and potential impacts.<br />

• Infosec search plat<strong>for</strong>ms are valuable <strong>for</strong> security researchers and analysts, as they can help<br />

find exposed devices, track threats, prepare <strong>for</strong> spear phishing simulations and more.<br />

Utilizing these resources and gaining a better understanding of how to dynamically assess risk factors<br />

will enable you to take a more holistic approach to vulnerability management.<br />

About the Author<br />

Corey Bodzin is a security expert and a proven leader with over 25 years of<br />

experience building outstanding teams and products. As Chief Product<br />

Officer at GreyNoise Intelligence, he spearheads product strategy and<br />

development, from vision to execution. Prior to GreyNoise, Bodzin served<br />

as Chief Product Officer <strong>for</strong> Eclypsium, a company that provides supply<br />

chain security <strong>for</strong> enterprise infrastructure. Previously, he served as Vice<br />

President of Product Operations and Product Management at Tenable<br />

Network Security, and held senior product and technology positions at<br />

innovative security companies such as Automox, deepwatch, ExtraHop,<br />

RSA (the security division of EMC), nCircle and Qualys. He began his<br />

career managing IT <strong>for</strong> large financial services and telecommunications firms such as Charles Schwab,<br />

Wells Fargo and Lucent Technologies.<br />

Corey can be reached online at https://www.linkedin.com/in/coreybodzin/ and at<br />

https://www.greynoise.io/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 158<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Learning from the Inevitable<br />

Why Organizations Must Prioritize Incident Response<br />

By Stephanie Aceves, Senior Director of Product Management, Tanium<br />

<strong>The</strong> talent shortage in cybersecurity continues to persist. Just last year, research showed a cybersecurity<br />

market gap of 85 workers <strong>for</strong> every 100 job openings - 15% of jobs go unfilled. <strong>The</strong>re aren’t enough<br />

professionals to cover the baseline of organizational needs, creating greater risk <strong>for</strong> businesses and more<br />

opportunity <strong>for</strong> cybercriminals.<br />

While this issue is seeping into all areas of cybersecurity, it has been especially problematic in the area<br />

of Incident Response (IR), where the impact is not as clear and the solution is, in some ways, elusive. IR<br />

requires extensive training, creativity, and experience on the job, but cybersecurity teams are so<br />

inundated with threats and vulnerabilities that most don’t prioritize time or resources toward developing<br />

great incident responders. That’s a problem.<br />

As a result, companies are getting worse at properly responding to incidents and the issue has gone<br />

unaddressed <strong>for</strong> far too long. Organizations need these types of professionals to safeguard their<br />

operations, data, and customers, but without the proper training and tools, they don’t have the ability to<br />

build out strong IR teams.<br />

Incident Response is Critical to Threat Prevention<br />

Although IR is, by definition, about having a plan <strong>for</strong> responding to attacks, it’s actually a crucial way <strong>for</strong><br />

organizations to defend against potential threats and one that must be prioritized. In 2023, Mandiant<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 159<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


eported that 15% of the breaches they investigated came from attacks where the initial access vector<br />

was a prior compromise. <strong>The</strong>se attacks could have been avoided with the right team and processes in<br />

place, conducting comprehensive incident response to adequately scope and eradicate the attacker from<br />

the environment.<br />

IR is a critical step in learning from and preventing the next incident. If teams don't have this<br />

understanding internally, how are they addressing this need? If an organization isn’t able to investigate<br />

a breach, assess and analyze, then create actionable steps based on key learnings, it is unlikely that<br />

they will be able to prevent them when they inevitably happen again. So, what’s the path <strong>for</strong>ward <strong>for</strong> IR?<br />

Short-Term Solutions Aren’t Real Solutions<br />

Currently, too many organizations follow a “nuke and pave” approach to IR, opting to just reimage<br />

computers because they don’t have the people to properly extract the wisdom from an incident. In the<br />

short term, this is faster and cheaper but has a detrimental impact on protecting against future threats.<br />

When you refuse to learn from past mistakes, you are more prone to repeating them.<br />

Conversely, organizations may turn to outsourcing. Experts in managed security services and IR have<br />

realized consulting gives them a broader reach and impact over the problem — but none of these are<br />

long-term solutions.<br />

This kind of short-sighted IR creates a false sense of security. Organizations are solving the problem <strong>for</strong><br />

the time being, but what about the future? Data breaches are going to happen, and reliance on reactive<br />

problem-solving creates a flimsy IR program that leaves an organization vulnerable to threats.<br />

Organizations need something long-term to bolster their security programs. <strong>The</strong> best way to do that is<br />

with modern tooling and refactoring IR as a core function of companies to help them extract wisdom from<br />

the suffering. Arming organizations and their cybersecurity experts with the proper training and solutions<br />

is the only surefire way to introduce better IR programs.<br />

Training and Tools Create Better Incident Response<br />

Part of the difficulty in creating a strong IR program is that there’s no one-size-fits-all solution, meaning<br />

there’s no perfect handbook <strong>for</strong> an organization to consult when bolstering its teams. <strong>The</strong> NIST<br />

<strong>Cyber</strong>security Framework recognizes this reality: by necessity, different organizations have different<br />

risks, objectives and risk tolerances. Instead, IR needs to take a training-<strong>for</strong>ward approach based on an<br />

organization’s needs and arm its people with the right skills and solutions.<br />

Knowledge-sharing is the best way to go about this. Sharing key learnings from previous attacks is how<br />

these teams can grow and prevent future disasters. <strong>The</strong> problem is that while plenty of engineers agree<br />

they learn the most when something “breaks” and that incidents are a treasure trove of knowledge <strong>for</strong><br />

security teams, these conversations are often restricted to need-to-know channels. Openness about<br />

incidents is the only way to really teach teams how to address them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 160<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong>se teams also need the right tools to get the job done. Organizations have access to a variety of<br />

these; <strong>for</strong> example, Endpoint Detection and Response tools can monitor and collect activity data to<br />

identify threats and enable quick response. Security In<strong>for</strong>mation and Event Management can a<br />

comprehensive time analysis of security alerts, while Network Traffic Analysis can find abnormalities that<br />

point toward threats. Similarly, User and Entity Behavior Analytics can find insider threats.<br />

Solutions like these give IR teams breathing room in the event of an attack by making responses faster<br />

and easier. <strong>The</strong>y relieve some of the pressure and reduce the need to spend money outsourcing IR or<br />

reimaging devices. Most importantly, they allow learning and better understanding that helps with future<br />

prevention.<br />

Focusing on IR and root cause analysis as an integral step is necessary to put organizations in the best<br />

position to handle attacks as they come and to avoid bigger disasters down the line. Preparation is crucial<br />

in cybersecurity; IR is a core piece of that kind of defense. Additionally, teams need “dwell time” to think<br />

through what happens. This goes back to having appropriate training programs in place.<br />

Tooling and training will become even more important as the threat landscape changes, and evolving<br />

technology makes it more difficult to keep up with attackers. Alongside the shortage of talent,<br />

organizations need to invest in the development of their existing teams to protect against new threats.<br />

Otherwise, they risk subjecting themselves to even greater breaches and attacks.<br />

Incident Response is the Path Forward <strong>for</strong> Better <strong>Cyber</strong>security<br />

As organizations neglect to prioritize IR to protect against a rising threat landscape, they leave<br />

opportunities open <strong>for</strong> cyberattackers to take advantage of their same weaknesses in their defenses.<br />

Every breach should be a learning opportunity so that teams are able to extract in<strong>for</strong>mation that bolsters<br />

security programs against future threats.<br />

About the Author<br />

Stephanie Aceves is a Senior Director of Product Management at<br />

Tanium. She is a cybersecurity subject matter expert and part of her<br />

Tanium career helping build out Tanium’s presence in Latin America.<br />

Prior to Tanium, she was an ethical hacker at Ernst & Young, getting<br />

paid to hack into companies in a wide range of industries. Her<br />

expertise was in compromising internal corporate networks. She has<br />

obtained GIAC certifications <strong>for</strong> both <strong>for</strong>ensic examination and<br />

penetration testing. Stephanie can be reached online at LinkedIn and<br />

at our company website https://tanium.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 161<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Navigating Holiday Threats: Strengthening PC Resilience with<br />

Desktops as a Service (DaaS)<br />

Taking a look at this year’s holiday cybersecurity threats and modern ways to reduce the attack<br />

landscape<br />

By Amitabh Sinha, CEO & Co-Founder of Workspot<br />

<strong>The</strong> holiday season, often seen as a time <strong>for</strong> joy and celebration, has trans<strong>for</strong>med into a crucial period<br />

<strong>for</strong> organizational cybersecurity. With online activity surging and remote work becoming the norm, this<br />

season presents unique challenges that amplify cybersecurity risks.<br />

<strong>The</strong> financial and reputational fallout from cyber incidents can be significant. For example, the cost of a<br />

data breach has risen by 10% in the past year, now averaging $4.8 million. Moreover, larger enterprises<br />

face an annual loss of approximately $400 billion due to disruptions and downtime in critical operations.<br />

Beyond immediate financial impacts, a loss of trust among customers and investors can hinder growth.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 162<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Compounding these issues, even cybersecurity tools can inadvertently disrupt our computing<br />

infrastructure, as seen with the Crowdstrike bug.<br />

To safeguard against financial and reputational damage, cybersecurity and IT leaders must take<br />

proactive steps, such as implementing Desktop as a Service (DaaS) strategies, to address the<br />

heightened risks of this busy season.<br />

<strong>Cyber</strong> Risks During the Holiday Season<br />

Every winter, organizations experience increased disruptions, from targeted cyberattacks to IT outages.<br />

<strong>The</strong> rise in online shopping on corporate devices, along with personal devices being used <strong>for</strong> work, puts<br />

corporate networks at greater risk. Additionally, the dispersed nature of remote work complicates<br />

monitoring and detection of potential threats.<br />

<strong>The</strong> holiday season has become a prime target <strong>for</strong> various cyber threats, including ransomware, data<br />

breaches, and phishing attacks. Ransomware groups often exploit the increased workload and staffing<br />

shortages during this time, potentially demanding payments of up to $2.7 million from enterprises. Data<br />

breaches can expose sensitive in<strong>for</strong>mation, leading to financial losses, reputational harm, and regulatory<br />

penalties. Phishing attacks, often disguised with holiday themes, can deceive employees into clicking<br />

malicious links or downloading harmful attachments, compromising credentials and providing attackers<br />

with access to organizational systems. <strong>The</strong>se threats are particularly perilous, as a single click from any<br />

user can lead to a successful breach.<br />

Desktop as a Service (DaaS): A Vital Component <strong>for</strong> PC Resilience<br />

DaaS addresses two key challenges <strong>for</strong> IT:<br />

1. Implementing a Zero-Trust End User Computing Strategy<br />

2. Establishing a PC Resilience Strategy in the Event of a <strong>Cyber</strong>attack<br />

Zero Trust End User Computing Strategy with DaaS<br />

Despite spending over $300 billion annually on cybersecurity software and services, the number of cyber<br />

threats continues to rise. A more effective approach involves shifting focus from managing and securing<br />

devices to securely delivering applications through a zero-trust endpoint. While traditional Virtual Desktop<br />

Infrastructure (VDI) allows <strong>for</strong> virtual application and desktop delivery on any device, it is often complex<br />

and costly, resulting in a subpar user experience. In contrast, DaaS is a modern SaaS solution that fulfills<br />

the zero-trust promise of VDI at a significantly reduced cost and complexity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 163<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


PC Resilience Strategy with DaaS<br />

DaaS plays a crucial role in creating PC resilience, whether in the event of a ransomware attack or a bug<br />

similar to the Crowdstrike incident. <strong>The</strong> concept is straight<strong>for</strong>ward: maintain a backup virtual desktop<br />

environment. As a cloud-based solution, you only incur costs when resources are actively used. If an<br />

attack or issue arises, you can quickly activate the DaaS solution, providing a computing environment <strong>for</strong><br />

users until the problem is resolved.<br />

About the Author<br />

Amitabh Sinha has more than 20 years of experience in enterprise software,<br />

end-user computing, mobile, and database software. Amitabh cofounded<br />

Workspot with Puneet Chawla and Ty Wang in August 2012.<br />

Prior to Workspot, Amitabh was the general manager <strong>for</strong> enterprise<br />

desktops and Apps at Citrix Systems. In his five years at Citrix, Amitabh was<br />

vice president of product management <strong>for</strong> XenDesktop and vice president<br />

of engineering <strong>for</strong> the Advanced Solutions Group. Amitabh has a Ph.D. in<br />

computer science from the University of Illinois, Urbana-Champaign.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 164<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Rethinking NHI Security: <strong>The</strong> Essential Shift to Zero Trust<br />

Security and Ephemeral Identities<br />

By Ofir Har-Chen, Co-Founder & CEO, Clutch Security<br />

As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding<br />

human identities to protecting Non-Human Identities (NHIs)—such as API keys, service accounts,<br />

secrets, tokens, and certificates. While traditional approaches focused on managing users and their<br />

credentials, the rapid expansion of cloud services, automation, and APIs has accelerated the growth of<br />

machine-to-machine interactions. NHIs have become some of the most critical assets within an<br />

organization ’s cybersecurity perimeter, facilitating business operations, automating processes, managing<br />

cloud services, and enabling seamless integration between applications and systems. However, as NHIs<br />

proliferate across cloud, SaaS, and on-premise environments, they also become significant attack<br />

vectors.<br />

Organizations have recognized that NHIs present a unique and expanding attack surface. Managing<br />

them has become increasingly complex, decentralized, and fragmented. Many security teams focus on<br />

securing these identities by configuring them correctly, en<strong>for</strong>cing governance policies, and storing them<br />

securely in vaults. But that’s only part of the equation. <strong>The</strong> real question is no longer just “Are my NHIs<br />

secure?” but also “Who is using them, and are they being used legitimately?” and “How can I<br />

prevent attackers from exploiting NHIs, even if they are compromised?”<br />

This article explores the complexity of securing NHIs and presents a fresh perspective: it’s not the<br />

identity itself that needs securing, but how it is being used.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 165<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> NHI Landscape: Complexity and Blind Spots<br />

NHIs are embedded throughout an organization’s infrastructure, from cloud services and on-prem<br />

environments to CI/CD pipelines, code repositories, data warehouses, and third-party integrations. With<br />

estimates suggesting that NHIs now outnumber human identities by at least 45:1, securing them can be<br />

an overwhelming task.<br />

What compounds this challenge is the fragmented nature of NHIs. API keys and service accounts, <strong>for</strong><br />

instance, are often distributed across multiple plat<strong>for</strong>ms, each with its own security protocols. This<br />

fragmentation creates blind spots <strong>for</strong> security teams, making it difficult to maintain consistent oversight<br />

of how and where NHIs are used.<br />

Traditional security practices focus on NHI lifecycle management—revoking stale identities, en<strong>for</strong>cing<br />

least privilege access controls, and configuring them properly. While these measures are necessary, they<br />

fail to address the core issue: trust. Who is using these NHIs, and can their usage be trusted?<br />

