09.01.2025 Views

CS Jan-Feb 2025

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

Computing

Security

Secure systems, secure data, secure people, secure business

A TURNKEY EXPERIENCE

How to take your security

levels to ever greater

heights

NEWS

OPINION

INDUSTRY

COMMENT

CASE STUDIES

PRODUCT REVIEWS

COMPLIANCE DEFIANCE

Missed EU deadline

could come back to

haunt offenders

FORCE TO BE RECKONED WITH

Winds of change are

blowing: investment

in people is ramping up

TRUST... IN THE ROUND

Adaptive trust engines are

all revved up for action

Computing Security Jan/Feb 2025


What if there was a way to

Adapt to all Email

Security threats...

Libraesva integrates cloud email and a secure email gateway with our unique

adaptive trust engine to provide award winning protection.

Layered security defends your business against spam, malware, phishing, email

fraud, spoofing, zero-day threats, account takeover, social engineering, business

email compromise, inadvertent disclosure of sensitive information and more.

Test your security for FREE with our Email Security Tester

emailsecuritytester.com

libraesva.com


comment

AYE, AYE TO AI

EDITOR: Brian Wall

(brian.wall@btc.co.uk)

LAYOUT/DESIGN: Ian Collis

(ian.collis@btc.co.uk)

SALES:

Edward O’Connor

(edward.oconnor@btc.co.uk)

+ 44 (0)1689 616 000

David Bonner

(dave.bonner@btc.co.uk)

+ 44 (0)1689 616 000

Stuart Leigh

(stuart.leigh@btc.co.uk)

+ 44 (0)1689 616 000

Is the speed of AI development leaving UK SMEs struggling to plug security gaps? That is the

question posed by a new IT trends report. Findings to emerge included an encouraging 81%

of UK SMEs who responded agreeing that their organisation should be investing in AI, while

33% predicted budgets will rise by 10-20% in the future.

However, as UK SMEs embrace the integration of AI, its growing attack capabilities challenge

UK SME IT security teams, with 25% of cyber-attacks experienced by SMEs attributed to AIgenerated

attacks, the report reveals.

JumpCloud's Q3 2024 SME IT Trends Report also states that there is a measurable increase in

UK SMEs' appetite to embrace AI, compared to its Q1 2024 report. "With this being a bi-annual

survey, it's interesting to see how rapidly general attitudes towards AI, adoption and predicted

adoption, and how it can benefit business, is changing for the better. Over three quarters (81%)

of SMEs agree that their organisation should be investing in AI initiatives for IT, an increase from

70% in Q1 2024. Additionally, 75% view AI as a net positive versus 71% in Q1 2024."

This optimism is impacting AI adoption amongst UK SMEs, according to the report, with 34%

of UK respondents planning to implement AI in the next six months. "Encouragingly, just 9%

of UK SMEs said they have no plans to implement AI, adds JumpCloud.

"Overall, UK SMEs are starting to embrace the idea of implementing AI into their tech stack,

no doubt helped by AI's increasing popularity," the company's Sean Gill, head of sales, Europe,

comments. "However, in classic British style, their optimism is guarded; 37% of respondents

think that the potential impact of AI is the same as six months ago - albeit moving slower than

they thought it would."

Brian Wall

Editor

Computing Security

brian.wall@btc.co.uk

PUBLISHER: John Jageurs

(john.jageurs@btc.co.uk)

Published by Barrow & Thompkins

Connexions Ltd (BTC)

35 Station Square,

Petts Wood, Kent, BR5 1LZ

Tel: +44 (0)1689 616 000

Fax: +44 (0)1689 82 66 22

SUBSCRIPTIONS:

UK: £35/year, £60/two years,

£80/three years;

Europe: £48/year, £85/two years,

£127/three years

R.O.W:£62/year, £115/two years,

£168/three years

Single copies can be bought for

£8.50 (includes postage & packaging).

Published 6 times a year.

© 2025 Barrow & Thompkins

Connexions Ltd. All rights reserved.

No part of the magazine may be

reproduced without prior consent,

in writing, from the publisher.

www.computingsecurity.co.uk Jan/Feb 2025 computing security

@CSMagAndAwards

3


Secure systems, secure data, secure people, secure business

Computing Security Jan/Feb 2025

inside this issue

CONTENTS

Computing

Security

NEWS

OPINION

INDUSTRY

COMMENT

CASE STUDIES

PRODUCT REVIEWS

A TURNKEY EXPERIENCE

COMPLIANCE DEFIANCE

Missed EU deadline

How to take your security

could come back to

levels to ever greater

haunt offenders

heights

FORCE TO BE RECKONED WITH

Winds of change are

blowing: investment

in people is ramping up

TRUST... IN THE ROUND

COMMENT 3

Aye, Aye to AI

Adaptive trust engines are

all revved up for action

NEWS 6

Malicious emails surge

Stress takes its toll

'Quantum apocalypse is coming'

Phishing remains business scourge

Snyk acquires DAST provider Probely

ARTICLES

IN WHOM WE TRUST 10

Libraesva's Rodolfo Saccani, on the power

and relevancy of Adaptive Trust Engines

COMPLIANCE DEFIANCE 18

Experts are predicting that the current high

levels of non-compliance will most likely

compromise the EU's goal of creating a

robust European cybersecurity framework,

leaving businesses and the public further

exposed to risk.

MISH, MASH… BASH! 12

Aggressors are constantly finding new

ways - such as Mishing - to exploit email,

to breach an organisation’s defences

A FORCE TO BE RECKONED WITH 22

Many organisations fail to invest in, and plan

'DEFENDING AS ONE' 14

for, the human component of cybersecurity

The 'Security Project of the Year' winner at

until after a breach has occurred. This is too

the 2024 Computing Security Awards

little and way too late, say several industry

showed how Socura, along with CymruSoc,

experts, and can leave those organisations

is enhancing threat detection across Wales

damaged financially and by reputation.

JOURNEY TO CYBER RESILIENCE 16

LevelBlue's Scott Scheppers discusses

the right approach to formalising threat

detection and incident response strategies

PLANNING FOR DISASTER 28

STRENGTH IN NUMBERS 17

Defending against cyber threats requires

Risk mitigation is one of the key steps that

a unity of purpose and of people, states

needs to be taken in the risk management

Pavin Varughese, VP Sales, JetPatch

process. It underpins the whole strategy of

planning and developing options to reduce

A TURNKEY EXPERIENCE 26

those threats to project objectives often

New insights on how best to integrate

faced by a business or organisation.

managed detection and response into an

organisation's existing security make-up

PRODUCT NEWS 34

MAKING THE PEN MIGHTIER 30

New service targets cloud complexity

Sophos in $859 million acquisition

According to the National Cyber Security

Optalysys and Google partner up

Centre, it's not uncommon for a year or

Scam Copilot takes to the air

more to elapse between penetration tests.

"So, vulnerabilities could exist for long periods

BOOK REVIEW 25

of time without you knowing about them,

'Inside Cyber'. Chuck Brooks enters deep

if this is your only means of validating

into a world where fact and fiction collide

security," it points out.

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk

4



news

CYBERCRIMINALS UP THE ANTE WITH MALICIOUS EMAILS

VIPRE Security Group's Q3 2024 Email Threat Trends

Usman Choudhary.

Report reveals the sophisticated strategies and

techniques being employed by cybercriminals, with a

particular persistent focus on the highly lucrative tactic

of business email compromise (BEC).

VIPRE processed 1.8 billion emails globally, of which 208

million turned out to be malicious, it is stated.

BEC scams surged, accounting for some 58% of phishing

attempts. Notably, 89% of these BEC attacks involved

impersonation of authority figures.

"The findings of this report yet again illustrate the

sophistication of criminal tactics. BEC email and phishing

attacks are becoming more targeted and convincing,"

commented VIPRE Security Group's chief product and

technology officer Usman Choudhary.

Darren Williams.

STRESS TAKES ITS TOLL

Nearly a quarter of CISOs or IT security

decision makers (ITS DMs) are actively

looking to leave their position, according

to new research that was commissioned

by BlackFog. A further 54%, while not

actively looking to quit, said they were

open to new opportunities.

The research, which explored the cause

and impact of stress on people at work,

also highlights how security leaders are

managing the demands they face and

what they need from their organisations

to feel more supported.

Conducted with UK and US cybersecurity

leaders, the research also reveals that,

of those considering leaving their role,

93% state that the stress and demands

are impacting their decision to leave.

Said Dr Darren Williams, CEO and

founder, BlackFog: "The cost and time

involved in replacing senior level security

leaders is considerable, so it's absolutely

essential that organisations address the

root cause of stress to reverse the cycle

of churn."

SNYK ACQUIRES DAST PROVIDER PROBELY

Snyk, a leader in developer security, has acquired

Probely, a modern dynamic application security

testing (DAST) provider, with coverage of API security

testing and web applications.

Probely also powers Security Headers, a free tool

designed to help users understand and benchmark

the security of their web properties.

"For global security leaders seeking to further

accelerate trusted AI adoption, adding Probely's

technology and expertise further extends the breadth

and depth of Snyk's platform," said Peter McKay, chief

executive officer, Snyk.

NATIONWIDE NAMED CYBER RESILIENCE AMBASSADOR

The world's largest building society, Nationwide, has been

named a National Ambassador of the National Cyber

Resilience Centre Group (NCRCG). In this new role, the

organisation will be helping to shore up the cyber defences

of the UK's small and medium-sized enterprises (SMEs).

Sharon Gould, supplier security and resilience manager at

Nationwide Building Society, commented: "Protecting our

customers against fraud and scams, and preventing

criminals at source, is a priority at Nationwide. It's vital all

areas of the supply chain work together, sharing resources

and the latest technology to stay ahead of criminals."

Peter McKay.

Sharon Gould.

6

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


Building cyber security

awareness together.

Leading the way in personalised

cyber security awareness.

Keep your staff engaged, cyber-secure, and compliant with our award-winning,

personalised cyber security training.

Designed with real people and teams in mind, our expertly crafted content transforms

cyber security into an informative and captivating experience. By making learning

fun and impactful, we maximise engagement and enhance staff security behaviour,

ensuring constant vigilance against cyber threats.

Our staff fully engaged with our

security awareness program, with

completion rates over 85%

Best cyber security awareness

platform available


news

Daniel Hofmann.

INTEGRITY360 LAUNCHES NEW UNIFIED SECURITY SOLUTION

Integrity360 has launched its Managed Cloud Native

Ahmed Aburahal.

Application Protection Platform (CNAPP) Service, which

has been designed specifically to deliver automated

cloud workload protection, visibility into cloud

environments, proactive threat and exposure detection,

and compliance alignment.

Comments Ahmed Aburahal, technical product

manager at Integrity360: "The need for advanced,

unified security solutions is critical, particularly as

Gartner predicts that 95% of cloud breaches will stem

from user misconfigurations by 2025.

"Our Managed CNAPP Service bridges these gaps,

providing a unified platform that ensures continuous

monitoring, streamlined risk management and robust

threat protection."

PHISHING REMAINS THE

SCOURGE OF BUSINESSES

Hornetsecurity's annual Cybersecurity

Report has revealed that a third (36.9%)

of all emails received by businesses (20.5

billion) in 2024 were unwanted. Of these,

2.3% contained malicious content, totalling

427.8 million emails.

Once again, phishing remained the most

prevalent form of attack, responsible for a

third of all cyber-attacks in 2024.

This was confirmed by the analysis of some

55.6 billion emails, showing that phishing

remains a top concern consistently year

over year. Malicious URLs and advanced

fee scams were responsible for 22.7% and

6.4% respectively.

