Biswajit Banerjee's Posts (40)

Sort by

We are hosting an exclusive Best Of The World Talks on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor, Google Cloud) & David Randleman (Field CISO, FireCompass).

In today's rapidly advancing digital world, AI is transforming the way we approach cybersecurity. This session explores the practical applications of AI in enhancing security measures, detecting threats, and automating responses. Attendees will gain valuable insights into how AI can be leveraged to strengthen their cybersecurity posture, reduce response times, and improve threat intelligence. Join us to discover actionable strategies and real-world use cases that showcase the potential of AI in protecting organizations against evolving cyber threats.

 

Key Discussion Points:

- Strategies for securing AI systems and mitigating adversarial attacks.

- Implementing AI to improve security measures and automate responses.

- Types of AI technologies used by hackers to enhance their attack methods.

- Practical applications of AI by Google security practitioners for daily tasks.

 

Session Details:

Date:
 23rd Jan, 2025 (Thursday)

Time: 12:00 PM EST | 9:00 AM PST | 10:30 PM IST

 

Join us live or register to receive the session recording if the timing doesn’t suit your timezone.

>> Register here

Read more…

In the current threat environment, ransomware attacks have become increasingly sophisticated and frequent, representing a substantial threat to businesses of all sizes. As a cybersecurity professional, I have observed the significant impact these attacks can have on organizations. Therefore, I am sharing six fundamental data backup strategies designed to protect your business and ensure operational continuity in the face of this escalating threat.

13408138085?profile=RESIZE_180x180

Why Your Business Needs a Ransomware Backup Strategy

Before we dive into the strategies, let's quickly address why a ransomware-specific backup plan is crucial:

Escalating Threats: Ransomware attacks are becoming more frequent and sophisticated.

- Financial Impact: Data recovery costs can run into millions of dollars.

Regulatory Compliance: Many industries have strict data protection requirements.

Business Continuity: A solid backup strategy ensures your operations can continue even after an attack.



Now, let's explore the six essential strategies to fortify your defenses against ransomware.

1. Backup Data Frequently to Minimize Loss

One of the most critical aspects of a ransomware backup strategy is frequent backups. Here's why it matters:

- Daily backups ensure you always have the most current data preserved.

- Automated backup routines eliminate human error and guarantee consistency.

- Consider implementing point-in-time snapshots for even more granular recovery options.

Pro Tip: Some advanced backup solutions allow you to take backups as frequently as every 60 seconds, providing maximum protection for rapidly changing data.

2. Keep at Least One Backup Offsite or Offline

Diversifying your backup locations is crucial for ransomware protection:

- Store at least one copy of your backups offsite or offline.

- This approach isolates a portion of your backups from potential network-based attacks.

- Consider cloud storage solutions for easy offsite backup management.

3. Automate Your Backup Processes

Automation is key to maintaining a consistent and reliable backup strategy:

- Set up automated backup schedules to ensure regular data protection.

- Reduce the risk of human error in the backup process.

- Enable quick response times in case of an attack.

 4. Utilize Immutable Storage

Immutable storage is a game-changer in ransomware protection:

- Once data is written, it cannot be altered or deleted for a predefined period.

- This feature ensures that malicious actors cannot compromise your backup data.

- Immutable storage acts as a last line of defense, guaranteeing an untouched copy for recovery.

Pro Tip: Look for backup solutions that offer Compliance-Mode immutability for critical data storage types.

5. Implement the 3-2-1-1 Rule

The 3-2-1-1 rule is a comprehensive approach to backup strategy:

- Maintain 3 copies of your data

- Store them on 2 different media

- Keep 1 copy offsite

- Ensure 1 copy is immutable

This multi-layered approach significantly increases your chances of successful data recovery during a ransomware attack.

6. Use Strong Encryption for All Backups

Encryption is your final layer of defense:

- Encrypt all backup data, both in transit and at rest.

- Use strong, industry-standard encryption algorithms.

- Consistent encryption practices are crucial for maintaining data security and regulatory compliance.

Conclusion

Implementing these six ransomware backup strategies will significantly enhance your organization's resilience against attacks. Remember, the key to effective protection is a proactive approach. Review and update your backup strategy regularly to stay ahead of evolving threats.

As a cybersecurity advisor, I've seen these strategies make a real difference for businesses. Don't hesitate to reach out if you need help implementing a robust ransomware backup plan. Your data is your business's lifeline – protect it with the care it deserves.

What steps are you taking to protect your business from ransomware? Share your thoughts in the comments below!

Referenced resources:
[1] https://forgeandsmith.com/blog/how-to-write-a-business-blog/
[2] https://yoursitehub.com/blog/the-art-of-cybersecurity-blogging-tips-for-success/
[3] https://spin.ai/blog/how-to-protect-against-ransomware/
[4] https://www.bramework.com/business-blogging-best-practices/
[5] https://n2ws.com/blog/ransomware-backup-strategies

 

By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

 
 
Read more…

Cybersecurity has become a cornerstone of operational success and resilience in the increasingly interconnected business world. The challenge is even more pressing for small and medium-sized businesses (SMBs). Cyber threats continue to grow in sophistication, and without the extensive resources of larger corporations, SMBs often find themselves vulnerable. Partnering with a cybersecurity consulting firm is not just a strategic decision—it’s a necessity. These partnerships provide SMBs with access to expertise, cutting-edge solutions, and a proactive approach to safeguarding digital assets. This blog delves into the critical aspects of selecting the right consulting partner, offering guidance on evaluating, integrating, and optimizing this vital relationship.

Why Cybersecurity Consulting Matters for SMBs

Cybercriminals are increasingly targeting SMBs, as they often lack the robust defenses of larger organizations. According to industry reports, nearly half of all cyberattacks are aimed at small businesses, with many resulting in devastating financial and reputational damage. Cybersecurity consulting firms bridge the gap by offering tailored solutions that align with the unique needs of SMBs. These firms provide specialized expertise, helping businesses identify vulnerabilities, mitigate risks, and ensure compliance with industry regulations.

A skilled consulting firm addresses immediate threats and builds a foundation for long-term resilience. With the right partner, SMBs can focus on growth and innovation, confident that their cybersecurity needs are in expert hands.


Cybersecurity consulting firms undertake a variety of critical tasks that add significant value to an organization:

1. Risk Assessments and Audits: By evaluating existing vulnerabilities and potential threats, consultants can identify weak points in a company’s digital infrastructure. This ensures that resources are allocated effectively to mitigate high-risk areas focused on preventing breaches by addressing vulnerabilities before they are exploited, saving organizations from financial losses and reputational damage.

2. Incident Response Planning: Preparing for potential breaches is as critical as preventing them. Consultants develop detailed plans to ensure quick and effective responses to incidents, minimizing downtime and recovery costs focused on enabling rapid recovery, reducing operational disruptions, and protecting customer trust.

3. Compliance Management: Compliance with standards such as GDPR, HIPAA, or PCI DSS is essential for businesses in regulated industries. Consulting firms guide SMBs through these requirements, ensuring both compliance and security focused on Avoiding hefty fines and legal repercussions while building trust with stakeholders.

4. Employee Training: Many breaches stem from human error. Consultants provide training to improve awareness and establish secure practices across the organization. The training is focused on creating a proactive security culture, reducing the likelihood of breaches due to phishing or poor password hygiene.

Current Environmental Challenges and Overcoming Them

Challenge 1: Limited Budgets
SMBs often operate with restricted financial resources, making it difficult to justify investing in extensive cybersecurity measures. As a result, many underestimate their exposure to cyber risks.

Cybersecurity consulting firms offer scalable solutions tailored to SMB budgets. By prioritizing risk and leveraging existing infrastructure, consultants ensure maximum security impact with minimal investment.

Challenge 2: Rapidly Evolving Threat Landscape
New threats emerge constantly, from ransomware attacks to supply chain vulnerabilities. SMBs may need more expertise to stay ahead of these changes.

Consultants provide continuous monitoring and threat intelligence, ensuring businesses remain informed and prepared for emerging risks. Regular updates and proactive measures keep defenses aligned with the latest threat vectors.

Challenge 3: Cloud Adoption and Hybrid Work Environments
The shift to cloud-based services and remote work has expanded the attack surface for SMBs, creating new challenges in managing access and securing data.

Consulting firms help businesses mitigate these risks by implementing secure cloud configurations, identity and access management (IAM) solutions, and zero-trust architectures.

Potential Future Solutions to Optimize Cybersecurity

As technology continues to evolve, SMBs can optimize their cybersecurity strategies by incorporating the following advancements:

1. AI and Machine Learning: Advanced AI-powered analytics can enhance threat detection, providing real-time insights and automating responses to minimize damage during attacks.

2. Zero-Trust Architectures: By adopting a “never trust, always verify” approach, SMBs can significantly reduce their exposure to internal and external threats.

3. Cybersecurity as a Service (CaaS): Subscription-based models allow SMBs to access enterprise-grade solutions without the overhead of maintaining an in-house team.

4. Integration with Emerging Technologies: As IoT devices and hybrid cloud environments become integral to SMB operations, consultants can provide expertise in securing these assets.

Summary

Choosing the right cybersecurity consulting firm is pivotal for SMBs aiming to protect their assets and drive growth. Here’s how to get started:

1. Evaluate Your Needs: Identify your organization’s cybersecurity challenges, such as compliance requirements or cloud security.
2. Shortlist Consulting Firms: Research firms that align with your needs, emphasizing their expertise, reputation, and scalability.
3. Conduct Interviews: During detailed consultations, discuss your goals and assess the firm’s understanding of your business.
4. Focus on Long-Term Partnerships: Select a firm that offers ongoing support and adapts its services as your business grows.
5. Invest in Training and Culture: Work with your consultant to build a proactive security culture within your organization.

These steps allow SMBs to confidently navigate the complex cybersecurity landscape and establish a robust defense against evolving threats.

 

By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

Read more…

Strategies for Effective Resource Distribution

Developing a cybersecurity budget is fundamental for SMBs (Small and Medium-Sized Businesses) to protect themselves against escalating cyber threats. Below are tailored strategies for SMB leaders:

Understanding the Importance of Cybersecurity

Cybersecurity protects digital assets, your business's reputation, and operational continuity. Recent trends reveal that nearly half of all cyberattacks target SMBs. The consequences of inadequate cybersecurity include data breaches, financial losses, and erosion of customer trust.

 

Budget Planning Strategies

  1. Risk Assessment: Begin by identifying your critical assets and vulnerabilities. Tools like the Cybersecurity Maturity Model Certification (CMMC) offer frameworks to determine gaps.

  2. Prioritize Investments: Allocate resources to address high-risk areas first. For example, access control mechanisms, regular software updates, and employee training offer immediate impact without overwhelming budgets.

  3. Leverage Affordable Solutions: Use cost-effective technologies like cloud-based security services and open-source tools to ensure compliance and scalability without exceeding financial limits.

Aligning Cybersecurity with Business Goals

Cybersecurity strategies should integrate seamlessly with business objectives. Engage stakeholders to ensure alignment between security initiatives and broader operational goals. For SMBs, this integration can foster resilience while maintaining cost efficiency.

Monitoring and Adjusting the Budget

As cyber threats evolve, so should your cybersecurity budget. Implement continuous monitoring and review processes to adapt to emerging risks and technology advancements. Proactive management ensures long-term effectiveness and maximizes ROI.

Start securing your business today—partner with cybersecurity experts to develop a tailored, efficient plan that safeguards your business while supporting growth. You can contact a trusted advisor to guide your cybersecurity journey.

 
 

Here is a concise 5-step plan for SMBs to build an effective budget that aligns with business needs and optimizes capital resources:

1. Assess and Align

- Evaluate current financial position
- Define clear business objectives
- Align budget with strategic goals

2. Implement Smart Budgeting Techniques

- Adopt zero-based budgeting to justify all expenses
- Use rolling budgets for flexibility and adaptability
- Balance CapEx and OpEx based on strategic priorities

 3. Leverage Technology and Data

- Implement financial software for real-time tracking
- Use data analytics for accurate forecasting
- Automate budget monitoring and reporting

4. Prioritize and Optimize Investments

- Rank projects based on potential impact and ROI
- Strategically allocate resources between long-term assets and operational needs
- Explore flexible financing options to preserve cash flow

5. Monitor, Engage, and Adjust

- Conduct regular budget reviews (monthly or quarterly)
- Engage team members in financial responsibility
- Make data-driven adjustments to keep the budget aligned with business performance and market conditions

This streamlined approach combines strategic planning, intelligent resource allocation, and continuous monitoring to create a dynamic budget that supports SMB growth and financial stability.

 

By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

Read more…

Small and medium-sized businesses face unprecedented cybersecurity challenges in today's rapidly evolving threat landscape, which can significantly impact their operations and growth potential. As cyber threats become more sophisticated, many SMBs find themselves at a crossroads between maintaining adequate security measures and managing limited resources effectively.

13407005486?profile=RESIZE_180x180


Understanding the Value Proposition

Cybersecurity outsourcing represents a strategic solution that enables SMBs to access enterprise-grade security capabilities without the burden of building and maintaining an in-house security team. This approach allows businesses to leverage specialized expertise while focusing on their core operations and growth objectives.

Key Operational Benefits
Modern managed security providers deliver comprehensive protection through 24/7 monitoring, advanced threat detection, and rapid incident response capabilities. These services are particularly valuable for SMBs needing more infrastructure to maintain round-the-clock security operations internally.

Cost-effectiveness and Resource Optimization

The financial advantages of outsourcing cybersecurity are compelling for SMBs. Rather than investing heavily in infrastructure, training, and staffing, businesses can access a full suite of security services through a predictable subscription model. This approach transforms cybersecurity from a capital expense into a manageable operational cost.

Environmental Challenges and Solutions

Current Landscape Challenges
SMBs often need more budgets, lack of technical expertise, and the complexity of maintaining comprehensive security programs. The rapidly evolving threat landscape compounds these challenges, making it difficult for internal teams to stay current with emerging threats.

Overcoming Obstacles
Managed security providers help overcome these challenges by providing access to cutting-edge technologies and specialized expertise. Through outsourcing, SMBs can implement robust security measures while maintaining operational efficiency and focusing on strategic initiatives.

Future Optimization Strategies

The future of cybersecurity outsourcing holds promising developments for SMBs. As security technologies evolve, managed service providers will likely offer even more sophisticated protection mechanisms. Integrating artificial intelligence and machine learning capabilities will enhance threat detection and response capabilities, while automated security processes will improve operational efficiency.

Actionable Summary

To effectively implement cybersecurity outsourcing, SMBs should:

  1. Conduct thorough assessments of potential security providers, evaluating their expertise, track record, and service offerings
  2. Establish clear security objectives and performance metrics to measure the effectiveness of outsourced services
  3. Maintain regular communication and oversight of security operations to ensure alignment with business goals


If you want more information about cybersecurity outsourcing and managed security services, visit cpf-coaching.com or contact our team to discuss your specific security needs.

Remember: Effective cybersecurity is not just about protection—it's about enabling your business to thrive in an increasingly digital world while maintaining resilience against evolving threats.

 

By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

Read more…

We are hosting an exclusive Fireside Chat on "Top Trends In Cybersecurity 2025 & Beyond" featuring Ravi Subbiah (CISO Consulting & Cybersecurity Delivery Leader at TCS) & Vijay Kumar Verma (SVP & Head Cybersecurity Engineering at Jio Platforms Ltd.).

As the digital landscape continues to evolve, new trends and technologies are shaping the future of cybersecurity. This session delves into the top cybersecurity trends expected to dominate 2025 and beyond, including advancements in AI, the rise of quantum computing, and the growing importance of zero-trust architecture. Attendees will gain insights into how these trends impact security strategies and the steps organizations can take to stay ahead in a rapidly changing environment.

Key Discussion Points:

- How can organizations effectively integrate AI and ML into their existing cybersecurity infrastructure to improve defensive operations?

- How has the zero trust architecture evolved in recent years, and what are the key components organizations should focus on for the future?

- How do you see privacy regulations evolving to address the challenges of emerging technologies like AI and IoT in the coming years?

Session Details:

Date:
15th Jan, 2025 (Wednesday)

Time: 12:00 PM IST

 

Join us live or register to receive the session recording if the timing doesn’t suit your timezone.

>> Register here

Read more…

Table of Contents


1. Introduction to Consent in DPDPA

Consent is the foundational principle that governs how personal data is collected, processed, and utilized. Under the DPDPA, consent ensures that individuals have control over their personal information, empowering them to make informed decisions about who accesses their data and for what purposes. When it comes to personal data, consent is the golden ticket—it’s what separates ethical data practices from intrusive overreach. Think of it like a gatekeeper for your personal information. Without it, anyone could waltz in, rifle through your details, and use them however they please. Under the Digital Personal Data Protection Act (DPDPA), consent is more than just a checkbox on a form; it’s a fundamental principle that puts you, the individual, in the driver’s seat. Let’s break it down. Consent, in this context, means you have the final say over how your personal data is collected, processed, and used. It’s not just about saying “yes” or “no”—it’s about ensuring you’re fully informed, in control, and protected. This is a game-changer in a world where data has become the new currency.


Why Consent Matters: The Three Pillars

Consent isn’t just a buzzword; it’s the backbone of ethical data handling. Let’s explore why it matters so much under the DPDPA.

1) Empowerment:
 Grants individuals autonomy over their personal information. Imagine you’re handing someone the keys to your house. Would you do it without knowing why they need access, how long they’ll stay, or what they plan to do inside? Of course not. The same logic applies to your personal data. Consent empowers you by giving you autonomy over who gets to use your information and for what purpose. The DPDPA recognizes that your data is yours—plain and simple. With clear, upfront consent requirements, it ensures you have the power to decide whether a company can collect your browsing history, your shopping habits, or even sensitive details like your health records. This shift flips the script, making you the decision-maker rather than a passive participant in the data ecosystem.

2) Transparency:
 Promotes clear communication between data fiduciaries and data principals. Ever felt like you signed up for a service but had no idea what you were really agreeing to? You’re not alone. In the past, terms and conditions often resembled a never-ending maze of legal jargon—designed more to confuse than clarify. The DPDPA changes that by prioritizing transparency. Here’s how it works: when a company seeks your consent, it must clearly explain what data it’s collecting, why it’s doing so, how it will be used, and who it might share it with. No fine print, no surprises. This level of transparency fosters trust, making you feel more confident about sharing your information. It’s like walking into a restaurant where the chef explains every ingredient on the menu—you know exactly what you’re getting.

3) Accountability:
 Holds organizations accountable for responsible data handling. Consent isn’t just about empowering individuals—it’s also about holding organizations accountable. Think of it as a safety net. When a company mishandles your data or uses it for purposes beyond what you agreed to, the DPDPA ensures they can’t just shrug it off. Data fiduciaries (the entities handling your data) are required to stick to the conditions of your consent. If they deviate or act irresponsibly, they face penalties. This isn’t just about protecting individuals; it’s about setting a gold standard for responsible data management. Accountability keeps everyone honest, creating a culture where organizations take data privacy seriously.


2. Key Terms Related to Consent

Understanding consent within the DPDPA framework requires familiarity with several key terms:

Understanding consent under the Digital Personal Data Protection Act (DPDPA) isn’t just about knowing your rights—it’s about speaking the same language as the law. To make sense of how consent functions within this framework, it’s essential to familiarize yourself with a few key terms. Think of these as the building blocks of a secure and ethical data ecosystem. Once you know these terms, navigating the DPDPA becomes as straightforward as following a well-marked map.

1) Data Principal:
 The individual to whom the personal data pertains.the STAR of the Show At the heart of the DPDPA is the data principal—that’s you. Simply put, the data principal is the individual to whom the personal data pertains. If your email, phone number, or health records are being collected, you’re the data principal. Think of yourself as the owner of a treasure chest, and your personal data is the treasure. The DPDPA emphasizes that as the data principal, you have ultimate authority over how your treasure is handled. It’s like being the captain of a ship—you decide who gets to come aboard, what they can do while they’re there, and when they need to leave.

2) Data Fiduciary:
 An entity (individual or organization) that determines the purpose and means of processing personal data.The Trusted Guardian Now, let’s talk about the data fiduciary. This is the entity—whether it’s a company, an organization, or an individual—that determines the purpose and means of processing your personal data. If you’re the captain, they’re like the crew you’ve hired to handle your ship. But here’s the catch: they’re legally bound to act in your best interest. The word “fiduciary” implies trust, and under the DPDPA, this trust is non-negotiable. Data fiduciaries are expected to handle your information responsibly, transparently, and only for the purposes you’ve agreed to. If they overstep, misuse your data, or fail to protect it, they can face serious consequences. In a way, they’re like stewards of a valuable museum artifact—you own it, but they’re responsible for keeping it safe.

3) Explicit Consent:
 A clear and specific agreement by the data principal for the processing of their sensitive personal data.The Gold Standard When it comes to sensitive personal data, the DPDPA insists on explicit consent—and for good reason. Explicit consent means you’re fully aware of what’s being collected, why it’s being collected, and how it will be used. You’ve given your permission in a clear, unambiguous way. It’s like signing a contract where every clause is explained in plain language. For example, if a healthcare app wants to access your medical records, it can’t just bury that request in a lengthy terms-and-conditions document. Instead, it must explicitly ask for your consent, detailing how your data will be stored, processed, and shared. This level of clarity is crucial for ensuring trust and fairness.