Securing the Identity Is Not Enough<br />

Context and trust are essential <strong>for</strong> NHI security. Consider an API key or service account as a car key:<br />

just because someone has the key doesn’t mean they are authorized to drive, nor does it guarantee<br />

proper usage. <strong>The</strong> key merely grants access—it doesn’t tell you who’s behind the wheel or what they<br />

intend to do. Similarly, NHIs grant access, but having the credentials doesn’t guarantee legitimate use.<br />

For instance, an API key <strong>for</strong> cloud workloads can be exploited to escalate privileges or execute malicious<br />

operations if it falls into the wrong hands—even if the key itself is properly configured. Without continuous<br />

monitoring and validation, NHIs can become entry points <strong>for</strong> attackers.<br />

While storing NHIs securely in vaults or secret stores is critical, it’s insufficient. Secure storage alone<br />

does not offer visibility into how NHIs are used once retrieved. It’s akin to locking a car key in a safe;<br />

once the key is out, how do you know who’s using it? Organizations need to go beyond storage and focus<br />

on securing the consumption of NHIs.<br />

<strong>The</strong> Ephemeral Approach: Reducing Exposure Time<br />

A key strategy to reduce NHI-related risk is the adoption of ephemeral credentials. Unlike long-lived<br />

credentials that remain vulnerable if exposed, ephemeral NHIs are short-lived and automatically expire<br />

after a set period. By dynamically generating and revoking these credentials, the attack surface is<br />

drastically reduced, and the window of opportunity <strong>for</strong> attackers is minimized.<br />

Integrating ephemeral secrets into automated workflows, such as CI/CD pipelines or cloud-native<br />

environments, allows security teams to manage credentials seamlessly without business interruptions.<br />

This approach not only enhances security but also improves operational efficiency by reducing the<br />

overhead associated with managing long-lived credentials.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 166<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Moving Beyond Secret Rotations<br />

Adopting a Zero Trust approach, where every NHI consumer is continuously validated, and embracing<br />

ephemeral credentials renders traditional secret rotations less effective. While rotating secrets or API<br />

keys regularly can limit the time an attacker has to exploit them, this practice has significant drawbacks:<br />

• Ongoing Risk: Even frequent rotations leave windows of opportunity <strong>for</strong> attackers to exploit NHIs<br />

during their lifespan. Rotations do not address who is using the NHI, how it’s being used, or the<br />

intent behind its use.<br />

• Resource-Intensive: Per<strong>for</strong>ming frequent rotations, such as hourly, is impractical and burdens<br />

security teams with significant operational overhead, diverting focus from other critical tasks.<br />

• Potential Downtime: Frequent rotations may disrupt application availability, and missteps in the<br />

process can lead to downtime or skipped rotations, creating unintended security gaps.<br />

• Team Friction: Secret rotations can introduce friction between security teams and other<br />

departments, like IT and DevOps, who are responsible <strong>for</strong> ensuring that rotations don’t disrupt<br />

services, creating operational bottlenecks.<br />

Secret rotations can be an effective reactive measure, but they don’t address the core issue of context<br />

and trust. <strong>The</strong> focus should shift to continuous consumer validation and ephemeral identities, offering<br />

a more proactive solution.<br />

Shifting Focus: From Configuration to Trust<br />

While securely configuring and storing NHIs is important, it’s just the starting point. <strong>The</strong> true challenge<br />

lies in maintaining continuous trust and verification throughout the NHI’s lifecycle. Security teams<br />

must move beyond static controls and adopt a dynamic, context-aware approach where monitoring<br />

the real-time use of NHIs is as important as their initial setup. This approach ensures that NHIs are<br />

validated constantly and, where applicable, rendered volatile through ephemeral credentials, leaving no<br />

security gaps.<br />

Actionable Steps <strong>for</strong> Security Teams<br />

1. Continuous Contextual Visibility Holistic visibility into all NHIs across the enterprise is<br />

essential. A contextualized inventory helps security teams understand each NHI’s origin,<br />

associated users, storage locations, consumers, and accessed resources, enabling effective<br />

monitoring.<br />

2. Continuous Monitoring and Behavioral Analytics Continuous monitoring builds trust in NHI<br />

usage. By analyzing normal usage patterns, security teams can detect anomalies—such as NHIs<br />

being used in unusual locations or accessing unfamiliar systems—that may indicate a<br />

compromise.<br />

3. Dynamic Trust Attribution Trust should be dynamic, not static. Regularly assess the entity<br />

behind each NHI, whether it’s an application, script, or automated process, ensuring its behavior<br />

aligns with expected patterns. This aligns with Zero Trust principles, where every request is<br />

continuously validated.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 167<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4. Adopting Ephemeral NHIs Wherever possible, adopt ephemeral NHIs to minimize the risks<br />

associated with long-lived credentials. <strong>The</strong>se short-lived identities are deleted after use, rendering<br />

them useless to attackers.<br />

Conclusion<br />

Securing NHIs requires more than lifecycle management and secure storage - it demands contextual<br />

visibility, continuous monitoring, and dynamic trust attribution. By embracing Zero Trust principles<br />

and adopting ephemeral credentials, organizations can significantly reduce the risk of breaches,<br />

ensuring that NHIs are only used by authorized and legitimate entities.<br />

About the Author<br />

Ofir Har-Chen is the Co-Founder & CEO of Clutch Security, the industry’s<br />

first Universal Non-Human Identity Security Plat<strong>for</strong>m, purpose-built <strong>for</strong> the<br />

enterprise. With over 15 years of experience in security and leadership roles,<br />

Ofir has managed large-scale incident response and preemptive<br />

engagements <strong>for</strong> Fortune 500 companies, and has led high-scale strategic<br />

development and fast-paced, customer-facing teams globally.<br />

Ofir can be reached online at ofir@clutch.security, and more in<strong>for</strong>mation is<br />

available on Clutch’s website https://www.clutch.security/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 168<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Revolutionizing Third Party Risk Management: <strong>The</strong> Future with<br />

Autonomous Pen-Testing<br />

By Arun Kumar Krishna, Chief Technology Officer, Sennovate INC<br />

In today's interconnected digital landscape, businesses are more dependent than ever on third-party<br />

vendors and partners. While these relationships bring numerous benefits, they also introduce significant<br />

risks. Traditional third-party risk management (TPRM) approaches, largely reliant on questionnaires and<br />

self-assessments, often fall short in providing an accurate picture of the actual threats posed. As a<br />

thought leader in cybersecurity, I advocate <strong>for</strong> a paradigm shift towards leveraging autonomous<br />

penetration testing (pen-testing) in an assumed breach approach to evaluate third-party threats. This<br />

innovative strategy promises to trans<strong>for</strong>m TPRM from a theoretical exercise into a robust, action-oriented<br />

defense mechanism.<br />

<strong>The</strong> Limitations of Traditional TPRM<br />

Traditional TPRM relies heavily on questionnaires and self-assessments. Vendors are asked to provide<br />

in<strong>for</strong>mation about their security measures, compliance with regulations, and potential vulnerabilities.<br />

While this approach provides a baseline understanding, it has several critical limitations:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 169<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Self-Reported Data: Vendors may unintentionally or intentionally misrepresent their security<br />

posture.<br />

2. Static In<strong>for</strong>mation: Risk assessments often occur annually or semi-annually, failing to capture<br />

real-time changes in the threat landscape.<br />

3. Lack of Depth: Questionnaires focus on policy and procedure rather than actual security<br />

practices, providing a superficial understanding of risks.<br />

4. Resource Intensive: <strong>The</strong> process is time-consuming and requires significant resources to review<br />

and analyze the responses.<br />

Given these limitations, it is evident that traditional TPRM does not adequately address the dynamic and<br />

complex nature of cybersecurity threats.<br />

<strong>The</strong> Assumed Breach Approach<br />

<strong>The</strong> assumed breach approach is a proactive security strategy that operates under the assumption that<br />

a breach has already occurred or will occur. This mindset shifts the focus from preventing breaches to<br />

detecting and mitigating them quickly. Applying this approach to TPRM involves simulating real-world<br />

attacks on third-party systems to identify vulnerabilities and assess their security posture.<br />

Autonomous Pen-Testing: <strong>The</strong> Game Changer<br />

Autonomous pen-testing is a cutting-edge technology that uses artificial intelligence (AI) and machine<br />

learning (ML) to simulate sophisticated cyber-attacks. Unlike traditional pen-testing, which requires<br />

human intervention, autonomous pen-testing continuously scans and tests systems <strong>for</strong> vulnerabilities<br />

without manual input. Here's how it revolutionizes TPRM:<br />

1. Continuous Monitoring<br />

Autonomous pen-testing provides continuous, real-time monitoring of third-party systems. This capability<br />

ensures that any new vulnerabilities are detected promptly, allowing organizations to respond swiftly.<br />

Continuous monitoring is crucial in today's rapidly evolving threat landscape, where new vulnerabilities<br />

emerge daily.<br />

2. Comprehensive Coverage<br />

Autonomous pen-testing tools can simulate a wide range of attack vectors, including external and internal<br />

threats. This comprehensive coverage ensures that all potential entry points are tested, providing a<br />

holistic view of the third-party's security posture.<br />

3. Scalability<br />

One of the significant advantages of autonomous pen-testing is its scalability. It can simultaneously test<br />

multiple third-party systems without the need <strong>for</strong> additional resources. This scalability is particularly<br />

beneficial <strong>for</strong> large organizations with numerous third-party relationships.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 170<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4. Objective Assessment<br />

Unlike questionnaires and self-assessments, autonomous pen-testing provides an objective assessment<br />

of third-party security. <strong>The</strong> results are based on actual tests and real-world scenarios, eliminating the<br />

biases and inaccuracies associated with self-reported data.<br />

5. Cost-Effectiveness<br />

While the initial investment in autonomous pen-testing tools may be significant, the long-term benefits<br />

outweigh the costs. Continuous and automated testing reduces the need <strong>for</strong> frequent manual<br />

assessments, saving time and resources. Moreover, early detection of vulnerabilities can prevent costly<br />

breaches and associated damages.<br />

Implementing Autonomous Pen-Testing in TPRM<br />

Transitioning to an autonomous pen-testing approach in TPRM involves several key steps:<br />

1. Selecting the Right Tools<br />

Organizations must choose autonomous pen-testing tools that align with their specific needs and risk<br />

profiles. Factors to consider include the tool's comprehensiveness, ease of integration, and support <strong>for</strong><br />

various attack vectors.<br />

2. Integrating with Existing Systems<br />

Autonomous pen-testing tools should seamlessly integrate with the organization's existing security<br />

infrastructure. This integration ensures that the testing process is streamlined and that results are easily<br />

accessible <strong>for</strong> analysis and response.<br />

3. Defining Testing Parameters<br />

Organizations need to define the parameters and scope of the pen-tests. This includes specifying the<br />

types of attacks to simulate, the frequency of tests, and the third-party systems to be tested.<br />

4. Continuous Improvement<br />

<strong>The</strong> results of autonomous pen-testing should be used to continuously improve both the organization's<br />

and the third-party's security posture. This involves addressing identified vulnerabilities, updating security<br />

policies, and refining the testing process based on emerging threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 171<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Future of TPRM<br />

<strong>The</strong> adoption of autonomous pen-testing in an assumed breach approach represents a significant leap<br />

<strong>for</strong>ward in TPRM. As more organizations embrace this innovative strategy, we can expect several<br />

trans<strong>for</strong>mative impacts on the field:<br />

1. Shift from Compliance to Security<br />

Traditional TPRM often focuses on compliance with regulations and standards. While compliance is<br />

important, it does not necessarily equate to security. Autonomous pen-testing shifts the focus towards<br />

actual security, ensuring that third-party systems are genuinely resilient against cyber threats.<br />

2. Enhanced Collaboration<br />

<strong>The</strong> assumed breach approach fosters a collaborative relationship between organizations and their third<br />

parties. By working together to identify and address vulnerabilities, both parties can strengthen their<br />

security postures and build a more resilient ecosystem.<br />

3. Increased Accountability<br />

Autonomous pen-testing provides clear, objective evidence of a third party's security capabilities. This<br />

transparency increases accountability, encouraging third parties to prioritize and invest in robust security<br />

measures.<br />

4. Proactive Threat Management<br />

With continuous monitoring and real-time threat detection, organizations can shift from a reactive to a<br />

proactive approach to threat management. This proactive stance enables quicker response times and<br />

reduces the potential impact of security incidents.<br />

Case Studies: Success Stories<br />

To illustrate the effectiveness of autonomous pen-testing in TPRM, let's explore a few real-world success<br />

stories:<br />

Case Study 1: Financial Institution<br />

A large financial institution with numerous third-party relationships implemented autonomous pen-testing<br />

to enhance its TPRM program. <strong>The</strong> continuous monitoring capability allowed the institution to identify and<br />

remediate vulnerabilities in real-time, significantly reducing the risk of data breaches. As a result, the<br />

institution experienced a significant decrease in security incidents related to third parties within the first<br />

year of implementation.<br />

Case Study 2: Healthcare Provider<br />

A healthcare provider, concerned about the security of its patient data, adopted an assumed breach<br />

approach with autonomous pen-testing. <strong>The</strong> comprehensive testing revealed several critical<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 172<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


vulnerabilities in third-party systems that traditional assessments had missed. By addressing these<br />

vulnerabilities, the provider ensured the protection of sensitive patient in<strong>for</strong>mation and maintained<br />

compliance with healthcare regulations.<br />

Case Study 3: Technology Company<br />

A technology company with a complex supply chain leveraged autonomous pen-testing to assess the<br />

security of its third-party vendors. <strong>The</strong> scalability of the pen-testing tool allowed the company to test<br />

multiple vendors simultaneously, providing a comprehensive view of the supply chain's security posture.<br />