Commenting on the findings, Daniel

Hofmann, Hornetsecurity CEO, said: "These

findings highlight both progress and new

challenges in the fight against cyber threats.

"While it's encouraging to see some consistency

in attack methods, for defensive

purposes, the shift toward more targeted

social engineering tactics means businesses

must stay vigilant."

WEIGHING UP THE RISKS

Kiteworks has launched its Risk Exposure Index,

which evaluates and prioritises data breaches

based on their severity and potential impact. The new

index has been applied to analyse the top 11 data

breaches of the first half of 2024, offering insights

into the evolving landscape of cybersecurity threats.

The Risk Exposure Index incorporates a range of

factors to provide "a more nuanced understanding of

breach severity, including the type of data

compromised, the extent of exposure, potential

regulatory penalties and long-term impact on brand

reputation", states the company.

"In today's complex cybersecurity landscape,

organisations need a more sophisticated approach to assessing and prioritising data

breach risks," says Tim Freestone, chief strategy and marketing officer at Kiteworks.

"Our Risk Exposure Index offers a standardised framework for quantifying and comparing

the risks associated with different data breaches, enabling organisations to allocate

resources more effectively and enhance their overall security posture."

'QUANTUM APOCALYPSE IS COMING'

Up to 99% of Fortune 500 companies are not adequately prepared for the imminent threats

posed by quantum computing.

Tim Callan, chief experience officer at Sectigo, says that the quantum paradox is evident. "While

the remarkable processing power of quantum holds boundless potential, it simultaneously

poses a significant threat to the foundation of all encryption.

"In the event that a country does develop a quantum computer capable of breaking current

encryption methods, it is likely that they would keep it a closely guarded state secret, as the UK

did when it broke the Enigma code during World War II. For this reason, it is imperative that

businesses take their own proactive measures to prepare for this eventuality by transitioning to

quantum-safe algorithms before it is too late."

8

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


Layers aren’t just for cakes; they’re

essential in cybersecurity’s secret

recipe for protection!

Bake it happen with VIPRE Security Group. Secure your

bytes before you take a bite with Email Security, Endpoint

Security and User Protection

www.vipre.com


q&a session

IN WHOM WE TRUST

COMPUTING SECURITY SAT DOWN RECENTLY FOR A FIRESIDE CHAT WITH LIBRAESVA'S CTO RODOLFO

SACCANI ABOUT THE POWER AND RELEVANCY OF ADAPTIVE TRUST ENGINES

Computing Security: What is an

adaptive trust engine? How does it

differ from a traditional static trust

model?

Rodolfo Saccani: Adaptive trust engines

(ATEs) use AI to learn the usual patterns

of email communication behaviour for

organisations and individuals. They

continuously assess the strength of

business-to-business trust and

proactively hold anomalous traffic.

In comparison, traditional email security

tools are reactive, relying on attack

vectors and signatures to be already

known. As a result, they are vulnerable

to threats, including new (zero-day)

attacks, business email compromise,

phishing and spoofing. This inflexibility

and inability to be constantly updated is

a serious weakness in legacy systems.

CS: Can you explain some common use

cases for adaptive trust engines in

cybersecurity?

RS: The valuable information that ATEs

collect and constantly learn from is vital

for repelling a range of attack attempts.

Fake replies sent by unusual

correspondents, for example, are flagged

by the friction between the semantics of

the message and the lack of any previous

relationship. Spamming patterns can be

spotted by a uni-directional message

flow from an external entity targeting

multiple internal users, whilst

compromised accounts are rooted out

thanks to ATEs identifying internal email

accounts suddenly sending emails to

many external addresses with no prior

relationship.

ATEs also trigger additional security

checks and policies on emails from firsttime

senders and display warning

banners in the body of emails from

unusual correspondents.

CS: How have emerging cybersecurity

threats necessitated the need for

adaptive solutions?

RS: The evolution of email security has

rendered traditional signals ineffective.

Reputation information, for example,

becomes useless when emails are sent

from compromised accounts on

prominent and reputable email services.

Alternative methods to evaluate

trustworthiness are sorely needed.

In this context, ATEs provide a powerful

solution. By leveraging historical

relationship data - a source harder to

spoof or manipulate - ATEs can provide

more accurate assessments of sender

credibility.

CS: Can these solutions ease the resource

burden for companies affected by the

cybersecurity recruitment crisis?

RS: It's no secret that AI is changing how

we approach tasks in the cyber security

industry. The speed at which these

intelligent systems have developed has

been hugely impressive and has led to

tools becoming increasingly capable of

taking over responsibilities traditionally

assigned to humans. With AI doing the

heavy lifting on several resource-intensive

tasks, cyber security professionals will

have more time for strategic and highvalue

work.

We are spearheading this shift,

investing heavily in AI tools that enhance

the reliability and effectiveness of our

email security solutions. Companies are

10

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


q&a session

used to a 'set and forget' approach to

email security solutions, where the

system can be implemented, configured,

and left to operate without constant

intervention. AI enables us to ensure that

solutions are continuously updated

without intensive processes so that

emergent threats can be dealt with.

CS: What are some key factors or

attributes that an adaptive trust engine

evaluates when determining

trustworthiness?

RS: ATEs account for all communication

history between individuals in a

company, as well as communications

with other businesses, helping to build a

pattern that cannot be fabricated. This

means that when evaluating potential

threats, including bad actors who are

looking to exploit vulnerabilities, conduct

fake online activity, impersonate

companies, and generally fool humans,

ATEs have a wealth of activity to pull

from to make a decision.

CS: What are the challenges in training a

machine learning model to assess trust in

real-time?

RS: The all-encompassing visibility that

ATEs have allows them to thoroughly

evaluate all inbound and outbound

communications, gaining unparalleled

insights into the relationships between

individuals and organisations over time.

However, with such a vast repository of

data, the challenge for the model is to

make good use of this resource and

provide real-time assessments of sender

credibility, trustworthiness and intent.

For example, our solution can

automatically identify emails from

unknown or new external senders. It can

then establish a 'trusted' label for them,

if they are being sent to a recipient who

has recently been introduced to the

external party by a colleague with whom

they already have an established trust

relationship. This allows us to quickly

recognise that these new relationships

are legitimate and not malicious, even if

there is no prior interaction between the

sender and the recipient.

CS: What security concerns should be

addressed when developing an adaptive

trust engine?

RS: We are already seeing efforts to

circumvent ATEs by exploiting legitimate

services or the mailboxes of trusted

parties. For ATEs to be able to

comprehensively evaluate emails and

identify potential evasion attempts, they

must integrate data from diverse sources,

including other AI-powered systems.

CS: How would you handle a situation

where the trust engine mistakenly grants

high trust to a malicious actor or device?

RS: Our layered security approach

provides comprehensive protection

against evolving threats, meaning that,

even if one section mistakenly grants

access, another layer will detect the

threat. The ATE is just one component,

but it plays a crucial role. By integrating

input from multiple components, our

system analyses the signals holistically

through a final AI layer that detects

discrepancies between various indicators.

This layer focuses on identifying

attempts to bypass protections via

legitimate services, such as PayPal or

Microsoft's invoicing service, to deliver

technically legitimate emails that

attackers can exploit by injecting

malicious content. The goal is to catch

these sophisticated threats before they

reach the recipient's inbox.

CS: How can an adaptive trust engine

handle an emerging threat or a new type

of attack that wasn't previously

considered in its trust model?

RS: Threat actors who are financially

Rodolfo Saccani, CTO, Libraesva.

motivated and well-funded often have

sophisticated skills that enable them to

develop innovative attack techniques. To

remain effective, any security system

must not only detect known threats, but

also be equipped to evolve rapidly in

response to new attack methodologies.

Developing a comprehensive early

detection network to identify emerging

threats has been a key driver for me and

the rest of the company. I've been

impressed by how dedicated our team of

seasoned analysts are to staying at the

forefront of threat intelligence and trying

to get a step ahead where they can. We

continuously monitor and analyse new

attack techniques to keep abreast of the

evolving threat landscape.

Because of this, we can rapidly deploy

new versions of our engines, in response

to emerging threats, in as little as five

minutes. In the fight against security

threats, this agility and dedication are

key to ensuring safety for all our clients -

no matter how sophisticated the

attack is.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

11


email protection

MISH, MASH… BASH!

AGGRESSORS ARE CONSTANTLY FINDING NEW WAYS - SUCH AS

MISHING - TO EXPLOIT EMAIL, IN ORDER TO BREACH DEFENCES

Cybercriminals are increasingly

targeting mobile users through attack

methods that exploit the unique

features of mobile devices, like voice calls,

text messages (SMS), cameras and emails,

states Tim Roddy, vice president, product

marketing for mobile threat defence at

Zimperium. "These tactics are collectively

known as 'Mishing', a term that covers all

mobile-targeted phishing techniques."

He identifies common Mishing tactics:

Mobile-targeted Email Phishing:

launched via a standard email message,

but only executes when a link is clicked

by the user from a mobile device

Smishing (SMS Phishing): deceptive

SMS messages lure victims into clicking

malicious links or sharing data

Vishing (Voice Phishing): fraudulent

voice calls, often AI enabled, used to

trick users into divulging confidential

information or taking another risky

action

Quishing (QR Code Phishing): mobile

cameras are exploited to deliver phishing

attacks through malicious QR codes.

Roddy also singles out factors he says are

increasing the prevalence of Mishing:

Increased mobile usage

Expanded access to sensitive data & apps

Limited security measures deployed on

mobile devices

Poor user behaviour.

To safeguard against Mishing, he suggests

that organisations might adopt certain best

practices. For users, he offers this guidance:

Be sceptical of unexpected messages:

treat unsolicited messages with caution.

Verify the sender before responding or

clicking on any links to prevent

unauthorised access to sensitive

information

Avoid clicking on suspicious links: refrain

from clicking links from unknown or

unverified sources. Instead, manually

enter the URL into your browser to

ensure you are visiting a legitimate

site and safeguarding corporate data

Exercise caution with QR codes: be wary

when scanning QR codes from even

known sources.

And, for organisations, Roddy advises:

A comprehensive mobile threat defence:

deploy zero-day, on-device threat

protection to detect and block threats in

real-time, as well as application scanning

for malware and vulnerabilities

Educating employees: provide training

on recognising and avoiding Mishing

attempts.

"Mishing is an increasingly common and

sophisticated threat in today's mobilecentric

world, particularly for organisations

that rely on mobile devices for remote work

and access to sensitive information," he

concludes. "By understanding the nature

of Mishing and adopting proactive mobile

security measures, organisations can better

protect their critical information from

cybercriminals."

RIDING THE TROJAN HORSE

Email is, of course, commonly used as a

route into corporate networks to spread

malware, such as ransomware, spam and

viruses, as well as other attack vectors, such

as phishing and scams. Whether in small

businesses or large enterprises, public or

private sectors, email remains a primary

attack vector, cautions Jack Chapman, SVP

of threat intelligence at Egress, a KnowBe4

company. "This trend is evident in the 8%

rise in phishing emails between April 1-June

30, 2024, compared to January 1-March

31, 2024. Cybercriminals continue to see

12

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


email protection

email as an opportunity to spread malware,

exploit sensitive data or commit financial

fraud - all of which can be triggered by

a single successful phishing attack."

In 2023, 58% of organisations reported

account takeover (ATO) incidents, with

79% originating from phishing emails that

harvested employees' credentials, he adds.

