December 13, 2018 | SSS Events Team
Recently we hosted the inaugural SSS Cyber Security events in Auckland, Wellington and Christchurch. We are extremely pleased with how it went and the feedback we received so far has been really positive.
For these events we wanted to provide an opportunity for organisations to learn about some of the solutions they could consider to help solve some of their biggest IT Security issues. Based on the feedback we have received so far, our attendees appreciated the opportunity to have discussions with our sponsoring partners and to learn more about their solutions and tools.
"The Cyber Security Day was great! Thank you SSS team for the excellent preparation. I have learned a lot of knowledge in a single day" - Jianbo Li
"Really good day thank you, speakers were great" - Ian Galloway
We value your feedback. If you attended and did not receive our survey, let us know and we can send you a copy.
PDF copies of our presentations are available. Some of the key points from our presentations were:
Use Intelligent Fraud Aware Identity to protect your enterprise assets and customer applications
- Nearly all breaches start with a stolen credential.
- Fraudsters are getting more sophisticated using stealthier and more complex monetisation schemes.
- Fraud Aware Identities include contextual intelligence layers, user centric authentication, multiple intelligent MFA options, device reputation and fraud checking and adaptive authentication.
Identity is more than just a person
- With the rise of digital economy, consumers have unintentionally turned banks, governments and stores into identity management organisations.
- In a digital world we need to establish Trust, transact with Trust and maintain Trust.
- The foundation of Trust is identity. The ability to prove you are who you say you are is critical to engaging with the world and being part of the economy.
People are working differently
- The workplace is no longer a place - 50% of all cloud usage occurs beyond your network and access methods have changed.
- Threats use multiple vehicles.
- By 2020 there will be 432.5 million Wi-FI hotspots - that's one hotspot for every 18 people on the planet.
- 90% of people move between devices to accomplish a goal.
- A new malware specimen emerges every 4 seconds.
- Organisations don't always have full visibility of which cloud applications are being used in their organisation and they may have data that should not be stored in their cloud applications.
- The use of granular controls can protect against threats and data loss.
Controlling application communications and staying compliant has become exponentially harder
- The shift to multi-cloud and micro-services has left organisations blind to application flows. Organisations need to validate whether applications conform with policies to understand application security and risk.
- When an attacker compromises an initial system, organisations need to be able to segment and isolate critical apps and data.
32% of hackers say accessing privileged accounts was the number one choice for the easiest and fastest way to get at sensitive data
- It is critically important to know how cyber criminals target their victims and what you can do to reduce risk and make it more challenging for attackers to steal your information, identity or money.
- Once a hacker enters your system they can explore your IT environment under the guise of a legitimate user, elevate privileges, maintain access, conduct malicious activity and cover their tracks to remain undetected.
- Cyber attacks can be prevented by securing passwords, protecting endpoints, and controlling access.
Cyber criminals are not slowing down
SophosLabs predict the following cyber security trends for 2019:
- Capitalist cyber criminals are taking manual control of attacks raking in millions of dollars.
- Attackers are using admin tools in their attacks.
- Mobile and IoT malware are expected to continue as mobile and IoT devices remain vulnerable to attack.
- Cyber criminals use EternalBlue for cryptojacking attacks even though Microsoft released an update for Windows more than a year ago.
Organisations need to look at how they are protecting their machine identities
- A 2015 TechValidate survey of 47 users found 16,500 unknown keys and certificates. This increased to 57,000 unknown keys and certificates in 2018.
- Unknown certificates can leave you blind to attack and can be left to expire which can severely and negatively impact your business.
- According to Gartner 70% of malware attacks will use SSL by 2020.
- It is important to gain intelligence, to set and enforce relevant policies and to automate operations to help you manage and protect your machine identities.
Thank you to our sponsors who helped make these events a success!
- - - - - - - - - - - - - - - -
We have started planning our 2019 Cyber Security events and will release early in the new year!
Email Sales@sss.co.nz to register your interest.