This proactive approach enabled the company to mitigate risks be<strong>for</strong>e they could be exploited by cyber<br />

adversaries.<br />

Challenges and Considerations<br />

While the benefits of autonomous pen-testing are clear, organizations should be mindful of the challenges<br />

and considerations involved in its implementation:<br />

1. Initial Investment<br />

<strong>The</strong> cost of acquiring and integrating autonomous pen-testing tools can be significant. Organizations<br />

need to weigh this investment against the potential savings from preventing breaches and improving<br />

security.<br />

2. Skill Requirements<br />

While autonomous pen-testing reduces the need <strong>for</strong> manual intervention, organizations still require skilled<br />

personnel to interpret results and take appropriate action. Investing in training and development is crucial<br />

to maximize the benefits of this technology.<br />

3. Third-Party Collaboration<br />

Successful implementation of autonomous pen-testing requires collaboration and cooperation from thirdparty<br />

vendors. Organizations must establish clear communication channels and foster a culture of<br />

transparency and trust.<br />

4. Regulatory Compliance<br />

Organizations must ensure that their autonomous pen-testing practices comply with relevant regulations<br />

and standards. This includes obtaining necessary permissions and maintaining records of testing<br />

activities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 173<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Sennovate Can Help<br />

Sennovate, a leader in cybersecurity solutions, is uniquely positioned to assist organizations in<br />

overcoming these challenges and successfully implementing autonomous pen-testing <strong>for</strong> TPRM. Here’s<br />

how Sennovate can help:<br />

1. Expert Guidance and Consultation<br />

Sennovate provides expert guidance to help organizations select the most suitable autonomous pentesting<br />

tools. Our team of experienced cybersecurity professionals works closely with clients to<br />

understand their specific needs and risk profiles, ensuring that the chosen solutions align with their<br />

security objectives.<br />

2. Seamless Integration<br />

We assist organizations in integrating autonomous pen-testing tools with their existing security<br />

infrastructure. Our seamless integration process ensures that the tools work efficiently within the client’s<br />

environment, providing real-time monitoring and comprehensive coverage without disrupting operations.<br />

3. Customized Testing Parameters<br />

Sennovate helps organizations define and customize the parameters <strong>for</strong> pen-tests, ensuring that the<br />

testing scope aligns with their risk management strategies. Our tailored approach ensures that all relevant<br />

attack vectors are tested, providing a thorough assessment of third-party security.<br />

4. Continuous Improvement and Training<br />

We offer ongoing support and training to help organizations interpret the results of autonomous pentesting<br />

and take appropriate action. Our continuous improvement programs ensure that clients stay<br />

ahead of emerging threats and maintain a robust security posture.<br />

5. Collaboration with Third Parties<br />

Sennovate facilitates collaboration between organizations and their third-party vendors, promoting<br />

transparency and trust. Our collaborative approach ensures that all parties are aligned in their security<br />

objectives and work together to address identified vulnerabilities.<br />

6. Regulatory Compliance Support<br />

We ensure that our clients’ autonomous pen-testing practices comply with relevant regulations and<br />

standards. Sennovate’s comprehensive compliance support includes obtaining necessary permissions,<br />

maintaining testing records, and providing documentation <strong>for</strong> regulatory audits.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 174<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Conclusion<br />

<strong>The</strong> integration of autonomous pen-testing in an<br />

assumed breach approach marks a new era in thirdparty<br />

risk management. This innovative strategy<br />

addresses the limitations of traditional TPRM<br />

methods, providing continuous, objective, and<br />

comprehensive assessments of third-party security.<br />

As organizations increasingly adopt this approach, we<br />

can expect a significant reduction in cyber risks and a<br />

stronger, more resilient digital ecosystem.<br />

As a thought leader in cybersecurity, I am excited about the potential of autonomous pen-testing to<br />

revolutionize TPRM. By shifting the focus from assumed risks to actual risks, we can build a safer and<br />

more secure future <strong>for</strong> businesses and their stakeholders. Embracing this technology is not just a<br />

strategic advantage; it is a necessity in the ever-evolving landscape of cyber threats.<br />

In conclusion, the time is now <strong>for</strong> organizations to rethink their TPRM strategies and embrace the power<br />

of autonomous pen-testing. <strong>The</strong> future of cybersecurity depends on our ability to innovate and adapt, and<br />

autonomous pen-testing is a critical step in that direction. Together, we can trans<strong>for</strong>m third-party risk<br />

management and create a more secure digital world.<br />

About the Author<br />

Arun Kumar Krishna is Chief Technology Officer of Sennovate Inc. He has<br />

12+ year of experience and specializes in AI-driven cybersecurity. Leveraging<br />

deep technical expertise and Web3 background to protect clients' critical<br />

assets. Building scalable, resilient security solutions and driving industry<br />

innovation. He recently published a book on AI in <strong>Cyber</strong>security:” Trans<strong>for</strong>ming<br />

Threat Detection and Response.”<br />

Arun can be reached online at akrishna@sennovate.com and on Linkedin as<br />

well as at our company website http://www.sennovate.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 175<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Hidden Dangers of Free Messaging Apps: Security Risks<br />

and Data Mining Threats<br />

By Nicole Heron, Marketing Manager at Salt Communications<br />

In the era of constant communication with friends, family and peers, free messaging apps have become<br />

a ubiquitous part of our daily lives. However, their convenience often comes with hidden dangers,<br />

particularly <strong>for</strong> businesses. <strong>The</strong> security risks and data mining threats associated with these apps can<br />

have serious implications.<br />

Here’s why using a secure communication system is vital and why businesses should consider investing<br />

in robust, enterprise-grade solutions.<br />

Security Risks of Free Messaging Apps<br />

Free messaging apps are attractive targets <strong>for</strong> cybercriminals due to their widespread use and often<br />

inadequate security measures. <strong>The</strong>se apps can expose users to various security risks, including:<br />

1. Lack of Control: <strong>The</strong> main issue with using WhatsApp <strong>for</strong> business is the lack of control organisations<br />

have over the plat<strong>for</strong>m, meaning they cannot regulate employee communications. This absence of<br />

oversight can lead to unmonitored sharing of sensitive in<strong>for</strong>mation outside of intended recipients,<br />

increasing the risk of data leaks and non-compliance with industry regulations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 176<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Malware Distribution: Popular messaging plat<strong>for</strong>ms are common vectors <strong>for</strong> distributing malware due<br />

to their open nature, allowing anyone to communicate with anyone else. This approach means users<br />

cannot prevent hackers from contacting them via these apps, which can leave them open to receiving<br />

malware, compromising their devices and stealing their in<strong>for</strong>mation. <strong>Cyber</strong>criminals often disguise<br />

malicious links or attachments within messages, which, when opened, can install malware that captures<br />

keystrokes, accesses files, or even takes control of the entire device.<br />

3. Unauthorised Access: Poor authentication mechanisms can allow unauthorised individuals to access<br />

accounts, leading to data breaches. Weak passwords, lack of multi-factor authentication, and insufficient<br />

encryption practices make it easier <strong>for</strong> attackers to gain entry. Once inside, they can steal sensitive<br />

in<strong>for</strong>mation, impersonate users, or spread misin<strong>for</strong>mation, potentially causing significant financial and<br />

reputational damage.<br />

Data Mining Threats<br />

One of the most insidious dangers of free messaging apps is data mining. <strong>The</strong>se plat<strong>for</strong>ms often collect<br />

and analyse user data to monetise their services, posing significant privacy concerns:<br />

1. Data Harvesting: User conversations, metadata, and personal in<strong>for</strong>mation are often harvested by free<br />

messaging apps. This data collection includes details such as who you communicate with, the frequency<br />

of communication, and even the content of your messages. This harvested data is frequently sold to third<br />

parties, such as advertisers or data brokers, often without the user’s explicit consent. This practice raises<br />

significant privacy concerns, as users may not be fully aware of the extent to which their personal data is<br />

being collected and shared.<br />

2. Targeted Advertising: <strong>The</strong> data collected from users is used to create detailed user profiles, which<br />

are then utilised <strong>for</strong> targeted advertising. <strong>The</strong>se profiles can include in<strong>for</strong>mation about your interests,<br />

behaviours, and preferences, enabling advertisers to deliver highly personalised adverts. While this might<br />

be seen as beneficial to some, it can feel intrusive to many users, as it often reveals just how much the<br />

app knows about them. This erosion of privacy can lead to a loss of trust in the plat<strong>for</strong>m, as users become<br />

increasingly concerned about how their in<strong>for</strong>mation is being used.<br />

3. Uncontrolled Data Sharing: Data shared with third parties by messaging apps can be further sold,<br />

shared, or even leaked. Once the data is out of the app’s control, it becomes challenging to monitor how<br />

it is being used, leading to potential misuse. This uncontrolled data sharing can result in sensitive<br />

in<strong>for</strong>mation being exposed to malicious actors or used in ways the user never intended, such as identity<br />

theft, financial fraud, or unwanted solicitation. <strong>The</strong> lack of transparency and control over this data sharing<br />

further undermines user trust and can have serious consequences <strong>for</strong> personal privacy and security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 177<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Importance of Secure Communication Systems<br />

For businesses, relying on consumer apps <strong>for</strong> communication is not just risky but potentially disastrous.<br />

Here’s why investing in a robust, enterprise-grade communication solution is essential:<br />

1. Data Privacy: Enterprise-grade solutions ensure that communications are private and secure,<br />

safeguarding sensitive business in<strong>for</strong>mation from unauthorised access. Unlike free messaging apps,<br />

which may expose data to various risks, these solutions employ robust encryption and security protocols.<br />

This means that only the intended recipients can access the in<strong>for</strong>mation, significantly reducing the risk of<br />

data breaches and ensuring that confidential business discussions remain protected from prying eyes.<br />

2. Regulatory Compliance: Businesses must adhere to a range of data protection regulations, such as<br />

DORA, SEC, GDPR, HIPAA, and others. Secure communication systems are designed to help maintain<br />

compliance with these regulations by offering advanced security features, data control, and compliance<br />

configurations. <strong>The</strong>se systems allow businesses to en<strong>for</strong>ce data handling policies, ensure that<br />

communications are encrypted, and provide the necessary tools to demonstrate compliance during<br />

audits, thus avoiding hefty fines and legal complications.<br />

3. Overall Security: Enterprise and military grade communication solutions provide comprehensive<br />

security measures, including end-to-end encryption, strong authentication methods, flexible deployment,<br />

strict data retention policies and regular security updates. <strong>The</strong>se measures ensure that business<br />

communications are protected against the ever-evolving landscape of cyber threats. By continuously<br />

updating security protocols and applying patches, these solutions defend against vulnerabilities that<br />

cybercriminals might exploit, thereby safeguarding the integrity and confidentiality of business<br />

communications.<br />

4. Maintaining Trust: Using secure communication systems reflects a business’s commitment to<br />

protecting client and employee in<strong>for</strong>mation, which is crucial <strong>for</strong> maintaining trust and upholding the<br />

company’s reputation. Clients and employees alike expect their personal and professional in<strong>for</strong>mation to<br />

be handled with the utmost care. By prioritising secure communications, businesses demonstrate their<br />

dedication to safeguarding this in<strong>for</strong>mation, thereby strengthening relationships and fostering loyalty.<br />

5. Regain Control: <strong>The</strong> hidden dangers of free messaging apps—such as security risks and data mining<br />

threats—underscore the vital importance of using a secure communication system. For businesses, the<br />

stakes are even higher. Investing in a robust, secure communication solution not only ensures data<br />

privacy and regulatory compliance but also bolsters overall security. By regaining control over who<br />

accesses the system as well as how and where communications are managed and secured, businesses<br />

can protect sensitive in<strong>for</strong>mation, maintain trust, and shield themselves from the increasingly common<br />

threats of data breaches and privacy violations.<br />

In an age where data breaches and privacy violations are increasingly common, the hidden dangers of<br />

free messaging apps cannot be ignored—especially by businesses. While these apps offer convenience,<br />

they also expose users to significant security risks and data mining threats, which can lead to serious<br />

repercussions <strong>for</strong> both individuals and organisations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 178<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Salt is the pioneer in providing a comprehensive solution <strong>for</strong> encrypted communications between<br />

smartphone users and secure systems within their organisation. <strong>The</strong> Salt product offers centralised<br />

control <strong>for</strong> administrators, integrating with trusted internal services, and providing secure calls,<br />

messaging, and file transfers <strong>for</strong> users making critical decisions on the go.<br />

In a landscape where choosing between free messaging apps and secure communication systems<br />

equates to choosing between vulnerability and protection, Salt enables businesses to safeguard their<br />

operations against the constantly evolving threats of cyberattacks. By opting <strong>for</strong> Salt, organisations<br />

demonstrate a commitment to security and privacy, protecting not only their reputation but also their<br />

future.<br />

To sign up <strong>for</strong> a free trial or demo of Salt Communications contact us on info@saltcommunications.com<br />

or visit our website at https://saltcommunications.com/.<br />

References:<br />

https://www.consumernotice.org/data-protection/mining/<br />

https://saltcommunications.com/news/the-not-so-hidden-dangers-of-conducting-business-overwhatsapp-why-your-data-isnt-safe/<br />

About the Author<br />

Nicole Heron, Marketing Manager at Salt Communications. Nicole<br />

has been working within the Salt Communications Marketing team<br />

<strong>for</strong> several years and has played a crucial role in building Salt<br />

Communications reputation. Nicole implements many of Salt<br />

Communications digital ef<strong>for</strong>ts as well as managing Salt<br />

Communications presence at events, both virtual and in person<br />

events <strong>for</strong> the company.<br />

Nicole can be reached online at LINKEDIN, TWITTER or by<br />

emailing nicole.heron@saltcommunications.com and at our<br />

company website https://saltcommunications.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 179<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security Through Collaboration: France and Saudi Arabia<br />

By Jacques de la Riviere, CEO, Gatewatcher<br />

With a population of just over thirty-six million, Saudi Arabia has established itself as a key international<br />

player in cybersecurity. Through its various development programmes - particularly the Saudi Vision 2030<br />

project, the Kingdom (KSA) has begun building strong cyber defense capabilities. It is now a balancing<br />

<strong>for</strong>ce in the Middle East, playing a regulatory role on the international stage.<br />

However, this strategic shift has made it a prime target <strong>for</strong> cyberattacks. In 2020, Saudi Arabia recorded<br />

over 22.5mn cyberattacks. By 2022 this had risen to 110mn. Furthermore, Forrester Group research<br />

commissioned by Tenable found that 40% of cyberattacks against Saudi Arabian organisations in the<br />

past two years have been successful.<br />

This level of threat arises because the kingdom faces the same risks as Western countries: rapid digital<br />

trans<strong>for</strong>mation, growing interconnection of critical infrastructures, and increasingly sophisticated<br />

cybercriminals exploiting vulnerabilities, be<strong>for</strong>e robust defenses are implemented.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 180<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A bold national strategy: innovation at the heart of defense<br />