"With these log-in details, attackers can

move laterally across networks and even

launch onward attacks to compromise

entire supply chains, meaning organisations

must address this issue at the source before

an attack is successful. Cybercriminals are

far from static - they're constantly refining

their attack techniques to bypass traditional

detection technologies like secure email

gateways (SEGs). This is evident in the

52.2% increase in attacks bypassing SEGs

in the first three months of 2024, in

addition to phishing toolkits that are

now widely available on the dark web,

advertising specific SEG vendors that their

attacks can get through."

One example of this evolution can be seen

in the rising sophistication of 'quishing'

attacks, Chapman points out. "Although

still relatively new to the cyber landscape,

Egress threat intelligence analysts have

already observed attackers manipulating

the size and colour of QR codes to more

effectively evade detection. As cybercriminals

grow more advanced, businesses must

invest in intelligent, cloud-based antiphishing

technology capable of detecting

zero-day threats - something SEGs are

unable to do."

A dual approach to email security is

the best solution, he argues - combining

intelligent detection technology with

modern security and awareness training.

"Recognising that people significantly

expand the attack surface via email is the

first step in building a robust security

strategy. This allows businesses to turn their

employees from their biggest email security

risk into their strongest line of defence."

INGENUITY OF CYBERCRIMINALS

Although email is now a decades-old,

commonplace communication practice, it

remains a significant attack vector for

cybercriminals and a significant weakness

for enterprises - and this, says Chris Fuller,

senior director of technical field operations

at Obsidian Security, is mainly as a result of

the ingenuity of cybercriminals, who are

constantly evolving the tactics they use for

phishing campaigns, leaving cybersecurity

vendors and teams playing catch up.

"Where once the aim of the campaigns

deployed by phishers was simply to harvest

credentials, we now see more advanced

techniques, such as adversary-in-the-middle

attacks, which bypass the traditional multifactor

authentication techniques that have

grown in popularity as a phishing deterrent.

If these defences fail, the compromise of

your systems could, in turn, lead to malicious

activity in your network or the exfiltration

of sensitive corporate data.

This is of particular concern in SaaS

applications, which have grown massively in

popularity in recent years across every area

of business function. These applications,

with distributed responsibilities within the

business, and misapprehensions about how

much security the vendor provides, exist

outside the traditional IT and security

structures in many corporations, making

them particularly vulnerable."

Using a variety of techniques to fool users,

from AI-crafted text to QR-code based

attacks, the new generation of phishing

gangs work by gaining access to identity

providers, such as Okta and Microsoft, via

legitimate accounts and reverse proxies

which allow them to access these systems

and bypass traditional defences. "One such

example which we recently observed is

a phishing-as-a-service platform, known

as Mamba 2FA, which is successful as a

Jack Chapman, Egress: threat intelligence

analysts at his company have observed

attackers manipulating the size and

colour of QR codes to evade detection.

byproduct of the ease at which

cybercriminals can register new domains,"

states Fuller.

"Most email protection systems are based

on using URL scanners to identify visual

similarities on phishing pages. However,

cybercriminals, such as those operating the

Mamba 2FA service, have adapted to avoid

this, using Cloudflare turnstiles, which hide

phishing sites behind a CAPTCHA challenge,

meaning automated scanners do not detect

it. This is reflective of our own data, which

indicates that 93% of spear phishing and

AiTM compromises we observed occurred

even when email protection was in place."

The evidence as a result of this is all too

clear, Fuller points out. "Email protection

alone is not enough to defend today's

enterprises from next-generation phishing

campaigns. Understanding this for a

modern enterprise looking to keep their

email systems safe is crucial."

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

13


Computing Security Awards 2024

‘DEFENDING AS ONE’

THE ‘SECURITY PROJECT OF THE YEAR’ WINNER AT THE 2024 COMPUTING SECURITY AWARDS CLEARLY

SHOWED HOW CYMRUSOC, MANAGED BY SOCURA, IS ENHANCING THREAT DETECTION RIGHT ACROSS WALES

COMPUTING SECURITY AWARDS WINNERS

Security Project of the Year:

CymruSOC - Wales' National Security

Operations Centre

Company: Socura

Project Overview:

How CymruSOC, launched in May 2024, is

supporting a ‘Defend as One’ approach across Wales

Led by the Welsh Government, in

collaboration with Merthyr Tydfil

County Borough Council, CymruSOC -

the first scheme of its kind in the UK -

strengthens the resilience of public sector

organisations across Wales. By fostering

a 'defend as one' approach, it is also

responsible for helping to safeguard the

data of the Welsh population, as well

as 60,000 employees in the public sector.

CymruSOC is managed by Socura, a

Cardiff-based Managed Detection Response

provider. Socura operates as a partner of

more than 21 local authorities and fire

and rescue services in Wales, supplying

the expertise and capabilities they need

to monitor and respond to cyber threats

around the clock.

Socura was awarded the CymruSOC

contract following a competitive tender

process, where the company demonstrated

its pedigree in areas including

cyber and technical expertise, support for

detection technologies and customer

service. It was also selected for its

commitment to driving employment

opportunities in cyber across Wales.

CYBER SECURITY CHALLENGES

IN THE PUBLIC SECTOR

Every day, thousands of people rely

on councils and other public sector

organisations in Wales for essential services

such as social care, education, and waste

collection. Should a cyber-attack impact

the availability of these services, the results

can be devastating.

Unfortunately, many public sector

organisations with tight security budgets

often lack the level of security specialists

they need, in order to adopt a proactive

approach to security monitoring.

In the case of Merthyr Tydfil Borough

Council, the organisation was aware its

ability to minimise security risks was heavily

linked to its ability to detect attacks early

and shut them down before they caused

disruption.

Keeping its Security Incident and Event

Management (SIEM) platform always

optimised, for example, was proving

challenging and Ryan James, chief

14

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


Computing Security Awards 2024

information security officer at Merthyr Tydfil

Borough Council, was keen to achieve

a more proactive approach. Key security

concerns of the council included:

Preventing disruption to essential

Council services

Protecting sensitive personal and

financial data

Mitigating the risks of phishing and

human error

Keeping security controls optimised

to detect new threats.

”People and businesses rely on the council

for essential services such as social care,

education and waste collection,” says

James. “If our websites, email systems

and telephone systems go down, that’s

going to prevent residents from accessing

information, reporting issues and seeking

assistance.”

HOW SOCURA IS ENHANCING THREAT

DETECTION ACROSS WALES

As the delivery partner of CymruSOC,

Socura is rolling its Managed Detection and

Response (MDR) service out to participating

public sector organisations across Wales.

As the contracting authority of CymruSOC,

Merthyr Tydfil Borough Council was the

first organisation to benefit from the

service. Operating as an extension of an

organisation's security team, Socura MDR

service supplies a 24/7 team of detection

and response specialists. Detection technologies

are included as part of the service,

if required.

To centralise threat visibility, all available

network, endpoint and cloud security

controls deployed within an organisation

are fully integrated with Socura's Security

Orchestration, Automation and Response

platform. New log sources are integrated

regularly and Socura performs weekly

threat-hunting activities to look for evidence

of historical attacks.

"Previously, we may have only found out

about an incident at eight in the morning

when everyone starts work," adds James.

“With Socura monitoring and responding

to threats 24/7, we now get an early

detection warning."

KEY BENEFITS OF THE SERVICE

How public sector organisations across

Wales are benefiting from the CymruSOC

service delivered by Socura:

Enhanced threat visibility: By aggregating

security data from an organisation's choice

of security controls, Socura centralises

threat visibility and identifies coverage

gaps. To increase the detection of adversary

behaviours, Socura's team ingests new log

sources and performs regular threat

hunting activities.

Reduced mean time to respond: Socura's

MDR service doesn't just detect threats such

as malware and phishing attacks, it also

helps organisations respond to them, both

swiftly and effectively. Automated incident

response playbooks are triggered when

specific behaviours are observed, meaning

threats can be shut down in minutes.

Genuine incident notification

Because all security incidents are

thoroughly investigated and triaged

by Socura's SOC team, organisations

participating in CymruSOC are confident

that when they receive a notification,

it is usually a genuine incident that requires

attention. Organisations now spend far

less time investigating and responding to

false positives.

'A defend as one' approach: By monitoring

threat activity across all public sector

organisations participating in CymruSOC,

Socura can respond to security events at

scale. Should threat activity be observed in

one organisation, Socura's can take swift

action to secure others against the same

risk. To further support, CymruSOC's

Ryan James.

'defend as one' approach, Socura shares

regular threat intelligence bulletins to

spread awareness of the latest threats and

exposures.

Instant access to experts: Operating as an

extension of the council, the Socura team

is always on-hand to provide support and

advice when needed. This also includes

responding to service requests, such as

integrating new SIEM log sources.

Measurable outcomes

So that organisations can closely monitor

their security posture, Socura shares

monthly service reports and the data

they need to measure improvements

and identify potential risks. These are

supplemented by regular reviews led by

a dedicated customer success manager.

"The Socura team are experts in their field

and we've already built great working

relationships with their staff," adds James.

"During the early discussions with Socura,

you get the indication that they are very

customer-centric and this has been

demonstrated in all aspects of the work

they do for us."

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

15


cyber resilience

THE JOURNEY TO CYBER RESILIENCE

FORMALISING THREAT DETECTION AND INCIDENT RESPONSE STRATEGIES:

BY SCOTT SCHEPPERS, CHIEF EXPERIENCE OFFICER AT LEVELBLUE

Developing and

maintaining the right

threat detection and

incident response strategies

is integral to achieving cyber

resilience, which can best be

defined as an organisation's

ability to effectively recover

its entire IT estate from an

unexpected interruption. It

begins by formalising specific

incident response protocols

and reprioritising advancing

cybersecurity into corporate

strategy discussions, while

allocating dedicated IT security

budgets to every project. But it

doesn't end there - achieving cyber resilience

is a journey and there are ongoing initiatives

that every organisation should focus on to

face today's evolving threat landscape.

CHALLENGES TO BUILDING

AN INCIDENT RESPONSE PLAN

Threat detection and incident response

strategies are critical in establishing a

comprehensive security programme, but

they can often be difficult to develop and

maintain. Internal security teams often

struggle with managing multiple point

solutions and keeping up with the day-to-day

activities required to properly run them, as

additional resources are often limited.

Results from the 2024 LevelBlue Futures

Report indicate that less than half (47%) of

organ-isations reveal their cybersecurity

processes are standardised across the

enterprise and just 35% say that their

incident response is significantly formalised.

Identifying these challenges and what is at

stake is the first step in understanding how

best to structure an incident response plan.

PRIORITISING CYBER RESILIENCE

AT THE LEADERSHIP LEVEL

LevelBlue research shows 63% of

organisations believe leadership doesn't

prioritise cyber resilience. With another 72%

indicating organisations do not specifically

invest in cyber resilience beyond cybersecurity,

leadership underestimates the harm a major

cyber incident can cause. Further, we find

cybersecurity budgets are remaining reactive

versus proactive in addressing cybersecurity

threats. This approach, combined with outdated

security practices, undermines other

effective cyber resilience efforts.

Breaking down silos of communication

between cyber teams and leadership has

always been a challenge, but it is one that

still needs addressing. We remain hopeful,

however, as our research shows that,

compared to previous years, there is a

notable increase in resources dedicated to

cybersecurity.

CONTINUING THE CYBER

RESILIENCE JOURNEY

Each organisation will have unique

challenges and opportunities as

they build their threat detection

and incident response strategies.

Once implemented, they will

help fortify their cyber resilience

posture. Organisations should

look to take these additional

steps to ensure a cyber-resilient

future:

Identify Unique Barriers.