4) Implicit Consent:
 Assumed consent based on the context of data collection, typically not suitable for sensitive data.The Gray Area Unlike explicit consent, implicit consent is more contextual. It’s assumed based on your actions, but it’s generally not suitable for sensitive personal data. For instance, if you hand your email address to a retailer to receive a receipt, it’s reasonable to assume they have your implicit consent to send you that receipt. However, they can’t assume they have the right to add you to their marketing list without asking explicitly. Think of implicit consent as a handshake—an agreement based on mutual understanding. While it works in certain everyday situations, it’s not robust enough for more serious or sensitive data-sharing scenarios. For anything beyond the basics, the DPDPA leans heavily on explicit consent as the preferred standard.

5) Revocable Consent:
 The ability of the data principal to withdraw consent at any time.Taking Back Control Here’s where things get really interesting. Under the DPDPA, consent isn’t a one-time deal—it’s revocable. That means you can withdraw your consent at any time, no questions asked. If you decide that you no longer want a company to hold onto your data, you can simply revoke your permission, and they’re obligated to comply. Imagine you’ve rented out your spare room to a tenant. You gave them the keys and agreed on a set of rules, but later, you realize you’re no longer comfortable with the arrangement. Revocable consent is like saying, “Thanks, but I need those keys back now.” The tenant (or in this case, the data fiduciary) has no choice but to res pect your decision.

 

Why These Terms Matter 

These terms aren’t just legal jargon—they represent the foundation of a more ethical and transparent approach to data handling. They ensure that:

• You stay in control of your personal data at all times.

• Organizations act responsibly and are held accountable.

• Consent is dynamic, giving you the flexibility to adapt as your comfort level changes.

By defining roles like data principal and fiduciary and setting standards for explicit, implicit, and revocable consent, the DPDPA creates a framework that prioritizes clarity, fairness, and empowerment.

A Practical Example: Bringing It All Together


Let’s say you’re using a fitness app. As the data principal, you own the rights to your workout logs and health data. The app acts as the data fiduciary, collecting and analyzing your information to provide personalized recommendations.

• When you sign up, the app seeks explicit consent to access your health metrics. It explains how the data will be used to improve your experience.

• By using the app to track a workout, you provide implicit consent for the app to record that session.

• Six months later, you decide you no longer want the app to retain your data. Thanks to revocable consent, you can request deletion of your records, and the app must comply promptly.

This seamless interplay between these concepts ensures that your data journey is secure, transparent, and entirely under your control.


3. Rights of Individuals Regarding Consent

The DPDPA enshrines several rights for individuals to manage their consent effectively:

In a world where data is currency, knowing your rights is like holding the keys to your digital kingdom. The Digital Personal Data Protection Act (DPDPA) takes this responsibility seriously, placing the control firmly in your hands. Gone are the days of blindly signing off on vague terms and conditions. With the DPDPA, individuals are equipped with a robust set of rights to manage their consent effectively and ensure their data is handled with the respect it deserves. Let’s break down these rights, each of which is designed to give you more power, transparency, and peace of mind in the increasingly complex digital landscape.


1) Right to Informed Consent:
 Individuals must be fully informed about how their data will be used before providing consent.Knowledge Is Power

Imagine agreeing to a deal without knowing the terms. Sounds reckless, right? The DPDPA ensures this doesn’t happen with your data. The Right to Informed Consent means you have the right to know exactly how your personal data will be used before you agree to share it. When a company seeks your consent, it’s not enough for them to say, “We’ll use your data.” They must explain what data they’re collecting, why they’re collecting it, how it will be used, and who it might be shared with. This is like reading a clear, easy-to-understand menu before placing your order, rather than being surprised by a dish you didn’t expect. This right empowers you to make informed decisions, giving you the confidence to either give your consent or say, “Thanks, but no thanks.”

2) Right to Specific Consent: Consent must be obtained for specific purposes and not be blanket approval for all data processing activities.

Have you ever signed up for a service and felt like you gave them the keys to your entire life? That’s exactly what the Right to Specific Consent aims to prevent. Under the DPDPA, companies must obtain your consent for a specific purpose. They can’t ask for blanket approval to process all your data for any reason they choose. For example, if you’re signing up for a food delivery app, they can ask for your location to find nearby restaurants, but they can’t use that consent to track your movements 24/7 or sell your data to advertisers. It’s like granting someone access to your garden to water the plants—not to throw a party or start digging up your lawn. Specific consent ensures your data is used for the purpose you agreed to and nothing more.

3) Right to Withdraw Consent: Individuals can revoke their consent at any time, and data fiduciaries must cease processing personal data upon withdrawal.

What if you change your mind about sharing your data? No problem. The Right to Withdraw Consent gives you the power to revoke your permission at any time. This isn’t just a symbolic right—it’s actionable. When you withdraw your consent, the data fiduciary (the entity handling your data) must stop processing your information immediately. If they’ve shared it with third parties, they’re obligated to inform those parties to cease using your data as well. Think of this as taking back the keys you lent someone. Whether you trusted them initially but later had second thoughts, or simply decided it’s no longer necessary, you have every right to pull the plug. It’s your data, your call.

4) Right to Access and Control: Individuals can access their data and understand how it is being used, ensuring transparency.

How often have you wondered, “What are they doing with my data?” The Right to Access and Control gives you the answer. Under this right, you can access the personal data a company has about you and understand how it’s being used. Are they storing your email address securely? Are they sharing it with third parties? This level of transparency is crucial for building trust and ensuring accountability. Moreover, if you notice something that feels off—like outdated or inaccurate information—you can request corrections. It’s like being able to audit your financial records whenever you want, ensuring that everything is in order and nothing shady is happening behind your back.


How These Rights Work Together ?

Let’s consider an example to see these rights in action. Imagine you’re signing up for a healthcare app.

  1.Right to Informed Consent: The app clearly explains that it will collect your health data to provide fitness recommendations and secure it with encryption.

  2.Right to Specific Consent: The app asks for your consent specifically to track your daily steps and calorie intake—not to share this data with advertisers.

  3.Right to Withdraw Consent: Three months later, you decide you no longer want the app to track your calorie intake. You withdraw your consent, and the app immediately stops collecting this data.

  4.Right to Access and Control: You also request a summary of the data the app has collected so far and notice an error in your recorded weight. You ask for a correction, and the app updates your profile accordingly.

Together, these rights create a system where you remain in the driver’s seat, fully informed and fully in control.


4. Obligations of Data Fiduciaries Concerning Consent

Data fiduciaries bear significant responsibilities to uphold the consent framework:

Data fiduciaries, the entities entrusted with managing personal data, play a critical role in upholding the principles of consent under the Digital Personal Data Protection Act (DPDPA). They’re like the custodians of a digital vault, responsible for ensuring the data inside is handled ethically, securely, and transparently.

 

1) Obtain Clear Consent: Ensure that consent is explicit, informed, and freely given, avoiding any form of coercion.

At the heart of any consent framework is clarity. Data fiduciaries must ensure that consent is explicit, informed, and freely given. This means individuals should fully understand what they’re agreeing to, without being coerced or misled. Imagine you’re about to sign a contract. Would you do it without knowing the terms? Of course not! Similarly, consent under the DPDPA must be crystal clear. Fiduciaries are required to explain, in plain language, why they need your data, how they’ll use it, and for how long. Ambiguity or fine print? Not allowed. This obligation empowers individuals to make informed choices and eliminates manipulative practices like pre-ticked checkboxes or vague consent forms. By ensuring consent is genuine, data fiduciaries set the foundation for trust.

2) Provide Detailed Information: Clearly communicate the purpose, scope, and duration of data processing activities.

Transparency is like a window into the data processing world—it lets individuals see exactly what’s happening with their personal information. Data fiduciaries are required to provide detailed information about their activities, including: • Purpose: Why is the data being collected? • Scope: What specific data will be processed? • Duration: How long will the data be retained? Think of this as the fiduciary laying all their cards on the table. When you sign up for a service, they can’t just say, “We’ll use your data to improve user experience.” They need to spell out what “improve user experience” means—whether it involves personalized recommendations, behavioral analysis, or something else entirely. This level of transparency not only builds trust but also ensures individuals are never left in the dark about how their data is being used.

3) Implement Consent Management Systems: Develop robust systems to record, track, and manage consent, including mechanisms for withdrawal.

Managing consent isn’t a one-and-done task—it’s an ongoing responsibility. Data fiduciaries must develop robust consent management systems to record, track, and manage consent. These systems should make it easy for individuals to: • View the data they’ve shared. • Understand the permissions they’ve granted. • Update or withdraw their consent at any time. Picture it like a dashboard for your digital life—a place where you can see who has access to what, and adjust those permissions as needed. For fiduciaries, this isn’t just about compliance; it’s about creating a user-friendly experience that reinforces trust.

4) Ensure Data Security: Protect personal data through technical and organizational measures to prevent unauthorized access or breaches.

What good is consent if the data isn’t secure? Data fiduciaries are obligated to implement strong technical and organizational measures to protect personal data. This includes: • Encryption: Ensuring data is stored and transmitted securely. • Access Controls: Restricting who can access sensitive information. • Incident Response: Having a plan in place to handle data breaches swiftly. Imagine entrusting a bank with your money, only to find out they leave the vault door wide open. That’s the equivalent of poor data security. Fiduciaries must treat personal data with the same level of care and vigilance, ensuring it’s protected against unauthorized access, theft, or misuse.

5) Regular Audits and Compliance Checks: Conduct periodic reviews to ensure ongoing adherence to consent requirements under the DPDPA.

Compliance isn’t a one-time box to tick—it’s an ongoing journey. Data fiduciaries must conduct regular audits and compliance checks to ensure they’re adhering to the DPDPA’s consent requirements. These audits serve as a health check for their data practices, identifying any gaps or vulnerabilities before they become major issues. It’s like taking your car in for regular servicing—you address small problems early to avoid costly breakdowns later. By committing to continuous improvement, fiduciaries not only stay compliant but also demonstrate their dedication to ethical data management.


Why These Obligations Matter


You might be wondering, why all these rules? The answer is simple: to protect individuals and create a fair digital ecosystem. These obligations ensure that:

  • Consent is meaningful, not just a checkbox.

  • Transparency is prioritized, eliminating hidden agendas.

  • Data is secure, reducing the risk of breaches.

  • Trust is built, fostering better relationships between fiduciaries and individuals.

In essence, these responsibilities transform data fiduciaries from passive collectors into active stewards of personal information.

Real-Life Example: A Healthcare App


Let’s put these obligations into perspective with an example. Imagine a healthcare app that tracks your fitness progress:

  1.Obtain Clear Consent: The app explains that it needs your health data to provide tailored fitness recommendations.

  2.Provide Detailed Information: It specifies that it will collect your step count, calorie intake, and heart rate, and retain the data for six months.

  3.Implement Consent Management Systems: You can log in anytime to review the permissions you’ve granted or withdraw your consent.

  4.Ensure Data Security: The app encrypts your data and uses secure servers to prevent unauthorized access.

  5.Regular Audits and Compliance Checks: It conducts periodic reviews to ensure its practices align with the DPDPA.

This holistic approach ensures your data is handled with care, respect, and transparency.


5. Role of the Data Protection Board in Consent Issues

The Data Protection Board (DPB) is the regulatory authority responsible for enforcing the DPDPA. Its roles concerning consent include:

Monitoring Compliance: Oversee data fiduciaries to ensure they adhere to consent protocols.

Handling Complaints: Address grievances filed by individuals regarding misuse or mishandling of their consented data.

Imposing Penalties: Enforce fines and corrective actions against entities that violate consent requirements.

Guidelines and Recommendations: Issue directives to clarify consent-related provisions and best practices for data fiduciaries.


6. Role of the Consent Manager under the DPDPA

Let’s face it—managing consent in the digital age can feel like walking a tightrope. The Digital Personal Data Protection Act (DPDPA) 2023 introduces a game-changer in this regard: the Consent Manager. But who is this mysterious entity, and why does it matter? Think of a Consent Manager as a digital traffic cop, directing the flow of your personal data and ensuring it doesn’t get misused. Under the DPDPA 2023, Consent Managers act as intermediaries between data principals (that’s you and me) and data fiduciaries (companies handling our data). Their primary job? To make giving, withdrawing, and managing consent for data usage seamless, transparent, and secure. Here’s the cool part: Consent Managers must be registered with the Data Protection Board of India, ensuring they meet high standards of accountability and data security. They simplify the complex world of consent by offering easy-to-use interfaces, where individuals can control who gets access to their data and for what purpose—no more fine-print nightmares or shady opt-ins. Why is this important? Because in a world where data is the new oil, your consent is your power. With Consent Managers, DPDPA 2023 places control firmly in your hands, making data privacy not just a right, but a reality.

What Does a Consent Manager Do?


The Consent Manager is responsible for simplifying the process of providing, withdrawing, or managing consent. We’ve all faced those confusing consent forms full of legal jargon and endless checkboxes. Consent Managers aim to eliminate this frustration by offering user-friendly interfaces where you can control who gets access to your data and for what purpose.

For instance:

  • You can easily grant or revoke consent for specific data uses with just a click.

  • They ensure that you’re fully informed before granting consent, including details like why your data is being collected and how it will be used.

  • If you ever feel like withdrawing your consent, it’s as simple as toggling a switch—no lengthy processes or endless customer service calls.

Essentially, Consent Managers act as a guardian of your digital rights, making data privacy accessible and actionable.

Why Are Consent Managers Crucial?


In a world where data is the new oil, having control over who accesses your personal information is non-negotiable. Without proper checks and balances, data misuse can lead to identity theft, targeted scams, or even manipulation through behavioral profiling. Consent Managers ensure that your personal data is handled ethically and legally, aligning with the principles of informed consent. But their role doesn’t just stop at safeguarding your data rights. They also benefit businesses by reducing compliance risks. Companies that integrate Consent Manager services can demonstrate their commitment to data privacy, building trust with customers in a hyper-competitive market.

DPDPA 2023: Consent empowerment through Consent Manager
 The Consent Manager is more than just a tool—it’s a cornerstone of the DPDPA 2023’s mission to make data privacy a reality for everyone. By bridging the gap between individuals and organizations, Consent Managers ensure that your consent is not just a checkbox but a meaningful, enforceable
agreement. With this innovation, India takes a significant leap toward a privacy-first digital future, where your data remains truly yours.


7. Latest Amendments, Notifications, and Guidelines on Consent

Staying abreast of the latest changes is crucial for compliance. Recent updates should include:

Enhanced Consent Mechanisms: Introduction of more stringent requirements for obtaining explicit consent for sensitive data.

Clarifications on Consent Withdrawal: Detailed guidelines on how data fiduciaries should facilitate the withdrawal process.

Digital Consent Platforms: Encouragement of using secure digital platforms to manage and document consent interactions.

Periodic Audits: Mandatory regular audits to verify consent management practices and data handling procedures.

Clarity on Consent Managers Role Consent manager to be within organisation or outsourced. Consent managers liability and indeminity


Stay Updated:


Regularly consult the Data Protection Board of India's website for the latest amendments and official notifications.


8. Comparison with Other Indian Laws

Indian Contract Act, 1872

The Indian Contract Act, 1872 also touches upon consent, albeit in a different context:

1) Definition of Consent: Consent must be free, informed, and without coercion for a contract to be valid.

The Indian Contract Act, 1872 establishes consent as the cornerstone of valid agreements. It requires that parties willingly agree to the terms without coercion, fraud, undue influence, misrepresentation, or mistake. This principle, often referred to as consensus ad idem or “meeting of the minds,” ensures that all parties understand and agree to the same terms. Consent in this context is crucial because it validates the integrity of the agreement, making it enforceable under the law. For instance, if someone is misled into signing a contract based on false information, the consent is considered tainted, rendering the contract voidable at their discretion. This emphasis on free and informed consent creates a balance of power, safeguarding individuals from exploitation in contractual relationships.

2) Linking Consent to the DPDPA’s Framework

The Digital Personal Data Protection Act (DPDPA), 2023 adopts and adapts this concept of consent, bringing it into the digital age. Like the Contract Act, the DPDPA prioritizes informed and voluntary agreement. However, it takes this principle further by requiring explicit consent for the collection and processing of personal data, particularly sensitive information. The DPDPA also empowers individuals with dynamic control through the right to withdraw consent at any time, a feature not commonly emphasized in traditional contracts. By combining the foundational principles of the Indian Contract Act with modern requirements for transparency and individual control, the DPDPA transforms consent into a robust tool for protecting personal autonomy in a data-driven world. Together, these laws illustrate how the concept of consent has evolved to address both physical and virtual interactions, ensuring fairness and accountability across domains.


9. Landmark Case Laws on Consent in India

Several pivotal cases have shaped the understanding and enforcement of consent in India:

Justice K.S. Puttaswamy (Retd.) vs Union of India (2017): Affirmed the right to privacy as a fundamental right, underscoring the importance of consent in data protection.

Shreya Singhal vs Union of India (2015): Struck down Section 66A of the IT Act for being unconstitutional, highlighting the necessity for clear and lawful consent in data-related provisions.

Anurag Srivastava vs Google India Pvt Ltd (2021): Addressed issues related to consent and data privacy in the context of search engine data handling.

Vasundhara Raje vs Union of India (2018): Dealt with data breach notifications and the role of consent in governmental data processing.

These cases collectively emphasize the judiciary's stance on consent, reinforcing its critical role in data protection.


10. Real-World Examples Illustrating Consent

To better grasp the practical applications of consent under the DPDPA, consider the following scenarios:

Example 1: Online Shopping Platforms

Scenario:
When you make a purchase on an online platform, you provide personal details like name, address, and payment information.

Consent Implications:
The platform must obtain your explicit consent to process this data for order fulfillment, marketing, and improving user experience. You should have the option to opt-out of receiving promotional emails at any time.

Example 2: Healthcare Apps

Scenario:
A health tracking app collects sensitive data such as your health metrics, biometric data, and lifestyle information.

Consent Implications:
The app must obtain explicit consent before collecting this data, clearly stating how it will be used. Additionally, it must provide mechanisms for you to revoke consent and ensure that your data is securely stored and processed.

Example 3: Social Media Platforms

Scenario:
When signing up for a social media account, you agree to share personal information and interact with targeted advertisements.

Consent Implications:
The platform must ensure that consent is informed and specific, detailing how your data will be used. Users should have the ability to control the extent of data sharing and withdraw consent whenever desired.


11. Conclusion

The Future of Consent in a Data-Driven World As technology continues to evolve, the concept of consent will need to adapt. With the rise of artificial intelligence, predictive analytics, and IoT devices, data collection has become more pervasive and less visible. You might not even realize when your data is being collected—think smart speakers, wearable devices, or connected cars. The DPDPA’s emphasis on consent ensures we don’t lose sight of individual rights amid this technological boom. By requiring transparency and accountability, it sets a framework that can evolve alongside innovation. In a sense, it’s like setting the rules of the road for self-driving cars before they dominate the streets—future-proofing the system to ensure safety and fairness. Consent isn’t just a legal requirement; it’s a fundamental right that empowers, protects, and respects individuals in the digital age. Under the DPDPA, consent takes center stage as the cornerstone of ethical data practices. It promotes autonomy, fosters trust, and ensures accountability, creating a fairer and more transparent data ecosystem. As we navigate an increasingly data-driven world, the importance of consent will only grow. It’s not just about ticking a box; it’s about reclaiming control over what’s yours—your data, your decisions, your power. In this landscape, the DPDPA acts as a guiding light, ensuring that consent remains the bedrock of data privacy. stands as a pivotal element within the Digital Personal Data Protection Act, 2023 (DPDPA), safeguarding individual autonomy over personal data and fostering trust between data principals and fiduciaries. As data becomes increasingly integral to our lives, understanding and adhering to consent mechanisms is paramount for the general public, businesses, and legal professionals alike. By aligning with the DPDPA's stringent consent requirements, organizations not only ensure compliance but also contribute to a more secure and transparent digital ecosystem.

Stay Informed:
Data protection laws are ever-evolving. Regularly updating your knowledge and practices in line with the latest guidelines and amendments is essential for maintaining compliance and protecting individual privacy.

By: Advocate (Dr.) Prashant Mali (Founder, Cyber Law Consulting).


Additional Resources

Official DPDPA Documentation: Ministry of Electronics and Information Technology

Data Protection Board of India: Data Protection Board Website yet to be launched

Indian Contract Act, 1872: Full Text of the Act

Landmark Case Laws:

Justice K.S. Puttaswamy vs Union of India (2017)

Shreya Singhal vs Union of India (2015)

Anurag Srivastava vs Google India Pvt Ltd (2021)

Educational Materials:

Webinars and workshops on DPDPA compliance offered by industry bodies and educational institutions.

Online courses on data protection and privacy laws.

Read more…

According to recent reports, cybercrime in India significantly increased in 2024 and will be growing all through 2025, with statistics showing a large rise in reported cases and financial losses, with over 740,000 cybercrime complaints filed in the first four months of the year alone, resulting in losses exceeding ₹1,750 crore to cybercriminals; this surge is attributed to a global increase in cyberattacks, placing India among the most affected countries

An updated list of cybercrimes and modus used this year. Worth Sharing isnt it ?.