Addressing these threats, Saudi Arabia is not merely reactive. <strong>The</strong> KSA is structuring its cyber defense<br />

along two key axes. On one hand, a coherent national organization, and on the other, a strategy that<br />

balances investment with the establishment of a clear legal framework.<br />

In 2017, Saudia Arabia created and then institutionalized, the National <strong>Cyber</strong>security Authority (NCA).<br />

This body set clear policies and strong regulatory frameworks, to develop a nationwide, holistic cyber<br />

strategy.<br />

A key part of this evolution has been international cybersecurity events, including large-scale<br />

conferences. In February 2020, the first edition of the Global <strong>Cyber</strong>security Forum (GCF) launched under<br />

Saudi Arabia’s G20 presidency, aiming to contribute to a more resilient and inclusive cyberspace. This<br />

<strong>for</strong>um attracts over 9,000 participants from 117 countries, including cybersecurity experts, NGOs, private<br />

companies, and international organizations.<br />

<strong>The</strong> Forum fosters multilateral collaboration and progress on socio-economic challenges related to<br />

cybersecurity. It has had a direct impact on the development of a regulatory framework that matches the<br />

digital ambitions of Saudi Arabia. <strong>The</strong> resultant anti-cybercrime laws help protect the KSA in the face of<br />

160,000 daily cyber incidents.<br />

France: A historical player in Saudi tech development<br />

Saudi Arabia’s desire to expand its influence and attract expertise has led the country to open to <strong>for</strong>eign<br />

businesses.<br />

France is a respected partner in Saudi technological development, particularly thanks to its cybersecurity<br />

expertise. Exchange programmes between French universities and institutions like the Prince<br />

Mohammed bin Salman College <strong>for</strong> <strong>Cyber</strong>security are examples of this cooperation, fostering a robust<br />

ecosystem <strong>for</strong> the movement of talent.<br />

This partnership demonstrates a continuous transfer of technical expertise and collaborations around<br />

strategic cybersecurity projects. It contributes to the development of a talent pool in this rapidly growing<br />

sector.<br />

In <strong>2024</strong>, a delegation led by France’s Minister of the Interior, Gérald Darmanin, further strengthened ties<br />

between the two nations. This mission paved the way <strong>for</strong> collaborative innovation: Gatewatcher<br />

presented solutions to Saudi leaders, including multi-vector technology, capable of detecting both known<br />

and unknown attacks while ensuring that no data leaves the Kingdom.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 181<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Towards a lasting and proactive partnership<br />

Faced with a greater number of cyberattacks, that are increasingly sophisticated, cybersecurity has<br />

become an absolute priority <strong>for</strong> Saudi Arabia. Recent research points towards a third of Saudi businesses<br />

projecting an increase of 6-10% in their organisation's cyber budget.<br />

This is not just a response to current threats but an initiative-taking strategy, backed by significant<br />

investments. Consequently, the Saudi cybersecurity market set to reach SAR 13.3 billion (USD 3.5<br />

billion), according to the latest report from the NCA.<br />

In this context, the <strong>Cyber</strong>IC programme, initiated by the National <strong>Cyber</strong>security Authority (NCA), aims to<br />

strengthen the country's defenses by encouraging public and private organizations to adhere to the<br />

strictest cybersecurity standards, while training their teams to face new threats.<br />

Saudi Arabia’s ranking as the number one country in the world <strong>for</strong> addressing cybersecurity concerns,<br />

according to the World Competitiveness Yearbook <strong>2024</strong>, not only highlights the country’s progress but<br />

also presents significant opportunities <strong>for</strong> cybersecurity companies, particularly those from France.<br />

<strong>The</strong> Franco-Saudi partnership is strengthened as cyber defense challenges become global and require<br />

coordinated approaches. <strong>Cyber</strong>security can no longer be addressed in isolation: the growing number of<br />

threats demands a collaborative vision, where strategic alliances and cooperation are essential to<br />

anticipate, and counter cyberattacks. In this context, France and Saudi Arabia will continue to collaborate<br />

to remain competitive in a rapidly evolving international sector.<br />

About the Author<br />

Jacques de la Riviere is the Founder and CEO of Gatewatcher, a<br />

cybersecurity provider based in France. Jacques has held positions<br />

throughout Open<strong>Cyber</strong>, Adneom and BK Consulting. He is also currently<br />

vice-president of Hexatrust - a cluster of 100 European software<br />

cybersecurity leaders and cloud providers.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 182<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Industry Experts on Sustaining Vigilance <strong>for</strong> A Secure Digital<br />

Future<br />

<strong>Cyber</strong>security Awareness Month may have come to a close, but the need <strong>for</strong> vigilance in our digital lives<br />

remains as crucial as ever. As we move <strong>for</strong>ward, it’s essential to remember that cyber threats don’t<br />

adhere to a calendar—they are a constant presence. From phishing scams to ransomware attacks, the<br />

landscape of cyber threats is ever-evolving, and staying in<strong>for</strong>med and prepared is our best defense.<br />

We’ve compiled expert insights to guide our path <strong>for</strong>ward, providing practical advice and strategies to<br />

stay ahead of cybercriminals. By incorporating these recommendations into our daily routines, we can<br />

trans<strong>for</strong>m last month’s awareness and practices into lasting habits, paving the way <strong>for</strong> continuous action<br />

and a more secure digital future.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 183<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Philip George, Executive Technical Strategist, InfoSec Global Federal:<br />

<strong>Cyber</strong>security Awareness Month this year comes on the heels of NIST releasing post-quantum encryption<br />

standards, which are designed to withstand attacks from cryptographically relevant quantum computers<br />

(CRQC). For several years, the cybersecurity community and government leaders have been raising<br />

awareness around the impending threat of a CRQC and the potential large-scale ef<strong>for</strong>t to migrate to<br />

quantum safe encryption, recognizing there is not one area across the in<strong>for</strong>mation technology domain<br />

that does not rely on some aspect of vulnerable classical cryptography. <strong>The</strong>re<strong>for</strong>e, the arrival of the new<br />

quantum safe standards is a pivotal moment. <strong>The</strong>se new ciphers provide public and private sectors with<br />

the ability to establish an effective bulwark against both present day and emerging cryptographic threats<br />

to include the prospect of a CRQC.<br />

But the very first step <strong>for</strong> any organization is to conduct an automated discovery and inventory of deployed<br />

cryptographic assets. This single act provides the foundation <strong>for</strong> the development of a comprehensive<br />

and effective defense in-depth strategy that aligns with larger ef<strong>for</strong>ts like that of zero-trust (ZT)<br />

modernization. If an organization has not conducted an automated discovery and inventory scan in lieu<br />

of prior manual ef<strong>for</strong>ts, they could be implicitly accepting risk that has neither been accurately assessed<br />

nor mitigated. This can create scenarios where PQC migration execution is incomplete at best or fails to<br />

mitigate an exposed attack surface of a high value asset.<br />

Once a comprehensive inventory has been achieved, however, organizations will have more insight into<br />

how best to approach remediation and decide between either a stand-alone ef<strong>for</strong>t or to incorporate within<br />

existing zero-trust modernization activities. <strong>The</strong> outcome of which would be a more in<strong>for</strong>med ZTA plan<br />

that ensures quantum safe cryptography is incorporated into new architecture and tools and enables<br />

effective cryptographic posture management.<br />

Which leads into the final area of consideration while planning your PQC migration strategy: agility. <strong>The</strong><br />

concept of cryptographic agility is the ability to implement, update, change, and remove cryptographic<br />

functions from systems and applications on demand, without changing the systems or applications<br />

themselves. By adopting such a model within your PQC migration plan, organizations will ensure future<br />

quantum safe algorithms are easier to adopt and require a dramatically lower level of ef<strong>for</strong>t to<br />

operationalize. NIST has also initiated a cryptographic agility workstream that seeks to provide guidance<br />

and best practices around sound cryptographic agility adoption strategies <strong>for</strong> departments and agencies.<br />

Migrating to the new post quantum algorithms will take considerable time and ef<strong>for</strong>t. Aligning such<br />

activities with similar large scale modernization ef<strong>for</strong>ts like zero-trust will be key. This paired approach<br />

will ensure that the adoption of ZTA principles won't be undone by continuing to rely on soon to be<br />

deprecated cryptography. Cryptography is the underpinning of Zero Trust, so aligning PQC migration<br />

with Zero Trust initiatives is imperative.<br />

Danny Brickman, CEO and Co-Founder, Oasis Security<br />

Non-Human Identities (NHIs) such as service accounts, tokens, access keys, and API keys, are<br />

fundamental components of modern business operations across all sectors and industries. However, NHI<br />

management is often neglected, which leaves organizations vulnerable to severe cyber threats. Recent<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 184<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


high-profile breaches that stemmed from the exploitation of NHIs underscore the criticality of properly<br />

managing and securing NHIs.<br />

October is <strong>Cyber</strong>security Awareness Month, a time dedicated to prioritizing cybersecurity best practices<br />

and shoring up cyber defenses. With traditional identity & access management solutions and best<br />

practices rendered obsolete, and NHIs proliferating every day, the industry needs solutions to properly<br />

secure this massive attack surface.<br />

Now is the time <strong>for</strong> enterprises and midmarket organizations alike to incorporate comprehensive NHI<br />

management into their security and identity programs. Core best practices <strong>for</strong> managing NHIs include:<br />

• Maintain a comprehensive and up-to-date inventory of all NHIs within the organization<br />

• Understand the business context and owners of each NHI<br />

• Apply the principle of least privilege<br />

• Monitor the environment continuously to detect and respond to suspicious activities involving<br />

NHIs<br />

• Define governance policies and implement them via automation<br />

• Prioritize secret rotation<br />

• Decommission stale and orphaned service accounts<br />

Non-human identity management (NHIM) is a security, operational and governance challenge. To<br />

effectively address it, organizations need a purpose-built enterprise plat<strong>for</strong>m that solves all three.<br />

Successful NHIM requires not only discovering NHIs in real time and without prior knowledge of them,<br />

but also understanding their individual business context (usage, consumers, owners, authentication<br />

methods, entitlements, resources, risk factors, behavior, etc.). In order to achieve this, modern NHI<br />

management solutions must be able to ingest vast amounts of data from a wide range of sources (audit<br />

logs, IDP, Vaults, DSPMs, ASPMs, etc.) and continuously analyze it with advanced AI/ML, LLMs and<br />

behavioral analytics techniques.<br />

<strong>Cyber</strong>security Awareness Month is a good reminder to invest in the right tools and best practices to<br />

protect against evolving threats and uphold security in a dynamic digital landscape.<br />

Victor Monga, Global <strong>Cyber</strong>security Technologist, Menlo Security<br />

<strong>The</strong> internet has become such a big part of our everyday lives, and most of us don’t even realize how<br />

much we rely on it. Whether we’re shopping online, paying bills, or even closing million-dollar deals <strong>for</strong><br />

work, most of these activities now happen in our web browser. It’s like the front door to everything we do<br />

online. But with that convenience comes risk. <strong>The</strong> same browser that lets you order groceries or work<br />

from home can also be a target <strong>for</strong> cybercriminals trying to steal your money, your identity, or even your<br />

work. It’s no longer just about protecting your bank account—it’s about protecting everything that matters<br />

to you.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 185<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Here are a few things that can happen if your digital security is compromised:<br />

• Identity theft: Hackers can use your personal in<strong>for</strong>mation to open credit cards or take out loans<br />

in your name.<br />

• Loss of privacy: <strong>Cyber</strong>criminals can access your emails, personal messages, and sensitive files.<br />

• Job security risks: If you work from home or on the go, your job might be at risk if your company’s<br />

data is stolen through your browser.<br />

• Family safety: Your kids’ in<strong>for</strong>mation can also be at risk, leading to identity theft or unwanted<br />

exposure to harmful content.<br />

To protect yourself online, there are some simple but powerful steps you can take to keep your<br />

in<strong>for</strong>mation safe. One of the most important things you can do is always use multi-factor authentication<br />

(MFA) whenever possible. This adds an extra layer of security by requiring a second <strong>for</strong>m of identification,<br />

like a text message code or an app confirmation, be<strong>for</strong>e accessing your accounts. It’s also smart to<br />

validate any requests <strong>for</strong> money or signatures—if you’re about to transfer funds or sign an important<br />

document, double-check with the person or organization first, especially if it seems urgent or unexpected.<br />

Keeping an eye on your financial well-being is just as important, so make sure you review your credit<br />

card statements regularly <strong>for</strong> any suspicious activity.<br />

Here are a few other things you can do to protect yourself:<br />

• Keep your PC and all software up to date: Regular updates help patch security vulnerabilities<br />

that hackers could exploit.<br />

• Only install software from trusted sources: Avoid downloading anything unless you’re certain<br />

it’s safe and from a reputable company.<br />

• Be mindful of what you post or click on online: Remember, once you post something or click<br />

a suspicious link, it’s often a one-way street. Visiting websites with fake coupons or offers could<br />

lead to malicious actors tracking your activity or worse—hacking into your system and ruining<br />

your day.<br />

By following these steps, you can significantly reduce your risk of becoming a victim of cybercrime and<br />

protect not just your finances, but your personal life and privacy as well. Another essential way to protect<br />

yourself is by freezing your credit, which makes it harder <strong>for</strong> identity thieves to open new accounts in your<br />

name. You can call the three major credit bureaus—Equifax (1-800-685-1111), Experian (1-888-397-<br />

3742), and TransUnion (1-888-909-8872)—to request a credit freeze. It’s free, and it helps stop any new<br />

credit accounts from being opened without your permission. It’s a simple but effective way to secure your<br />

personal in<strong>for</strong>mation. Stay vigilant and cautious—it’s better to prevent an issue than to fix it later!<br />

Venky Raju, Field CTO, ColorTokens<br />

When a cybersecurity breach makes headlines, the finger often points straight at humans. High-profile<br />

incidents like the SolarWinds attack, where human error was cited as a key factor, the recent 23andMe<br />

breach blamed on users' weak passwords, or Uber's MFA fatigue incident—all rein<strong>for</strong>ce the narrative<br />

that humans are the weakest link in security. While there's some truth to it, I believe it's not the whole<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 186<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


story. <strong>The</strong> real issue isn't human incompetence. It's the complexity of the systems we expect people to<br />

navigate. Alert fatigue, overly complicated user interfaces, and an endless stream of warnings all<br />

contribute to burnout. Combine that with limited budgets and staffing, and it's no wonder mistakes<br />

happen.<br />

Instead of piling more responsibilities onto users, we need to rethink our approach to cybersecurity.<br />

• Rethinking Authentication: Passwords are a prime example. We tell people to use complex,<br />

unique passwords, change them frequently, and never reuse them. Password managers are<br />

supposed to help, but even they aren't foolproof. <strong>The</strong> LastPass breach raised concerns about<br />

relying solely on these tools since they can become single points of failure.<br />