This will require a thorough

assessment, in order to determine

where an organisation

may be exposed to areas of risk

Be Secure by Design

Evaluate the organisation's

next-generation computing

needs and implement security at the

start to meet compliance standards and

address future threats

Align Cyber Investments with the

Business. Communication is crucial to

ensuring cybersecurity initiatives

integrate with business objectives

Build and Pressure Test a Support

Ecosystem. Partnerships with external

collaborators are paramount to

enhance an organisation's security

expertise, but they must be tested.

Do this through a company's incident

response exercises

Transform Cybersecurity Strategies.

Adaptability and flexibility are a must

for all security initiatives and tools. so

that they can address the latest threat.

These proactive measures are key as

organisations face the challenges that

prevent them from formalising a threat

detection and incident response plan,

jeopardising their overall cyber resilience.

For more in-depth information, see the

special LevelBlue report here.

16

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


compliance insights

STRENGTH IN NUMBERS

NO SINGLE BUSINESS, GOVERNMENT ENTITY OR INSTITUTION CAN TRULY DEFEND

AGAINST CYBER THREATS ON ITS OWN, WARNS PAVIN VARUGHESE, VP SALES, JETPATCH

The widespread non-compliance

with the NIS2 directive is definitely

concerning - see also our main

feature starting on page 18 - but it also

highlights an important opportunity,

states Pavin Varughese, VP Sales,

JetPatch. "Cybersecurity isn't something

that can be tackled by individual organisations

alone; it's a collective responsibility!

No single business, government

entity or institution can effectively

defend against cyber threats on its own.

If businesses, regulators and the public

sector work together, we can create a

much stronger and more resilient system

that benefits everyone."

One way to encourage this collaboration,

he says, is through positive

reinforcement. "Rather than focusing

solely on penalties, why not reward

compliance? For example, tax breaks

or financial grants for cybersecurity

improvements could encourage

organisations to take their obligations

seriously. Public recognition programs,

like certifications or awards for compliant

companies, could also provide a

competitive advantage and encourage

others to follow suit. This approach

would shift the narrative around compliance

from being a burdensome obligation

to an opportunity for growth and

recognition. Businesses that meet or

exceed compliance requirements should

feel valued and supported, not simply

pressured to avoid penalties."

Another critical factor is education,

adds Varughese. "Many organisations are

still unaware of what the NIS2 directive

entails or why it's so important. This is

particularly true for small and mediumsized

enterprises (SMEs), which often

lack dedicated cybersecurity resources

or expertise. Running widespread

awareness campaigns and offering free,

accessible resources could go a long way

in bridging that knowledge gap. Regulators

could also partner with industry

associations or chambers of commerce

to provide sector-specific guidance and

training. For instance, manufacturing

companies might need a different

approach to cybersecurity than financial

services firms. Customising these efforts

to the unique needs of various industries

could make a big difference in how compliance

is perceived and implemented."

Equally important, he argues, is creating

a culture of shared responsibility. "Cybersecurity

affects everyone and no organisation

operates in isolation. If one

business is compromised, it can have a

ripple effect on its customers, partners

and the wider supply chain. To address

this interconnectedness, public-private

partnerships could play a key role.

"Governments could work closely with

businesses to develop and implement

compliance strategies, while businesses

could share real-world insights and

feedback with regulators to ensure

directives like NIS2 are practical and

effective."

Information-sharing initiatives are

another way to amplify the impact of

compliance measures. "Cyber threats

are constantly evolving, and staying

ahead of attackers requires real-time

collaboration," adds Varughese. "By

creating secure platforms for sharing

threat intelligence and best practices,

Pavin Varughese: cybersecurity has to

be treated as a collective responsibility.

businesses and regulators can work

together to mitigate risks before they

escalate. This kind of collaboration isn't

just beneficial: it's essential in a world

where cyberattacks are becoming more

sophisticated and widespread."

At its core, compliance with NIS2

shouldn't be seen as a box to check, but

as a shared mission to protect our digital

future, he concludes. "When we work

together, we're not just meeting obligations,

we're building a safer, more

secure Europe for everyone.

"By shifting the focus to collaboration,

incentives and shared responsibility,

we can transform compliance from a

challenge into an opportunity to strengthen

our collective resilience in the face of

evolving threats."

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

17


compliance special

COMPLIANCE DEFIANCE

WITH UP TO TWO-THIRDS OF EUROPEAN BUSINESSES ESTIMATED TO HAVE MISSED THE LATEST

EU SECURITY COMPLIANCE DEADLINE, THE FALL-OUT COULD PROVE SEVERE FOR UK ORGANISATIONS

The Network and Information Security

Directive (NIS2) deadline for EU member

states to transpose the directive into

national law has come and gone: October 17,

2024. The directive's aim is to improve cybersecurity

across the EU by setting stricter

requirements for compliance. For those in any

doubt, the implications for UK businesses are

significant, particularly those with operations

or digital services in the EU. with fines, nonmonetary

remedies and, in extreme cases,

legal consequences awaiting those who fail

to comply.

Meanwhile, experts are predicting the

current high levels of non-compliance will

likely compromise the EU's goal of creating

a robust European cybersecurity framework,

leaving businesses and the public further

exposed to risk. What can be done to

persuade those organisations that are still

non-compliant to change tack, meet the

obligations of NIS2 and, at the same time,

become less of a target themselves for the

hackers and attackers?

STRUCTURAL FRAMEWORK

"Highlighting the increased enforcement,

penalties and reputational damage from

breaches can motivate action, but equally

beneficial is showing how compliance to ISO

27001 certification can protect their business

and provide a competitive advantage," argues

Luke Dash, CEO, ISMS.online. "The updated

NIS2 directive introduces stricter enforcement

requirements across more sectors than before.

To meet these obligations, a logical first step

for non-compliant organisations would be

to pursue ISO 27001 certification-an

internationally recognised standard for

Information Security Management Systems

[ISMS]."

ISO 27001 provides a structured framework

for protecting critical assets, focusing on risk

assessment, risk management and continuous

improvement. Certification depends on

achieving several key components, including

comprehensive risk assessments, securitydriven

organisational structures, access

controls, physical and technical safeguards,

and well-defined information security policies

and monitoring protocols. "When comparing

these requirements to NIS2, it's clear that

many overlap- they both emphasise risk

management, access control and security

policies. By adopting ISO 27001, organisations

not only align with NIS2, but also gain a

strong head start in their compliance journey."

Beyond compliance, ISO 27001 offers

competitive advantages, adds Dash.

"Certification by an accredited body

demonstrates that your security measures

follow best practices, helping to build trust

with customers and stakeholders. Customers

will quickly recognise that your enterprise

security measures are grounded in best

practices, providing them with the peace

of mind that you are an enterprise that will

take the protection of their data and assets

seriously."

Fortunately, with ISO 27001 certification,

support is readily available, he points out.

"With the proper guidance, what initially

seems challenging can transform into a

manageable and streamlined aspect of your

business operations. By adopting the right

approach and utilising available resources,

organisations can seamlessly integrate best

practices into their internal processes and

effectively promote them externally."

HARMONISATION FACTOR

Over and above the difficulties encountered

in its implementation, the NIS2 directive does

more than simply lay down rules for each

member state, comments Bernard Montel,

technical director and security strategist,

Tenable. "It aims to harmonise cybersecurity

practices across Europe, under the supervision

of ENISA, in order to better respond to

growing cyberthreats and protect critical

infrastructures."

By extending its scope to strategic sectors,

such as healthcare, telecommunications and

digital services, it takes into account the

growing interconnection of infrastructures

and the cyber risks that now affect a large

part of the economy, he says. "However, this

harmonisation poses challenges for

companies, particularly those operating in

several countries, as it requires rigorous

management of national compliance. SMEs,

often limited in resources, will have to be

resourceful in adapting and some implementation

details remain unclear, which makes

navigating this regulatory framework all the

more crucial to the directive's success.

"NIS2 is not too dissimilar in its aspirations

as that of the EU's General Data Protection

Regulation (GDPR). When introduced in 2018,

GDPR had a huge impact, not just across

Europe, but worldwide, increasing the overall

18

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


compliance special

protection of personal data. NIS 2 will have

a similar impact for the cybersecurity posture

of critical infrastructure operators and the

suppliers they rely upon."

One of the other major changes that NIS2

will impose on companies is a profound

rethinking of their cybersecurity strategy,

encouraging them to build resilience over the

long term, adds Montel. "With this approach,

it's no longer just a matter of complying with

standards to better protect oneself, but of

transforming cybersecurity into a genuine

strategic pillar of the company. This transformation

involves investment in advanced

detection technologies, ongoing training

programs for teams and robust incident

response plans.

CYBERSECURITY POSTURE

Jamie Beckland, chief product officer at

APIContext, underscores how compliance

can streamline operations, increase customer

trust and ultimately make organisations less

attractive targets to attackers by strengthening

their cybersecurity posture. "For instance,

compliance requirements in API development

play a crucial role by establishing a minimum

standard that all organisations must meet,

effectively 'raising the floor' of security, privacy

and functionality across the board. This

approach ensures that even the most basic

implementation meets essential safety and

interoperability criteria, reducing the risk of

severe vulnerabilities and creating a more

consistent, reliable experience for users.

"When specific API standards are used to

achieve compliance - like OAuth2.0 for secure

authentication, FAPI [Financial-grade API]

for enhanced financial security, or FHIR

[Fast Healthcare Interoperability Resources]

for healthcare data exchange - the standards

bodies responsible for these specifications

integrate robust security measures directly

into the technology.

"All these standards are developed and

refined by experts who continuously analyse

and address security threats, ensuring that

implementations adopting these standards

start from a solid, secure foundation,"

says Beckland. "By adopting and actively

monitoring standards like NIS2, companies

will not only adhere to regulatory requirements,

but also establish a stronger, more

resilient ecosystem that keeps pace with

evolving security threats and user

expectations."

RISK ASSESSMENT SHORTCOMINGS

Ngaire Guzzetti, technical director supply

chain, CyXcel, points to how many organisations

are still operating under the

assumption that their supply chain is secure.

"UK government statistics show that still only

36% of businesses have undertaken cyber

security risk assessments in the last year,

with only 10% saying they review the risks

posed by immediate suppliers - this alone is

alarming. Supplier contracts might mention

vague cybersecurity requirements, but lack

the teeth to enforce compliance. Vendor

assessments may be infrequent or overlook

digital risks entirely. Trust, for many, is still

based on reputation, rather than verifiable

security practices. It's a bit like trusting the

cook at your favourite restaurant, because

they've been open for years-without realising

they've never once cleaned the kitchen."

NIS2 has forced a change to that, she says.

"The directive significantly broadens the scope

of industries covered, extending its reach

into sectors that previously flew under the

regulatory radar, such as postal and courier

services, manufacturing, food producers and

research organisations…This means that even

businesses that don't consider themselves part

of 'critical infrastructure' may find themselves

indirectly impacted, if they supply or partner

with a regulated entity. Cybersecurity can no

longer be viewed as a distant concern - it's

about to become a fundamental part of how

supply chains operate."

For many organisations, navigating and

compliance with NIS2 will require more than

just a tweak to existing processes - it will

demand a fundamental shift in how cybersecurity

is integrated into supply chain

management, advises Guzzetti. "The first step

for businesses is to gain a comprehensive

understanding of their current supply chain

security posture. This involves mapping out

and tiering all suppliers, assessing their

cybersecurity measures and identifying potential

points of vulnerability. By prioritising the

highest-risk areas, organisations can focus

their efforts where they will have the greatest

impact. Beyond this, companies will need to

develop and implement robust cybersecurity

policies and procedures. Tailored cybersecurity

requirements for suppliers, building security

into contract negotiations, and ensuring that

both parties are held accountable for compliance

are key."