1. If you are called about how the TRAI is going to disconnect your phone, do not respond. It is a scam.

2. If you are called by FedEx about a package and asked to press 1 or whatever, do not respond. It is a scam.

3. If a police officer calls you and talks to you about your Aadhaar, do not respond. It is a scam.

4. If they tell you that you are under 'digital arrest', do not respond. It is a scam.

5. It they tell you that drugs have been discovered in some package meant for you or sent by you, do not respond. It is a scam.

6. If they say you can't tell anyone, do not listen to them. Inform National Helpline for reporting cyber crime and financial frauds at 1930. If in State of Maharashtra you can also call 14407
You can file a complaint (take typed or hand written two copies with screen shots and bank statements) in nearest regular police station or cyber crime police station also. 7. If they contact you using WhatsApp or SMS, do not respond. It is a scam.

8. If anyone calls you and tells you they have sent money to your UPI id by mistake and that they just want their money back, do not respond. It is a scam.

9. If someone says they want to buy your car or your washing machine or your sofa and say they are from the army or CRPF and show you their id card, do not respond. It is a scam.

10. If someone says they are calling from Swiggy or Zomato and need you to confirm your address by pressing 1 or anything else, do not respond. It is a scam.

11. If they ask you to share OTP just to cancel the order or ride or whatever, do not respond. It is a scam. In any case, do not share your OTP with anyone over phone.

12. Never answer any calls on video mode, if you want to answer buy a webcam cover / mobile phone camera cover or sticker , first close the cover and answer the call

13. If confused simply switch off your phone & block that number.

14. Never press on any link written in blue.

15. Even if you get a notice about pornography or TAX Evasion from the highest Police , CBI, ED , IT Department; do verify offline.

16. Always check if such letters are from Government portals, TIP: Letters with too many logos and stamps are FAKE

17. If somebody calls you stating that a sub-poena( American's call summons of Court as Sub-poena) and you have to come and collect it or you have to pay to see it., ask him/her to send it through the process server of the court or by registered post to address on the summons or case file. If they threaten you, just waste the person's time. Also ask for the Judge's name, Court Room No and floor and /or Building no- if the person is not able to tell, then it means it is a sure shot scam.

18. If somebody calls and says that he /she is calling from Police station and you are being summoned, ask him/her to send it to local police station (dont disclose your location/city) and let the local police station serve it on you.

19. Don't part with ANY Debit/ Credit/ Rupay Card details including card number, CVV, Date of Expiry.

20. A phone number prefix of "160" indicates a call is meant for service or transactional purposes, usually from government agencies or regulated financial institutions, designed to help identify genuine calls and combat fraudulent ones; essentially, if a call starts with "160", it is likely a legitimate service call from a verified source like a bank or government department. Don't pick calls marked Spam or Fraud. Block all calls that fall under this category.

21. Disconnect any calls informing that "So and so asked me to send such and such amount to you". Call the person supposed to be sending you money and confirm. But, don't click on links or scan QR Code or share OTP.

22. Don't do anything if someone calls informing about an emergency/ illness/ accident of a dear one/ relative/ friend, asking to send/ deposit money. Even if it's a video call or a voice call. Call the dear one/ relative/ friend/ their family etc, and confirm. If the person is not reachable, then Google the numbers yourself and call the hospital etc and make enquiry. Physically reach that place, if feasible.

23. Don't respond to ANY calls/ messages "advising buying of shares/ stock Or cryptocurrency". Don't buy such stock because "definite gains" are predicted.

24. Don't respond to calls/ messages promising "home based work". They snare you, make you send money "for investing" while showing "profits". There are NEVER any profits. It's a scam.

25. Don't rush out of the house if you hear the voice of a dear one/ relative/ friend in pain, asking for help. Especially during the night. Try to assess who's outside. Call the dear one/ relative/ friend's mobile/ home. Call the police, if necessary.

26. Don't fall for "easy loans" Apps. They gradually snare you in taking multiple loans that you can't return. Sometimes, they promise huge returns, and give you loans for investing. There are NEVER profits. The money you "invested" is gone. You take the loan to only invest in some scam. Your "investment" will be lost but you will be responsible for paying off the Loan and interest. Then they start tightening the screws.

27. Avoid selling secondhand items on OLX or Quickr or any websites if the buyer is not paying from his own bank account or UPI.

28. Avoid falling prey to indiapost scam where someone calls and says your letter is undelivered and asks you to visit a website or directs you to a IVR CALL.

29. Remember these vultures feast on individual GREED and or FEAR. There is NOTHING FREE. There's nothing like "EASY MONEY/ RETURNS/ ONCE A LIFETIME DEAL"... And, if you are not dealing in drugs/ banned medicines/ fake passports/ illegal arms and ammunition/ human trafficking or other crimes like laundering money - YOU HAVE NOTHING TO FEAR!!

30. AVOID ALL IVR CALLS i.e. AUTOMATED CALLS ASKING TO PRESS SOME NUMBER FOR OPTIONS IN MENU

31. This is the link to Report Suspected Fraud Communication and Report Unsolicited Commercial Communication (UCC) / Spam: https://sancharsaathi.gov.in

32. This is the link to inform such fraudsters and file cyber crime or fraud related complaint: https://cybercrime.gov.in

REMEMBER- NO COURT/ POLICE STATION/ GOVT INVESTIGATION AGENCY CALLS and informs you - they work on paper mode and there is a reason for this ! Always STOP,PAUSE and dont jump to give answers !! Sharing it so that people are aware and don’t fall prey to the scammers.


By:
 Adv. (Dr.) Prashant Mali Founder at Cyber Law Consulting (Advocates & Attorneys)

Read more…

We had a community session on "The CISO's Role: Evolving Expectations In Cybersecurity" featuring Matthew Rosenquist (CISO at Mercury Risk & Compliance) & David Randleman (Field CISO at FireCompass).

The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into 2025, strategies for managing increasing expectations, and how to effectively organize a cybersecurity roadmap to align with business goals in a dynamic threat landscape.

Key Discussion Points: 

  • What are the expectations for the CISO role going into 2025?
  • How can an effective security leader manage these expectations?
  • How do you organize your cybersecurity roadmap for the year?

About Speaker

  • Matthew Rosenquist (CISO at Mercury Risk & Compliance)
  • David Randleman (Field CISO at FireCompass).

 

 

Executive Summary (Session Highlights):

The CISO’s Role: Evolution and Strategic Leadership

The session explored the dynamic and expanding responsibilities of CISOs in navigating today’s complex cybersecurity landscape. Matthew Rosenquist, CISO at Mercury Risk and Compliance, shared insights from his 35-year career, offering practical advice on proactive strategies, leadership growth, and adapting to the increasing demands of the role.

The Evolution of the CISO Role:

The discussion highlighted the transformation of the CISO’s role from technical expertise to strategic leadership. Matthew emphasized the importance of aligning cybersecurity goals with business priorities, understanding adversarial motivations, and predicting future challenges to adopt a proactive security posture.

Addressing Advanced Threats:

Matthew outlined how nation-state actors are leading the charge in cyber R&D, creating advanced tools and vulnerabilities that trickle down to cybercriminals. He stressed the need for organizations to anticipate and mitigate these threats through strategic threat modeling and collaboration across sectors.

Leadership Amid Rising Expectations:

The session addressed the growing expectations on CISOs, who must balance regulatory compliance, resource constraints, and the need for effective communication. Matthew encouraged CISOs to adopt a collaborative mindset, engage with boards and stakeholders, and build resilient teams capable of adapting to evolving challenges.

The Role of Collaboration and Communication:

Collaboration emerged as a critical theme, with Matthew advocating for cross-sector partnerships and open communication channels. He highlighted the importance of mentorship, continuous learning, and inclusive leadership to build a cohesive security strategy that aligns with business needs.

Navigating Regulatory and Compliance Demands:

The session examined the implications of new SEC regulations requiring disclosure of material cybersecurity impacts. Matthew advised CISOs to work closely with legal, finance, and audit teams to define materiality and ensure compliance while maintaining a strategic focus on broader security objectives.

Conclusion: Building a Resilient Security Strategy

The session provided actionable takeaways for CISOs:

  • Adopt Proactive Leadership: Develop a strategic mindset to anticipate threats and align cybersecurity with business objectives.

  • Embrace Collaboration: Build partnerships across sectors, competitors, and internal departments to share knowledge and strengthen defenses.

  • Balance Compliance and Strategy: Leverage regulatory compliance as a baseline while focusing on broader risk management goals.

  • Prioritize Communication: Foster open dialogue with stakeholders, enabling a deeper understanding of business needs and expectations.


The conversation concluded with a call to action for CISOs to lead with resilience, adapt to the changing threat landscape, and drive meaningful change in the cybersecurity industry.

Read more…
Enhancing Cybersecurity for SMBs: Key Metrics That Matter
 
Cybersecurity has become critical for the success and longevity of small and medium-sized businesses (SMBs). As cyber threats continue to evolve and become more sophisticated, SMBS needs to establish a robust cybersecurity framework. However, many smaller organizations struggle to assess their security posture effectively. This is where the strategic use of metrics becomes invaluable, serving as a guide to improve cybersecurity practices and ultimately enhance business outcomes.
 
 
Understanding Cybersecurity Metrics
 
Understanding and implementing cybersecurity metrics is crucial for SMBs to protect valuable assets and maintain customer trust. By leveraging these metrics, businesses can make data-driven decisions that enhance security and contribute to overall business growth and resilience.
 
Types of Cybersecurity Metrics:
 
1. Quantitative vs. Qualitative Metrics:

Quantitative metrics are essential for providing objective, numerical data that can be systematically tracked and analyzed over time. These metrics allow businesses to conduct precise trend analysis, identify patterns, and measure the effectiveness of their cybersecurity strategies in a clear and measurable way. Examples of quantitative metrics include the number of security incidents detected, the average time taken to respond to threats, and the frequency of system vulnerabilities identified. These metrics are invaluable for setting benchmarks, evaluating performance, and making informed decisions about resource allocation and risk management.

On the other hand, qualitative metrics, while more subjective, offer valuable insights into the human aspects of cybersecurity that are often overlooked by purely numerical data. These metrics delve into areas such as employee awareness, organizational culture, and the overall security mindset within a company. By assessing factors like the level of employee engagement in security training programs, the effectiveness of communication regarding security policies, and the general attitude towards cybersecurity within the organization, qualitative metrics provide a deeper understanding of the human elements that influence security outcomes. This understanding is crucial for fostering a security-conscious culture and ensuring that employees are not only aware of potential threats but are also proactive in preventing them. Together, quantitative and qualitative metrics provide a comprehensive view of an organization's cybersecurity posture, enabling a balanced approach to both technical and human factors in security management.
 

2. Leading vs. Lagging Indicators:

By focusing on both leading and lagging indicators, small and medium-sized businesses (SMBs) can gain a comprehensive and nuanced view of their cybersecurity posture. Leading indicators are predictive measures that provide foresight into potential future security issues, allowing businesses to anticipate and mitigate risks before they materialize. These might include metrics such as the frequency of security training sessions or the number of attempted phishing attacks thwarted. On the other hand, lagging indicators are retrospective, offering insights into past security performance and outcomes. They help businesses understand the effectiveness of their cybersecurity measures by analyzing data such as the number of breaches that occurred or the time taken to recover from incidents. By integrating both types of indicators into their cybersecurity strategy, SMBs can engage in proactive risk management, ensuring they are not only reacting to threats but also anticipating them. This dual approach enables more effective resource allocation, allowing businesses to prioritize investments in areas that will have the most significant impact on enhancing their overall security posture. 
 
 
Key Metrics for Enhancing Cybersecurity
 
 
Incident Response Metrics
 
Effective incident response is crucial for minimizing the impact of a cybersecurity breach on an SMB's operations, reputation, and bottom line. By tracking these metrics, businesses can improve their ability to detect, respond to, and recover from security incidents quickly, thereby reducing potential financial losses and maintaining customer confidence.
 
 
Key metrics to focus on include:
 
  1. Mean Time to Detect (MTTD): MTTD refers to the average time it takes for an organization to detect a cybersecurity incident after its occurrence. It measures the efficiency of monitoring and threat detection systems in identifying potential security breaches or anomalies.
  2. Mean Time to Respond (MTTR): MTTR is the average time required to respond to a detected security incident and mitigate its effects. This metric includes containment, eradication, and recovery efforts to restore normal operations while minimizing damage.
  3. Number of Incidents: This metric represents the total count of security incidents identified within a specified period. It includes all recorded security events that trigger a response from the incident management team, regardless of severity.
  4. Incident Recovery Times: Incident Recovery Times measures the duration required to fully restore systems, data, and operations after a security breach. It tracks the time from incident detection through response and recovery to normal functioning, reflecting an organization’s resilience and disaster recovery capability.
 
 
Threat Detection and Prevention Metrics
 
For SMBs, maintaining a strong defense against cyber threats is essential for protecting sensitive data and ensuring business continuity. Organizations can optimize their security tools and strategies by monitoring threat detection and prevention metrics, reducing the risk of successful attacks and associated costs.
 
 
Important metrics in this category include:
 
  1. Rate of Detected Threats vs. False Positives:
    This metric measures the accuracy of a security system by comparing the number of legitimate threats detected to the number of false positives (incorrectly flagged incidents). It is calculated using the formula:

     

     


    13353065455?profile=RESIZE_710x 


    Rate of Detected Threats vs. False Positives= (True Positives+False Positives / True Positives​) 

    • True Positives: Actual threats correctly identified.
    • False Positives: Benign activities incorrectly flagged as threats.


    A higher rate indicates better detection accuracy, minimizing unnecessary alerts while capturing real threats.

  2. Effectiveness of Security Tools:
    This metric evaluates how well security tools protect an organization against threats. It considers various performance indicators such as:

    • Detection Accuracy: Ability to identify real threats without false alarms.
    • Response Speed: Time taken to react to identified threats.
    • Coverage: Breadth of protection across different types of threats and attack vectors.
    • Ease of Use: Usability and integration into existing workflows.
    • Adaptability: Capability to adapt to emerging threats through updates and learning models.


    The effectiveness is typically measured using performance tests, benchmarking against industry standards, and conducting simulated attacks to assess real-world protection.

 
User Awareness and Training Metrics
 
Employees are often the first line of defense against cyber threats, making user awareness and training crucial for SMBs. By tracking these metrics, businesses can assess the effectiveness of their security awareness programs, identify areas for improvement, and ultimately reduce the risk of human-error-related security incidents.
 
 
Key metrics to evaluate include:
 

Percentage of Employees Completing Security Training:

This metric measures the proportion of employees who have successfully completed assigned security awareness training within a specific timeframe. It is calculated using the formula:

 

13353066684?profile=RESIZE_584x

Percentage of Employees:  100Percentage of Employees Completing Security Training=Total Number of EmployeesNumber of Employees Completing Training​×100

 

A higher percentage indicates better engagement and compliance with the organization's cybersecurity training programs, reflecting the organization's commitment to fostering a security-aware culture.

Phishing Simulation Results:

This metric assesses how employees respond to simulated phishing attacks designed to test their awareness and resilience against social engineering tactics. Key indicators include:

  • Click Rate: Percentage of employees who clicked on malicious links or attachments in phishing emails.
  • Report Rate: Percentage of employees who identified and reported phishing attempts to security teams.
  • Compromise Rate: Percentage of employees who submitted sensitive information (e.g., login credentials) in response to phishing simulations.


Phishing simulation results help gauge an organization's vulnerability to phishing attacks and inform targeted training efforts to strengthen its cybersecurity posture. Check out CyberHoot Positive Educational Phishing Simulation.

 
Implementing a Metrics-Driven Cybersecurity Strategy
 
 
Setting Clear Objectives
 
Aligning cybersecurity objectives with overall business goals is essential for SMBs to ensure that security efforts contribute directly to the organization's success. By setting clear, measurable objectives, businesses can focus their resources on the most impactful security initiatives and demonstrate the value of cybersecurity investments to stakeholders.
 
 
Collecting and Analyzing Data
 
Effective data collection and analysis are fundamental to a successful metrics-driven strategy. For SMBs, this process can provide valuable insights into their security posture, help identify trends, and inform decision-making. By leveraging the right tools and best practices, even smaller organizations can gain a comprehensive view of their cybersecurity landscape.
 
 
Best practices include:
 
- Regularly reviewing data for anomalies
- Using visualization tools to interpret complex data sets
 
 
Continuous Improvement and Adaptation
 
In the ever-evolving landscape of cyber threats, SMBs must remain agile and adaptive in their approach to cybersecurity. By continuously reviewing and updating metrics, businesses can ensure that their security strategies remain effective against new and emerging threats, ultimately protecting their assets and maintaining a competitive edge in the market.
 
 
Challenges in Measuring Cybersecurity Effectiveness
 
 
Data Privacy Concerns
 
For SMBs, balancing the need for comprehensive security metrics with data privacy regulations is a critical concern. Failure to comply with privacy laws can result in significant fines and reputational damage. By implementing transparent and compliant data collection methods, businesses can mitigate these risks while gathering the necessary insights to improve their security posture.
 
 
Resource Limitations for SMBs
 
Many SMBs face budget constraints when implementing robust cybersecurity metrics. However, these organizations can still develop a strong metrics-driven approach to cybersecurity by focusing on cost-effective strategies and leveraging existing resources. This helps protect against threats and demonstrates a commitment to security that can be attractive to potential clients and partners.
 
 
Strategies to leverage existing resources effectively include:
 
- Utilizing free or low-cost cybersecurity tools
- Investing in employee training to enhance security awareness and reduce reliance on expensive technology
 
 
Interpreting Metrics Accurately
 
Accurate interpretation of cybersecurity metrics is crucial for SMBs to make informed decisions about security investments and strategies. By avoiding common pitfalls and focusing on contextual analysis, businesses can ensure that their metrics provide actionable insights that drive fundamental improvements in their security posture.
 
In conclusion, by focusing on these key metrics and implementing a metrics-driven cybersecurity strategy. While each business is unique and has different business drivers, SMBs can significantly enhance their security posture, protect valuable assets, and drive positive business outcomes by starting to measure processes for the desired business outcome. Understanding and tracking these metrics will improve cybersecurity and contribute to overall business resilience and growth in an increasingly digital world.
 

By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

 
 
Read more…

In today’s fast-paced digital world, small and medium-sized businesses (SMBs) face ever-growing cyberattack threats. While technological advancements have provided businesses with unprecedented opportunities, they have also exposed them to significant cybersecurity risks. For SMBs with limited resources, the consequences of a cyberattack can be catastrophic, often resulting in severe financial losses, operational disruptions, and irreparable damage to their reputation. This makes cybersecurity insurance an essential component of a well-rounded risk management strategy. This comprehensive guide will help SMB owners navigate the complex world of cyber insurance and secure their businesses against devastating losses.

The Rising Importance of Cyber Insurance for SMBs

The increasing reliance on digital infrastructure has amplified SMBs’ exposure to cyber risks. Cybercriminals frequently target smaller businesses because of perceived weaker security measures and lower defenses. Recent statistics highlight the urgency of implementing cybersecurity insurance:

  • 85% of ransomware attacks target small businesses, exploiting vulnerabilities in outdated systems and weak cybersecurity protocols.
  • 60% of SMBs that suffer a significant cyberattack are forced to close within six months due to financial and operational damage.

These figures emphasize the necessity of a robust cybersecurity framework supported by comprehensive cyber insurance coverage. It serves as a financial safety net, allowing businesses to recover from breaches while minimizing long-term impacts.

Key Components of Cyber Insurance

Cyber insurance policies provide a safety net that covers various costs associated with cyber incidents. Understanding the key components of a cyber insurance policy can help businesses choose appropriate coverage and ensure maximum protection. Here’s a breakdown of the essential features:

Financial Protection

Cyber insurance policies typically include coverage for a wide range of expenses arising from cyber incidents:

  • Breach Response Costs: Covers expenses related to breach investigation, legal consultations, customer notifications, and credit monitoring services.
  • Business Interruption: Compensates for lost revenue and operational downtime caused by cyberattacks.
  • Cyber Extortion Payments: Provides financial coverage for ransom payments and associated costs during ransomware incidents.
  • Regulatory Fines and Penalties: This policy protects against penalties levied for non-compliance with industry-specific data protection laws, such as GDPR or HIPAA.
  • Legal Defense and Settlements: Covers legal expenses, court fees, and potential settlements arising from lawsuits related to data breaches.


Incident Response and Expertise

Beyond monetary reimbursement, many insurers offer access to specialized incident response services that are invaluable during a crisis:

  • Incident Response Teams: Provides access to IT specialists, legal experts, and PR professionals to manage and mitigate the fallout from a cyberattack.
  • Risk Management Services: Offers tools and best practices to strengthen the business’s cybersecurity posture and reduce the likelihood of future incidents.


Types of Cyber Insurance for SMBs

Understanding the different types of cyber insurance can help SMBs select the best policy for their needs:

  • Cyber Theft Insurance: Covers financial losses resulting from the theft of digital assets, such as funds transfer fraud or data theft.
  • Cyber Liability Insurance: Protects against third-party damages, including legal claims from customers, suppliers, or partners affected by a breach.
  • Cyber Extortion/Ransomware Insurance: Pays for ransom demands, recovery expenses, and associated investigation costs.
  • Technology Errors and Omissions (E&O) Insurance: Covers mistakes, service failures, or negligence related to IT products or services offered by the business.