• Embracing Passwordless Technologies: By adopting passwordless technologies like<br />

passkeys or biometric authentication, we can enhance security and simplify the user experience.<br />

Passkeys use public-private key cryptography, allowing users to authenticate using their devices'<br />

built-in capabilities.<br />

• Reducing Alert Fatigue: <strong>Cyber</strong>security professionals face an overwhelming number of alerts<br />

daily, many of which are false positives. This constant barrage leads to alert fatigue, where<br />

genuine threats might be missed. Our reliance on detection and response technologies like<br />

Endpoint Detection and Response (EDR) contributes to this overload. While valuable, they<br />

shouldn't be our only defense.<br />

• Proactive Security Measures: By adopting proactive security measures, we can reduce alerts<br />

and ease the burden on professionals. Techniques like microsegmentation compartmentalize the<br />

network, limiting threat spread and reducing the attack surface. By <strong>for</strong>tifying networks from the<br />

start, we prevent threats from reaching users in the first place. This approach lessens the reliance<br />

on human vigilance and reduces the chances of error due to fatigue or complexity.<br />

This <strong>Cyber</strong>security Awareness Month, let's shift the narrative. Too often, we find the easy victim—users—<br />

when the real issue lies in the systems they're <strong>for</strong>ced to work with. As responsible technologists, it's our<br />

duty to simplify their lives, not complicate them.<br />

It's time to stop expecting users to be perfect and start designing systems that support them better. After<br />

all, security is a collective responsibility, and technology should be an enabler, not an obstacle.<br />

Building a Resilient Future through Continuous Improvement<br />

By making cybersecurity a daily priority, we can safeguard our data, protect our privacy, and contribute<br />

to a more resilient digital community. Together, we can build a future where security is ingrained in our<br />

routines, and our collective ef<strong>for</strong>ts create a <strong>for</strong>midable barrier against cyber threats. Staying in<strong>for</strong>med<br />

and integrating these expert strategies into our daily lives helps us stay ahead of cybercriminals and<br />

fosters a culture of continuous improvement and vigilance. This proactive approach ensures that our<br />

ef<strong>for</strong>ts during <strong>Cyber</strong>security Awareness Month are not just a temporary focus but a permanent part of our<br />

approach to digital security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 187<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Authors<br />

Philip George, Executive Technical Strategist, InfoSec Global<br />

Federal<br />

Philip George has led federal initiatives in mitigating the post-quantum<br />

cryptographic (PQC) threat <strong>for</strong> national security systems, as well as<br />

supporting software code assessments and the establishment of<br />

verifiable software bill of materials artifacts. He continues this ef<strong>for</strong>t<br />

with InfoSec Global Federal to ensure other government agencies<br />

understand the need <strong>for</strong> cryptographic visualization and vulnerability<br />

management. He actively works with government PQC POCs, the<br />

NIST NCCOE, and their partners to promote the establishment of<br />

en<strong>for</strong>ceable cryptographic policies that incorporate agility into zero trust<br />

modernization ef<strong>for</strong>ts.<br />

Danny Brickman, CEO of Oasis Security<br />

Danny Brickman is the Co-Founder and CEO of Oasis Security, the<br />

leading provider of Non-Human Identity Management (NHIM)<br />

solutions. A visionary entrepreneur, Danny drives strategic direction,<br />

product innovation, and global business development at Oasis.<br />

Be<strong>for</strong>e co-founding Oasis with Amit Zimerman in August 2022, Danny<br />

led product strategy at Buildots, developing solutions <strong>for</strong> the<br />

construction technology sector. Danny's extensive cybersecurity<br />

experience includes 11 years in the Israel <strong>Defense</strong> Forces (IDF) in<br />

various roles such as Head of <strong>Cyber</strong> R&D Department, <strong>Cyber</strong> R&D<br />

Course Commander, and <strong>Cyber</strong> R&D Team Lead. During his time with<br />

the IDF, Danny received the Israel <strong>Defense</strong> Prize <strong>for</strong> his significant contributions to Israel’s national<br />

security.<br />

Danny's academic background includes a Master of Engineering in Biomedical Engineering from the<br />

Technion – Israel Institute of Technology. He also holds a Bachelor of Science in Computer Science and<br />

Physics from the Hebrew University of Jerusalem.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 188<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Victor Monga, Global <strong>Cyber</strong>security Technologist, Menlo Security<br />

Victor Monga is a Global <strong>Cyber</strong>security Technologist at Menlo Security,<br />

where he leverages his extensive expertise to advance cybersecurity<br />

solutions <strong>for</strong> organizations worldwide. With a strong background in threat<br />

detection and incident response, Victor is dedicated to enhancing digital<br />

security through innovative technologies and strategies. His passion <strong>for</strong><br />

cybersecurity drives him to educate and empower teams to navigate the<br />

complex landscape of cyber threats effectively.<br />

Venky Raju, Field CTO, ColorTokens<br />

Venky Raju, Field CTO of ColorTokens, has a strong background in<br />

computer networking, software development, and cybersecurity. He has<br />

led R&D teams across the globe developing leading-edge networking<br />

solutions, smartphone plat<strong>for</strong>ms, and connected applications.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 189<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Best <strong>Defense</strong> Against BEC Attacks: A Threat Intensified by<br />

AI And Digitalization<br />

With the rise of AI and digitalization, the threat of BEC attacks is growing. To combat these<br />

threats, enterprises must implement a robust and layered security approach<br />

By Robert Haist, CISO, TeamViewer<br />

<strong>The</strong> global work<strong>for</strong>ce is becoming increasingly digital. While this brings a slew of benefits, including<br />

flexibility, reduced costs, happier employees, etc.; it threatens one area in particular: cybersecurity. <strong>The</strong><br />

shift to hybrid and remote work – excelling the use of personal devices <strong>for</strong> work – has triggered a trend<br />

of business email compromise (BEC) attacks, quickly becoming one of the most pressing cybersecurity<br />

threats <strong>for</strong> businesses. <strong>Cyber</strong>criminals, armed with AI tools, are using BEC scams to infiltrate companies,<br />

access confidential in<strong>for</strong>mation, and deceive employees into making fraudulent transactions.<br />

Additionally, geographically dispersed work<strong>for</strong>ces have made it harder <strong>for</strong> IT teams to monitor network<br />

activity and secure access to sensitive data. <strong>The</strong>se gaps in security, combined with the power of AI, have<br />

provided fertile ground <strong>for</strong> cybercriminals, allowing them to exploit vulnerabilities on personal devices and<br />

trick employees into granting unauthorized access to systems.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 190<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Threat Intensified by AI and Digitalization<br />

<strong>The</strong> rise of AI has so far been no help when it comes to the issue of these attacks. Much like privacy<br />

violations, data breaches and bias issues have been exacerbated by AI, the frequency of BEC attacks<br />

have surged in recent years. In fact, BEC accounted <strong>for</strong> only 1% of cyberattacks in 2022, which rose to<br />

more than 18% of all attacks in 2023.<br />

Making matters worse, AI is further amplifying the effectiveness of BEC scams. Criminals now use AIpowered<br />

tools to craft personalized emails that mimic the language and tone of executives, customers or<br />

partners. This approach allows scammers to generate emails with minimal spelling or grammatical errors<br />

– something that has historically been a dead giveaway in a phishing email – increasing their chances of<br />

success. AI can even translate phishing emails into multiple languages, broadening the scammers’ reach<br />

and making it easier <strong>for</strong> them to target global enterprises.<br />

<strong>The</strong> First Line of <strong>Defense</strong>: Empowering Employees<br />

One of the most effective ways to protect against BEC attacks is to empower employees to recognize<br />

and respond to phishing scams. However, the type of security awareness training organizations have<br />

implemented in the past are no longer enough. Today’s BEC attacks are highly sophisticated and – with<br />

the help of AI and social engineering tactics – can deceive even the most vigilant employees. That is<br />

exactly why enterprises must implement dynamic, engaging security awareness programs that simulate<br />

real-world scenarios.<br />

Employees can no longer rely on common indicators like poor grammar or spelling and have to be trained<br />

to look <strong>for</strong> other giveaways.<br />

<strong>The</strong>se training programs should teach employees to identify common red flags, such as spoofed email<br />

addresses, a sense of urgency, unexpected requests <strong>for</strong> financial transactions, or changes to account<br />

in<strong>for</strong>mation. Additionally, employees must be trained to verify internal suspicious email requests by<br />

contacting the sender through an established communication channel, such as their phone number or a<br />

company chat tool like Slack or Microsoft Teams. Similarly, external emails should also be questioned<br />

and authenticity should be confirmed by contacting the company sending the email via a published phone<br />

number on their website.<br />

But it doesn’t stop there. With AI upleveling phishing and BEC attacks, it is important <strong>for</strong> security training<br />

programs to continuously evolve to account <strong>for</strong> the latest threats and advancements, and to keep<br />

employees skeptical and vigilant.<br />

<strong>The</strong> Cornerstone: Zero Trust<br />

While employee education is crucial, it is not enough to fully protect organizations from the growing<br />

sophistication of BEC attacks. A comprehensive cybersecurity strategy must also include robust security<br />

processes, with zero trust at the core.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 191<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> zero-trust model operates under the assumption that no user or device – whether inside or outside<br />

the organization – should be trusted by default. Every user must be continuously authenticated be<strong>for</strong>e<br />

accessing sensitive resources, ensuring that even if an attacker gains access to login credentials, there<br />

will be a number of roadblocks, so they aren’t able to gain automatic access and move freely within the<br />

organization’s systems.<br />

Supporting Tactics: Key Security Measures<br />

To support a zero-trust framework, enterprises should implement several key security measures,<br />

including multi-factor authentication (MFA); least privilege access; continuous monitoring and risk-based<br />

access controls; and network segmentation.<br />

MFA goes beyond username and password, and requires users to provide multiple <strong>for</strong>ms of identification,<br />

such as a password and a code from an app or a biometric scan. It significantly raises the barrier <strong>for</strong><br />

attackers attempting to use stolen credentials to access a system.<br />

<strong>The</strong> principle of least privilege access ensures that employees are granted only the minimum level of<br />

access required to per<strong>for</strong>m their jobs. By limiting access, organizations can minimize the damage in the<br />

event of a security breach.<br />

Continuous analytics monitoring and risk-based access controls allow security teams to monitor user<br />

behavior and identify any suspicious activity. For example, if a login attempt is made from an unfamiliar<br />

location, the system can require additional verification steps to ensure the legitimacy of the request.<br />

Lastly, by dividing the network into smaller, isolated sections, organizations can contain potential threats<br />

more easily. Even if an attacker breaches one part of the network, their access will be restricted,<br />

preventing them from compromising the entire system.<br />

A Multifaceted Approach<br />

<strong>The</strong> level of remote work in the United States has remained steady since 2022 and may reach even<br />

higher levels in the future. Simultaneously, AI will continue to play an increasingly prominent role in the<br />

development of phishing emails, making them harder to detect and more effective at bypassing traditional<br />

security measures.<br />

With that, the best defense against BEC attacks is a holistic and layered security approach centered on<br />

zero trust. By continuously educating employees on how to recognize and respond to BEC attacks and<br />

adopting a zero-trust model with supporting security measures, enterprises can significantly reduce the<br />

risk of falling victim to BEC scams.<br />

As AI continues to evolve and BEC attacks grow more sophisticated, businesses must remain vigilant<br />

and agile in their security ef<strong>for</strong>ts. Only by combining technological safeguards with employee education<br />

will organizations be able to effectively defend themselves against the complex and ever-changing threat<br />

landscape of BEC attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 192<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Robert Haist is the Chief In<strong>for</strong>mation Security Officer (CISO) at<br />

TeamViewer. He is responsible <strong>for</strong> the internal and product security<br />

programs to keep our customers safe. He is passionate about<br />

in<strong>for</strong>mation security, threat intelligence, and incident response. He<br />

has a ten-year cyber security leadership background with a focus on<br />

threat intelligence, incident response and digital <strong>for</strong>ensics. He holds<br />

a MSc. with distinction in Advanced Security & Digital Forensics from<br />

Edinburgh Napier University and an Executive MBA from the Quantic<br />

School of Business and Technology. Robert is passionate about<br />

open-source software and digital solutions <strong>for</strong> a better and fairer<br />

society. Robert can be reached online via LinkedIn and at our<br />

company website https://www.teamviewer.com/en-us/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 193<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Critical Importance of Securing Mobile Identities<br />

By David Natker, Vice President of Global Partners and Alliances, Zimperium<br />

Modern mobile threats are rapidly evolving and growing in sophistication, placing a critical need <strong>for</strong><br />

steadfast vigilance and attention within a zero-trust framework. In particular, digital identities are at risk.<br />

SpyCloud Annual Identity Exposure Report <strong>2024</strong> shows that the average digital identity exposed on the<br />

dark web has a 1 in 5 chance of already being the victim of an infostealer malware infection. In essence,<br />

this means that criminals possess personal identity data such as credentials, personally identifiable<br />

in<strong>for</strong>mation (PII), financial details, and valid session cookies. <strong>The</strong>y can leverage this data <strong>for</strong> subsequent<br />

attacks, including session hijacking, fraud, and ransomware. Identity security allows organizations to<br />

en<strong>for</strong>ce compliance requirements and en<strong>for</strong>ce security policies, and enable your organization to hold<br />

users and partners responsible <strong>for</strong> their actions. Today’s remote work and digital trans<strong>for</strong>mation has<br />

increased the complexity of identity security and expanded the attack surface, placing high importance<br />

on finding an identity security solution. High-level security has become essential to meet the demands of<br />

corporate devices and the constantly changing environments they operate in, ensuring continuous insight<br />

into the exact risk posture of these devices.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 194<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Challenge<br />

Session hijacking, compromised credentials, phishing and advanced post-authentication attacks present<br />

substantial risks to businesses of any scale. According to Zimperium’s 2023 Global Mobile Threat Report<br />

it’s not solely that organizations are facing more breaches; the impact of these breaches are also more<br />

severe. In fact, 73% of organizations that experienced a mobile-related compromise classified it as a<br />

“major” breach. To highlight further, according to Verizon’s <strong>2024</strong> Data Breach Report, last year tripled<br />