PAPER TIGER

Innes Muir, regional manager, MSSPs, UK,

EIRE and RoW, at Logpoint, says part of the

problem with NIS2 is that no fines were ever

levied under its forerunner, NIS, and this risks

the legislation being regarded as something

of a 'paper tiger'. "There's no point threatening

to impose million Euro fines, if those aren't

applied. However, many of the other punitive

measures are also likely to be painful. These

include on-site inspections, targeted security

audits [to be carried out by a third party and

charged back to the entity], security scans

and requests for information or access to

additional data or documents, plus there's the

added threat of senior management being

suspended if they are found personally liable

in the event of a breach.

"NIS2 is ambitious and applies to a far wider

range of entities across 17 verticals, affecting

over 160,000 entities. It will also capture

SMEs, except in special circumstances. If the

authorities pull it off, it will be a tide that raises

all ships, effectively baselining security across

the continent, protecting businesses and economies.

What's more, it will see the sharing of

threat intelligence between member states,

improving our understanding of, and ability to

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

19


compliance special

Luke Dash: certification by an accredited

body demonstrates that your security

measures follow best practices.

Jamie Beckland, APIContext: compliance can

streamline operations and increase customer

trust.

swiftly respond to, national threats" But not

all entities know if they are in scope and the

risk management measures advocated are

deliberately non-prescriptive, which has left

many organisations unsure of how to proceed.

"On top of that, compliance is likely to be

expensive for those SMEs who were previously

out of scope, with estimates that it will cost

the continent 31.2bn euros on an annual

basis," adds Muir. "Small wonder, then, that

many are choosing to do nothing, particularly

as their governments are also behind the curve,

with several having missed the deadline."

Persuading entities to comply will therefore

require more carrot and stick. "Efforts such

as the online tool rolled out by the Dutch

government can help entities determine if

NIS2 applies to them. The security industry,

too, needs to help educate entities on how

they can achieve economies of scale when

becoming compliant by mapping the

requirements to existing standards, such as

ISO27001, and utilising the tools they have,

such as SIEM, to meet the incident reporting

demands. Compliance with NIS2 could also

become something of a merit badge in the

market, because it proves the entity has

met those base level practices associated

with good cyber hygiene."

URGENT POLICIES REVIEW

Beyond the obvious need for compliance,

NIS2 should be a stark reminder for CISOs

to urgently reevaluate their security policies,

says Adam Preis, director of product solution

marketing at Ping Identity. "The key focus

needs to be broad; first, they must rethink

their risk analysis and security policies, then

look at security incident management, business

continuity planning and crisis recovery

management. Important requirements include

supply chain security and the security auditing

procedures at the network and information

system level - forgetting this can be detrimental

to compliance. Organisations must

also continually look at the wider ecosystem,

and ensure standards are driven across

supplier and partner organisations."

What underpins continual NIS2 compliance,

he states, is a strong focus on measures to

evaluate cybersecurity readiness and hygiene,

and appropriate training and procedures for

the workforce. "As well as ensuring policies are

being followed, training should be designed

to help employees get to grips with continuous

authentication, and strengthen and

modernise their IAM," adds Preis.

"How the workforce authenticates and

accesses critical resources - and how they are

secured - is critical to achieving a business's

broader cybersecurity goals, such as zero trust

and layered security, as well as limiting a ripple

effect of risk on partner organisations."

The scope of NIS2 is complex, but necessary,

due to the interconnectedness of the EU, he

states. "It shouldn't take much persuasion to

convince non-compliant businesses as to why

they should care about NIS2 when the stakes

and risk to reputation - and to the overall

resilience of the EU - are so high. Even for

UK businesses, the implementation of NIS2

should be an opportunity to overhaul security

practices and standards for their own sake."

DISRUPTION & DESTRUCTION

As highlighted in recent cybersecurity incidents

like the Volt Typhoon and Flax Typhoon

attacks, state-sponsored cybercriminals are

no longer just targeting data for profit or

espionage -"they're positioning themselves

for large-scale disruption and destruction of

critical infrastructure causing widespread

economic and societal harm", warns Phil

Lewis, SVP - market strategy and development

at Titania.

"The sophistication of these attacks, often

characterised by months or years of undetected

activity, proves that traditional reactive

security measures are insufficient. Businesses

must shift from a reactive stance to proactive,

continuous monitoring and segmentation of

the attack surface of their critical systems and

data to assure operational readiness and

resilience and comply with NIS2."

20

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


compliance special

To persuade non-compliant organisations to

act, it's essential to highlight the operational

risks they face beyond financial penalties, he

continues. "Cyber threats are becoming more

sophisticated, moving laterally across and then

lying in wait within flat networks. Macro and

micro segmentation, proactive monitoring of

changes to the configuration of the attack

surface and automating detection of indicators

of compromise are not just regulatory

demands, but essential for survival in today's

threat landscape.

"By adopting these measures, businesses not

only reduce their risk of comp-liance fines, but

also significantly diminish their attractiveness

as a target for attackers."

Regulatory mandates like NIS2 are not just

about compliance, he goes on to say - they

are a blueprint for safeguarding the future.

"The emphasis on network segmentation and

continuous monitoring of the attack surface is

key to creating a security-first culture, reducing

vulnerabilities and, ultimately, mitigating the

operational impact of inevitable attacks."

BUSINESS ENABLER

Sean Tilley, senior director of sales at 11:11

Systems, says that, to persuade tardy organisations

to invest in cybersecurity, a shift in

mindset is required. "NIS2 compliance should

be reframed as a business enabler-one that

reduces exposure to risks, builds consumer

trust and ultimately enhances business

resilience. There are several practical

approaches to driving compliance and

encouraging investment in cybersecurity.

First, businesses should be educated on the

financial and reputational costs of a data

breach or cyber-attack. Many companies may

not realise that the direct financial implications

of a breach - ranging from lost revenue to the

costs of recovery - can vastly exceed the cost

of implementing proper security measures

upfront. Demonstrating that cybersecurity

investment is not only about compliance, but

also about long-term financial sustainability,

which could encourage more businesses to

take it seriously."

In order to achieve compliance and effectively

mitigate the threat of attack vectors,

companies must remain ever vigilant and

continually monitor their IT environment, he

adds. "If the incident is significant, organisations

are required to report it within 24

hours of becoming aware of the incident;

while less critical threats are to be reported

within 72 hours of detection.

BREACH WARNINGS

"This requires advanced threat detection

systems, a robust incident response plan and

a clear understanding of the vulnerabilities in

the organisation's systems. Without proper

monitoring, organisations could be missing

key indicators of a breach and may fail to

notify the appropriate regulatory bodies on

time, leading to compounded consequences."

There are other highly important strategies

that organisations should be implementing

to achieve compliance, states Tilley:

Undergo a comprehensive resilience review

and gap analysis, including an incident

response process

Establish board-level accountability for

cyber security

Ongoing monitoring and lifecycle

management.

"Finally, governments and regulatory bodies

should consider offering support, in the form

of grants, tax incentives or training programmes

to help smaller businesses meet NIS2

requirements. Financial assistance or technical

resources could help to bridge the gap for

businesses that are struggling to make the

necessary investments in cybersecurity.

"Ultimately, achieving widespread NIS2

compliance requires a collective effort to

demonstrate that cybersecurity is not a legal

obligation, but a strategic priority for the

future."

Ngaire Guzzetti, CyXcel: there are many

organisations that are still operating

under the assumption their supply chain

is secure.

Phil Lewis, Titania: state-sponsored

cybercriminals are positioning themselves

for large-scale disruption and destruction

of critical infrastructure.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

21


training essentials

A FORCE TO BE RECKONED WITH

ORGANISATIONS MUST ADDRESS THE HUMAN FACTORS OF CYBERSECURITY -

AND THAT MEANS CULTIVATING AN INFORMED AND PROACTIVE WORKFORCE

Many organisations fail to invest in,

and plan for, the human component

of cybersecurity until after a breach

has occurred. This is too little, way too late,

and can leave that organisation damaged

financially and by reputation.

More and more, it is being recognised that

employee awareness should be the first

line when it comes to the defence of any

organisation's digital assets. That means

building a cyber workforce capable of rising

up to the challenge of cybersecurity through

recruiting and retaining efforts.

It also entails taking a fresh look at information

security training and awareness efforts,

providing immersive learning opportunities

to reinforce behaviour change.

BEHAVIOUR AND CULTURE SHIFT

"Over the past decade, there has been

a significant shift in how organisations

approach security awareness and training,"

says John Scott, lead cyber security researcher

at CultureAI. "Best practice now involves

moving beyond mere awareness, with

organisations aiming to foster a comprehensive

change in behaviour and culture. The

focus is on transforming beliefs, motivations

and attitudes towards security. That said,

many organisations still see awareness as

the only thing they need to do. While well

intentioned, this often results in increased

pressure on employees, who are unfairly

labelled as the 'weakest link' or the 'problem

exists between keyboard and chair'."

He points to how we talk about security

being everyone's responsibility -true, to some

extent - as we all interact with technology

and assets and should do so as securely as

possible. However, expecting more from

employees increases their cognitive load,

making errors more likely, even among

well-trained professionals.

"Our recent research showed that 79% of

organisations experi-enced a breach with a

human element," states Scott, "even though

100% of these organisations deliver training,

with 78% conducting it monthly. This highlights

the urgent need for a fresh approach."

The answer is not to burden individuals, but

to return to the basics, he says. "People,

processes and technology must be equally

prioritised, and we should invest in layered

controls, including the human element, to

make sure that we have defence in depth.

Investing in secure-by-design systems is

crucial, as is learning from security UX experts

to ensure that secure choices are also easy

choices.

"In cyber security, we often give lip service to

the phrase 'assume breach', but, to truly build

a resilient organisation, it's essential to create

systems where a single human error cannot

compromise the entire company. Human error

is inevitable, but resilience can be achieved by

ensuring that such errors are detected and

remediated as quickly as possible."

Ultimately, he adds, this problem is not

going to be fixed by considering one element

or another. "We need to take a step back and

consider this systemically - if an error occurs,

what was it about the whole environment

that made that error possible, or even likely?

Resilience doesn't mean nothing fails - it

means we can cope with failure."

22

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


training essentials

AI CHANGES THE BALL GAME

Matt Chinnery, security consultant at Ripjar,

says employees have long been identified by

criminals as being the weak element of an

organisation's defences. Naturally, therefore,

companies have needed to invest in cybersecurity

training for their workforce to bring

them fully up to speed on common and

emerging threats.

"Traditionally, this has been done by training

employees to spot 'red flags', he states. "This

could be by helping them to identify bad

spelling in an email; an indicator of a fake

which is trying to convince the employee

to click through to a website containing

malware or give away personal and financial

details. Or perhaps teaching them to identify

scam behaviour over the phone, such as

clever forms of social engineering used to

bypass traditional Know Your Customer

(KYC) checks."

However, the proliferation of Artificial

Intelligence (AI) has changed the ballgame,

he maintains. "Where once it was relatively

easy to train employees to identify threats,

new AI-powered techniques make it

increasingly difficult. Gone are poorly crafted

emails; instead, we have messages so well

generated that they convincingly imitate

the intended sender. Similarly, Deepfakes

are gaining traction, with criminals creating

videos, and he voices of colleagues and

customers that are incredibly realistic."