Factors Affecting Cyber Insurance Costs

The cost of a cyber insurance policy can vary significantly depending on several factors. SMBs should understand these variables to budget effectively and potentially reduce premium costs:


Business Characteristics

Insurers evaluate several business attributes when determining policy premiums, including:

  • Business Size and Industry: Larger businesses or companies in high-risk industries like healthcare and finance typically pay higher premiums.
  • Data Sensitivity and Volume: Companies handling sensitive financial or healthcare data are considered to be at higher risk.
  • Current Security Measures: Strong cybersecurity practices such as firewalls, antivirus software, and network monitoring can reduce premiums.


Coverage Options

The scope of coverage directly impacts policy costs. Policies with higher limits, lower deductibles, or additional coverage options will naturally incur higher premiums.


Insurance Requirements

Many insurers require SMBs to meet specific security standards before granting coverage. These include:

  • Multi-Factor Authentication (MFA): A common requirement for securing user accounts.
  • Regular Data Backups: Businesses must maintain secure, encrypted backups to ensure data recovery after an incident.
  • System Patching and Updates: Ensuring all operating systems, software, and applications are up-to-date.
  • Employee Cybersecurity Training: Regular training sessions to educate staff on recognizing phishing attempts and handling sensitive information securely.


Choosing the Right Cyber Insurance for Your SMB

Selecting the right cyber insurance policy involves careful assessment and thoughtful decision-making. SMBs should take the following steps to ensure comprehensive coverage:

  • Assess Your Risks: Identify specific cybersecurity risks based on business operations, industry, and data handling processes.
  • Evaluate Coverage Options: Compare multiple policies to find one that addresses your business's unique vulnerabilities.
  • Consult a Managed Service Provider (MSP): An MSP can conduct a cybersecurity risk assessment, recommend appropriate policies, and ensure compliance with insurance requirements.
  • Review Policy Details: Understand coverage limits, deductibles, exclusions, and the claims process before committing to a policy.


Conclusion

As cyber threats continue to evolve, cybersecurity insurance has emerged as a critical element of a well-rounded risk management strategy for SMBs. By understanding the available coverage options, assessing specific business risks, and implementing the required security measures, SMBs can better protect themselves against potential financial, legal, and reputational damage. Investing in cybersecurity insurance today can help ensure the business's long-term survival and success in an increasingly digital world. Remember, the cost of cyber insurance is often far less than the devastating financial fallout of a successful cyberattack. Take proactive steps to secure your business’s digital future.


By: Christophe Foulon, (vCISO at Quisitive)

Original link of post is here

Read more…

Recently, a friend posted a wonderful piece attributed to their hero, the CISO. I disagreed and immediately felt like a party pooper. But, I had to do it.

Here’s why.

In business today, the role of a CISO is crucial. With the consistency and severity of cyber attacks and data breaches worsening, compliance becoming a minefield, organisations are turning to (and paying) CISOs for protection and guidance.

However, it’s important to note that while the CISO may be seen as a hero in the eyes of many, this mindset can be dangerous. Placing too much pressure on one individual to single-handedly protect an entire organisation can result in someone developing what’s commonly referred to as a hero complex.

And before you say, the buck has to stop with someone, hear me out.

 

First, What’s a Hero Complex?

Often stemming from a strong desire to be seen as exceptional, indispensable, or the sole saviour in challenging situations, this complex can manifest in various ways. Considering how it develops, here are a few things to be aware of:

  • Need for Recognition: In environments that emphasise heroism, individuals might feel compelled to constantly seek recognition and praise for their actions, leading to a reliance on being perceived as the only solution to problems.
  • Overextension and Burnout: Those with a hero complex may struggle to delegate tasks or seek support, resulting in overextension and potential burnout as they take on more than they can reasonably handle.
  • Disregard for Team Effort: The hero complex can lead individuals to undervalue the contributions of others and undermine the importance of collaborative efforts in achieving success.
  • Risk of Perfectionism: There’s a risk of developing perfectionist tendencies, as individuals with a hero complex may feel the need to consistently excel and maintain an image of infallibility.

 

Heroes Often Attract Drama

Steven Karpman, the creator of the Drama Triangle model, see below, outlined how the hero, along with the victim and persecutor, contributes to the cycle of interpersonal conflict and dysfunction.

His work sheds light on the underlying motivations and consequences of hero behaviour within this framework. Karpman’s analysis emphasises that the hero’s actions, while initially driven by a desire to help, can inadvertently perpetuate a sense of powerlessness and dependency among those they seek to rescue.

Furthermore, the hero’s interventions may stem from their own need for validation or a sense of purpose, leading to a complex interplay of psychological dynamics within the drama triangle. As such, understanding the role of the hero in the drama triangle provides valuable insights into the complexities of human interaction and the potential for transformative change through awareness and conscious communication.

 

13343104064?profile=RESIZE_710x

 

A Securer Approach

That’s why I advocate for a different, securer approach – positioning the CISO as a guide rather than a hero. This concept is similar to that of Obi One in Star Wars, who acted as a mentor and guide to Luke Skywalker rather than doing all the work himself.

And yes, I bet you’re saying well his role wasn’t to protect an entire galaxy, but hear me out, again.

The CISO’s role is more than just protecting the company from cyber threats for the CISO has to become an enabler for the rest of the organisation. They educate and empower employees on cybersecurity best practices, implement policies and procedures, and provide guidance on identifying and mitigating potential risks.

By taking on this role as a guide, the CISO builds a stronger culture of security within the organisation. Employees become effective cyber defenders as they’re now more aware of potential threats and are better equipped with the knowledge and resources to protect themselves and their company.

Additionally, by shifting away from the idea of a hero, organisations avoid placing unrealistic expectations on their CISOs.

Here’s how they building stronger security postures and healthier environments:

    • Promote Collaboration: Emphasise the value of teamwork and collective problem-solving to reduce the pressure on individuals to always be the hero.
    • Recognise Contributions: Acknowledge and celebrate the efforts of all team members, highlighting the collective achievements rather than individual heroics.
    • Encourage Self-Care: Foster a culture that prioritises self-care, work-life balance, and open discussions about mental health to prevent burnout and promote well-being.
    • Develop Leadership Skills: Provide opportunities for individuals to cultivate leadership skills that prioritise delegation, mentorship, and empowering others.

 

To end…

I believe CISOs should never be positioned as a hero. By acknowledging and addressing the potential development of heroes, organisations and individuals can create a more supportive and balanced work environment that values collaboration, shared success, and individual well-being.

 

Now I want to hear from you…

In a culture that celebrates heroes, tell me how can we shift the narrative to honour collective efforts and collaborative achievements, fostering a more inclusive and sustainable approach to success? Drop me an email or join me on LinkedIn where we can continue this discussion and you can tell me your thoughts on this matter.

Or, reflect on a time when you felt compelled to be the hero in a situation. How might the outcome have differed if a collaborative approach was prioritised?

 

By Jane Frankland (Business Owner & CEO, KnewStart)

Original link of post is here

Read more…

As we emerge from an intense season of industry conferences like Infosec and RSA, I believe the cybersecurity community finds itself at a critical juncture. While hot topics like AI’s role in combating hacker threats has dominated discussions, an equally significant issue has remained—mental health and burnout.

As an industry veteran, having spent over two decades in cybersecurity, I’ve been thinking a lot about the current state of the field—our relentless pursuit of productivity, and how we often find ourselves trapped in a cycle of continuous hard work — an endless grind of task completion, goal attainment, and often burnout.

And while the modern world champions the industrious individual, I posit that this push for unwavering productivity might just be the arch-nemesis of creativity and the innovation we need in cyber if we’re to win against our attackers.

Consider the paradox where the most innovative ideas often occur not when we’re buried in work, but when we’re relaxing and taking a break from work.

History tells us that it’s on the backs of such moments that Sir Isaac Newton pondered gravity, Sir Charles Darwin’s mind unraveled the theory of evolution, and Albert Einstein profoundly reshaped our understanding of the universe with his theory of relativity, all during moments of introspection and contemplation.

It’s in these times of relaxation, our minds have the freedom to wander and make connections that may not arise in a busy work schedule. Yet, our obsession with being productive and “always on” often leaves little room for the mind to wander and explore the vast expanses of imagination.

This industriousness, driven partly by economic demands, and an adrenaline addicted corporate culture, inadvertently establishes a framework where time spent idle or in leisure is regarded as someone being lazy, having a lack of ambition, and quite simply wrong.

But is it really so?

 

Let’s consider AI

AI’s integration into the cybersecurity landscape is not only optimising operational efficiency but it’s also paving the way for valuable downtime, crucial for ideation and problem solving. By handling routine and monotonous tasks, AI is now enabling cybersecurity professionals to divert their cognitive resources towards more strategic endeavours.

This technological partnership means that while AI manages real-time threat detection and basic incidence responses, human experts can engage in creative deliberation, deeper analysis, and strategic planning. This blend of human ingenuity and AI brings with it the potential to create a more cyber resilient defence mechanism and foster an environment where breakthrough ideas and novel solutions can flourish, ultimately contributing to more robust cybersecurity frameworks.

 

Story time

On a personal note, I recall the time a Managing Director at one of the companies I was working at joined a new team and stepped into a whirlwind of responsibilities. She believed in the power of relentless hard work until she took her first holiday with her family after joining this team and was forced to disconnect. Upon her return, she raved about the rejuvenation she felt from genuinely disconnecting, engaging in quality time with her loved ones, and stepping away from the all-consuming digital ties to her professional life, including an important tender which due date coincided with her holiday.

This break from constant productivity didn’t send her team into disarray. Quite the opposite. She returned with a wellspring of energy, each idea sharper, each decision crisper, an embodiment of how periods of rest not only restore but renew our creative spirit.

 

Harnessing the Power of Pause in Cyber

With cybercrime costs growing globally at the rate of 15% per yearAI technology expected to grow 4x in the next five years, and cybersecurity professionals burning out at a faster rate than frontline health care workers. I believe now is the time to ask ourselves whether the uninterrupted chase after productivity can be held responsible for dulling the spark of innovation within us and stopping the flow of good ideas.

Perhaps it’s in the moments of stillness, in the pause between the notes of our daily lives, that the symphony of creativity truly unfolds.

 

Practical Steps for Implementing Downtime in Cybersecurity Teams

  • Institutionalise Breaks:Encourage employees to take regular breaks throughout the day to refresh their minds and reduce stress.
  • Create Flexible Work Arrangements: Flexibility in work schedules allows employees to find their optimal working hours, leading to increased productivity and creativity. Consider implementing a four-day workweek, shorter working days to give your team time to recharge, or (if possible) giving them the freedom to find their most productive times without being constrained by traditional office hours.
  • Support Mental Health: Addressing mental health concerns is crucial for fostering a creative and healthy workplace culture. Invest in programs that provide resources for managing stress, building resilience, and promoting overall well-being.
  • Embrace AI Technology: As mentioned earlier.
  • Promote Work-Life Balance: Foster a culture that values time spent pursuing passions outside of work, whether it’s hobbies, family time, or simply relaxing.
  • Encourage Mindfulness Practices: Introduce mindfulness and relaxation techniques, such as meditation or yoga, to help employees manage stress and maintain mental clarity.
  • Lead by Example: Leadership should model these behaviours, demonstrating that taking time to recharge is not only acceptable but encouraged.
  • Contact companies who specialise in reducing burnout in cybersecurtyCybermindz instantly springs to mind but The Mental Health in Cybersecurity Foundation via Sarb Sembhi‘s lead in the UK is doing some great work to unite groups, as well as Forrester for research via Jinan Budge.

 

To End

To entrepreneurs and corporate leaders, I say this: recognise that efficiency isn’t always the frequency of output but sometimes the latitude of the thoughts we breed. Offer the world of work the room it needs to flex the muscles of creativity rather than chain it down with timesheets and the weighty expectations of constant productivity.

Trust in your employees to deliver the best results when they’re given the freedom, space and guardrails to unlock their true potential. Embrace a culture that values taking breaks, pursuing passions outside of work, and allowing minds to wander. Reshape this understanding of what it means to be productive, and unlock the full potential of creative energies.

Because in advocating for periods of respite and a redefinition of a successful work ethic, you do not call for indolence but a balanced approach where industriousness does not become creativity’s stranglehold.

 

Now I want to hear from you…

Tell me about a time when you experienced a burst of creativity after taking a break from work. How did it impact your productivity in the long run?

Drop me an email or join me on LinkedIn so we can continue this conversation and find ways to embrace both industriousness and creativity in our lives.

 

By Jane Frankland (Business Owner & CEO, KnewStart)

Original link of post is here

Read more…

We had a community session on The CISO's Journey: From Expert to Leader featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (CEO, FireCompass; Advisor, CISO Platform) & David Randleman (Field CISO, FireCompass)

In this discussion, we covered the journey from cybersecurity expert to strategic leader including stages of a CISO’s evolution, the balance between technical expertise and leadership, the unique value veterans bring to cybersecurity, and strategies to stay ahead of emerging attack techniques in an ever-changing threat landscape.

Key Highlights:

  • Career Evolution: Insights into the journey to becoming a CISO at Oracle and defining career moments.
  • Success Metrics: Industry trends shaping how CISOs measure success.
  • Veterans’ Role: The impact of veterans’ skills and clearances in cybersecurity hiring.
  • Mental Health & Pop Culture: Managing stress as a CISO and pop culture’s take on cybersecurity.


About Speaker

  • David B. Cross (SVP & CISO at Oracle)
  • Bikash Barai (CEO, FireCompass; Advisor, CISO Platform)
  • David Randleman (Field CISO, FireCompass)

 

 

Executive Summary (Session Highlights):

  • The Journey from Expert to Leader: A CISO’s Perspective
    The session delved into the evolution of security professionals into leadership roles. David Cross, CISO at Oracle, emphasized that becoming a CISO is a journey requiring patience, adaptability, and preparation, much like training for a marathon. Key insights included the importance of seizing opportunities, even when the path isn’t clearly defined, and continually evolving one’s leadership capabilities.

  • The Power of Mentorship in Leadership Development
    The speakers underscored mentorship as a cornerstone for growth. David Cross introduced three types of mentors:
  1. Long-term mentors for career guidance.
  2. Tactical mentors for skill-specific improvements.
  3. Peer mentors for candid, constructive feedback.
    Bikash Barai highlighted the value of collaboration over mere networking, urging CISOs to “pay it forward” and contribute to community growth.
  • Stress Management and Achieving Work-Life Harmony
    Stress management was a central theme, with both speakers sharing personal strategies. David Cross described running as his form of meditation, enabling mental clarity and resilience. Bikash Barai spoke about evolving from task management to a philosophy of happiness, integrating mindfulness, gratitude, and awareness into his routine.

  • Prioritization: A Key Challenge for CISOs
    The discussion highlighted the complexity of prioritizing risks and tasks in cybersecurity. Bikash Barai compared life’s minimalism with cybersecurity’s intricacies, emphasizing risk-based and exploitability-based prioritization. David Cross advocated for standardizing prioritization frameworks to reduce ambiguity, ensuring decisions are fact-based rather than political.

  • AI and the Future of Cybersecurity
    AI emerged as a pivotal theme for 2025. The panel explored two key AI considerations:
  1. AI for Security – Leveraging AI to enhance threat detection, automate security operations, and optimize response.
  2. Security for AI – Integrating robust security development lifecycles for AI systems to mitigate vulnerabilities.
    Both speakers stressed the necessity for CISOs to maintain a technical foundation, as understanding AI and its risks is now critical for leadership credibility.
  • Networking, Community, and Continuous Learning
    The session emphasized building strong professional networks and leveraging communities for shared learning. The speakers encouraged CISOs to prioritize ongoing skill development, aligning with evolving technologies such as AI and quantum computing.

Conclusion: Preparing for the Next Phase of Leadership

The conversation concluded with actionable takeaways for CISOs:

  • Invest in mentorship and continuous learning.

  • Standardize prioritization processes to manage risks effectively.

  • Build resilience through stress management strategies.

  • Leverage AI both as a security tool and as a protected asset.

  • Focus on collaboration, networking, and contributing to the larger cybersecurity community.
Read more…

We are hosting an exclusive Best of the World Talks session on "How the rapidly evolving expectations of cybersecurity are forcing CISOs to adapt and show more value to their organization?" featuring Matthew Rosenquist (CISO at Mercury Risk & Compliance) & David Randleman (Field CISO at FireCompass).

The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into 2025, strategies for managing increasing expectations, and how to effectively organize a cybersecurity roadmap to align with business goals in a dynamic threat landscape.

13322913686?profile=RESIZE_710x

Key Discussion Points: 

  • What are the expectations for the CISO role going into 2025?
  • How can an effective security leader manage these expectations?
  • How do you organize your cybersecurity roadmap for the year?

Date: 19th Dec, 2024 (Thursday)
Time: 8:00 AM PST | 9:30 PM IST

Join us live or register to receive the session recording if the timing doesn’t suit your timezone.

>> Register here

Read more…

Part 2 of Interview with Enoch Long

As cyber threats become more sophisticated, the need for visibility across your organization’s cyber asset environment and proactive strategies has become increasingly critical. According to Enoch Long, Field CISO at JupiterOne, true visibility goes beyond asset tracking and instead should encompass people, processes, and technology to create a unified defense. In Part 2, Enoch dives into actionable advice for security leaders, including the importance of asset management, strategies for adapting to evolving threats, and critical trends that will shape cybersecurity in 2025. If resilience is the goal, visibility is the foundation—and Enoch offers insights to help organizations build both.

 

What advice would you give to security leaders and practitioners as they work to protect their organizations from evolving threat actors?

In today’s environment, your security strategy must start with a clear understanding of your attack surface—knowing your assets, and where they reside. In the past, security teams focused on log management and monitoring network access without integrating asset management into their approach. With the rise of hybrid environments, cloud infrastructure, and distributed networks, you need to understand every asset—where it resides, how it’s connected, and what vulnerabilities it presents. An asset isn’t just an item on a checklist; it’s a potential entry point that needs to be secured and monitored.

As organizations adopt more federated IT models and hybrid cloud setups, many business units operate with their own quasi-IT teams, deploying systems and SaaS applications autonomously. Security teams must ensure that even with this decentralization, asset management and security standards are consistent across the organization. Establish clear protocols for asset discovery, vulnerability tracking, and continuous monitoring to maintain a unified security posture, regardless of where the assets are located or who manages them.

My top recommendation is to focus on improving the storytelling around incidents and near-misses. Often, the things we "just got lucky on" can be powerful learning moments and a compelling way to communicate the importance of proactive security measures to leadership. Dig into situations where luck played a role. For example, maybe an employee didn’t click on a malicious link, or maybe a threat was caught by chance rather than through a well-designed control. These close calls highlight vulnerabilities that need addressing, and they provide stories that illustrate the risks clearly to executives and other stakeholders.

Many near-misses can be traced back to incomplete asset management, outdated configurations, or a lack of visibility into the environment. By connecting these incidents to gaps in asset management or inventory, you provide a practical context that shows where better resources, tools, or processes could make a difference. Convey that relying on luck isn’t sustainable while demonstrating an urgent need for proactive improvements.

Looking at trends, how important is visibility in cybersecurity in the evolving cybersecurity threat environment?

Visibility means more than just knowing where your devices are; it’s about having a comprehensive understanding of your people, processes, and technologies. True visibility isn't simply tracking assets—it's about knowing who’s managing them, how they’re being used, and how they fit into the bigger picture of your operations.

Starting with a clear view of the people supporting your infrastructure. It’s not just about knowing roles but understanding who manages specific devices, applications, servers, and connections. Security is most effective when it considers the operating model—knowing who’s responsible for what and ensuring they have the context needed to make informed decisions.

Beyond asset tracking, true visibility extends into how systems are deployed and managed throughout their lifecycle. From deployment in production environments to manufacturing and operational sites, visibility requires insight into every step, from inception to production. Knowing the lifecycle of each asset and the processes that support them gives you a deeper understanding of potential risks and areas to monitor.

While it’s common for organizations to use 30-40+ security tools, visibility requires going beyond simply having these technologies. It's about configuring each tool effectively, ensuring they’re logging appropriately, and collecting the right data for meaningful analysis. When your technology stack is not only comprehensive but also configured with purpose, it transforms raw data into actionable insights.

In the evolving threat environment, true visibility is the fusion of people, processes, and technology into one cohesive approach. It’s this level of visibility that equips security teams to respond swiftly and proactively, maintaining a strong defense against an increasingly complex threat landscape.

 

What cyber trends are you seeing for 2025?

When it comes to key security trends, this varies based on an organization’s level of maturity. More mature security programs tend to look beyond the immediate buzzwords and dig into threats and trends that may be overlooked. Here are four critical trends I see security leaders at more mature organization are tracking closely:

●      A few years back, supply chain attacks were all over the news, and while this has quieted down, mature security leaders haven’t forgotten. They know the risk is still very real and likely to resurface. Organizations still rely on interconnected software, so keeping an eye on supply chain vulnerabilities is crucial to staying a step ahead.

