{"id":881,"date":"2018-03-20T01:00:00","date_gmt":"2018-03-20T01:00:00","guid":{"rendered":"http:\/\/inswwdev.azurewebsites.net\/au\/insights\/uncategorized\/re-skilling-with-an-alien-arsenal-future-security-decisions-now\/"},"modified":"2018-03-20T01:00:00","modified_gmt":"2018-03-20T01:00:00","slug":"re-skilling-with-an-alien-arsenal-future-security-decisions-now","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/re-skilling-with-an-alien-arsenal-future-security-decisions-now\/","title":{"rendered":"Re-skilling with an Alien Arsenal. Future security decisions now"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Lee Foster \u2013 Head of Cyber Security and Information Management at Insentra.<\/strong><\/p>\n<p style=\"text-align: justify;\">With the rapid rise and volatility of Crypto Currencies together with the ease at which vulnerabilities and exploits are traded on the dark web, we will continue to face ever-increasing and evolving threats like \u201cSpectre &amp; Meltdown\u201d and, so quickly yesterday\u2019s news, \u201cWannaCry and Petya\u201d. Add to that the plethora of buzzwords and confusing narratives surrounding emerging threats and changes to legislation that will impact all areas and business verticals serviced by the channel, it is difficult to filter through the noise. In attempt to bring some order for seeming chaos, maybe we should start with some simple questions.<\/p>\n<p style=\"text-align: justify;\"><strong>What innovations will we see in the near future?<\/strong><\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\"><span>The Disruption of BlockChain<\/span><\/h3>\n<p style=\"text-align: justify;\">With the continued evolution of BlockChain and the inherent benefits of immediate global cross border payments more and more businesses will be disrupted. As organisations adopt blockchain based technologies and cryptocurrencies, we are faced with a whole new paradigm for cybersecurity. The way in which information and financial information is shared, stored, and managed will see a vast and dynamic change. Trust is going to be redefined on all fronts and it\u2019s going to come down to Risk vs Reward. Already some of the big banking corporations have recognized huge savings in fee\u2019s by adopting Ripple and XRP to achieve immediate settlements. With every evolution in technology, cybercrime is in lockstep. Threat vectors are changing almost daily and typical end-point protection is not enough. Cyber criminals are leveraging machine learning and artificial intelligence (there I used two of the buzzwords) to watch and learn user behavior. Gaining access to a user\u2019s private of a crypto wallet is far more attractive than hacking an endpoint. In the same way that the cybercriminal is leveraging next generation tools, the current and emerging security vendors will evolve and accordingly. It will simply come down to the way in which businesses transact and where the focus of the potential attacker will be. It is critical that security vendors in the same way the financial institutions have done stay in lock step with technology innovation.<\/p>\n<p style=\"text-align: justify;\">Artificial Intelligence is going to explode, organisations need to adapt and adopt AI into their arsenal to turn the corner and get ahead of both legal and illegal adversaries. Australia and New Zealand are known for its adoption of bleeding edge or next-generation technology so the race between cybercrime, legislation, and the current and emerging security vendors is going to be an exciting arena to be in.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\"><span>What significant challenges could my organisation be facing?<\/span><\/h3>\n<p style=\"text-align: justify;\">2018 brings some challenging new legislation. Mandatory breach notification is already making a lot of organisations nervous and as a direct result is bringing the spotlight directly on to information governance and security. Organisations are facing the challenge of truly understanding the information that is created and how it is used, shared, stored, and ultimately deleted. A culture shift is required, and in turn creates its own challenges. Business is built on trust, but for that trust to stand up it must be foundational or from the ground up. Security is paramount and getting the security platform and posture right, nurtures trust. Understanding information will empower organisations to make informed decisions. Basing decisions on \u201ctrust\u201d alone without any insight will leave organisations wide open.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\"><span>What should I be doing now to overcome these challenges?<\/span><\/h3>\n<p style=\"text-align: justify;\">Let\u2019s start with a premise.\u00a0 There are two types of organisation \u2013 one that has been breached and one that doesn\u2019t know they have been breached. So what to do?<\/p>\n<p style=\"text-align: justify;\">First, discover, discover, discover. Use available tools to reach out and understand every point of interaction with corporate information (transaction channels, storage locations, on premises and cloud services, mobile devices, portable storage and the like).<\/p>\n<p style=\"text-align: justify;\">Secondly, undertake security cultural awareness education. What is that you ask? Well, this kind of education outlines and answers the key questions;<\/p>\n<ul>\n<li>What constitutes a breach?<\/li>\n<li>How does a breach happen?<\/li>\n<li>Who is accountable for the information created, handled, stored and shared?<\/li>\n<li>How does my behaviour contribute towards a potential breach?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Define and create policy (discover only) that confirms what you collated in discovery. Are users doing what you expected, are your systems and information being access in the manner you expected (most likely not)<\/p>\n<p style=\"text-align: justify;\">Next, create and adopt a policy for the categorisation of information, allowing for e-discovery to provide what you have discovered and now know, which in turn will help towards compliance and regulation readiness.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\"><span>Is there professional help available to me?<\/span><\/h3>\n<p style=\"text-align: justify;\">The security team at Insentra have developed a methodology for Data Loss Prevention (DLP) Adoption to helps partners and customers begin or adapt their Security strategy whilst improving their DLP maturity. This process starts with a discovery session and then sets clear timelines and objectives in an agile manner to allow continuous risk reduction and improvement over time. Month by month and organization can see which risk areas in the adoption plan have been mitigated against and what the focus areas are for the next month. Avoiding or surviving an attack is one thing; it\u2019s an organisations ability to learn and evolve that will set them apart from those that do not survive, for some the loses will be too high and the retrospective story will not be so bright.<\/p>\n<p style=\"text-align: justify;\">You cannot secure what you cannot manage, you cannot manage what you cannot see.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lee Foster \u2013 Head of Cyber Security and Information Management at Insentra. With the rapid rise and volatility of Crypto Currencies together with the ease at which vulnerabilities and exploits are traded on the dark web, we will continue to face ever-increasing and evolving threats like \u201cSpectre &amp; Meltdown\u201d and, so quickly yesterday\u2019s news, \u201cWannaCry&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/re-skilling-with-an-alien-arsenal-future-security-decisions-now\/\">Continue reading <span class=\"screen-reader-text\">Re-skilling with an Alien Arsenal. Future security decisions now<\/span><\/a><\/p>\n","protected":false},"author":55,"featured_media":882,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-modern-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=881"}],"version-history":[{"count":0,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/881\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media\/882"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}