In 2024 the Department for Science,

Innovation & Technology reported that the

most common type of cyber breach or attack

is phishing. "The proliferation of AI will only

increase this number and firms will need to

bump up their investment in cybersecurity

training for their employees to combat it,"

warns Chinnery. "It's crucial that, in that AI

era, organisations stay agile, foster a culture

of security and focus on developing diverse

skills for their employees. Operating a zerotrust

policy is becoming increasingly popular,

because those that fail to act and protect their

operations will not just see their business fall

to criminal activity, but likely face significant

fines through associated data protection laws,

such as GDPR."

CHANGE BEGINS AT THE TOP

Ignoring or not investing in the human

element can mean missing the opportunity

to greatly reduce risk, comments Javvad

Malik, lead security awareness advocate at

KnowBe4. "The transformation towards a

more secure posture requires a cultural shift.

What that means in reality is that, unlike

a software update, you can't simply 'patch'

knowledge or change behaviours; rather,

a long-term sustained approach is required."

There are many paths and steps that

organisations can take to embed a strong

security culture and the approaches will

vary, depending upon the maturity of the

organisation and its size. "However, one thing

is for sure; simply rolling out annual security

awareness training is not effective. Like many

programmes, change begins at the top. So,

getting leadership on board to champion

the need for secure practices is important.

Cybersecurity needs to be seen as an enabler,

so the security team should seek to build

good relations with their colleagues across

the organisation."

Security awareness training must be ongoing,

engaging and, perhaps most importantly, it

needs to be relevant, adds Malik. "Delivering

training to the people who need it the most,

when they need it. It needs to be personalised,

relevant and adaptive to the needs

and the mediums through which it is

delivered. By combining structured training,

simulated exercises, games, nudges and

building an accurate risk profile of individuals

and departments, the security team can gain

insight into where gaps are and every employee

understands they have a role to play."

Organisations must also consider the tools

and policies in place. Are they user-friendly?

Do they encourage secure behaviour or do

John Scott, CultureAI: it's essential to

create systems where a single human

error cannot compromise the entire

company.

Javvad Malik - KnowBe4: you can't simply

'patch' knowledge or change behaviour. A

long-term sustained approach is required.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

23


training essentials

they push employees towards corner-cutting?

"As for the payoffs, beyond the straightforward

reduction in risk, there's the matter

of trust - both from clients and within the

organisation. A proactive stance on cybersecurity

can be a significant market differentiator,

enhancing brand value and

potentially opening new doors."

Addressing the cost concern, it's about

perspective. "The question is not so much

about whether one can afford to invest

in employee awareness and training, but

whether one can afford not to. The cost of

a single breach often outweighs the investment

in comprehensive security awareness.

Additionally, many strategies for improving

human factors in cybersecurity don't require

hefty investments in new technologies, but,

rather, call for a reallocation of existing

resources towards more effective ends."

NUDGE, NUDGE

According to Tim Ward, CEO and co-founder,

ThinkCyber Security, some studies suggest

that the number of cyber security attacks

caused by human actions accounts for

as much as 90% of total incidents.

"The common misinterpretation of this

statistic is that humans are the 'weakest link,'

but this actually speaks to the systemic problem

of compliance-based training methods

[eg, information overload, out-of-context

learning, generalised topics]. The high scores

that individuals may record in training

scenarios create a false perception that they

are equipped to apply that same knowledge

in real-time situations where cognitive biases,

such as optimism and fear, are most likely

to be exploited."

The cost of facilitating annual training

sessions significantly exceeds the initial

payment, Ward states, presenting itself

in the form of:

Draining billable hours - employees

are required to step away from their

work to attend training sessions

Outdated materials - The time gap

between sessions means that the knowledge

gained quickly loses its usefulness

as threats evolve throughout the year

Misaligned training - the generic resources

do not consider individual cognitive biases

and heuristics before training, meaning

that there is no baseline for measuring

behaviour change.

"Simply put, the return on cyber security

training should not be about meeting training

quotas; it should be about achieving

behavioural change that prevents breaches

and reduces human-driven risk. For instance,

'nudge theory' - coined by behavioural

economist Richard Thaler and legal scholar

Cass Sunstein - suggests that small, frequent

reminders and practical prompts at the right

moments can influence positive behavioural

shifts without overwhelming users. This theory

is well-suited to cybersecurity, where everyday

habits, like checking the origin of emails, can

significantly improve a company's resilience

against threat actors," adds Ward.

While implementing a real-time, nudgebased

approach might require an upfront

investment, it's a fraction of the cost,

compared to the workflow disruptions and

ongoing risks that come with outdated,

compliance-focused training, he argues.

"When individuals can identify phishing

emails, sidestep risky behaviours and adopt

secure habits seamlessly in their daily work,

the return on investment is undeniable -

paying off in fewer breaches and a stronger

overall security culture. It's no longer enough

to just invest in firewalls; it's time to invest

in the people behind them."

ON BOARD

"Cybersecurity is not just about technology;

it's, first and foremost, about an organisation's

culture and its people," points out Richard

Woolfrey, regional director, UK&I at Fortinet.

"This is because employees are the first, and

often strongest, line of defence against

a potential attack. But how can organisations

begin building a cyber-aware workforce?

"The first step is starting at the top and

raising awareness of the importance of

cybersecurity at board-level. Leaders need to

understand the impact a cyber-attack can

have on reputation, finances and staff morale,

and these impacts must be communicated to

workers in a way they truly understand. Doing

so will ensure cybersecurity remains at the very

top of the agenda for both the board and

wider organisation. Positively, recent research

by Fortinet found 72% of organisations

believe their board was more focused on

cybersecurity in 2023 than the year before."

Leaders must prioritise employee training,

Woolfrey continues. "All staff must be

equipped with the knowledge and skills

necessary to stop attacks, regardless of their

job role or title. While this should be tailored

to your organisation's specific needs, it's

important training covers topics such as

passwords and how to spot the key signs of

an attack. It is also essential for organisations

to move beyond offering one-off training

sessions, instead adopting a continuous

learning approach. Doing so will help fill

outstanding gaps in knowledge, whatever the

level of cybersecurity understanding is within

a workforce."

Attacks can have far-reaching consequences.

"For example, over half [53%] of leaders

surveyed in our research reported a breach

cost their organisation more than $1 million in

lost revenue, fines and other related expenses.

"As such, resuming normal day-to-day

operations following an attack can also take

a while, with nearly a third of organisations

[28%] reporting recovery took four months

or longer. Ensuring improved cyber awareness

through educating both the board and

employees will not only help organisations

get back on their feet more quickly postattack,

but also make cybersecurity everyone's

responsibility - bolstering an organisation's line

of defence both now and in the future."

24

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


book review

WHERE FACT AND FICTION COLLIDE

IN AN ERA WHERE ARTIFICIAL INTELLIGENCE CAN CREATE CONTENT INDISTINGUISHABLE

FROM REALITY, SEPARATING TRUTH FROM FICTION IS GETTING EVER MORE DIFFICULT

In an era where technological innovation

evolves at an exponential rate, 'Inside

Cyber: How AI, 5G, and Quantum

Computing Will Transform Privacy and

Our Security', by Chuck Brooks, seeks to

add some clarity. In the book, he offers

the following paybacks:

Gain clear, accessible explanations of

cutting-edge technologies, such as AI,

blockchain, and quantum computing,

and their impact on the business world

Learn how to navigate the cybersecurity

landscape, safeguarding your business

against the vulnerabilities introduced

by rapid technological progress

Uncover the opportunities that

technological advancements present

for disrupting traditional industries

and creating new value

Here are some excerpts from Brooks' book,

by way of an appetiser:

"Emerging technologies are having a wide

range of effects on cybersecurity strategies.

The overall value of digital transformation

for industry and society might reach over

$100 trillion by 2025, according to a recent

announcement made at the annual WEF

gathering in DAVOS. The announcement

touched on the amazing potential:

"Examples of societal value generated

by digitization include mass adoption of

autonomous vehicles and usage- based car

insurance, which could save up to 1 million

lives a year worldwide by 2025. In the

electricity sector, a cumulative reduction

in carbon emissions worth $867 billion

by 2025 could be achieved through the

adoption of digital technologies, principally

through smarter asset planning.

"The pace of innovation can be illustrated

by the fact that, while it used to take

Fortune 500 companies an average of 20

years to reach a billion- dollar valuation,

digital start- ups are reaching the same

milestone in just four years. The research

suggests that, once limitations preventing

the mass- market commercialization of

enabling technologies such as battery

storage and wireless charging are overcome,

the pace of change could accelerate.

"However, the digital transformation of

industries comes with risks attached that

will require careful management by all

stakeholder groups. One such risk is

inequality, which could be exacerbated if

access to digital skills is not made available

to all. Another is trust, which has been

eroded by growing concerns over data

privacy and security. This will only be

overcome with improved norms of ethical

behaviour."

"We also need a new approach in building

cyber defences with emerging threats,

Brooks argues. "Both business and

government cybersecurity efforts have

focused on responding to the most current

security flaws or threats in recent years.

This is a reactive, rather than proactive,

approach and consequently cyber defenders

were always at least one step behind,

making it challenging to mitigate the risks.

"As a consequence of the sharp rise

in security breaches and the increased

awareness of how crucial IT is to our

operations, safeguarding against breaches

is now seen as more than just an expense

for the company; rather, it is essential to

maintaining reputation and business

continuity."

To order a copy, click here.

PRINT FACTS

'Inside Cyber: How AI, 5G, and

Quantum Computing Will Transform

Privacy and Our Security'

Author: Chuck Brooks

(ISBN: 978-1-394-25494-1)

Published October 2024 by Wiley

E-Book: from 17.99.

Print: from £22.99

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

25


detection & response

A TURNKEY EXPERIENCE

HOW CAN MANAGED DETECTION AND RESPONSE BE INTEGRATED INTO AN ORGANISATION'S

EXISTING SECURITY MAKE-UP TO BEST ADVANTAGE, WHILE AVOIDING ANY POSSIBLE DOWNSIDES?

Gartner defines managed detection and

response (MDR) services as those that

provide customers with remotely

delivered security operations centre (SOC)

functions. "These functions allow

organisations to perform rapid detection,

analysis, investigation and response through

threat disruption and containment. They offer

a turnkey experience, using a predefined

technology stack that commonly covers

endpoints, networks, logs and cloud."

Significantly, MDR offers outcome-driven

security incident management that is

predicated on the detection, analysis and

investigation of potentially impactful security

events, and the delivery of active threat

disruption and containment actions to

respond to and mitigate the impact of

cyber breaches.

So, how can MDR be integrated into an

organisation's existing security make-up

to best effect, and where and how can it

reinforce and add to its ability to resist attack?

DRIVERS FOR SUCCESS

According to Dominic Trott, director

of strategy and alliances, Orange

Cyberdefense, the success of

MDR is driven by its ability

to improve security

outcomes, such

as speed of detection and response at

a predictable cost level that is often lower

than is possible internally.

"But also bear in mind the flexibility of how

MDR can be consumed. For example, there

are a range of options, in terms of working

patterns, ownership models and technology

coverage, to meet a range of budgets and

use cases. This ability to tailor MDR to meet

specific needs makes it an ideal service for

companies that want the benefits of a SOC

function, but don't want the operational costs

or complexity of internal development. By

outsourcing security monitoring to a specialist

third-party managed security services provider

(MSSP), in-house security teams can focus

on service output, rather than frontline work.

Investing in an MDR service can provide 24/7

monitoring, while reducing pressure on

internal resources."

Collaboration between MSSP and customer

is the basis for successful integration of MDR

into existing security approaches, Trott adds.

"This will ensure the service provided is tailored

to meet specific needs. The one thing

businesses will never be able to outsource is

in-depth knowledge of their organisation.