●      AI is the hot topic, but not all of the excitement translates into practical use cases. A lot of experienced teams are taking a step back to sort out what’s real and useful versus what’s marketing fluff. They’re asking tough questions about measurable impacts, focusing on AI applications that add value today instead of getting caught up in futuristic possibilities that the organization may not even be ready to handle.

●      With data moving in and out of systems, countries, and even cloud environments, data protection is more critical than ever. Security leaders are now treating data like an asset, asking not only where sensitive information is stored but also how it moves within and outside the organization. It’s about having a complete data inventory, knowing classification levels, and ensuring protection policies are in place wherever that data goes.

●      Vulnerability management has stepped up a notch with Continuous Threat Exposure Management (CTEM). Rather than tackling vulnerabilities as isolated issues, CTEM helps teams get visibility across both internal and external attack surfaces, allowing them to prioritize based on real exposure. It’s a shift toward proactive threat management, merging traditional vulnerability insights with a broader attack surface view to help teams handle risks more strategically.

Cybersecurity is no longer just about reacting to incidents—it’s about staying ahead of them. As Enoch has indicated, building resilience starts with a clear understanding of your environment, from assets and vulnerabilities to the people and processes behind them. By prioritizing visibility and adopting proactive strategies, organizations can transform their security posture from reactive to strategic.

If you’re ready to take the next step in proactive cybersecurity, JupiterOne offers the tools and insights you need to uncover risks, prioritize actions, and secure your most critical assets. Learn more about how JupiterOne can help you build a resilient, future-ready cybersecurity program.

 

 

- By Chuck Brooks (President, Brooks Consulting International)

Original link of post is here

Read more…

Cybersecurity is a constantly changing battleground, where threats are evolving more rapidly than ever before. For Enoch Long, Field CISO at JupiterOne, navigating this complex environment requires not only technical expertise, but also a calm and strategic mindset which he has developed over his two decades spent in the field. From leading SOC teams during high-pressure incidents to managing enterprise security for Fortune 500 companies, Enoch has seen firsthand how the threat landscape has evolved over time. In Part 1 of this two part series, Enoch shares his experiences handling major threats, the challenge of staying ahead in the SOC, and how modern-day adversaries have transformed the way security operations teams must respond.

 

Can you describe one of the biggest threats you’ve personally dealt with during your time in the SOC, and how you approached handling it?

One of the biggest threats I’ve encountered in my time in the SOC was not necessarily a headline-grabbing event, but rather a smaller incident that had a major impact on the business and significant visibility within the leadership chain. In many cases, we don’t immediately grasp the full scale or impact of an incident. Often, it's only through the process of collecting data, analyzing information, and providing regular updates that we begin to understand just how far-reaching the effects may be.

In this case, as more data emerged, it became clear that this seemingly minor issue had larger implications, requiring extensive internal communication and coordinated response efforts across teams. This experience really drove home the fact that the “biggest” threats aren’t always the flashiest. Sometimes it’s quieter, underlying issues that end up testing a team’s resilience and response agility. It’s a reminder that visibility, strong reporting, and a proactive mindset are crucial—because in this line of work, anything can become a serious challenge.

As a SOC lead, it’s essential to stay composed and level-headed, no matter the situation. My approach is all about balancing emotional intelligence with a visible presence, clear communication, and data-driven updates. This combination ensures we’re not only responding to the incident effectively but also maintaining the trust and confidence of both the team and leadership throughout the process. This approach also helps the team stay focused and confident, and it sets the tone for a controlled, organized response. During an incident, I ensure that everyone, from defenders and operators actively mitigating the threat to IT teams providing support, can reach me quickly. Whether on video or in person, this accessibility allows me to offer guidance, answer questions, and address immediate needs directly. I prioritize clear, fact-based updates, focusing on what we know, the steps we’re taking, and practical next steps for the team. I keep executive stakeholders, like the CIO and GC, informed with regular updates, laying out the incident’s status, our response plan, and what they can expect moving forward.

 

Looking back at the threat landscape from the past compared to today, what are the three biggest changes that stand out to you? How have these changes impacted the way the SOC operates and responds to threats?

From my perspective as someone who’s spent over 20 years in security operations, these changes represent the types of threats we focused on in the past.

●     Back in the day, we focused on sophisticated attacks from nation-state actors and the occasional insider threat. Ransomware wasn’t a primary concern, nor were we overly worried about “script kiddies” or loosely organized hacker groups. Now, ransomware gangs have transformed into well-organized operations, often behaving more like businesses than lone hackers. They’re targeting companies indiscriminately, and their methods have evolved to impact organizations at every level.

●     Today, the landscape is filled with a much broader range of threat actors. Now, we have to consider a spectrum that includes lone wolf hackers, hacktivists, and politically motivated groups alongside nation-states. This diversity has added more complexity to our defense strategies, as each type of actor has different goals, methods, and levels of sophistication.

●     Insider threats used to primarily involve accidental exposures or compromises of individuals who were physically present within the organization. We now deal with sophisticated insider threats that can be linked to external cybercriminals, like employees who unintentionally open the door to attackers through phishing or other social engineering tactics.

All of these changes mean that SOCs must account for a wider array of tactics and motives. Threat response now requires a more nuanced understanding of the context behind each incident. For example, attacks can be triggered by something as simple as a political statement from leadership. In one case, I read about how a two-person hacker team launched an attack solely to embarrass the company over a public affiliation with a political figure. This level of targeted retaliation requires the SOC to consider potential reputational triggers and how they could motivate actors to disrupt operations.

The SOC has to expand its approach, adopting proactive intelligence gathering to identify emerging threats before they escalate. Response strategies have to become more dynamic, relying on flexible playbooks that allow for rapid adaptation to unexpected motives and sophisticated attack methods.

As cyber threats grow more complex, the role of visibility and intelligence has never been more critical. In Part 2, Enoch dives into actionable strategies for security leaders to protect their organizations in this ever-changing landscape.

 

 

About Enoch: Enoch Long serves as JupiterOne’s Field CISO. In this capacity, Mr. Long has global responsibility for providing executive leadership, domain expertise, strategic, technical, operational, and security guidance for the Global GTM organization. Before joining JupiterOne, Enoch held key strategic leadership positions at Regeneron Pharmaceuticals, Alexion, Splunk, and Northrop Grumman. He also served key cyber engineering and advisory roles supporting the Dept of Defense and the intelligence community. Enoch earned his MBA from Georgetown University and a Bachelor of Science in Computer Science from Temple University. Enoch is based in Washington, DC.

 

- By Chuck Brooks (President, Brooks Consulting International)

Original link of post is here

Read more…

Spooky Cyber Stats And Trends In Time For Halloween

Chuck Brooks

FORBES Contributor

Global Thought Leader in Cybersecurity and Emerging Tech

Spooky Cyber Stats and Trends in Time for Halloween

Every year the stats on cyber-attacks seem to get spookier! As we finish October’s Cybersecurity Awareness month, it is a suitable time to review some of the key statistics and trends that can haunt us and help us meet the cybersecurity challenges of the evolving digital ecosystem. There are so many frightening cyber stats that I had room for only a few categories, but they are important ones to know.

 

 

The healthcare industry is a continuing prime target for criminal hackers. Consider these realities:

Two-thirds of healthcare organizations hit by ransomware in past year: survey

Two-thirds of healthcare organizations hit by ransomware in past year: survey | Healthcare Dive

“Nearly 40% of healthcare organizations reported it took more than a month to recover after an attack, according to the survey by cybersecurity firm Sophos. The healthcare sector’s increased burden of ransomware attacks comes as other industries face fewer incidents, according to the survey by cybersecurity firm Sophos. Recovery from ransomware attacks is taking longer  — sometimes more than a month  —  as attacks increase against the healthcare industry, About two-thirds of respondents said they were hit by a ransomware attack in the past year, up from 60% the year prior. Just 34% said they were hit by a ransomware attack in Sophos’ 2021 report.”

14M patients affected by healthcare data breaches in 2024

Healthcare organizations remain top targets for cyberthreat actors, according to a SonicWall threat brief that explored trends in healthcare data breaches.14M patients affected by healthcare data breaches in 2024 | TechTarget

“At least 14 million patients in the U.S. have been affected by healthcare data breaches in 2024 so far, a threat brief by cybersecurity company SonicWall revealed. What's more, 91% of the healthcare data breaches that SonicWall researchers analyzed involved ransomware, highlighting the continued targeting of the U.S. healthcare sector. SonicWall based its report on data from SonicWall Capture Labs, which uses machine learning to collect and retain data about attack vectors and threats in real time. The researchers concluded that healthcare remains a top target for exploitation by cyberthreat actors due to its data-driven nature and reliance on sensitive data.”

Change Healthcare data breach officially affects 100M

Change Healthcare data breach officially affects 100M | Healthcare Dive

“The massive Change Healthcare cyberattack could have compromised data from 100 million people — the largest healthcare data breach ever reported to federal regulators. Responding to the cyberattack has cost UnitedHealth too. Earlier this month, the healthcare giant said it has recorded $2.5 billion in total impacts from the attack through the nine months ended Sept. 30, including $1.7 billion in direct response costs.”

CB Take: The cyber-attack on Change Healthcare is certainly alarming and is another wake-up call. It is not surprising that hackers focus on healthcare. As computers and other devices used for medical care become more networked and linked, the digital world of health management, clinics, hospitals, and patients has become more vulnerable. A more comprehensive approach to healthcare cybersecurity should include better risk management, more investments in cybersecurity to protect systems, and good cyber hygiene.

Dmitry Raidman, CTO & Co-founder, of the company Cybeats offers excellent advice:  “Given its critical nature and unique vulnerabilities, the healthcare sector must adopt a multi-layered approach to combat the rise in ransomware attacks. This means strengthening security through continuous network segmentation, deploying endpoint detection, and enhancing user training, as healthcare systems are only as resilient as their most vulnerable points. A proactive, risk-based approach that includes frequent vulnerability assessments and comprehensive data backups is essential to ensure both operational continuity and patient safety. Collaboration with industry stakeholders and sharing threat intelligence can also provide the healthcare sector with a stronger front against these growing cyber threats."

 

Ransomware, especially popular for extorting healthcare, has also been deployed across industries and significantly elevated incidents.

Ransomware incidents rose 73% globally in 2023, report shows

Ransomware incidents rose 73% globally in 2023, report shows | StateScoop

“Ransomware attacks rose 73% between 2022 and 2023, according a report published Thursday by the Ransomware Task Force, part of the Institute for Security Technology, a Washington D.C. think tank. The annual report, which includes a map of global ransomware incidents and identifies ransomware trends based on reporting of double-extortion attacks — in which cybercriminals demand ransom payments from victims to keep their data private and off the dark web — found there were 6,670 ransomware incidents in 2023, with more than 2,800 incidents just in the United States.”

Ransomware Will Strike Every 2 Seconds By 2031

https://cybersecurityventures.com/ransomware-will-strike-every-2-seconds-by-2031/

“Cybersecurity Ventures predicts that by 2031, ransomware will cost victims $265 billion annually, and it will attack a business, consumer, or device every 2 seconds. Chief information security officers and cybersecurity teams are devoting more time than ever protecting against ransomware. Ransomware gangs are, in almost every case, financially motivated. These cybercriminals will stop at nothing to be paid — whether this means locking up your personal information or grinding the operations of a Fortune 500 company to a halt.”

The 2023 RTF Global Ransomware Incident Map

Institute for Security and Technology2023 RTF Global Ransomware Incident Map: Attacks Increase by 73%, Big Game Hunting Appears to Surge - Institute for Security and Technology

“The 2023 RTF Global Ransomware Incident Map presents the task force’s annual map of ransomware incidents and identifies ransomware trends worldwide. In 2023, the data showed 6,670 ransomware incidents, a 73% year-over-year increase from 2022. This increase is consistent with other recently published findings, which demonstrate an overall increase in ransomware activity and illicit cryptocurrency payments. For example, the FBI Internet Crime Center (IC3) reported over 2,825 complaints from the American public alone. According to Chainalysis, ransomware payments broke a new record, totaling over $1 billion in 2023.”

CB Take: Due to the substantial number of easy targets, ransomware will continue to be a devastating threat. A world that is becoming more hyper-connected affects every part of our lives. Maintaining and safeguarding data is an important security requirement for all businesses and organizations.  Knowledge of and skill with ransomware can assist in solving numerous safety issues. Cyber hygiene is particularly important as strong passwords, multifactor authentication, and phishing awareness training make a company less of a target. New cybersecurity technologies, tools, and standards can help slow down the staggering rise in ransomware attacks. Actively protecting systems, networks, and devices are essential to make them more resilient

While the healthcare, financial, and educational industries are always prime targets for breaches, no industry or sector is immune. One area to watch is the legal community as they possess valuable and confidential data of clients.

Over one million law firm passwords found on dark web

Over one million law firm passwords found on dark web - Legal Cheek

“New research has uncovered more than a million passwords linked to the IT systems of UK law firms on the dark web. Researchers found that nearly three-quarters (72.2%) of the 5,140 law firms audited had employee username and password combinations that appeared in lists circulating in the darkest corners of the internet. A total of 1,001,313 passwords were discovered, averaging 195 password combinations per firm or 1.27 per individual staff member. Atlas Cloud, the IT outfit that conducted the research, warns that cybercriminals could use this information to infiltrate a firm’s IT systems, potentially gaining access to valuable data or intercepting transactions.

Last autumn, before its merger with Shearman, Allen & Overy confirmed that it had “experienced a data incident affecting a small number of storage servers” after reportedly being targeted by a hacking group with ransomware. Similarly, in 2017, Legal Cheek reported that hackers had taken DLA Piper‘s computer systems and phones offline using malicious software.”

 

Outside Cybersecurity Subject Matter Expertise Needed!

Nearly 9 in 10 Companies Hiring Outside Cybersecurity Advisers

“87% of companies bring in outside cybersecurity advisers, 72% list cybersecurity as desired board skill

Companies are dramatically increasing their use of external cybersecurity advisers, with 87% now engaging outside experts compared to 43% in 2023, according to new research from EY’s Center for Board Matters. The surge comes as cyber threats grow more sophisticated, with FBI data showing a 10% increase in complaints and a 22% rise in losses to $12.5 billion annually.”

CB Take: Law firms should think about getting help from subject matter experts (SMEs) who know about the newest technologies and compliance/governance rules in the cyber ecosystem. This is because new threats and technology problems pose a higher risk to their clients' money and reputation. SMEs for the legal community are especially important because the cyber danger comes from both criminal organizations and countries that are at odds with each other. Because of a change in the cyber risk environment, more money is being spent on threat awareness and sharing information, which is important for businesses to stay open. SMEs are a particularly important part of figuring out the danger landscape and finding weaknesses.

According to Enoch Long, Field CISO for Jupiter One  “Cybersecurity SMEs can build a risk management cybersecurity strategy for law firms. The framework can also be utilized for compliance, (GDPR expertise), and other regulatory issues related to policy and industry specializations. An SME can help bolster the internal IT security team of a law firm, recommending potential technological solutions and protocols depending on budgets and needs. As the threats and cost of breaches continue to escalate in the legal profession landscape, getting outside help is a sensible option.

 

The Impact of Artificial Intelligence

This is a particularly frightening statistic, as identity fraud is now being significantly enabled by generative artificial intelligence tools:

Deepfake Fraud Doubles Down: 49% of Businesses Now Hit by Audio and Video Scams, Regula’s Survey Reveals

Deepfake Fraud Doubles Down: 49% of Businesses Now Hit by Audio and Video Scams, Regula’s Survey Reveals

“In 2024, every second business globally reported incidents of deepfake fraud, revealing a growing trend in AI-related crimes over the past two years. Meanwhile, fraud involving fake or modified documents now outpaces AI-generated scams. These are the first findings from a new survey* “The Deepfake Trends 2024” commissioned by Regula, a global developer of forensic devices and identity verification solutions.

Regula’s survey data shows a significant rise in the prevalence of video deepfakes, with a 20% increase in companies reporting incidents compared to 2022**. While 29% of fraud decision-makers across Australia, France, Germany, Mexico, Turkey, UAE, UK, and the USA reported encountering video deepfake fraud in 2022, this year’s data — covering the USA, UAE, Mexico, Singapore, and Germany — shows this figure has surged to 49%. This sharp increase across the revised cohort underscores the growing challenge of video deepfakes and their continued threat to businesses. Audio deepfakes are also on the rise, with a 12% increase compared to 2022 survey data.”

 

AI impersonation emerges as top cyber threat in new report

AI impersonation emerges as top cyber threat in new report

“New research from Teleport reveals that AI impersonation now ranks as the most challenging cyber-attack vector for security experts to defend against, as indicated by 52% of senior leaders surveyed. The 2024 State of Infrastructure Access Security Report issued by Teleport highlights the growing complexity of social engineering techniques, with AI and deepfakes substantially enhancing the effectiveness of phishing scams.

CB Take: Identity theft is a logical target of hackers using AI tools. We have been anticipating artificial intelligence's arrival and AI is becoming mainstream. Machine learning and natural language processing, which are already commonplace in our daily lives, contributed to the creation of AI. Criminal hackers are automating more of their phishing attacks with artificial intelligence and exponentially reaching many more businesses, agencies, and consumers. Generative AI makes it easy for anyone to become a hacker. Advances in technology have rendered phishing more accessible to cybercriminals. They have easy access to digital images for creating deep fake, and social engineering data to make it more viable. Hackers often combine spear-phishing, a technique they use to target executives at companies or organizations, with ransomware. Throughout its two-decade history, ransomware has grown in popularity because it makes it simpler for hackers to collect money via cryptocurrency.

 

Emerging Technologies Are Impacting Cybersecurity

Inside Cyber by Chuck Brooks: Reviewed - Irish Tech News

https://irishtechnews.ie/inside-cyber-by-chuck-brooks-reviewed/

Inside Cyber, by Chuck Brooks, takes complex ideas about emerging technologies and provides a simplistic explanation of the technology. Brooks takes technology such as quantum computing, 5G, and Artificial Intelligence, and explains the positives and negatives of these new technologies.

We live in a world that seems like it is changing by the day. Keeping up with the times and understanding all of the innovative technology around us can seem like an impossible task, especially as it affects our daily lives. Just a few years ago, artificial intelligence was considered to exist only in sci-fi movies. Cellular speeds are coming close to rivaling Wi-Fi as global satellite communication nears. Countries are scrambling as they prepare for the looming threat of cyber-attacks aided by AI. These modern technologies will forever change the way the world operates. This book dives into what may seem like an existential threat, providing necessary steps to remain safe and secure.”

 

Generative AI in Security: Risks and Mitigation Strategies

Generative AI in Security: Risks and Mitigation Strategies

“Security teams must balance the risks and benefits of AI. Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems. Pain points security teams should be aware of around AI include:

·         The integration of new technology or design decisions introduces vulnerabilities.

·         Users must be trained to adapt to new AI capabilities.

·         Sensitive data access and processing with AI systems creates new risks.

·         Transparency and control must be established and maintained throughout the AI’s lifecycle.

·         The AI supply chain can introduce vulnerable or malicious code.

·         The absence of established compliance standards and the rapid evolution of best practices make it unclear how to secure AI effectively.

·         Leaders must establish a trusted pathway to generative AI-integrated applications from the top down.

·         AI introduces unique and poorly understood challenges, such as hallucinations.

·         The ROI of AI has not yet been proven in the real world.”

CB Take: We are currently in a disruptive era of technological advancement labeled The Fourth Industrial Era. It is characterized by exponential connectivity of people and devices and involves the meshing of physical, digital, and biological worlds. This includes a multitude of innovative technologies (among others) such as artificial intelligence (AI) & machine learning (ML), robotics, sensors, 5G nanotechnologies, biotech, blockchain, and quantum.

Artificial intelligence (AI) is one to watch as it is a highly intriguing subset of emerging technologies. Science fiction no longer exists in the realm of AI. These days, AI can comprehend, diagnose, and resolve issues from organized and unstructured data, sometimes even without special programming. Although AI can be a useful instrument for cyber defense, threat actors may also take advantage. Malicious hackers are using AI to find and exploit threat detection model weaknesses. Malicious malware can also be distributed using artificial intelligence and machine intelligence to automate target selection, inspect compromised environments before launching further assault stages, and prevent detection.

Quantum technology, especially quantum computing, has immense potential that could change many fields, such as communications, real-time data analytics, biotech, genetic sequencing, and materials science. With its effects on artificial intelligence and the Metaverse, quantum computing will also speed us into the future. But with the good, we need to plan for and stop the bad, especially when it comes to data, which is the lifeblood of industry and trade. Starting right now, it is important to go down a road toward quantum-proof cybersecurity. For more on emerging tech, please also check out my recent FORBES article Artificial Intelligence, Quantum Computing, and Space are 3 Tech areas to Watch in 2024

As an additional thought, avoid hackers' tricks by being cyber aware and practicing good cyber hygiene this Halloween and beyond. Be prepared and vigilant!

###

 

Keep Your Manufacturing Operations Safe with This Cybersecurity Checklist

From zero trust to security by design, this checklist will help you customize a strategy that fits your business.

by Chuck Brooks, President and Consultant, Brooks Consulting International

Keep Your Manufacturing Operations Safe with This Cybersecurity Checklist

 

 

 

The manufacturing sector is a prime target for hackers. These organizations tend to lack expertise and investment in cybersecurity, carry vulnerabilities in their supply chains, favor productivity over security, and maintain a low level of cyber preparedness compared to other industry sectors, making them not just a prime target but also ripe for breaching.