(180%) in the increase in the exploitation of vulnerabilities. This surge enables attackers to gain<br />

unauthorized access to systems and data.<br />

To further describe the massive threat posed, “Broken Access Control” was listed as OWASP Top 10<br />

identifies leading security risk <strong>for</strong> web applications, noting 94% of tested applications exhibited<br />

vulnerability.<br />

4 Must-Haves of Identity Protection <strong>for</strong> Mobile Devices<br />

<strong>The</strong> combination of a changing work landscape and the increasing prevalence of mobile malware<br />

highlights the importance <strong>for</strong> enterprises to have a solution with the capabilities of a powerful identity<br />

protection plat<strong>for</strong>m. <strong>The</strong> following are key features that can drive a secure solution:<br />

• Real-Time Threat Intelligence: This enables quicker and more in<strong>for</strong>med risk assessments by<br />

providing rich, real-time threat context and intelligence.<br />

• Comprehensive Mobile Threat Protection: Utilizing an on-device, adaptive detection engine<br />

within a robust, multi-layered framework, this approach employs machine learning, deep learning,<br />

behavioral analysis, and deterministic methods to deliver comprehensive and dynamic threat<br />

protection <strong>for</strong> mobile devices. This allows organizations to mitigate and quickly identify a broad<br />

range of mobile threats.<br />

• Automated Countermeasures: Organizations can share threat signals to trigger automated<br />

responses to identity-based threats, such as initiating multi-factor authentication prompts or<br />

terminating sessions, as a result significantly minimizing the window of vulnerability.<br />

• Stronger Zero-Trust Security: Delivers real-time intelligence <strong>for</strong> both managed and unmanaged<br />

devices, making it ideal <strong>for</strong> zero-trust architectures. Maintaining a continuous risk posture<br />

enhances strong identity and access controls, further bolstering zero-trust security.<br />

Security Professionals’ Next Move<br />

Integrating robust mobile threat protection with AI-powered threat detection provides organizations with<br />

unparalleled mobile security and on-device operational efficiency. <strong>The</strong> combination of AI and mobile<br />

threat protection adds an extra layer of security, ensuring comprehensive defense against potential<br />

threats. Leading providers in the industry have been realizing the importance of this and are integrating<br />

identity threat solutions into their overall security strategies. For example, mobile security provider<br />

Zimperium recently partnered with Okta to enhance zero-trust identity threat protection with AI-driven<br />

mobile security solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 195<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CISOs and security leaders are navigating a complex threat landscape characterized by escalating<br />

compliance requirements, fragmented security solutions, and operational inefficiencies. This challenges<br />

security professionals to go beyond traditional identity and access management in order to stay ahead<br />

of security risks. For this reason, it is a game changer <strong>for</strong> security professionals to integrate a<br />

comprehensive mobile threat solution, designed to assess the full breadth of the mobile attack surface—<br />

including device, network, application, and web threats—into an identity plat<strong>for</strong>m to enhance security.<br />

As a result, companies can leverage real-time threat intelligence and rich threat context to provide<br />

comprehensive, real-time protection.<br />

About the Author<br />

David Natker is Vice President of Global Partners and Alliances at<br />

Zimperium. Natker has extensive experience in developing strategic<br />

partnerships. Prior to joining Zimperium, Natker was Senior Director of<br />

Sales <strong>for</strong> Global Service Delivery Partners at Rubrik . David can be<br />

reached online on LinkedIn, X and at our company website<br />

https://www.zimperium.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 196<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Critical Role of Due Diligence in Mergers and Acquisitions<br />

By Charlie Wood, Executive Vice President, FoxPointe Solutions In<strong>for</strong>mation Risk Management<br />

division of <strong>The</strong> Bonadio Group<br />

<strong>The</strong> merger and acquisition (M&A) market has experienced a slump in recent years. This is poised to<br />

change, however, with KMPG reporting that more than half of firms surveyed expect to pursue at least<br />

one strategic trans<strong>for</strong>mational deal in 2025. In light of this, it is becoming increasingly important <strong>for</strong><br />

acquiring organizations to understand and incorporate the due diligence process into their M&A activities.<br />

Scope of Due Diligence<br />

<strong>The</strong> due diligence process helps to identify and mitigate potential risks. Due diligence encompasses<br />

many different areas including financial, legal, operational, IT and more. When considering a potential<br />

M&A, organizations should carefully investigate the following areas:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 197<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• IT and <strong>Cyber</strong>security – Due diligence procedures in the IT and cybersecurity space help<br />

organizations understand what controls the target has in place to identify and mitigate<br />

cybersecurity risk.<br />

• Tax and Finance – Per<strong>for</strong>ming tax, finance and accounting due diligence involves analyzing<br />

historical financial statements, reviewing past tax returns and identifying potential tax liabilities.<br />

• Operations – This includes a thorough review of an organization’s business processes, overall<br />

organizational structure and more.<br />

• Human Resources – Human resource due diligence considerations include employment<br />

contracts, compensation, benefits and company culture.<br />

• Market – This involves understanding the target’s market position, competitive landscape and<br />

customer base.<br />

Importance of Due Diligence<br />

<strong>The</strong> importance of conducting due diligence in the above areas cannot be understated. In a world rampant<br />

with cybercrime, IT and cybersecurity may be considered among the most important parts of the due<br />

diligence process. M&A transactions involve an exchange of intellectual property and data. This data is<br />

protected using various IT and cyber-centric security controls. If this data is important to the acquiring<br />

organization, then it is presumably of interest to cybercriminals as well.<br />

Failure to appropriately per<strong>for</strong>m due diligence procedures can lead to a data breach and cause significant<br />

fines, loss of consumer confidence and trust, delays purchase price reduction and future liabilities. In<br />

order to limit the short-term and long-term costs associated with a breach, organizations need to ensure<br />

that they have a strong sense of what controls are currently in place. <strong>The</strong> IT due diligence process should<br />

include the following:<br />

• A review of physical and logical security access controls – Physical security access controls are<br />

those that protect the physical premises and hardware of an organization such as keys, badges,<br />

locks, surveillance cameras and more. Similarly, logical security access controls, such as<br />

passwords, data encryption, and software patches, protect digital assets.<br />

• Third party/vendor management – Third-party risk management (TPRM) involves analyzing and<br />

minimizing the risks associated with third-party vendors or suppliers.<br />

• Review of policies and procedures –Policies and procedures are structured guidelines that help<br />

organizations operate smoothly and efficiently, ensure compliance and establish consistent<br />

business practices.<br />

• Compliance requirement reviews – Compliance reviews include auditing an organization to<br />

ensure their operations, policies and procedures align with applicable regulatory standards.<br />

• Penetration testing procedures – Penetration testing involves simulating a cyberattack in order to<br />

discover and strengthen security vulnerabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 198<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Incident response planning and training ¬ An incident response plan (IRP) is a documented and<br />

structured approach that outlines an organization’s protocols <strong>for</strong> responding to an incident.<br />

Training helps ensure that relevant stakeholders understand their role in the process.<br />

• Security awareness procedures – <strong>The</strong>se procedures are designed to in<strong>for</strong>m employees about<br />

security threats and educate them on policies and best practices to help protect organizational<br />

assets.<br />

• Disaster recovery – Disaster recovery (DR) is the process through which organizations respond<br />

to and recover from an event that negatively effects business operations. This might include data<br />

backups, business continuity planning, emergency response procedures and more.<br />

Considering the increasing prevalence of cybercrime, as well as the M&A markets projected growth, the<br />

importance of due diligence in M&A transactions is more important than ever. Leveraging a savvy<br />

cybersecurity agency and/or a Chief In<strong>for</strong>mation Security Officer (vCISO) helps support this vital process.<br />

A second set of eyes can ensure compliance and identify new and evolving risks – further strengthening<br />

the security posture of the organization.<br />

About the Author<br />

Charlie Wood is an Executive Vice President in the In<strong>for</strong>mation Risk Management<br />

division of <strong>The</strong> Bonadio Group and co-founder and Practice Leader of FoxPointe<br />

Solutions. He has over 27 years of experience in the IT, cybersecurity, and<br />

compliance space.<br />

Charlie can be reached online at https://www.linkedin.com/in/charlie-wood-1458147/<br />

cwood@foxpointesolutions.com and at https://www.foxpointesolutions.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 199<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Internet of Things Privacy Review<br />

By Milica D. Djekic<br />

<strong>The</strong> Internet of Things (IoT) privacy is yet under special considerations which means many scientists,<br />

experts and professionals are doing a plenty of brainstorming and ideas exchanging day by day trying to<br />

develop something truly functional and cost-effective. In a modern business world, the majority of<br />

companies are ready to invest finances and resources into something that will guarantee a fast return<br />

and consequently a good profit to those who are interested into novel technological endeavors perhaps<br />

even if they are a product of the 4 th industrial revolution or anything which will come later, so far. <strong>The</strong> IoT<br />

privacy sounds promising especially if there is in mind all the advantages of the privacy systems that are<br />

well-designed through the US Army Tor project and indeed, if it is considered like that it’s clear some<br />

nation already has a rulership over such a technology and maybe some of their approaches could be<br />

applied in creating the next generation of the IoT systems.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 200<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> main rule with the privacy projects is they use a decentralized networking architecture and very<br />

strong encryption which is challenged with the cryptographic key obstacles directly impacting reliability<br />

and efficiency of such a grid, so far. As it is well-known, the decentralized solutions use relays that cope<br />

with a couple of the layers of the cryptography and relay by relay the outer levels of protection are set to<br />

0 and in such a fashion, avoided in the next step of the data communication. Also, those layers of<br />

assurance could be neutralized using a static or dynamic absorber as those technical systems also<br />

provide a set of 0s as their outcome. In other words, no matter what signal is brought at an input of the<br />

neutralizer the output will always vanish or in such a sense, be set to nothing.<br />

Further, there are also the challenges of the complex cryptographic algorithm processing and encryption<br />

key distribution, so in such a case it is recommended to apply less complicated cryptography such as<br />

binary cryptosystems that operate in a sub-second period of time and do not use an encryption key as<br />

they are literally some sort of the nowadays perfect secrecy which the cryptologists of the WW2 and<br />

afterward seriously looked <strong>for</strong>, so far. <strong>The</strong> mathematical remark of the decentralized systems is they use<br />

a link encryption dealing with a heap of levels of the diagonal square matrix which makes a shield of the<br />

external members being with a very dynamic ciphertext that is quite time-varying and inner member being<br />

in such a sense, with the plaintext or open message which also travels via the signal line inside.<br />

<strong>The</strong> good idea with the IoT technology is to count on some kind of the decentralization within its route<br />

transferring data between devices in a very secure way as the link encryption is mastered a few decades<br />

back, while the binary cryptosystems are still under development and deployment at a truly starting point<br />

of their existence, but it is believed they could bring some hope to those who want to be reliable, prompt,<br />

inexpensive and trusted at the same glance, so far.<br />

About <strong>The</strong> Author<br />

Milica D. Djekic is an Independent Researcher from Subotica, the Republic of<br />

Serbia. She received her engineering background from the Faculty of<br />

Mechanical Engineering, University of Belgrade. She writes <strong>for</strong> some domestic<br />

and overseas presses and she is also the author of the books “<strong>The</strong> Internet of<br />

Things: Concept, Applications and Security” and “<strong>The</strong> Insider’s Threats:<br />

Operational, Tactical and Strategic Perspective” being published in 2017 and<br />

2021 respectively with the Lambert Academic Publishing. Milica is also a<br />

speaker with the BrightTALK expert’s channel. She is the member of an ASIS<br />

International since 2017 and contributor to the Australian <strong>Cyber</strong> Security<br />

Magazine since 2018. Milica's research ef<strong>for</strong>ts are recognized with Computer<br />

Emergency Response Team <strong>for</strong> the European Union (CERT-EU), Censys Press, BU-CERT UK and<br />

EASA European Centre <strong>for</strong> <strong>Cyber</strong>security in Aviation (ECCSA). Her fields of interests are cyber defense,<br />

technology and business. Milica is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 201<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Looming Quantum Threat: Safeguarding Our Digital Future<br />

By Rahul Tyagi, CEO and Founder at SECQAI<br />

Working alongside global governments and defense organizations, I've observed a worrying trend:<br />

hackers are now playing a long game and harvesting more encrypted data than ever be<strong>for</strong>e, and as a<br />

result, betting on the imminent arrival of quantum computing to break current cryptographic methods,<br />

potentially within the next few years.<br />

In <strong>2024</strong>, the average cost of a data breach has surged to an unprecedented $4.88 million. As quantum<br />

computing advances, it threatens to amplify these figures exponentially. Our increasing dependence on<br />

digital infrastructure compounds this risk, creating a perfect storm of global vulnerabilities. If exploited,<br />

these weaknesses could leave institutions exposed to massive financial extortion and potentially trigger<br />

worldwide disruption. <strong>The</strong> convergence of quantum capabilities with our digitally interconnected society<br />

isn't just a cybersecurity concern - it's a looming existential threat to global stability.<br />

This isn't a far-off scenario, it's a clear and present danger that demands our immediate attention.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 202<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Quantum Countdown<br />

For years, strong encryption has been our digital <strong>for</strong>tress, keeping sensitive in<strong>for</strong>mation safe from prying<br />

eyes. However, the advent of quantum computing threatens to shatter these defenses. Unlike classical<br />

computers, quantum computers can solve complex mathematical problems exponentially faster,<br />

potentially breaking the cryptographic algorithms that underpin our current security measures.<br />

Although many believe that this threat is a distant and far off problem, the quantum threat is closer than<br />

many realize. Innovative quantum simulation techniques could lead to breakthroughs in cracking current<br />

encryption methods much sooner than the ten-year time horizon suggested by many researchers in the<br />

field.<br />

This urgency is heightened by the "harvest now, decrypt later" strategy employed by state-sponsored<br />

hackers and cybercriminals. <strong>The</strong>y're amassing vast troves of encrypted data, betting on future quantum<br />

capabilities to unlock these digital vaults. <strong>The</strong>re<strong>for</strong>e, the need <strong>for</strong> a solution to this problem is as imminent<br />

as the threat which will be at our heels in the next few years.<br />

Critical Infrastructure at Risk<br />

<strong>The</strong> implications <strong>for</strong> national security and critical infrastructure are profound. Power grids, financial<br />

systems, and telecommunications networks all rely on encryption to function securely. A quantum<br />

breakthrough could expose these vital systems to unprecedented vulnerabilities.<br />