This should be discussed at the start to enable

the MSSP to offer grounded advice on how

the MDR solution can fit with the business

or provide recommendations on what needs

to change to get the most out of it."

When evaluating where to begin, he feels

Gartner's SOC triad of log, network and

endpoint remains a good foundation. "This

involves endpoint detection and response

(EDR) to monitor endpoints, network

detection and response (NDR) to monitor

network traffic; and security information

and event management (SIEM) to monitor

the usage of devices and applications.

Depending on customer needs, this approach

can be augmented with security

orchestration, automation

and response (SOAR), and

increasingly through

extended

26

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


detection & response

detection and response (XDR), which uses

AI to detect and address threats."

At the same time, organisations must

evaluate their unique environments before

diving headfirst into MDR, as they will each

have different requirements. "For example,

EDR requires software to be installed on

each device, which can be easy for some

companies and hard for others. NDR sensors

need to be physically installed, which can

be complex, depending on the network's

structure.

"When done well, MDR can help customers

benefit from continuous monitoring, early

threat detection, automated incident handling

and enhanced security across their entire

digital environment," he adds. "By enabling

faster responses to minimise damage, while

achieving an optimum balance of resources,

MDR is a strategic necessity."

DOUBLE DRAWBACK

"When organisations face challenges in their

cyber defence posture, it is often due to two

main reasons, says Milan Patel, global head

of MDR at BlueVoyant: the complexity of

managing multiple tools and integrating them

into a unified security system, and a shortage

of cybersecurity talent.

"An MDR provider can help address these

issues. The shortage of cybersecurity skills is

a common problem across the industry,

with more open positions than available

professionals. Additionally, many roles

required for adequate protection are

becoming specialised, needing expertise in

areas such as cloud security or malware

analysis. MDR provides access to external

cybersecurity experts, reducing the need

to attract and retain talent internally."

MDR also enhances cybersecurity by adding

a proactive threat-hunting capability, he adds.

"While automated tools are important for

detecting most threats, advanced persistent

threats [APTs] and other sophisticated

cybercriminals often develop techniques to

avoid detection by existing security solutions.

MDR can help organisations identify and

address threats that might otherwise go

unnoticed, with agreed service level agreements

(SLAs) providing timelines for threat

discovery, triage and mitigation."

Patel also refers to Gartner's remarks on how

security operations have evolved and need to

combine previously specialised technologies

and services. "In this vein, an effective MDR

solution aims to protect against a wide range

of attack vectors, covering both internal

and external threats. This involves not only

securing the internal network and endpoints,

but also extending protection to the entire

digital footprint of an organisation.

"By monitoring key areas, including the

network and endpoints, the solution helps

identify and address vulnerabilities," he states.

"As organisations' own internal networks

become more secure, they are often targeted

via third parties with network access. A nextgeneration

MDR provider should also offer

third-party cyber risk management that both

monitors key suppliers and vendors, and can

also work with them to mitigate issues."

A strong MDR platform also monitors the

dark web for threats such as data leaks and

compromised credentials. "By using threat

intelligence and analytics, it helps detect and

respond to sophisticated attacks before they

cause harm. Ongoing monitoring enables

quick threat identification, reducing exposure

and helping to prevent breaches."

An evolving MDR solution uses automation

and machine learning to improve detection

and response over time, Patel concludes.

"It provides insights that allow security teams

to focus on significant threats, while

automating routine tasks. By integrating

threat intelligence with automated responses,

it not only addresses current attacks, but

also aims to improve the organisation's

cybersecurity posture for the future."

Dominic Trott, Orange Cyberdefense:

investing in MDR can provide 24/7

monitoring, while reducing pressure on

internal resources.

Milan-Patel, BlueVoyant: a strong MDR

platform also monitors the dark web for

threats such as data leaks and

compromised credentials.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

27


$4.24 MILLION: COST OF A BREACH

The importance of data risk management

cannot be overstated, says BigID's data and

privacy researcher Alexis Hancock. "According

to IBM's Cost of a Data Breach Report 2021,

the average cost of a data breach globally

was $4.24 million. Beyond financial losses,

breaches erode customer trust and confidence,

leading to long-term implications for

business viability. With the proliferation of

data breaches and cyber threats, understandrisk

mitigation

PLANNING FOR DISASTER

ELIMINATING THREATS ENTIRELY IS SEEKING THE IMPOSSIBLE. THE STRATEGY SHOULD BE ON

PLANNING FOR EXPECTED CALAMITIES AND EASING THEIR IMPACT ON BUSINESS CONTINUITY

Risk mitigation is one of the key steps

in the risk management process,

underpinning the strategy of planning

and developing options to reduce any threats

to project objectives that are often faced by

a business or organisation.

According to IBM: "Risk mitigation is a

culmination of the techniques and strategies

that are used to minimize risk levels and

pare them down to tolerable levels. By taking

steps to negate threats and disasters, an

organisation is going to be in a strong

position to eliminate and limit setbacks."

The goal of risk mitigation is not to eliminate

threats, it adds, but rather it focuses on planning

for inevitable disasters and mitigating

their impact on business continuity.

PATH TO RECOVERY

Disasters impacting computer systems come

in many forms, states Stephen Young,

executive director, Assurestor, and, by their

nature, without warning. "Crucially, what

happens next hinges on plans in place,

technical decisions already made, staff

preparedness and disaster recovery tests

executed. Our recent UK survey of CTOs,

CIOs and IT directors identified that just over

40% lacked confidence in their IT recovery

technologies, while around half were not

confident that they could recover all their

data, in the event of a catastrophic data

disaster. The survey emphasised the

susceptibility of businesses to disasters

affecting their data, particularly from

cyberattacks, and an uneasiness regarding

their ability to recover."

A significant contribution a business can

make to mitigate any risk exposure, he points

out, is to understand their data and scrutinise

how it is safeguarded. "Implementing an

uncompromised structured test regime, with

measurable outcomes that can be reported

on and evaluated, will reassure the business

that recovery is achievable. Developing and

applying a flawed disaster recovery plan

is unintentional. But, without top-down

guidance to steer planning, any ambiguities

can allow misaligned and inappropriate

recovery technologies to be deployed,

compounded by inadequate testing regimes."

How is this recovery technology measured,

who reviews and decides if a disaster recovery

test is successful and what is considered

satisfactory? "When testing is not thorough

or regular and not aligned to any understandable

metrics, who is steering the ship

regarding business survivability?" asks Young.

"Mitigation starts with genuine business

needs influencing the disaster recovery plan.

There is 'no one solution fits all' scenarios with

disaster recovery and the recovery technology

deployed must be a 'no compromise'

implementation.

"Once implemented, frequent non-disruptive

testing for full failover, incorporating both

data and workload recovery, is essential,

which also accounts for often overlooked

aspects, such as networking and security.

Plans should build in these effortlessly

executed non-disruptive tests and the

business should strive to achieve what we

term a 'gold standard' for data recovery."

28

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


risk mitigation

ing and implementing effective data risk

management strategies is crucial to

safeguarding valuable information assets.

It involves assessing the potential threats

to data security and implementing measures

to mitigate these risks."

Some strategist leaders are conducting

regular data security assessments to identify

vulnerabilities and gaps in existing controls,

she points out. "This may involve penetration

testing, vulnerability scanning and security

audits. This next tip is often overlooked, but

is extremely crucial. IT leaders need to enforce

the principle of least privilege to restrict access

to sensitive data only to authorised individuals.

Use authentication mechanisms, such as multifactor

authentication [MFA], to enhance

access security."

Hancock also advises deploying Data Loss

Prevention (DLP) solutions to monitor and

prevent the unauthorised transmission of

sensitive data outside the organisation's

network perimeter. "The rapid adoption of

artificial intelligence (AI) has revolutionised

data risk management by enabling organisations

to enhance threat detection, automate

security processes and analyse vast amounts

of data for anomalies and patterns indicative

of potential risks. AI-powered solutions can

augment human capabilities, providing

real-time insights into emerging threats and

helping organisations stay one step ahead of

cyber adversaries."

She also says human error must be accepted

as inevitable - and for organisations to design

around that fact. "Employees are the biggest

weakness when it comes to cybersecurity and

companies need to train employees on data

security best practices, such as recognising

phishing attempts, safeguarding passwords

and securely handling sensitive information."

ACCELERATING MITIGATION

David Trossell, CEO and CTO OF Bridgework,

points to how risk mitigation is important

to individuals, organisations of all sizes and

to the global economy. "In this context, risk

mitigation is about preventing attacks while

having a Plan B, in case a cyber-attack is

successful. Based on this, IBM is right to

describe risk mitigation as a culmination

of techniques and strategies."

He also quotes a Google AI overview, which

declares: "In 2024, cybercrime is expected to

cost the world economy $7.46 trillion, and

the average cost of a data breach is $4.88

million. This is a significant increase from

previous years, and experts predict that global

cybercrime damage costs will grow by

15% annually over the next few years."

It also states: "The average cost of a single

ransomware attack is $1.85 million," and

that 88% of cyber-security breaches are

caused by human error.

Says Trossell: "For example, there is the need

to educate staff and partners to ensure that

phishing attacks don't lead to a data breach

or to a ransomware attack. Then there is the

need to back up data not only local, but 'airgapped'

as well, to protect backups from

cyber-attack, which is now the first port of call

for the cybercriminals and be able to rapidly

restore it to prevent downtime.

That can be achieved with WAN Acceleration,

he adds. "It uses artificial intelligence, machine

learning and data parallelisation to mitigate the

effects of latency and packet loss over a Wide

Area Network (WAN).

"It's vital to ensure that datacentres and

disaster recovery sites aren't placed in the

same circles of disruption, so that, when

a natural disaster occurs, one or more of

them can continue to operate and maintain

services. WAN Acceleration safeguards data

and makes sure it's in the right place, at the

right time, for when a disaster occurs. It

allows organisations to mitigate the impact

of cyberattacks, natural disasters, financial

uncertainty, legal liabilities, strategic management

errors and accidents to protect their

organisation and its operations."

Alexis Hancock, BigID: IT leaders need to

enforce the principle of least privilege.

Stephen Young, Assurestor: mitigation

starts with genuine business needs

influencing the disaster recovery plan.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

29


penetration testing

MAKING THE PEN MIGHTIER

HOW CAN YOU BE SURE THAT A DAY/WEEK/MONTH AFTER A SUCCESSFUL PEN TEST YOUR

SECURITY HASN'T BEEN COMPROMISED AND YOUR SYSTEMS AREN’T RIPE FOR EXPLOITATION?

As the National Cyber Security Centre

(NCSC) tellingly points out: "It's not

uncommon for a year or more to

elapse between penetration tests. So, vulnerabilities

could exist for long periods of time

without you knowing about them, if this is

your only means of validating security."

Regular pen testing remains a regulatory

requirement for telcos and financial services

companies, but beyond ticking the compliance

box how effective is it? There are, says

Dave Gerry, CEO of Bugcrowd, clues in the

following guidance from the NCSC itself:

"Penetration testing is a core tool for

analysing the security of IT systems, but

it's not a magic bullet.

"Penetration testing should be viewed as

a method for gaining assurance in your

organisation's vulnerability assessment and

management processes, not as a primary

method for identifying vulnerabilities."

"[A] penetration test can give confidence

that the products and security controls

tested have been configured in accordance

with good practice and that there are no

common or publicly known vulnerabilities

in the tested components, at the time of

the test."

Gerry labels traditional pen testing as stuck

in the past. "This typically involves small

teams using automated tools geared to

narrow compliance methodologies. Pen

testing is often slow and cumbersome to

deploy. Scoping tests can be bureaucratic

and costly, heavy on consultancy time and

resource-intensive for internal teams. Testers

may not have the right skill sets or may be

working to a narrow checklist."