The data tells this story well–Statista found that in 2023 there were 259 cases of data compromise in the manufacturing and utilities industry in the United States and that the cases registered in 2022 impacted 23.9 million people. Furthermore, according to the World Economic Forum (WEF), cyber-attacks on the manufacturing industry accounted for 25.7% of all attacks, with ransomware involved in 71% of these incidents. As a result of attacks costing 125% more each year, cyber risk is now seen as the third biggest outside risk to manufacturers.

The WEF also noted that cyber-attacks on the industry were caused by long production cycles, the large amounts of investment capital needed to redesign production lines, and the lack of cyber-security resilience. The WEF provided an example of a hacker attacking a German battery company’s IT system in February 2024, which caused production to stop at five plants for more than two weeks.

Last year, manufacturing giant Clorox experienced a cyber-attack that ended up costing the company $356 million, in addition to a big drop in their stock price. Also last year, the manufacturing company Brunswick Corporation suffered a cyber-attack that disrupted operations for 9 days and cost the organization around $85 million. While Clorox and Brunswick are large companies, many smaller and medium-sized manufacturers experienced similar fates.

The rise in breaches is not surprising, given the pace of industrial digitization. Already, most physical security systems are linked to IT networks and changing cloud infrastructure and, as industrial hardware and software become more integrated and more IT sensors are connected to the internet, hackers are finding new ways to get into all kinds of digital systems.

 

A Manufacturing Cybersecurity Checklist

To protect themselves from this ever-expanding field of threats, manufacturers must adopt a robust cybersecurity plan that fits within their production and security environments. There are many approaches for a risk management framework and no one-size-fits-all solution, so this plan development takes some work.

To help, I have composed a checklist of major concerns and considerations to help you on your way:

  • Identify, define, and monitor the company’s threat environment. Use an established manufacturing cybersecurity risk management framework that draws on industry experience and best practices, such as those provided by NIST
  • Conduct a comprehensive Zero Trust vulnerability assessment of all devices (and people) connected to the network
  • Evaluate and set policies with all connected to manufacturing supply chains
  • Make sure security architectures (cloud, hybrid cloud, are fully updated and monitored)
  • Update and patch vulnerabilities to both networks and devices
  • Control and management of access and identity, including biometrics (Zero Trust goals). Use strong authentication and perhaps biometrics for access control and establish privileged access for device controls and applications
  • Secure framework layers via firewalls, antivirus software, payload, network, and any endpoints
  • Compartmentalize any connected IoT devices, and stored data on the network to minimize attack surfaces. Add security software, containers, and devices to “digitally fence” networks and devices. Consider network isolation to guard against insider threats, botnets, and malware
  • Use the latest real-time horizon and threat scanning data or shared intelligence
  • Use encryption (should be quantum resistant, or if possible, quantum-proof)
  • Continually audit and use real-time analytics (including predictive analytics). Consider using AI/ML-enabled forensics (network traffic analysis, payload analysis, and endpoint behavior analysis), data analytics, and diagnostics
  • Back up all sensitive data from potential breaches or ransomware attacks
  • Develop an incident response and resilience plan that can be practiced and instituted
  • Implement security awareness training for all employees

Note: NIST has more detailed technical frameworks available for companies in the sector to use, especially for supply chain security.

 

Zero Trust and Security By Design

The risk management checklist can operate under the security framework themes of both Zero Trust and Security by Design.

Trust frameworks and designs should be used by manufacturing companies to protect their gaps better. In a zero-trust architecture, everything in the network is seen as potentially hostile, so trust is not based on where the network is located, and devices, users, and apps trying to get into the network must be authenticated and given permission.

A Zero Trust model is based on achieving and maintaining the highest level of segmentation and fortification possible. This way, the chances of a breach happening are kept to a minimum, and the damage from a breach is kept to a minimum by stopping lateral movement and escalation.

To keep up with emerging cyberrisks, OT and IT networks need to be planned, updated, and made stronger. “Security By Design,” is a strategy that builds security up front in the planning. This approach for manufacturing can help create flexible systems with practical cyber-fusion to adapt to new threats. Security By Design can also find organizational and system dependencies early in the process to eliminate known risks. As new manufacturing plants expand, and or are created, it makes sense to replace legacy systems with new fortified Security By Design architectures.

 

About the Author

Chuck Brooks, President and Consultant, Brooks Consulting International

Chuck Brooks serves as President and Consultant of Brooks Consulting International. Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program, where he teaches graduate courses on risk management, homeland security, and cybersecurity. Chuck has received numerous global accolades for his work and promotion of cybersecurity. Recently, he was named the top cybersecurity expert to follow on social media, and also as one top cybersecurity leaders for 2024. He has also been named "Cybersecurity Person of the Year" by Cyber Express, Cybersecurity Marketer of the Year, and a "Top 5 Tech Person to Follow" by LinkedIn” where he has 120,000 followers on his profile. Chuck has keynoted dozens of global conferences and written over 350 articles relating to technologies and cybersecurity. As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, The US Embassy to the Holy See and the Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech. He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for DHS CISA focused on security space systems. In his career, Chuck has received presidential appointments for executive service by two U.S. presidents and served as the first Director of Legislative Affairs at the DHS Science & Technology Directorate. He served a decade on the Hill for the late Senator Arlen Specter on Capitol Hill on tech and security issues. Chuck has also served in executive roles for companies such as General Dynamics, Rapiscan, and Xerox. Chuck has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.

###

Transformative Power: Artificial Intelligence Reshapes Global Society

By Chuck Brooks, Skytop Contributor

Transformative Power: Artificial Intelligence Reshapes Global Society — SKYTOP

 

 

 

The coming years will bring about a digital transformation or convergence that will significantly alter the way we communicate, work, and live. We are entering a new era of dynamic, networked technologies that combine engineering, computational algorithms, and culture on a global scale. Machine learning and artificial intelligence will play a crucial role in this transformation.

The digital ecosystem’s networked computer components, enabled by AI and machine learning, will create a plethora of new opportunities and significantly impact nearly all types of organizations. These combined AI and computer technology capabilities may open up new horizons in various fields, including big data, digital security, robotics, genetic engineering, augmented reality, and quantum computing.

 

What is Artificial Intelligence?

Gartner defines artificial intelligence as “technology that appears to emulate human performance typically by learning, coming to its conclusions, appearing to understand complex content, engaging in natural dialogs with people, enhancing human cognitive performance, or replacing people in the execution of non-routine tasks.”

With the intention of outpacing human speed and constraints, artificial intelligence (AI) systems simulate human characteristics and computational abilities in a computer. Machine learning and natural language processing—two technologies that are now extensively utilized in our daily lives—have helped develop artificial intelligence. With the help of organized and unstructured data, modern AI can comprehend, identify issues, and provide solutions—in certain cases even without the need for professional programming.

Artificial intelligence has the power to fundamentally alter both the economy and cognitive capacities. According to McKinsey & Company, automating knowledge work with intelligent software systems that can carry out knowledge work tasks from unstructured commands might have an economic impact of $5–$7 trillion by 2025. These technologies provide a plethora of fascinating opportunities. AI is “the most important technology that anybody on the planet is working on today,” according to Dave Choplin, chief envisioning officer of Microsoft UK, and research and development spending is a good indicator of future technical advancements. Financial giant Goldman Sachs estimates that by 2025, global investments in AI might total $200 billion.

Computers with artificial intelligence capabilities are made to automate tasks like learning, planning, problem-solving, and speech recognition. By leveraging data to prioritize and take action, these technologies can aid in more effective decision-making, particularly in larger networks with more users and elements. AI-enabled computers are now being developed for a number of fundamental tasks, such as speech recognition, learning and planning, and problem-solving. AI will affect a wide range of enterprises by 2023. According to Gartner, 40% of infrastructure and operations teams in large AI companies are proficient in creating algorithms that aid in problem-solving. AI-augmented automation is already being used by several businesses to increase efficiency.

 

AI in Medicine

Artificial intelligence is already transforming the healthcare industry by being used to discover novel drugs and evaluate mixtures of substances and procedures that will improve human health and combat illnesses and pandemics. AI was essential in helping medical professionals respond to the pandemic and in the development of the COVID-19 vaccines.

Predictive analytics is one of the most fascinating applications of AI in healthcare. By using past data on a patient’s ailments and treatments, predictive analytics makes predictions about their future depending on their current health or symptoms. This facilitates the decision-making process for medical professionals when treating individuals with chronic illnesses or recurrent medical conditions. For scientific and medical research, the computers developed by Google’s DeepMind AI division—which recently demonstrated the ability to predict millions of protein configurations—would be immensely beneficial.

AI will grow more skilled at diagnosing conditions, creating individualized treatment plans, and forecasting medical results as it develops. Medical professionals will be able to treat patients more expertly in the office, at charitable or religious institutions, and at home with this expertise at their disposal.

 

Interface Between Human and Computer

The human/computer interface is a fascinating field of AI research that has the potential to improve human memory and cognitive function. Significant scientific progress has already been made in the field of brain/computer connection. Brain mapping and neuromorphic chips are two examples of this. The development of assistive technology that uses implantable sensors to recognize electrical impulses from the brain and use those signals to power external devices has led to the creation of brain-computer interfaces.

It has even been demonstrated that a brain-computer interface is capable of reading thoughts. To detect electrical activity, an electrode plate known as an ECOG is placed in direct contact with the surface of the brain. Professor Brian Brown of the Icahn School of Medicine at Mount Sinai asserts that patients who received electroconvulsive treatment (ECOG) and were rendered immobile are now able to interact with others through text translation of their ideas.

The promise of human-computer interfaces was summed up in a Frontiers in Science publication that brought together scientists, academics, and organizations. A human brain-machine interface system powered by neural nanorobotics has the potential to significantly improve human intellect and learning capacities, enabling people to conclude that “We can imagine the possibilities of what may come next with the human brain-machine interface.” It may also set new standards for immersive virtual and augmented reality, enabling users to express themselves more fully and richly and to have more profound experiences. All of this is made possible by the instantaneous access to all of the human information stored in the cloud. These developments may help mankind adapt to new difficulties facing the species since they make it possible to leverage evolving artificial intelligence systems as human-augmentation technologies.

Neuromorphic computing is a technique that uses artificial intelligence to facilitate human/computer contact; it may help improve human brain functions, memories, and skills. At a seminar on the future of the globe in 2045, Google futurist Ray Kurzweil declared that processing power will, on average, quadruple every two years and that humans will “expand the scope of our intelligence a billion-fold.”

 

Connections and the Client’s Experience

AI is also changing the ways that people communicate in our culture. Businesses are already using robotic processing automation (RPA), a type of artificial intelligence, to cut down on manual labor and assist in getting rid of human error for routine tasks. By employing technology to manage monotonous, repetitive tasks, RPA improves service operations by freeing up human expertise for more complicated, higher-level problems. It is scalable and can be modified to satisfy performance requirements. In the private sector, RPA is widely utilized for many different purposes, such as contact centers, medical coding, insurance enrollment and invoicing, and claims processing.

Chatbots, voice assistants, and other messaging apps that leverage conversational AI to fully automate customer support and provide round-the-clock assistance can be advantageous for a variety of sectors.

###

 

Future Medicine: Physics, Biology, And AI Will Transform Human Health

Co-written by Chuck Brooks and Dr. Thomas A. Cellucci, MBA

Future Medicine: Physics, Biology, And AI Will Transform Human Health

 

 

 

Verticals that will be most impacted by innovative developments in technology and science are the disciplines of medicine, biotechnology, and health. Those industry verticals will see a profound growth of technological innovation in the near future.

Twenty years ago, Craig Venter and Daniel Cohen remarked, “If the 20th century was the century of physics, the 21st century will be the century of biology.” Since then, there have been some amazing advances in the fields of biotechnology and bioscience, with the promise of even more astounding breakthroughs to come. Over the past decade, we have seen significant strides in artificial intelligence, with radical long-term implications for every human endeavor. And now the convergence of the fields of physics, biology, and AI promises a far greater impact on humanity than any one of these fields alone. Even though a path to successfully integrating these fields exists, it is neither easy nor clear cut—but if done correctly, will revolutionize medicine and human health.

The Human Genome Project was just the beginning of the journey to find treatments for human diseases. Our genes are merely a codebook for making different proteins. These proteins are the fundamental building blocks for our cell structures and are responsible for their core functions. Understanding the biological processes behind a disease means identifying the specific protein or proteins whose undesirable effects in the body cause that disease. To treat the disease, a therapeutic agent is needed. This is usually given as a pill or an injection and contains active drug molecules that bind to copies of a disease-associated protein and change how they work.

 

4 key steps associated with finding treatments for human disease are as follows:

1) Figure out which proteins are implicated in the disease

2) Ensure that we can produce those proteins in a form conducive to testing and determine their structures either experimentally or through computer models

3) Find binders to those proteins (these binders are the drug candidates, and this step is the most important)

4) Test those binders first in vitro, then advance the most promising ones to animal tests, and finally select the best ones for clinical trials in humans

 

Step 1: Identifying Target Proteins

Top of Form

Bottom of Form

There has been tremendous amount of work in labs worldwide over the last three decades to identify the proteins implicated in various diseases. This work will continue into the near future, and AI-driven knowledge graphs can complement and speed up the work of biologists.

To map and characterize all the proteins encoded and produced by the human genome, scientists have embarked on the Human Proteome Project (HPP). So far, HPP has characterized 18,397 out of the estimated 19,778 proteins that make up the human body.[1] However, it is estimated that only 10,248 play roles in human disease.[2] This subset of proteins is what scientists call the “druggable” proteome.

 

Step 2: Isolating Target Proteins & Determining Their Structure

To verify whether a drug candidate works, it must be tested against a target protein implicated in a disease. Isolating target proteins is important to ensure target proteins are available for testing against drug candidates and for determining their three-dimensional structures. Some proteins are easy to isolate and purify; others can only be produced in conjunction with their associated cellular machinery. Scientists have made tremendous strides in determining the three-dimensional structures of these target proteins through x-ray crystallography and NMR. These structures are freely available for all to use in databases such as the Protein Data Bank (PDB). Now, AI is helping figure out the structures of those proteins for which we have not yet experimentally validated structures.

 

Step 3: Finding Drug Candidates

The Most Crucial Step

Once the target protein is properly characterized, then begins the truly daunting challenge of searching for drug-like molecules that bind to the protein and effectively intervene in the disease process. All of the work in steps 1 and 2 is for naught if we cannot find drug candidates that bind to the target proteins. So-called small-molecule drugs are the mainstay of modern medicine. Most pharmaceuticals are small molecules. Not only can these low-molecular-weight organic molecules bind to disease-associated proteins outside of cells, but they can also pass through cell membranes to bind to target proteins inside cells. Typically administered orally as shelf-stable drugs, small-molecule pharmaceuticals can be also manufactured and distributed efficiently.

A Challenging Process

The process of finding small-molecule drug candidates primarily relies on trial and error. The isolated and purified protein is tested against a collection of previously synthesized compounds stored in the lab to check for signs of a chemical reaction in the hope of finding a binder. But there is a fundamentally crippling limitation to this approach. Over the past 150 years, humanity has made fewer than 10 million distinct drug-like small-molecule structures, or chemotypes. Yet estimates of the total number of unique drug-like small-molecule chemotypes possible under the rules of chemistry range from a decillion (that is, 1033, or a one followed by 33 zeroes) to a novemdecillion (1060, or a one followed by 60 zeroes).

Drug-Like Molecules

Even if it were possible to magically accelerate the creation of brand-new chemical structures to one per second, it would take more than three septillion (that is, three plus 25 zeros) years to create a decillion chemotypes. That is well over two trillion times the currently estimated age of the universe! In other words, figuring out which small molecules would make viable drugs through brute-force synthesis and testing is an utterly impossible task.

Some companies have turned to AI as a substitute for trial-and-error experimentation. But can AI really help in the field of small-molecule drug discovery? AI only produces solutions similar to the ones for which it has seen examples in the data used to train it. Expecting AI to find drug candidates for which there is no pre-existing data is even more unreasonable than expecting Chat GPT trained exclusively on massive amounts of English webpage text to suddenly construct sentences in perfect Russian. AI will find drug-like molecules similar to the fewer than 10 million chemotypes for which experimental data already exists, but it cannot explore the other decillion+ possibilities. AI trained on existing data cannot unlock the secrets of a decillion unexamined compounds.

What if pharmaceutical companies could design never-before-made molecules on the computer and figure out if they will bind to a target protein without having to actually make the molecule, isolate the protein, and run experiments? We already rely on such technologies every day in other areas. For example, no one erects reduced-scale models of buildings or bridges to see if they will stand before actually constructing them.

But modeling the quantum physics of how a drug molecule binds to a protein in water is a forbiddingly complex challenge. Attempting to model the interaction between a protein with thousands of atoms and a drug-like molecule with hundreds of atoms quickly becomes intractable, exceeding the computing power of even the most advanced computing clouds. To tackle this extreme level of complexity, most simulation-based drug discovery technology companies found that drastic compromises were necessary. These compromises involved crude approximations of physics and computational short cuts. And invariably, these compromises led to gross inaccuracies when modeling molecular interactions.

Are both AI-based and physics-based approaches dead ends? Not quite. Various companies are still trying both approaches. However, reaching sufficient accuracy requires significant fundamental advances in modeling the physics of protein-drug interactions. Pfizer’s former Senior VP of R&D Strategy, Robert Karr, points out that one company, Verseon, has built a seamless platform incorporating propriety advances in physics and AI. In his words, “Verseon's disruptive platform changes how drugs can be discovered and developed, and the company is poised to make a dramatic impact on modern medicine.” After examining the company’s drug-discovery platform, Nobel Laureate Hartmut Michel said, “The fundamental advancements Verseon has made in quantum mechanical modeling of protein-drug interactions are extremely impressive.”

Verseon has built technology to design never-before-made novel drug molecules on the computer. The company’s advances in quantum-physics modeling, which it calls Deep Quantum Modeling™ (DQM™), are sufficiently accurate to determine whether its computationally designed new drug-like molecules will bind to a target protein before making and testing them in the lab. And AI trained on data from these new molecules identified by DQM will help generate more variants from which to pick the best ones for clinical trials.

 

Step 4: In Vitro, Preclinical, and Clinical Testing

All new drug candidates must still be taken through preclinical and clinical trials to fully establish their safety and effectiveness. This process typically takes years to complete, and process improvements that speed promising new treatments to market would be a welcome boon. AI can help with regulatory documentation. Weave is one example of a company selling solutions that utilize AI to streamline the process of preparing Investigational New Drug regulatory filings (INDs). Preparing INDs is one area that could benefit from automation. The company touts its ability to create INDs faster without sacrificing quality and offers greater control over data organization for IND filings.

Human organoid-based testing during the preclinical process is an emerging technique that can dramatically improve the characterization of how a drug will behave in clinical trials. Organoids are miniature versions of organs in the human body that are generated using adult stem cells. After taking samples from patients and trial volunteers, these lab-grown replicas mimic the function of various organs. Testing drug candidates on organoids can give a lot of clues into how the human body would react to a drug candidate before human trials.

Regulators like the US FDA are tasked with weeding out unsafe and ineffective drug candidates that enter trial pipelines. But it is a process that takes years once drug candidates enter the clinic. The long wait for approval frustrates both companies eager to enter the market with innovative products and patients desperate for a solution to a serious medical condition. The need to accelerate the process is not lost on regulators. The US FDA has set up processes such as Fast Track and Breakthrough Therapy designations to accelerate the clinical trial process for novel drugs that show uniquely desirable therapeutic properties.

 

The Implications of Using Advances in Physics, Biology, and AI to Their Full Potential

Assuming the pharmaceutical development ecosystem takes full advantage and coordinates the use of advances like those described above, what could medicine achieve?

Adityo Prakash and Tom Cellucci point out some of the implications in their recent article appearing in Homeland Security Today. They approach the subject from the perspective of both industry and national security. Adityo Prakash is the CEO of Verseon. He confounded Verseon to change how the world finds new medicines. Tom Cellucci drove America’s nanotechnology agenda under presidents Clinton and George W. Bush, and he served as the US Federal Government's first-ever Chief Commercialization Officer at the US Department of Homeland Security (DHS) under both the Bush and Obama administrations. Prakash and Cellucci point out that current medicine has so far only uncovered drug candidates that bind 670 of the druggable proteins in the human body. They contend that better methods for finding drug candidates and streamlining required testing will accelerate the march toward being able to address all 10,248 druggable proteins. Once this goal is reached, medicine will be able to intervene with exquisite precision in disease processes that inexorably progress over the human lifespan. Being able to precisely control the entire druggable set of proteins in the human body will also facilitate agile therapeutic development as a first line of defense against new infectious agents that try to enter our cells.

Emerging medical and life science technologies are helping contribute to an inward evolution. Scientists are learning from the exponentially growing data on our health and disease states using data analytics and AI-driven insights generated from such data. They are developing a deeper understanding of the concert of proteins involved in the progression of disease and the best pathways for both treatment and prevention.