We're not just talking about personal data or corporate secrets; we're looking at potential disruptions to<br />

the very fabric of modern society. <strong>The</strong> ability to compromise critical infrastructure could have catastrophic<br />

consequences.<br />

A Call to Action<br />

Given the stakes, what can be done to mitigate this looming threat? Drawing on my experience working<br />

with global entities, I propose a multi-faceted approach:<br />

1. Understand and Assess: First, we must conduct a thorough inventory of our digital infrastructure<br />

and the cryptography it uses. Tools like the open-source cryptography bill of materials developed<br />

by Banco Santander can be invaluable in this process.<br />

2. Prioritize and Migrate: Once the assessment is complete, organizations must prioritize their<br />

most critical systems and data <strong>for</strong> migration to post-quantum cryptography (PQC). This isn't a<br />

one-size-fits-all solution; it requires careful planning and execution.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 203<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3. Government Mandates: We need stronger government action. Policymakers should mandate<br />

this migration and provide clear timelines, not just <strong>for</strong> public entities but <strong>for</strong> private organizations<br />

handling sensitive data as well.<br />

4. Adopt New Standards: With the National Institute of Standards and Technology (NIST) releasing<br />

new PQC encryption standards, immediate action is crucial. <strong>The</strong> standards are here; the migration<br />

should start now.<br />

5. Holistic Security Approach: While preparing <strong>for</strong> the quantum future, it's vital to address current<br />

vulnerabilities. When adopting post-quantum standards, choose technology plat<strong>for</strong>ms that also<br />

protect against today's threats. Memory-safe hardware architectures, <strong>for</strong> instance, can prevent<br />

exploits used in current attacks like ransomware.<br />

6. Secure Hardware Solutions: We should focus on building security from the ground up. By<br />

developing secure semiconductors, we can automatically protect against a significant portion of<br />

the world's attacks. It's about creating a foundation of security that's resilient to both current and<br />

future threats.<br />

<strong>The</strong> Road Ahead<br />

<strong>The</strong> transition to a post-quantum security landscape won't be easy or quick. It requires a concerted ef<strong>for</strong>t<br />

from governments, industry leaders, and technology innovators. But the alternative is unthinkable.<br />

As we stand on the brink of the quantum era, the message is clear: the time to act is now. Our digital<br />

future—and the critical infrastructure that supports modern society—depends on our ability to stay ahead<br />

of the quantum curve. By taking decisive action today, we can build a more secure tomorrow,<br />

safeguarding our digital world against the quantum threat that’s on the horizon.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 204<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Rahul Tyagi is the CEO and Founder of SECQAI, a Londonbased<br />

leader in quantum security solutions. In 2021, Rahul cofounded<br />

SECQAI alongside Satyam Gandhi, with the mission of<br />

addressing the emerging cybersecurity threats posed by quantum<br />

computing.<br />

Recognised globally <strong>for</strong> its innovative leadership, SECQAI is the<br />

only Silicon Chip provider <strong>for</strong> Post Quantum Cryptography (PQC),<br />

selected <strong>for</strong> the NATO DIANA programme and included in the UK<br />

Chips Strategy under Chipstart. Rahul’s strategic vision drives<br />

SECQAI’s development in quantum-secure hardware, vital <strong>for</strong><br />

protecting critical national infrastructure and the global IoT market<br />

in the quantum era.<br />

Rahul’s expertise spans across cybersecurity, vulnerability analysis, and hardware-based attack vectors.<br />

He has previously developed and red-teamed access authentication systems <strong>for</strong> UK Health Providers<br />

and continues to lead ef<strong>for</strong>ts in creating quantum-resistant semiconductors. Under his guidance, SECQAI<br />

integrates advanced technologies like Quantum Machine Learning (QML) to develop resilient solutions<br />

<strong>for</strong> both defense and commercial applications.<br />

He holds two quantum patents related to random number generation related to quantum effects and has<br />

filed another patent <strong>for</strong> a novel deployment of neuromorphic compute. His work not only addresses<br />

theoretical challenges but actively shapes the future of secure semiconductors and system-on-chip<br />

solutions.<br />

With a BScT in <strong>The</strong>oretical Physics from Imperial College London and completion of the Stan<strong>for</strong>d<br />

Innovation and Global Management (SIGM) programme, Rahul blends technical depth with an innovative<br />

mindset. His ef<strong>for</strong>ts to combat potential attack vectors, such as side-channel attacks and hardware<br />

tampering, have established him as a thought leader in the post-quantum cybersecurity.<br />

A frequent speaker on data security and AI development, Rahul is a recognised innovator, shaping the<br />

future of quantum-secure hardware, while advancing SECQAI’s mission to dominate in post-quantum<br />

cryptography and IoT security.<br />

Rahul can be reached online on LinkedIn, and at our company website https://www.secqai.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 205<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> #1 Reason Employers Ditch <strong>The</strong>ir CISO (A Recruiter's Take)<br />

By Owanate Bestman, Founder, Bestman Solutions<br />

Recruiters will never be as in demand as doctors are. I’ve made my peace with that. Yet my role as a<br />

CISO headhunter and recruiter does require me to be a bit of a diagnostician.<br />

Observing organisations in that liminal phase in between CISOs can really be an eye-opener; as can<br />

working with CISOs who have recently left, been let go, or pushed out of their positions.<br />

I’m sure that it comes as a surprise to no one that CISOs generally leave roles due to stress.<br />

But why do CISOs get fired? Gross misconduct is vanishingly rare, yet I frequently get called in to replace<br />

CISOs who have been given the chop.<br />

In order to do so, and to help the organisation choose a new CISO that is more in line with their needs, I<br />

need to diagnose what went wrong. I need to uncover what about the previous CISO wasn’t hitting the<br />

mark, and what sort of individual they need in their place.<br />

Paging Dr Bestman…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 206<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Common Reasons Why CISOs Get the Boot<br />

Let’s take a look at some of the common themes I encounter when employers fire a cyber leader.<br />

Sometimes, the reasons why employers ditch their current CISO aren’t the CISO’s fault at all:<br />

• <strong>The</strong> CISO hasn’t gelled culturally with the organisation, or was a poor cultural fit to begin with.<br />

• <strong>The</strong> CISO’s team, reporting lines, or the people around them have changed, affecting their fit<br />

within the organisation.<br />

• <strong>The</strong> employer has changed in terms of its priority, direction, or leadership.<br />

• <strong>The</strong> organisation relies on insecure, legacy tech that the organisation can’t (or won’t) part with,<br />

causing tension between the CISO and the board.<br />

• <strong>The</strong> organisation doesn't really respect security risk but wants to look like they do.<br />

But sometimes, CISOs are dismissed due to things that are more within their control:<br />

• <strong>The</strong> employer feels that the CISO won’t be able to successfully lead the security function,<br />

especially through a <strong>for</strong>thcoming audit or regulatory challenge.<br />

• <strong>The</strong> CISO is far too cautious and becomes seen as more of a blocker than an enabler of<br />

organisational progress.<br />

• <strong>The</strong> CISO doesn’t articulate the breadth and depth of modern, cyber risk. Maybe they assume<br />

everyone knows what they do!<br />

• <strong>The</strong> CISO fails to get technical or financial buy-in due to miscommunication (granted, this can<br />

also be due to cultural difference).<br />

• <strong>The</strong> CISO can’t or doesn’t accurately communicate the value of their role or department, even in<br />

an environment that would have been open to hearing it.<br />

You may have noticed a bit of a recurring theme with those last few, so I’m not going to bury the lede any<br />

further. CISOs often struggle to keep their jobs when they can’t communicate the value of the security<br />

function, especially when it comes to communicating risk and value to those outside of the security<br />

bubble.<br />

Now that’s not to say that all CISOs who have been seen as “blockers” need to completely throw caution<br />

to the wind. Nor am I saying that achieving corporate buy-in hinges totally on the communication skills of<br />

the person seeking it. I’m also not saying that “inarticulate” CISOs need finishing school-levels of<br />

corporate etiquette.<br />

But a CISO who can communicate well; know their place but also their worth; can read a room; and<br />

extract the right steering and priorities from board meetings - those are the ones who will succeed in most<br />

environments.<br />

But It’s More Than That…<br />

Proving your worth to the board isn’t just a one-time thing. You can’t just march into a board meeting, say<br />

“Hi, my name’s [your name] and I am your CISO. Here’s why I’m great…” It’s an ongoing ef<strong>for</strong>t to build<br />

and maintain relationships throughout the board, and communicate your practical value to the<br />

organisation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 207<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


When done well, the board will see you as an invaluable, trusted asset - one that simply can’t be switched<br />

out at will.<br />

About the Author<br />

Owanate Bestman is the Founder of Bestman Solutions, a firm dedicated to helping<br />

leaders hire cyber security professionals. He advises CISOs and Executives on<br />

market factors that impact their growth plans and designs bespoke solutions to<br />

address this. Firmly embedded in the cyber security space, he possesses a global<br />

core network of well-respected and proven security specialists.<br />

Owanate has spent over a decade recruiting in the <strong>Cyber</strong> Security field. Be<strong>for</strong>e<br />

this, he recruited Technology and Operational Risk specialists and successfully<br />

staffed a number of high-profile banking regulatory programmes.<br />

He is also a keen industry speaker and writer <strong>for</strong> security associations and international publications.<br />

Outside of Security and staffing, he is interested in all things Martial Arts.<br />

Owanate can be reached online at ob@bestmansolutions.com, https://www.linkedin.com/in/owanatebestman-cyber-security-recruitment/<br />

and at our company website https://www.bestmansolutions.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 208<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Rise of Impersonation Scams Targeting Individuals & How<br />

to Protect Yourself<br />

By Fred Kwong, Vice President & Chief In<strong>for</strong>mation Security Officer, DeVry University<br />

In the ever-evolving cybercrime landscape, impersonation scams are rising as a threat. As technology<br />

advances at a breakneck pace, bad actors are leveraging these advancements to become more<br />

convincing and deceptive in their attempts to defraud their victims.<br />

One concerning trend is the rise in impersonation scams, where fraudsters are now targeting individuals<br />

more than businesses. This change is largely due to the evolution of technologies that enable scammers<br />

to appear more credible and trustworthy. From sophisticated voice manipulation software to deep fake<br />

videos, the tools at their disposal have become increasingly sophisticated, making it harder <strong>for</strong> the<br />

average person to detect these deceptive tactics.<br />

Impersonation scams occur when scammers pretend to be a trusted individual or entity, such as a family<br />

member or a bank representative to gain the victim’s confidence and ultimately steal their sensitive<br />

in<strong>for</strong>mation or financial resources. <strong>The</strong>se scams often take the <strong>for</strong>m of urgent text messages, voice calls,<br />

or emails. According to the FBI’s 2023 Internet Crime Complaint Center (IC3), tech and customer support<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 209<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


impersonation scams have resulted in 37,560 complaints and a staggering $924,512,658 in losses,<br />

representing a 15% increase in the trend.<br />

Another alarming trend is the rise of identity theft, fueled by the increasing number of data breaches that<br />

have exposed sensitive personal in<strong>for</strong>mation. In August this year, a massive data breach involving 2.7<br />

billion records, including Social Security numbers, was leaked on the dark web, highlighting the<br />

magnitude of the problem. Armed with this stolen data, bad actors can impersonate individuals, reset<br />

credentials, access bank accounts and engage in various <strong>for</strong>ms of fraud, such as opening new lines of<br />

credit or obtaining loans.<br />

As the threat of impersonation scams continues, individuals must be vigilant and take proactive measures<br />

to protect themselves.<br />

Common Tactics Used in Impersonation Scams<br />

One common tactic that impersonation scammers often employ is creating a sense of urgency or offering<br />

something you need. <strong>The</strong>y may ask <strong>for</strong> your personal in<strong>for</strong>mation. However, their true intention is to<br />

gather sensitive data that can be exploited <strong>for</strong> nefarious purposes.<br />

Another prevalent tactic involves requesting you to send in<strong>for</strong>mation via text or other messaging<br />

plat<strong>for</strong>ms. Scammers may impersonate representatives from your bank, claiming to need to verify your<br />

multi-factor authentication (MFA) setup due to a supposed glitch. <strong>The</strong>y’ll ask you to share the one-time<br />

code sent to your device, effectively circumventing the security measures designed to protect you.<br />

Alarmingly, the Federal Trade Commission (FTC) revealed that impersonation scams caused losses of<br />

$1.1 billion last year, more than three times what consumers reported in 2020.<br />

How to Spot and Stop Fraudulent Contacts<br />

<strong>The</strong> first line of defense against impersonation scams is vigilance. If you receive an unsolicited<br />

communication from an entity claiming to be a service provider, financial institution, or government<br />

agency, it's crucial to exercise caution. Never respond directly to the initial contact, as this could<br />

inadvertently validate the scammer's tactics. Instead, take proactive steps to verify the legitimacy of the<br />

request. One effective strategy is to contact the purported organization directly through their official<br />

channels, such as their website or customer service hotline. This way, you can confirm whether the initial<br />

communication was genuine or an attempt at fraud. Reputable organizations will never ask <strong>for</strong> sensitive<br />

in<strong>for</strong>mation, such as account numbers or passwords, over unsecured channels like email or phone calls.<br />

If the impersonation involves someone you know, such as a family member or friend, exercising caution<br />

and skepticism is essential. Scammers often exploit emotional vulnerabilities. Be<strong>for</strong>e acting on such<br />

requests, attempt to verify the individual's identity through alternative channels, such as contacting them<br />

directly or reaching out to a mutual acquaintance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 210<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Some additional proactive measures you can take:<br />

1. Freeze Your Credit: One of the most effective ways to prevent fraudulent impersonation is to<br />

freeze your credit with the three major credit bureaus: Experian, Equifax, and TransUnion. A credit<br />

freeze restricts access to your credit report, making it nearly impossible <strong>for</strong> anyone, including you,<br />

to open new accounts or take out loans in your name.<br />

2. Use Identity Protection Services: Consider subscribing to an identity protection service like the<br />

services offered by the major credit bureaus or other marketplace providers. (An internet search<br />

<strong>for</strong> “Identity Protection Services” will lead to numerous alternatives.)<br />

3. Monitor the Dark Web: <strong>The</strong> dark web is a haven <strong>for</strong> cybercriminals who trade and sell stolen<br />

personal in<strong>for</strong>mation. Websites like HaveIBeenPwned.com allow you to check if your email<br />

addresses, passwords or other sensitive data have been compromised in data breaches.<br />

4. Enable Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring a<br />

second <strong>for</strong>m of authentication, such as a one-time code sent to your phone or a biometric factor<br />

like a fingerprint or facial recognition. Enable MFA on all your important accounts, including<br />

banking, email and social media.<br />

5. Remove Personal In<strong>for</strong>mation from the Web: Companies like Aura offer services to help<br />

remove your personal in<strong>for</strong>mation from data brokers and online directories. You can reduce the<br />

risk of your in<strong>for</strong>mation falling into the wrong hands and being used <strong>for</strong> fraud by minimizing your<br />

digital footprint.<br />

Remember, scammers are skilled at creating a sense of urgency and exploiting our trust. By remaining<br />

vigilant, questioning unsolicited requests and prioritizing the protection of your personal in<strong>for</strong>mation, you<br />

can significantly reduce the risk of falling victim to these insidious tactics.<br />