THE LONG WAIT

He says customers often wait for weeks for

external test slots to become available, then

experience further delays before the testers

deliver their reports, which may tick the

compliance box, but have a low impact on

the overall hygiene of the system. "These

issues are addressed by the emergence of

pen testing as a service [PTaaS]," he argues,

"a model that embraces the scalability and

agility of SaaS. PTaaS fixes two critical

weaknesses in the old model: management

of the process and ability to scale."

ACCELERATED TESTING

Gerry says PTaaS accelerates the pen testing

process from scoping to reporting. "It also

enables test results to be fed into DevSec

workflows, speeding up remediation." He

adds that the process has been perfected

at Bugcrowd via an elastic pen tester bench

that adds scale, capacity and access to

specialised skills. "We use an AI-powered

platform to manage the testing process and

source the right skills for every project from

a global community of security researchers

and pen testers."

Pen testing is not a standalone solution,

he concludes, but should be part of a

layered approach to security, including

crowdsourced bug bounty and vulnerability

disclosure programmes. "Above all, before

they commission a pen test, customers

should check whether they are paying for

an off-the-shelf methodology or for highimpact

results."

30

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


penetration testing

ARMED FOR ACTION

The overall strength and benefit of

penetration tests, states Matthew Sciberras,

CISO - VP of Information Security & Information

Technology, Invicti, is that they "are

a fundamental part of the armoury". They

give companies the ability to understand

the efficacy of their own defences, from

an attacker's point of view. "These have

been around for years, are an absolutely

fundamental part of an effective cyberresilience

strategy, and are even often

required by partner agreements and

national regulations."

Yet lapses in schedule, oversights in

analysis or an unknown issue can be all

the opportunity an attacker needs to find

the right breach point, he warns. "Indeed,

those lapses are quite common. Regular

penetration tests are often skipped or

forgotten and, on top of that, they come

with their own blind spots and drawbacks,

and cannot be substituted for other kinds

of security evaluation.

"Take vulnerability assessments, which are

often conflated with penetration because,

on at least a superficial level, they do the

same thing: find vulnerabilities. Conflating

these two, however, will be a dangerous

oversight for any organisation that takes

their vulnerability management strategy

seriously."

Penetration tests generally focus on highprofile

security risks and taking the attacker's

eye view, leveraging human ingenuity to

simulate a real breach. "That's a valuable

task," says Sciberras. "but it's also timeconsuming,

expensive and only periodic.

It can't be easily scaled or automated. That's

why vulnerability assessments are a crucial

missing piece, because they can constantly

comb through an environment to find the

vulnerabilities deep within it."

A vulnerability assessment will start by

identifying all the resources within a given

organisation's systems, assigning values

and priorities to each. "They'll then assess

those systems, using automated security

scanning tools, and then offer a report

of the findings, detailing potential fixes,

patches and long-term solutions. This is

especially important in this era of software,

in which companies are pushing out new

releases and products every day. The

periodic nature of a penetration test will

surely miss a variety of deeply embedded

vulnerabilities that vulnerability

assessments will be able to."

In fact, vulnerability assessment should,

he maintains, ideally be done already

as an automated part of the software

development life cycle (SDLC), typically

using an integrated DAST tool. "From

there, organisations can continuously see

where their problem areas are and improve

upon them over the long term.

"Make no mistake - penetration tests

will always be a crucial part of a security

strategy, but they're not the only element.

Vulnerability assessments provide a regular

automated approach that penetration

testing simply can't and, as such, should be

considered as a critical partner to regular

penetration tests."

MEASURING POTENTIAL DAMAGE

The true value of a security-focused

penetration test comes from knowing

what is vulnerable - and important to the

organisation - in order to understand how

damaging a breach could be, states Barry

Sadler, head of penetration testing at

Protection Group International.

"When focusing on protecting what is

valuable to you, how you see threats

changes. It becomes more about

prevention of loss or minimalisation of

loss, as opposed to minimising cost of

compliance. This can lead to you having

a greater understanding on what the

biggest vulnerabilities really are and what

Barry Sadler, Protection Group

International: it’s more about prevention

or minimalisation of loss, as opposed to

minimising cost of compliance.

Dave Gerry, Bugcrowd: traditional pen

testing is very much stuck in the past.

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2025 computing security

31


penetration testing

Matthew Sciberras, Invicti: tests help

companies understand the efficacy of

their own defences.

you can do in response to them. There are

also technology-based reasons for increases

in penetration testing. Businesses are more

reliant than ever on technology for their

day-to-day operations, particularly the

cloud. As a result, there are more points

of access for criminals to take advantage

of and if compromised it can have a

devastating impact on a business' ability

to continue operating."

As a result of the increased threat and

high-profile hacks, there is also a complex

regulatory landscape surrounding most

sectors, he adds. "Failing to adhere to

regulations can result in huge fines,

reputational damage, and increased scrutiny

from regulators and the press. There is

also a skills gap within internal teams,

where a lack of knowledge can often be

a vulnerability itself; but can also mean that

practices and technology used [or misused]

can offer cybercriminals opportunities."

All of this means that the need for

organisations to have some understanding

of where vulnerabilities lie and how to

address those weaknesses has never been

more important. "As companies turn to

penetration testing to solve some of the

issues described above, they have to

ensure that they are getting the most out

of their investment and that the testing

is effective," cautions Sadler. "To do this,

businesses need an understanding of the

scope of the testing they've acquired and

whether it includes key areas that can have

the most impact if breached."

Some companies suffer from tunnel vision

when setting up penetration testing,

he continues. "They will often prioritise

areas where they feel confident in their

security measures and are comfortable

being scrutinised. Obviously, whilst it is

important to double-check these, in terms

of budgets they shouldn't be the main

focus. As part of this, we have seen situations

where some IT teams will protect

themselves from criticism from 'outsiders'

and their C-suite, and only put forward

areas in which they have confidence.

So, it is critical that management do not

intentionally restrict the systems allocated

to testing, to ensure that vulnerabilities

across all areas are detected. These might

not include the 'obvious' systems that are

used day-to-day, but back-office functions,

cloud environments and other seldom used

systems. It is these less-used systems that

tend to lie untested and vulnerable to

attack, rather than those that are part of

day-to-day operations."

While penetration testing cannot predict

the future, it can be critical in identifying

possible vulnerabilities that bad actors

could take advantage. "Therefore, both

sides [the customer and the penetration

testing provider] need to have an overview

and understanding of what is included

within the service agreement. Penetration

testing organisations need to be clear

about what the service can provide - and

equally what it cannot do," says Sadler.

SEEK AND YOU SHALL FIND

In an ideal world, advises the National

Cyber Security Centre (NCSC), you should

know what the penetration testers are

going to find, before they find it. Armed

with a good understanding of the vulnerabilities

present in your system, you can

use third-party tests to verify your own

expectations.

"Highly experienced penetration testers

may find subtle issues which your internal

processes have not picked up, but this

should be the exception, not the rule,"

says the NCSC. "The aim should always be

to use the findings of a penetration test

report to improve your organisation's

internal vulnerability assessment and

management processes."

What should a penetration test tell you?

"Typically, penetration tests are used to

identify the level of technical risk emanating

from software and hardware vulnerabilities.

Exactly what techniques are used, what

targets are allowed, how much knowledge

of the system is given to the testers beforehand

and how much knowledge of the test

is given to system administrators can vary

within the same test regime."

A well-scoped penetration test can give

confidence that the products and security

controls tested have been configured in

accordance with good practice and that

there are no common or publicly known

vulnerabilities in the tested components."

Which brings us back to the caveat at the

start of this article - namely, what is actually

discovered "at the time of the test".

As to what sort of system should be

tested, the NCSC comments: "Penetration

testing is an appropriate method for

identifying the risks present on a specific,

operational system consisting of products

and services from multiple vendors. It could

also be usefully applied to systems and

applications developed 'in-house'."

32

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


REGISTER

FOR YOUR

FREE TICKET

WWW.CLOUDSECURITYEXPO.COM/BTC


product news…product news

SOPHOS ACQUIRES SECUREWORKS FOR $859 MILLION

Sophos has reached a definitive agreement to acquire

Wendy Thomas.

Secureworks for $859 million. Sophos' position as a

leading provider of managed security services and endto-end

security products, combined with Secureworks

security operations expertise, is also expected to deliver

complementary advanced MDR and XDR solutions.

Comments Wendy Thomas, CEO, Secureworks: "Sophos'

portfolio of leading endpoint, cloud and network

security solutions - in combination with our XDRpowered

managed detection and response - is exactly

what organisations are looking for to strengthen their

security posture and collectively turn the tide against

the adversary."

Ahmed Aburahal.

NEW SERVICE TARGETS

CLOUD COMPLEXITY

Integrity360 has launched its Managed

Cloud Native Application Protection

Platform (CNAPP) Service. The offering has

been designed to address the growing

complexity of securing multi-cloud environments

and protecting cloud-native applications

against evolving risks.

Company technical product manager

Ahmed Aburahal comments: "The need

for advanced, unified security solutions

is critical, particularly as Gartner predicts

that 95% of cloud breaches will stem

from user misconfigurations by 2025."

OPTALYSYS ENTERS ENCRYPTION PARTNERSHIP WITH GOOGLE

Optalysys has partnered with Google HEIR

to integrate its photonic processing technology

into HEIR's compiler toolchain for fully

homomorphic encryption (FHE).

This integration aims to address the computational

challenges of FHE, in amove to make

it more commercially viable.

FHE is an advanced, quantum-resilient

cryptography method that allows encrypted

data to be processed, "without ever needing

to be decrypted". It allows organisations

to process data, while maintaining privacy,

opening up opportunities for secure data

collaboration across industries, even in untrusted environments, adds Optalysys.

SCAM COPILOT TAKES TO THE AIR

Bitdefender has launched Scam Copilot,

an advanced technology platform that

is powered by artificial intelligence (AI), and

designed to detect and fight scams, along

with fraud attempts, across devices including

computers, tablets and mobile phones.

The platform has been integrated into

several Bitdefender digital life protection

consumer products, it says, adding "another

layer of defence" to protect against malware,

credential stealing and data theft.

SECTIGO UNVEILS SITELOCK UPGRADE

Christopher Bray.

Sectigo has announced SiteLock 2.0, described as a

major upgrade to its website security and protection

platform. The upgrade is designed to simplify website

protection for small to medium-sized businesses (SMBs).

According to Christopher Bray, senior vice president,

worldwide partner and eCommerce sales, at Sectigo:

"With the launch of SiteLock 2.0, we're not just updating

a product; we're transforming and simplifying how

SMBs manage website security in an environment that

is getting more complex."

34

computing security Jan/Feb 2025 @CSMagAndAwards www.computingsecurity.co.uk


Computing

Security

Secure systems, secure data, secure people, secure business

Product Review Service

VENDORS – HAS YOUR SOLUTION BEEN

REVIEWED BY COMPUTING SECURITY YET?

The Computing Security review service has been praised by vendors and

readers alike. Each solution is tested by an independent expert whose findings

are published in the magazine along with a photo or screenshot.

Hardware, software and services can all be reviewed.

Many vendors organise a review to coincide with a new launch. However,

please don’t feel that the service is reserved exclusively for new solutions.

A review can also be a good way of introducing an established solution to

a new audience. Are the readers of Computing Security as familiar with

your solution(s) as you would like them to be?

Contact Edward O’Connor on 01689 616000 or email

edward.oconnor@btc.co.uk to make it happen.


Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!