Given that most major diseases are associated with aging, regulating the functions of proteins in our bodies will allow medicine to preserve a youthful and disease-free state far longer than is possible today—and eventually even to partially rejuvenate our bodies from the cellular level. These advances may make it possible to turn 80, 90, or even 100 into the new 50. But even before such dramatic increases in human health span happen, progress toward addressing large subsets of the druggable proteome will deliver a steady flow of amazing new drugs. These drugs will treat a great many diseases far better than we can today. Then the 21st century will indeed establish itself as the century of biology.

New Book "Inside Cyber"; a primer/resource for those interested in the impact of emerging tech on security and privacy in our new digital era

 

 

 

 

(4) New Book "Inside Cyber"; a primer/resource for those interested in the impact of emerging tech on security and privacy in our new digital era | LinkedIn

 

Dear Friends and Colleagues, today Ia m celebrating the release of my new book with the promo assistance of my American Eskimo dog. I wrote it to be a primer for those with a layperson background on cybersecurity. It also has some good reference value and insights for those who are more deeply involved with cybersecurity and tech such as artificial intelligence, quantum computing, 5G, and IoT. Most of all, it is a book about risk management for our new digital era. I hope you will read it and share feedback! Thanks, and stay safe! Chuck

"Just in time for Cybersecurity Awareness Month, Chuck Brooks announces his new book, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security. The book teaches readers how to navigate the intersection of tech, cybersecurity, and commerce.

"The near future that awaits can be characterized as an era of exponential technological change. It is being catalyzed by enhanced information sharing and the merging of physical and digital systems. The disruptive technological change will impact industries including health and medical care, transportation, energy, construction, finance, commerce, and security. Along with industry, the government is acclimating to the new emerging enterprise technology ecosystem and pursuing programmatic innovation. We are in a state of cyber-flux. Many companies and institutions are moving from legacy systems to cloud, hybrid cloud, and edge platforms to consolidate and secure data. Emerging technologies such as artificial intelligence, quantum computing, and 5G are creating operational shifts that require new cybersecurity strategies and requirements," says Chuck Brooks. New book tackles the impact of emerging technologies on privacy and cybersecurity | Security Info Watch

 

Chuck Brooks Debuts Book on Privacy & Cyber Impacts of Emerging Tech

by Charles Lyons-Burt

Cybersecurity, News ,Technology

Chuck Brooks Debuts Book on Privacy & Cyber Impacts of Emerging Tech - GovCon Wire

“Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security” by Chuck Brooks is a must-read for anyone who wants to understand and take advantage of the next wave of technological progress. Brooks is a well-known executive and adviser who breaks down complicated technological trends into easy-to-understand insights. He does this by providing a deep look at how modern technologies will change business and society in the future—just in time for Cybersecurity Awareness Month.

Brooks is one ofExecutive Mosaic’s esteemed GovCon Experts, an adjunct professor at Georgetown University, a widely recognized thought leader and a subject matter expert for the Cybersecurity and Infrastructure Security Agency’s Space Systems Critical Infrastructure Working Group. We sat down with Brooks ahead of “Inside Cyber’s” Oct. 15 publication to talk about the impetus behind it and why you should check it out. (“Inside Cyber” is available on Amazon now.)

 

GovConWire: What was the genesis for “Inside Cyber”?

Chuck Brooks: There were several impetuses. I travel and speak globally at conferences. For the past year, artificial intelligence has permeated almost every discussion at events. It is an early topic of the day. Another factor is my course at Georgetown University in the graduate cybersecurity risk management program. Over five years ago I designed a course called “Disruptive Technologies and Organizational Management.” This past year I reviewed the syllabus and had to completely redo the content as the rate of change in technology and in cybersecurity has become almost exponential. My third reason is that I have come to realize that to adapt to the new challenges facing business and security for both security and privacy, there needs to be a resource people can go to explain things in understandable terms. Hence my book!

 

GCW: What will readers learn as they read your book?

Brooks: They will get clear, easy-to-understand accounts of cutting-edge technologies like AI, blockchain, quantum computing, 5G and Internet of Things, as well as information on how these technologies will impact business operations, efficiency, and security. The reader will discover the ways that fast technological progress can change traditional industries and create new value by learning how to handle the cybersecurity landscape and protect their businesses and personal digital lives against the threats that come with it. I also include a comprehensive risk management strategy for managing cybersecurity risks in the ‘4th Industrial Era.’

People who work in government contracting can also use my book as a guide to make the most of the recent technologies that are changing the sector. I highlighted some of these technologies in a GovCon Expert article. The topics I highlighted in the article included AI, machine learning, cybersecurity, digital transformation, 5G, IoT, quantum and high-performance computing, cloud and edge computing, augmented reality, big data, virtualization, smart cities, wearables, 3D printing and materials science.

 

GCW: What is your general perspective in the near future for emerging tech and cybersecurity?

Brooks: Rapid technological progress is what the near future holds. Sharing information more easily and combining physical and digital methods are both helping to speed it up. Health and medical care, transportation, energy, building, finance, commerce, and security are just some of the fields that will be affected by the disruptive technological change. Getting used to the new workplace technology ecosystem is something that both businesses and the government are doing. It is like cyber-flux right now. For better data security and to move away from old systems, many businesses and organizations are switching to cloud, hybrid cloud and edge platforms. As innovative technologies like AI, quantum computing and 5G come out, they change how things work, which means that new safety approaches and rules are needed.

GCW: Thank you! Where can readers obtain your book?

Brooks: Readers can order the book from Amazon now. It will be available at Barnes & Noble, Target and other bookstores starting on Oct. 15.

 

Georgetown Professor Chuck Brooks is the Author of New Book “Inside Cyber How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security”

Georgetown Professor Chuck Brooks is the Author of New Book “Inside Cyber How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security” - HS Today

By Homeland Security Today

Discover how to navigate the intersection of tech, cybersecurity, and commerce.

In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.

In the book, you’ll:

Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world

Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress

Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value

Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide

How to Order:

Book link to order on Amazon: https://a.co/d/cAqjml1

The author is available for media interviews and be contacted at: cb1519@georgetown.edu

 

 
 
 

- By Chuck Brooks (President, Brooks Consulting International)

Original link of post is here

Read more…

Dear Friends & Colleagues, October is Cybersecurity Awareness Month. Actually, cybersecurity awareness really needs to be every month! Below is some content for the quest. Also, happy to announce that my book "Inside Cyber" will be arriving at bookstores on October 15. You can also get a copy from the Amazon or Barnes & Noble websites. Thanks, and stay safe! Best, Chuck

Make a Commitment To Be More Cyber-Secure for Cybersecurity Awareness Month

by Chuck Brooks

Commit To Be More Cyber-Secure For Cybersecurity Awareness Month (forbes.com)

 

 

 

Cybersecurity Awareness Month is approaching. Any businesses and organizations, no matter how big or small, can be hacked in today's digital world. That is a fact of our digital lives. However, not enough companies or people prepare to avoid a breach that could significantly impact their operations, brand, reputation, and income streams.

Cyberattacks on all companies, especially small and medium-sized ones, are happening more often, more precisely, and with more complicated methods. An Accenture Cost of Cybercrime Study released not long ago found that 43% of cyberattacks target small companies, but only 14% are ready to defend themselves.

And criminal hackers are doing it more often as internet connectivity grows. They are using machine learning to find holes in the defenses of their targets and to automate their attacks. Enabled by emerging technologies, hackers now operate faster, smarter, and more deadly strikes. They also share tools that are available on the Dark Web as part of their operational strategy. Threat actors include country states, criminal groups, and hacktivists, among others.

It is not always necessary for hackers to use the newest and most advanced software to be successful. Criminal hackers can do it easily. When it comes to online frauds, they usually look for the most vulnerable target at the best time.  A very tough problem is keeping up with the growing complexity of socially engineered threats, especially deep fakes, by threat actors.

 

Cybersecurity knowledge leads to good risk management

Even though everyone is open to cyberattacks, there are ways to help reduce the danger. Starting with a plan for managing risks and being vigilant is the first step. A comprehensive risk management strategy should also include data privacy, application security,  cyber vulnerability risk assessments, network access configuration, cyber hygiene best practices, use policies and permissions, and education and training,

. That includes people, methods, and tools. Cyber-awareness in simple terms means being alert, finding gaps, evaluating weaknesses, and having plans in place to protect yourself or company.

In today's increasingly unstable digital cyber risk environment, a security plan for managing risk needs to be both all-encompassing and flexible from dangers.

For businesses and groups to be successful, they need to know how to handle risks and understand the distinct types of threats and people who pose those threats. Their information should also include the National Institute of Standards and Technology (NIST) Framework's guiding principle: identify, protect, detect, respond, and recover.

Simple steps can be taken to make cyber-defenses stronger and raise awareness. These include updating and patching vulnerable software must be done regularly. Many businesses and groups are annoyingly slow or even careless when it comes to installing patches that would stop breaches. Given the large amount of malware that is out there and the growing number of attack surfaces, fixing has become particularly important. System and app updates are unnecessary and can be avoided at all costs.

 

The Importance of Cyber-Hygiene

Being cyber-aware really starts with practicing good cyber-hygiene. Do not click on the Phish! Criminal hackers prefer phishing because it is easy to do and works most of the time. The best advice is to not click on files you do not know anything about. You should pay close attention to website URLs to make sure they are real and not fakes, because hackers use automated phishing tools and good graphics that can look exactly like banks and company logos. Be especially careful of junk that contains fake job offers, bills for things you did not buy, and messages from your company that do not seem to belong. Additionally, it is recommended that you always make sure that email senders are who they say they are and be careful when opening any files.

Additionally, good online hygiene includes using strong passwords and multi-factor authentication that are hard to circumvent through social engineering. In addition, using multiple forms of authentication is a smart move that can help stop attempts that are not as technically advanced.

Training workers to spot malware and phishing attacks is important in today's business world.Good cyber hygiene means string identity access management policies. An administrator should monitor access to sensitive data, and limit information to which they can be accessed only by given permissions.

Any business and individual should also be cognizant of the growing impact of emerging technologies on the digital ecosystem.Artificial intelligence (AI), machine learning, the Internet of Things (IoT), 5G, virtual and augmented reality, and quantum computing are all part of the present cyber-threat and defense scenarios.

AI in particular can enhance the automation tool chest via horizon scanning technologies, analytics, audits, incident alert tools, diagnostics, and even self-repairing software. Real-time analysis and threat identification have now been made possible by AI and ML algorithms. Businesses will increasingly be able to keep an eye on what is happening within their system and identify any unusual behavior. At the same time, they need to be ready to defend against criminal hacker’s adversarial use of AI  to facilitate phishing, discover gaps on networks, and expand polymorphic malware attacks. (please see my new book, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security Amazon.com: Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security: 9781394254941: Brooks, Chuck: Books

Being resilient requires a plan.Have an incident reaction plan ready in case you are the victim of a breach. That plan should also include the possibility of calling the police to help get the files back and find out who is stealing them.

Protect your devices with anti-malware and anti-ransomware platforms and technologies, like firewalls and email filters, for both businesses and people. Software tools that can find strange things, analyze user behavior, and help stop threats are being made possible by innovative technologies like machine learning (ML) and artificial intelligence (AI). Computers can also use machine learning and artificial intelligence to make their systems safer.

Everyone who uses the internet, including businesses and regular people, should remember to back up any important or private files. Using the right backup methods does not take much time or money, and they can protect your business in case of a breach. The files should also be encrypted in case there is a leak.

Management Security Services (MSS) and Managed Service Providers (MSP) are practical choices for small and medium-sized businesses that do not have enough resources to handle security issues on their own. Monitoring networks, providing necessary cybersecurity tools, and threat assessments are all things that many companies can do. Businesses and industries that do not have (or cannot afford) the internal subject matter knowledge or capabilities to handle increasingly complex breaches can save money by using MSS.

One last thing that needs to be done for risk management is sharing information about threats, especially through public/private cooperation. Sadly, many small and medium-sized businesses do not have the tools and knowledge to deal with the growing number of cyber-threats. In a harsher reality, many underserved communities and small companies do not even know what cyber-threats they face. This kind of sharing will help people who did not know about the latest bugs, malware, phishing attacks, and ransomware stay safe. Governments could also suggest or share cyber defense tools in addition to data to make shields stronger.

Supporting cybersecurity knowledge through Cybersecurity Awareness Month is especially important, but it cannot just happen once a year; it has to be an ongoing effort. Consistent efforts to raise knowledge about cybersecurity are important. Improving cooperation between the government and businesses is the smartest way to help reduce online threats by teaching people who do not know about them.

 

My New Book!

Available on Amazon at: Amazon.com: Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security: 9781394254941: Brooks, Chuck: Books and at bookstores after October 15

 

Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security 1st Edition

Discover how to navigate the intersection of tech, cybersecurity, and commerce

In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.

In the book, you'll:

  • Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world
  • Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress
  • Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value

Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide.

 

 

 

 

From Bored Panda

by Chuck Brooks

45 Scammers Who Got ‘Destroyed’ By The People They Were Trying To Rip Off (New Pics) | Bored Panda

 

There are many scams, but social media and artificial intelligence has exacerbated the scourge of spoofing. Spoofing is when someone says they are you to get private data, accounts, or information. Most of the time, it's done through a phishing email or text message that looks like it came from a trusted source, like Amazon, Microsoft, your bank, or even your place of work.  It's often called "spear phishing" when it's aimed at business leaders. Ominously, ransomware is often downloaded when people fall for a fake. Then the demands come to the victim for payment, often in crypto currencies or prepaid charge cards.

In the past, it was easy to spot spoofs because they often had misspelled words, bad images, and claims that didn't make sense. That's no longer the case thanks to technology and threat players who are smart enough to fool almost anyone. People can spoof emails, websites, texts, and even IP addresses by making fake ones. And worse, generative AI can create deep fakes in video and audio that seem authentic.

Always being on the lookout is the best way to stop and spot spoofs. Make sure it's really the writer before clicking on any links in emails or on websites. In addition, you should get anti-virus and spoof detection software, and you might want to use packet blocking software, which is sold by many companies. Always encrypt your most important and private data, that way if someone steals your identity, the data won't be easy to move.

The goals of spoofing is to exfiltrate data, extort ransoms, or steal Identities.  Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain and it is a growing global problem..

The reason for the increased rate of identity fraud is clear. As we become more and more connected, the more visible and vulnerable we become to those who want to hack our accounts and steal our identities. The surface threat landscape has expanded exponentially with smartphones, wearables, and the Internet of Things so there are plenty of targets to phish.

Criminal hacking gangs and fraudsters often use social media to help engineer their phishing and malware attacks. They can garner a great deal of information such as birthdates and personal histories on social media posts to tailor their attacks With the development of machine learning algorithms and artificial intelligence, social engineering attacks have become much more sophisticated as they can more easily seek out vulnerabilities and automate phishing and ransomware attacks on a grand scale.  And when they succeed in stealing identities, the hackers often share them or sell them on the dark web to other criminals.

Below are five suggested actions that I recommend companies and people take to hep ameliorate identity theft:

1) Use multifactor authentication. This is an integral step in preventing identity theft because raises the bar toward stealing your password by requiring two or three steps to access data. Also, you can use biometrics such as facial recognition, an eye scan, or a thumb print to add an additional level of security.

2) Hackers are quite adept at guessing passwords especially when they have insights into where you lived in the past (street names), birthdays and favorite phrases via social engineering on social media. Use strong passwords and change them regularly can also complicate hacker tasks. Also consider a password manager if you use a variety of sites.

3) Maintain a separate computer to do your financial transactions and use it for nothing else. Also, consider using encryption software for valuable data that needs to be secured.

4) It is also prudent to monitor your credit scores, your bank statements, and your social accounts on a regular basis. There are several reputable monitoring organizations that provide account alerts that are very helpful in that awareness quest. The quicker you detect fraud the easier it is to handle the issues associated with identity theft.

5) Finally, if you get breached, have a plan in place to reach out immediately to your key vendors and connections.  If the breach is especially serious, do contact law enforcement authorities as it might be part of a larger criminal enterprise that they should know about.

 

Theft and use of someone else's private information without their permission, usually to make money, is called identity theft. Identity theft is on the rise, and it's easy to see why. Criminals who want to hack our accounts and steal our identities can see us and find us easier as we become more linked. Smartphones, wearable tech, and the Internet of Things have vastly increased the number of public threats. This means that there are many more people to phish.

Social media is often used by hacking groups and scammers to plan their phishing and malware attacks. On social media posts, they can find out a lot about people, like their birthdates and personal lives, which helps them target specific people. More advanced social engineering attacks are now possible thanks to machine learning algorithms and artificial intelligence. These technologies make it easier to find weaknesses and run large-scale phishing and ransomware attacks automatically. Once hackers get their hands on     someone's identity, they often give it to other crooks or sell it on the dark web.

What I think companies and people should do to help stop identity theft are the following five things:

2) Use more than one way to prove who you are. By making it take two or three steps to get to your data, this is an important step in avoiding identity theft because it makes it harder for someone to steal your password. Besides that, you can add an extra layer of protection with biometrics like a fingerprint, an eye scan, or facial recognition. 2) Hackers can easily figure out passwords if they know things like the street names where you used to live, your birthday from social engineering on social media. Make it harder for hackers by using strong passwords and changing them often. 3) Keep a different computer that you only use for paying bills and conduction financial activities.  And if you need to protect important info, you might want to use encryption software.

4) It's also a good idea to keep an eye on your credit reports, bank statements, and social media accounts on a daily basis. You can get account alerts from a number of trustworthy tracking services, which can help you raise awareness. An easier way to deal with identity theft problems is to catch scams as soon as possible. If your security is broken, you should have a plan for how to contact your important suppliers and contacts right away.

Chuck serves as President and Consultant of Brooks Consulting International with over 25 years of experience in cybersecurity, emerging technologies, marketing, business development, and government relations. He helps Fortune 1000 clients, organizations, small businesses, and start-ups achieve their strategic goals and grow their market share.

Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program, where he teaches graduate courses on risk management, homeland security, and cybersecurity. He designed the course that he teaches called “Disruptive Technology and Organizational Management” which is a course quite popular with students.

Chuck Brooks has received numerous global accolades for his work and promotion of cybersecurity.  Recently, he was named the top cybersecurity expert to follow on social media, and also as one top cybersecurity leaders for 2024 along with a very select group of industry and government colleagues. He has also been named "Cybersecurity Person of the Year" by Cyber Express, Cybersecurity Marketer of the Year, and a "Top 5 Tech Person to Follow" by LinkedIn” where he has 116,000 followers on his profile. He has 57,000 subscribers to his newsletter "Security and Tech Insights."

As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, The US Embassy to the Holy See and the Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech.  He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for DHS CISA focused on security space systems.

Chuck is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, Skytop Media, GovCon, Barrons, The Hill, and Federal Times on cybersecurity and emerging technology topics. He has been a leading voice in risk management keynoting dozens of conferences and writing over 350 articles relating to technologies and cybersecurity.

In his career, Chuck has received presidential appointments for executive service by two U.S. presidents and served as the first Director of Legislative Affairs at the DHS Science & Technology Directorate. He has also served in executive roles for companies such as General Dynamics, Rapiscan, and Xerox.

Chuck has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.

 

 

GovCon Expert Chuck Brooks Praises DHS Tribal Cybersecurity Grant Program - GovCon Wire

Earlier this Summer, the Department of Homeland Security (DHS), through the Federal Emergency Management Agency (FEMA) and the Cybersecurity and Infrastructure Security Agency (CISA), announced more than $18.2 million in Tribal Cybersecurity Grant Program (TCGP) awards to assist Tribal Nations with managing and reducing systemic cyber risk and threats.

This action was long overdue as Native Americans have been at the forefront in contributions to US national security. Native Americans have served in the U.S. military in every major conflict for 200 years, and at times at a higher rate than any other demographic. This is proportionally more than any other ethnic group and is the highest number of soldiers per person defending the homeland.

“Native Americans have not received enough public recognition for their support of national and homeland security .They have served in every major military conflict since the Revolutionary War. “ In the 20th century, more than 12,000 Native Americans served in World War I, and 10,000 Native women joined the Red Cross.  During World War II, over 44,000 Native Americans – American Indians served, including 800 women.”Understanding America: The Legacy of Native American Military Service - United States Department of State

Today, there are more than 24,000 American Indian and Alaskan Native men and women on active duty, and more than 183,000 veterans identify as American Indian or Alaska Native. Twenty-nine service members of Native American heritage have been awarded the Medal of Honor for valor.

In 2016, I authored an article of Indian Country News, and Homeland Security Today in it I stated that  “the majority of people who live on tribal land are not getting the education and training they need to take advantage of chances in the new digital economy. Numerous factors have led to a lot of young Native Americans living in poverty and with little chance of improving their financial situation. The situation could be improved by investing in and training staff that could provide jobs in cybersecurity and data analytics.

Right now, both the private and public sectors are seriously lacking skilled cybersecurity workers. Industries, universities, Congress, and the federal and state governments should all work hard to train the next generation of cybersecurity experts and data analysts from many of India's impoverished areas. Creating a new sense of economic destiny is possible when you teach useful work skills and match them with chances. Many benefits would come from the government, businesses, and universities investing in a fast-tracked cybersecurity program for Native Americans that includes internships and fellowships to give them real-world experience. Moreover, it would improve the country's ability to find skilled digital workers.