About the Author<br />

Fred Kwong has been in the in<strong>for</strong>mation security and technology field <strong>for</strong> the<br />

past 20+ years, working in the education, financial, telecommunication,<br />

healthcare, and insurance sectors. He is an award-winning thought leader in<br />

security and currently works at DeVry University as the Vice President and<br />

Chief In<strong>for</strong>mation Security Officer. Fred is a member of several advisory<br />

boards and is a frequent speaker at national security <strong>for</strong>ums on cyber security<br />

and in<strong>for</strong>mation technology and is often asked to consult on matters of<br />

security and leadership.<br />

Fred can be reached online by email at fred.kwong@devry.edu, on LinkedIn,<br />

and at our company website https://www.devry.edu/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 211<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Role of AI in <strong>Cyber</strong>security and Identity Management<br />

AI boosts cybersecurity but also heightens risks, stressing the need <strong>for</strong> strong identity<br />

management<br />

By Steve Moore, Chief Security Strategist, Co-Founder TEN18, Exabeam<br />

Artificial intelligence (AI) and its evolution over the past year has given rise to extraordinary technological<br />

advancements. More tools are being built around AI and its ability to maximize human potential in areas<br />

like cybersecurity, but this proliferation comes with a tale of caution. <strong>The</strong> average person can now access<br />

AI tools, and so too can cybercriminals who are motivated, creative, and historically the first to adopt<br />

technology to automate, scale, and positively influence their goals.<br />

While AI is shaping the future of many industries led by cybersecurity, it is also proving to be an advancing<br />

problem as cybercriminals abuse AI to create better, more believable vectors that ultimately lead to more<br />

significant <strong>for</strong>ms of compromise. How will my phishing training be relevant if I can write a perfectly<br />

researched phishing email with amazing organizational context?<br />

In this threat climate, industrywide awareness campaigns like Identity Management Day are essential <strong>for</strong><br />

keeping identity and privacy protection at the <strong>for</strong>efront of security investment and planning.<br />

Organizations, customers, partners, and individuals must be reminded about the ever-evolving risks<br />

associated with frail identities and weak identity management processes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 212<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Compromised Digital Identity<br />

Compromised identities remain a significant cause of data breaches <strong>for</strong> enterprises – a trend further<br />

accelerated by AI. This means securing additional layers of identity has become one of the most urgent<br />

tasks in our digital ecosystem, considering 90% of organizations experienced identity-related breaches<br />

in the last year alone.<br />

In the past, we’ve seen credential stuffing, the act of leveraging account in<strong>for</strong>mation from previous<br />

breaches, as an easy and popular method of obtaining access to one’s digital identity. Frequently, poor<br />

cyber hygiene is enough of an opening <strong>for</strong> adversaries to gain access. <strong>The</strong> typical defense is<br />

implementing multi-factor authentication (MFA), which is still often circumvented, poorly deployed, or<br />

unavailable <strong>for</strong> all accounts.<br />

<strong>The</strong> preventative control will fail, at which point it’s left to the defenders to properly identify the problem<br />

and respond. This brings us to the next problem: in most organizations, either no one is looking or there<br />

isn’t a method to detect the problem, and all action is reactive. In a nutshell, there is no prevention, only<br />

detection and response capabilities.<br />

AI-Driven Attack Capabilities<br />

AI’s broad availability allows adversaries to create and launch smarter, more effective cyberattacks to<br />

steal credentials and data. To be clear, this doesn’t change the vector or even the attack profile; it simply<br />

evades many of our well-established technical and human controls– <strong>for</strong> example, phishing training.<br />

<strong>The</strong>se intrusions maintain their high efficacy because stolen credentials allow them to mimic typical user<br />

activity, making them harder to catch.<br />

Two notable incidents in the past year come to mind when discussing these AI-driven attacks:<br />

• <strong>The</strong> first is the finance employee working with a multinational firm who fell victim to a 25 milliondollar<br />

deepfake scam. Fraudsters leveraged deepfake technology and made themselves out to<br />

be the organization’s Chief Financial Officer (CFO) along with several other staff members during<br />

a video call. Previously, the employee had suspected foul play as the fraudsters used written<br />

communications to first make contact. Un<strong>for</strong>tunately, the deepfakes in the following live video call<br />

were convincing enough to defraud the company and the employee.<br />

• Second, LastPass recently experienced a voice phishing attack utilizing audio deepfake<br />

technology. An employee of the company was bombarded with calls, messages, and voicemails<br />

from what sounded like LastPass’ CEO Karim Toubba, and although they recognized it as a scam,<br />

the implications are concerning. What if the fraudsters hadn’t used WhatsApp as their method of<br />

contact? What if they had called during more regular hours? Social engineered attacks are<br />

becoming harder to spot, and individuals now must focus on these types of details to discern<br />

illusion from reality.<br />

Attacks like these showcase the increasing frequency with which threat actors are harnessing AI in<br />

sophisticated attacks, most commonly to influence behavior or compromise their identity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 213<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As security professionals, we always advocate <strong>for</strong> establishing cyber hygiene best practices to safeguard<br />

personal and professional identities to prevent credential-based cyber attacks; this shouldn’t change.<br />

A more advanced method is understanding the behavior of your human and non-human identities and<br />

assets. Generally, this involves the investment in AI-based capabilities, just as the adversaries have. <strong>The</strong><br />

main requirement is twofold: to understand what is real and what is normal, and to immediately flag when<br />

a legitimate user account is exhibiting anomalous behavior. When security operations center (SOC) and<br />

identity analysts are given greater insights into the compromised and the malicious user, they can shorten<br />

response times and prevent data loss.<br />

<strong>The</strong>re may not be a straight<strong>for</strong>ward answer to spotting these attempts and securing your digital identity,<br />

but these steps can be taken to decrease the likelihood of adversary success.<br />

About the Author<br />

Steve Moore is the Chief Security Strategist and Co-Founder of TEN18 at<br />

Exabeam. Steve has over 20 years of experience in in<strong>for</strong>mation security,<br />

intrusion analysis, threat intelligence, security architecture, and web<br />

infrastructure design. Be<strong>for</strong>e joining Exabeam, Steve spent seven years at<br />

Anthem in various cybersecurity practitioner and senior leadership roles. He<br />

played a leading role in identifying, responding to, and remediating their data<br />

breach involving a nation-state. Steve has deep experience working with<br />

legal, privacy, and audit staff to improve cybersecurity and demonstrate<br />

greater organizational relevance. Steve can be reached online on LinkedIn<br />

and at our company website https://www.exabeam.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 214<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Using AI And Machine Learning to Detect and Respond To<br />

Contact Center Security Threats In Real-Time<br />

By Jerry Dotson, Vice President of U.S. Federal, Avaya Government Solutions<br />

You’re managing a federal agency contact center when someone calls in with a bomb threat targeting a<br />

government building. <strong>The</strong> employee immediately begins working to obtain as much in<strong>for</strong>mation from the<br />

individual as possible including the type, placement, and alleged detonation time of the device – but the<br />

call ends. Be<strong>for</strong>e you in<strong>for</strong>m the appropriate agency of the threat, you need to validate if it’s in fact real.<br />

How can you move as fast and efficiently as possible?<br />

<strong>The</strong> number of federally charged threat cases has risen 47% over the last five years, according to data<br />

from the Justice Department. With threats, hoaxes, and harassments growing not just in number but in<br />

digital complexity, federal agencies need to consider the use of innovative technology like Artificial<br />

Intelligence (AI) and Machine Learning (ML) to gain a significant lead against even the most sophisticated<br />

attackers. With deep data extraction, analysis, and reporting capabilities, AI and ML can pinpoint patterns,<br />

predict potential threats, and verify recognized threats virtually in real-time.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 215<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Quick Rundown of AI and ML <strong>for</strong> Threat Detection & Response<br />

To better understand how AI and ML supercharge threat detection and response, it’s important to<br />

understand how these technologies work at a base level.<br />

Supervised ML: Machine Learning can be trained by a human programmer to distinguish between<br />

normal vs. malicious activities; however, this is a complex, iterative process that requires deep skill and<br />

expertise. You need to define the problem (in other words, decide what kind of threats the technology<br />

should detect), collect and prepare (clean) data <strong>for</strong> it to use, choose an AI model, effectively train the<br />

model, and continuously test and improve.<br />

Unsupervised ML: Machine Learning can also work autonomously, learning to detect unknown or<br />

emerging threats by identifying anomalies and patterns based on established thresholds of what’s<br />

considered normal. Patterns can vary depending on the type of attack. In the case of a phishing attack,<br />

patterns may include where the email came from and how many servers it bounced off. In the case of a<br />

Denial-of-Service (DoS) attack, patterns may include how many times the attack has happened in the<br />

past days/weeks/months and how many other agencies have experienced it.<br />

AI: AI algorithms can crunch volumes of data <strong>for</strong> threat detection and response in a way human analysts<br />

can’t, including more subtle signs of malicious activity that go undetected by the human eye.<br />

Simultaneously, AI works 24x7 to collect, clean, and analyze vast amounts of data, continuously checking<br />

<strong>for</strong> potential incoming threats and using new intelligence as its collected to grow smarter in its threatidentifying<br />

work.<br />

How Do AI and ML Help monitor and Manage Potential Contact Center Threats?<br />

Let’s continue with our bomb threat scenario but change the <strong>for</strong>m of communication from phone to email.<br />

Here’s a rough step-by-step summary of what would happen in the call center with AI and ML in action.<br />

• ML algorithms dedicated to immediately spotting problems flag the email and quarantine the file<br />

as soon as it hits your server.<br />

• AI rapidly processes and analyzes the content of the message and reports on what you need to<br />

know (where the email is coming from), including the validity of the threat based on vast historical<br />

data and threat intelligence.<br />

• AI-powered automation immediately sends responses to the appropriate people or departments,<br />

including a threat signature if the threat is valid.<br />

• AI can work proactively with certain protocols and procedures to identify threats from the same<br />

source even faster in the future.<br />

This is just one of countless ways AI and ML can be used to accelerate and improve threat detection and<br />

response. Let’s look at a different use case. Let’s say you’re a government worker stationed overseas<br />

with your family and a real threat has potentially happened. Not only does the agency you work <strong>for</strong> need<br />

to ensure your safety as an employee but also the safety of your family.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 216<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Leveraging AI and ML, the agency can automatically reach out via multiple channels including email,<br />

text, and phone to verify that you and your family are in safe locations as well as communicate critical<br />

next steps. All you need to do is hit a key on your phone to verify that they’re okay. In the rare case that<br />

someone is being <strong>for</strong>ced to hit the key, AI can monitor human temperature and heartbeat to verify that<br />

they are not under duress. All of this happens in mere minutes.<br />

Improve Threat Detection & Response without Disrupting your Current System<br />

AI shouldn’t be considered a one size fits all solution, especially at the government level. <strong>The</strong> technology<br />

must be customized based on personnel, location, and dozens of other crucial factors – something that<br />

requires deep expertise, engineering support, and knowledge.<br />

Learn more about how Avaya helps federal agencies fast track adoption of AI and ML <strong>for</strong> threat detection<br />

and response as a DIY approach without risking resilience or disrupting current operations.<br />

About the Author<br />

Jerry Dotson is Vice President of U.S. Federal at Avaya’s Government<br />

Solutions, a global provider of business collaboration and<br />

communications solutions and a key technology partner <strong>for</strong> the US<br />

Federal, State, and Local Government. In his current role, Jerry<br />

oversees the business operations supporting the missions of all US<br />

Federal (Civilian & Intel) and Department of <strong>Defense</strong> customers. He<br />

joined Avaya in 2005, focusing on the Public Sector.<br />

Prior to his current position, Jerry served as the Regional Sales Lead<br />

<strong>for</strong> Avaya’s Foreign Account Module, managing key accounts such as<br />

HUD, NRC, and EPA, among others. With over 32 years of experience<br />

in the In<strong>for</strong>mation Technology industry, Jerry's expertise spans<br />

installation, operations, implementation, engineering, and proposal management. Throughout his entire<br />

career, Jerry has dedicated himself to supporting government entities, contributing to various challenging<br />

requirements, including pioneering the first VoIP implementation <strong>for</strong> the US Department of State. Jerry<br />

earned his PhD in 2011 from Kingsbury University.<br />

He is blessed with a wonderful wife of 24 years, a son who is currently attending Liberty University, and<br />

a daughter who is a senior in high school. Jerry and his wife are deeply committed to their community,<br />

having established and operated a food bank in Fairfax County, VA. This food bank has supported as<br />

many as 500 families a month over the past six years.<br />

Jerry can be reached at online at LinkedIn and at our company website:<br />

https://www.avaya.com/blogs/author/jerrydotson/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 217<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 218<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 219<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 220<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


cyberdefensetv.com now has 200 hotseat interviews and growing…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 221<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines <strong>for</strong> FREE.<br />

This magazine is by and <strong>for</strong> ethical in<strong>for</strong>mation security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices <strong>for</strong> IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the in<strong>for</strong>mation technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll in<strong>for</strong>m you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this <strong>for</strong> FREE, always, <strong>for</strong> our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Conferences.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Newswire.com, <strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com,and<br />

<strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability Corporation (LLC) originally incorporated in the United States of<br />

America. Our Tax ID (EIN) is: 45-4188465, <strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong><br />

<strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS# 078358935. All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any in<strong>for</strong>mation storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. <strong>The</strong> views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility <strong>for</strong> them. Send us great content<br />

and we’ll post it in the magazine <strong>for</strong> free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

https://www.cyberdefensemagazine.com/<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 11/04/<strong>2024</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 222<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Books by our Publisher: Amazon.com: CRYPTOCONOMY®, 2nd <strong>Edition</strong>: Bitcoins, Blockchains & Bad<br />

Guys eBook : Miliefsky, Gary: Kindle Store (with others coming soon...)<br />

12 Years in <strong>The</strong> Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know What You Think.<br />

It's mobile and tablet friendly and superfast. We hope you like it. In addition, we're past the five<br />

nines of 7x24x365 uptime as we continue to scale with improved Web App Firewalls, Content<br />

Deliver Networks (CDNs) around the Globe, Faster and More Secure DNS and<br />

<strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an array of live mirror sites. We successfully<br />

launched https://cyberdefenseconferences.com/ and our new plat<strong>for</strong>m<br />

https://cyberdefensewire.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 223<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 224<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 225<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 226<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 227<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2024</strong> <strong>Edition</strong> 228<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!