Native Americans have a long history of commitment and service to the United States. Department of Homeland Security (DHS) cooperation with Native Americans has already made a significant difference in keeping our borders safe, especially in remote places where drug smugglers and legal immigrants try to get in. Primarily, DHS's FEMA is working with Native Americans to get ready for situations. According to FEMA's Center for Domestic Preparedness, Native Americans from 23 tribes and 10 states are being trained to help with large-scale disasters caused by nature or human causes.

Government departments like the Department of Homeland Security and others, like the Department of Defense, are looking to hire qualified cybersecurity professionals and analysts. Bringing these Native Americans into the digital economy will only take a coordinated effort and investments in people. This will also improve the safety readiness of both the government and businesses.

A model for this kind of funding already exists in the government. The Cybersecurity Veterans Hiring Pilot program was started by the Department of Homeland Security. The Pilot was meant to support the Department's efforts to hire more cyber professionals and give soldiers more chances to keep working in cybersecurity for the country. Along with the addition of a new trial program, DHS hopes to copy the success of the Native American veteran cybersecurity program. Creating a Native American cybersecurity and digital analytic pipeline would not require a large infrastructure investment, but there are no set program guidelines because this is just an idea.

 

The parts are already there, and a program could grow out of a clearly defined public-private partnership goal. As the lead for tribal affairs and consultation at the Department of Homeland Security, the Tribal Desk in the Office of Intergovernmental Affairs (IGA) might be a good place to start talking about a possible Native American cybersecurity pilot project.

As an example, caring businesses like Google, Microsoft, Samsung, Apple, and many more could give computers to Indian schools and job training centers. Many groups, including universities, colleges, associations, foundations, and companies, could also help by using the right technology. Individualized classes, run in person or online, could make this possible. Additionally, separate groups could help make the courses needed to get certificates and even degrees in both cybersecurity and data analytics. Additionally, the government could support this work by giving money, internships, fellowships, and security training. By working together and sharing ideas and resources, making a digital job path for Native Americans will be a project that benefits many. As Native Americans have always been patriotic and committed to public service, it is now time to help them learn how to use technology in the modern world.”

Less than a decade later I am excited to see that some of my proposals have come to fruition in rewarding Native Americans for their service and helping prepare and train them to work in digital security as part of the cyber work force.  The Tribal Cybersecurity Grant Program hopefully will make a difference.

The DHS Tribal Grant Program, “in addition to helping Tribal governments address cybersecurity risks and threats to their information systems, TCGP is enabling DHS to provide targeted cybersecurity resources that will improve the security of critical infrastructure and resilience of the services that Tribal governments provide to their members. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Emergency Management Agency (FEMA) jointly manage the TCGP. CISA provides cybersecurity programmatic subject-matter expertise by defining goals and objectives, reviewing and approving cybersecurity plans establishing measures of effectiveness, and organizing Objective Review Panels to review and score applications.

Digital threats impacting American Indian and Alaska Native tribes are increasing and becoming more complex, and tribal sovereignty creates unique cybersecurity challenges for these communities who for far too long have been underfunded and under-resourced.

DHS respects the sovereignty and self-determination of Tribal governments and recognizes the intent of Congress to provide flexibility to Tribal governments to meet cybersecurity needs across Indian Country through the TCGP. The framework of the program was made as a result of nation-to-nation consultations with tribal representatives across the country and is intended to support tribal cybersecurity resiliency.” Tribal Cybersecurity Grant Program | CISA

 

- By Chuck Brooks (President, Brooks Consulting International)

Original link of post is here

Read more…

Cybersecurity expert Chuck Brooks discusses the top five issues in threat detection and how organizations can reduce the risk of cyber-attacks in 2024.

 

https://search.app/Miwuwt4EtELyDj9F8

 

Interview by Brian Kelly

I recently sat down with Chuck Brooks, President of Brooks Consulting International, who is a globally recognized thought leader and subject matter expert in the areas of Cybersecurity and Emerging Technologies. We discussed the top five challenges and solutions in threat detection today, and how knowing how to safeguard against them can help organizations mitigate the impact of cyber-attacks.

 

Brian Kelly: How do threat detection systems like DDoS Protection work?

Chuck Brooks: A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target and cause a denial of service. The flood of incoming messages, connection requests, or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems. These attacks are often orchestrated via bots.

A bot defense needs to be able to quickly find data that looks like it came from a known botnet or piece of malware. It also needs to rapidly spot actions that can only be done by software, like getting a lot of requests. Especially if the traffic behaved in a way that wasn't natural, like mouse movements, keystrokes, or visitation trends that weren't normal. An all-around bot defense should also be able to tell if traffic tried to directly access the application interface (API) when it wasn't supposed to or if it tried to stop the signal collection from happening.

 

Brian Kelly: How is the role of Artificial Intelligence (AI) impacting the cybersecurity space?

Chuck Brooks: AI is a powerful tool for enabling cybersecurity. By prioritizing and acting on data, AI and machine learning (ML) can help make decisions more efficiently. This is especially true for larger, more sophisticated networks with many users and variables.

AI and ML can increase the speed at which new attacks are discovered, draw statistical conclusions, and send that information to endpoint protection systems. You can get real-time data on deviations and other problems using network monitoring and horizon scanning. Continuous diagnostics and forensics analysis are possible for optimal protection, and the defense framework layers (firewalls, payload, endpoint, network, and antivirus) are updated automatically.

Prioritizing and acting on data using AI algorithms can help people make better choices, especially in bigger networks with many users and variables. Locating, sorting, and combining data is a capability for reducing online threats. As a result, predictive analytics can conclude from statistics with fewer resources and send this information to endpoint security platforms.

Generative AI technology can also help write secure code more quickly. Better AI tools, platforms, and technologies can aid writers in composing safer code from the start. This also makes it easier to fix problems as they happen.

AI can also monitor aberrations happening in the network, find new threats without clear signs, and take the right action. In addition, it can be used to connect data from different silos to figure out the types of attacks that are happening and to analyze network risks and weaknesses. As a key part of zero trust cybersecurity, identity, and access management may benefit from AI that checks the validity of data across many distributed systems.

AI can spot things that aren't normal or don’t follow the rules. It can do this by looking at data and files and seeing network activities in real-time to find unapproved connections, unwanted communication attempts, strange or malicious password use, brute force login attempts, strange data transfer, and data exfiltration. Further, AI could significantly change cybersecurity efficiency by automating and orchestrating security. Combining ML and advanced analytics, AI can automate and coordinate many security tasks, such as incident reaction and vulnerability management.

When it comes to adapting to new, sophisticated digital environments, AI and ML become key tools or innovative chess pieces in a cybersecurity strategy game. It will depend on the accuracy, speed, and quality of the algorithms and supporting technologies to stay safe against growing asymmetrical threats.

Also, because there just aren't enough skilled cybersecurity workers, AI can fulfill security tasks that would have been done by adding people in the past. That is a significant benefit.

 

Brian Kelly: Are there security challenges inherent in using cloud computing?

Chuck Brooks: Both the public and private sectors are quickly moving to cloud and hybrid cloud settings, which is bringing computing closer to the edge. More businesses and government bodies are storing their data in the cloud or a hybrid cloud setup.

The cloud will handle more than 90% of all data handling tasks, according to predictions. Setting up a secure cloud is an important part of protection. As cloud-based services become more common, cybersecurity issues have grown. Issues that businesses must deal with include cloud settings that aren't set up correctly, APIs that aren't safe, and data breaches caused by cloud vulnerabilities.

Rapid migration to the cloud raises new security concerns due to the complicated systems that need to be kept up to date and protected from zero-day threats. Thus, integration should be the main security focus for mixed cloud setups. Achieving integration requires being able to see everything in the environment, including public, private, and on-premises areas. It also requires having the right tools, rules and, in many cases, a managed services partner to make sure that all security standards are met.

 

Brian Kelly: What are some effective strategies for securing IoT (Internet of Things) devices?

Chuck Brooks: Securing IoT devices is a monumental challenge. The IoT, of course, refers to the emerging connectivity of embedded devices to the internet that are readable, recognizable, locatable, addressable, and/or controllable. That is a big universe of devices. The most at-risk electronics are networked cameras and storage devices, smartphones and tablets, laptops, computers and streaming video devices.

Hackers can potentially obtain data through any IoT-connected device. Many are particularly open to attack, as most of these devices have not had their default passwords changed. People just use them without changing the default passwords, which is an invitation to a data breach. An organization implementing an IoT security framework needs to immediately address how to change the default passwords on purchased, manufactured devices.

There are solutions ranging from homegrown to expert managed service providers with all-in-one solutions for IoT security. They include improving situational awareness, enforcing security policies for technology integration, threat information sharing, and having a cyber resilience strategy are all important parts of a good IoT risk management plan. For example, it should investigate how separating or segmenting IoT devices can lower risk and attack areas. To reach the end goal, solutions and services must be optimized, and the necessary amount of security must be determined.

 

Brian Kelly: Can you discuss strategies for managing supply chain cybersecurity risks?

Chuck Brooks: Cyber-attackers are always looking for the weakest link in the chain, and reducing the risk of third parties in supply lines is now seen as necessary for cybersecurity. Cyberattacks on supply lines can come from hackers, spies, thieves, or enemies of the country. Most of the time, this is done by breaking into networks with fake or hacked hardware and software, using providers' weak security measures, or using insider threats.

New technologies, like AI and blockchain, are now being used to keep track of, alert, and evaluate supply chain processes. To protect against cyber-threats, you can use Data Loss Prevention (DLP), encryption, log management, identity, access control tools, and SIEM (Security Information and Event Management) platforms. Another specific step companies can take is to audit the security measures that their suppliers and vendors use to ensure that the end-to-end supply chain is secure. The Department of Homeland Security (DHS), the Department of Defense (DOD), and the  White House have all recently implemented supply chain security measures. The Department of Commerce’s NIST (National Institute of Standards and Technology) has suggested a practical one for supply chain security that provides sound guidelines from both government and industry. Brian Kelly: Thanks for your time and your insights today, Chuck.

Chuck Brooks: Thanks Brian, I enjoyed our discussion.

 

How Spectrum Enterprise can help

Our managed solutions can help IT leaders reduce the burden on their understaffed and overworked teams, by automatically ensuring that your network infrastructure is up-to-date and secure, in accordance with the policies set forth by your organization.

Spectrum Enterprise delivers Enterprise Network Edge over the renowned Fortinet platform. This managed solution delivers complete visibility of security events and threats, network utilization and more through a secure and easy-to-use portal. You can take an active role in managing and controlling the policies of interest and leave the rest to us.

Over 80% of Fortune 500 companies rely on Spectrum Enterprise for technology solutions. Find out more about how Enterprise Network Edge can help you address cybersecurity issues.

 

My new book: Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security 1st Edition

Now available for pre-order on Amazon !

by Chuck Brooks

* Discover how to navigate the intersection of tech, cybersecurity, and commerce

In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.

In the book, you’ll:

* Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world

* Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress

* Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value

Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide.

Order here: Amazon.com: Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security: 9781394254941: Brooks, Chuck: Books

 

The Race for Quantum Cybersecurity

by Chuck Brooks

You can access the full magazine here: https://thecyberexpress.com/supply-chain-security-editon/

 

Supercharging DevOps with AI: The Ultimate Technology Dream Team

 

 

AI and DevOps: A Symbiotic Relationship In today’s fast-moving world, creating and updating computer programs quickly is super important for businesses. That’s where DevOps and Artificial Intelligence (AI) come in handy. DevOps is like a team strategy that helps computer programmers and operation folks work better together so they can make software faster and keep them running smoothly. And AI? Think of AI as a really smart helper that can learn and make decisions to take on heavy-duty tasks without much human help.When you mix DevOps and AI, it’s like creating a superhero team for technology. AI can help DevOps by spotting problems before they happen, which means fewer headaches and less downtime for the software. Also, with AI’s help, DevOps teams can manage many different tasks at the same time and make smarter decisions, super fast.For example, AI can look at lots of data to find patterns that might show when something’s about to go wrong. It’s like having a super sense that can smell a problem a mile away! This means that companies can fix issues before they become big dramas, keeping their software running like a dream.Plus, with AI’s ability to learn and adapt, it can help teams become better and more efficient over time. It takes notes on what works best and helps the team get even faster at building and fixing software. It’s always getting smarter and helping the DevOps team do their best work.For those who are interested in how smart technology can make software development zippier and more reliable, have a look at this deep dive into the collaboration between AI and DevOps over here: www.getambassador.io/blog/ai-devops-symbiotic-relationship-deep-dive.For more information on how your organization can accelerate your code modernization, check out the following whitepaper from Copper River at copperrivermc.com/devops/But what if you need some extra help getting started with this power duo of AI and DevOps? That’s where Diversified Outlook Group comes into play. They understand how important it is for businesses to keep up with tech trends and can guide you through the process. Their experts are ready to support you in harnessing the power of AI to boost your DevOps efforts. Reach out to them at support@diversifiedoutlookgroup.com to see how they can help your organization thrive

 

"The advent of artificial intelligence has many aspects to consider including ethics, regulations, and its many types of applications." ...

Source: BIZCATALYST 360° Artificial Intelligence And Security – Collective Thoughts (bizcatalyst360.com)

 

 

Artificial Intelligence and Security – Collective Thoughts

BY Chuck Brooks

I teach a course at Georgetown University’s Cybersecurity Risk Management Program called Disruptive Technologies and Organizational Management. I gain from the give-and-take of my student’s insights. As we are now at the onset of an exponential era of technological growth amplified by artificial intelligence in almost every way and industry vertical.

Regarding cyber risk management, artificial intelligence is a powerful enabler and accelerator for cybersecurity in our networked world.  AI systems are designed to mimic human characteristics and computational abilities in a computer, enabling them to outperform humans in terms of speed and capacity. AI machine learning provides the quickest way to identify new attacks, draw statistical inferences, and provide that information to endpoint protection systems in the context of cybersecurity.

The advent of artificial intelligence has many aspects to consider including ethics, regulations, and its many types of applications. I asked several of my students to share their insights which are featured below.

Student Insights:

  • How can safeguards be put on AI to ensure ethics, effective governance, and mitigate bias, and poisoned data?

Safeguarding AI: Ethics, Governance, and Mitigating Risks

Artificial intelligence (AI) offers immense transformative potential, but its unchecked development poses significant risks. Robust safeguards are essential to realize the benefits of AI while minimizing potential harm. Here is how we can approach this multifaceted challenge:

Ethical Frameworks: Industry-wide standards around fairness, transparency, accountability, and non-discrimination are a must. These principles should guide AI design, development, and deployment, ensuring alignment with societal values.

Governance Structures: Independent review boards, bias audits, and accountability can minimize risks. Regulations at the governmental level are also needed to define acceptable uses of AI, enforce standards, and protect individual rights.

Continuous Bias Evaluation: AI systems often learn from real-world data, which can carry deeply ingrained societal biases. Mitigating this requires an initial evaluation, continuous bias auditing, and techniques such as de-biasing algorithms to help train models to be less prone to discriminatory outcomes.

Protection Against Poisoned Data: AI can be manipulated through data poisoning attacks, where bad actors subtly alter training data. Data validation, exposing models to poisoned data sets, and understanding how AI reaches its decision can enhance security.

The Path Forward Collaboration between technology professionals, ethicists, policymakers, and the public is vital to ensuring that AI develops in a way that benefits society as a whole.

By Joshua Cushing https://www.linkedin.com/in/joshuacushing/


  • What needs to be in a Risk Management Framework to address the cyber threat of AI?

There needs to be several key components in a Risk Management Framework (RMF) to effectively address the cybersecurity threat of Artificial Intelligence (AI). It should start by identifying risks such as data manipulation, model theft, and malicious attacks. The framework must conduct a risk assessment to assess the probability and impact of these risks focusing on AI’s features like algorithm transparency. In addition, incorporating threat intelligence tailored for AI is crucial for predicting and mitigating threats. The framework should also enforce security measures including encrypting data and limiting access along with security checks to prevent attacks targeting AI systems. Having a response plan specifically designed for AI related breaches will ensure a timely response and containment. Adhering to data protection laws and understanding the ramifications of using AI are equally important. Finally, ongoing training for employees on AI risks in the RMF will help strengthen defenses against evolving AI technologies.

Leonard Field


  • How will AI impact cyber threats and cyber defenses?  (i.e. using Generative AI and predictive analytics)

Artificial Intelligence will have a significant impact on the safety of society from a physical and cyber security perspective.  AI will greatly impact the capability of threat detection mechanisms as well as cyber defensive countermeasures through its use of Generative AI and predictive analytics.  The use of Generative AI will allow cyber analysts to rapidly detect and respond to anomalies in their systems due AI ability not only analyze changes in a baseline, but continuously evolve as the landscape changes.  Predictive analytics will be able to assist in this effort by being able to collect and succinctly digest large datasets and identify trends, risks, and patterns that will help analysts in being proactive with the implementation of safeguards that both prevent and deter threat actors.  While capabilities will exist for defensive efforts, there must be an equal understanding that malicious actors will also have this same capability.  Threat agents will use AI in reconnaissance efforts to find vulnerabilities in systems and understand how defensive measures respond to specific intrusion attempts.  The cyber security industry as well as cyber security professionals must continuously analyze and develop tools within the AI space that increase in capacity and capability to mimic the ever-changing landscape.

By Shelley White III www.linkedin.com/in/shelley-white-56a6001a2


  • What is Artificial Intelligence Bias?

Regardless of one’s place of origin, inherent bias exists. Bias is not innate but taught. Bias can exist in the forms of race, religion, language, age, culture, or location. Therefore, AI Domain Team members tasked with labeling AI training data or designing AI algorithms for models must come from diverse backgrounds. Artificial Intelligence bias can be implemented purposely or without malice. The outcome of both is an unethical AI model.

By Darryl W. Hicks


  • ·How AI will transform the agriculture sector?

The integration of AI and the Internet of Things (IoT) is poised to revolutionize the agriculture sector, offering unprecedented opportunities to enhance efficiency, productivity, and sustainability. Leveraging IoT-enabled monitoring systems, AI algorithms provide farmers with real-time insights into soil conditions, moisture levels, and crop health, enabling data-driven decisions on irrigation, fertilization, and pest control for optimized resource usage and improved yields. Additionally, IoT-equipped wearable sensors and smart collars offer smart livestock management solutions, monitoring the health, behavior, and feeding patterns of animals to detect early signs of illness and enhance animal welfare. Through IoT-based management systems, the entire agricultural supply chain can be streamlined, with AI analytics tracking storage conditions, transportation routes, and product quality to reduce waste and ensure the freshness and safety of agricultural products from farm to market.

Furthermore, AI-driven control systems automate farming operations by leveraging IoT data to regulate irrigation, nutrient management, and crop spraying, while unmanned machinery like drones and robotic tractors perform precision tasks with minimal human intervention, increasing operational efficiency and reducing labor costs. Moreover, UAVs equipped with IoT sensors and AI algorithms monitor crops from above, identifying signs of disease, nutrient deficiencies, and pest infestations to provide actionable insights for targeted interventions, thereby improving crop health and maximizing yields. However, alongside these transformative benefits, the integration of AI and IoT in agriculture presents cybersecurity challenges that must be addressed to ensure the safe and secure adoption of these technologies.

Privacy concerns arise due to the passive nature of IoT data collection, necessitating robust encryption and access controls to safeguard sensitive agricultural data and prevent unauthorized access. Additionally, cybersecurity threats such as ransomware, denial of service (DoS) attacks, and social engineering exploits pose risks to IoT devices in smart farming, highlighting the need for AI-powered cybersecurity solutions to detect and mitigate these threats in real-time. Moreover, supply chain vulnerabilities must be addressed through the implementation of security measures such as blockchain technology and authentication mechanisms to protect against cyber-attacks and data breaches. In conclusion, while AI-driven IoT applications hold immense promise for transforming agriculture, addressing cybersecurity concerns is imperative to ensure their safe and secure adoption in smart farming practices.

References

Barreto, L., & Amaral, A. (2018, September). Smart farming: Cyber security challenges. In 2018 International Conference on Intelligent Systems (IS) (pp. 870-876). IEEE.

Kim, W. S., Lee, W. S., & Kim, Y. J. (2020). A review of the applications of the internet of things (IoT) for agricultural automation. Journal of Biosystems Engineering, 45, 385-400.

Kumar, N., Dahiya, A. K., Kumar, K., & Tanwar, S. (2021, September). Application of IoT in agriculture. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (pp. 1-4). IEEE.

Tao, W., Zhao, L., Wang, G., & Liang, R. (2021). Review of the internet of things communication technologies in smart agriculture and challenges. Computers and Electronics in Agriculture, 189, 106352

By Shavinyaa Vijaykumarr linkedin.com/in/shavinyaa-vijaykumarr-3314922a9


  • How will AI transform industries such as healthcare, finance, commerce, transportation, agriculture, space, robotics, and energy?

Artificial Intelligence has the potential to introduce essential contributions to the healthcare sector. This includes administrative processes, such as adherence to compliance standards as well as automation in tasks such as diagnosis and treatment.

By Emanuel Dos Santos https://www.linkedin.com/in/emanuel-dos-santos-506b1b275/


  • How can safeguards be put on AI to ensure ethics, effective governance, and mitigate bias, and poisoned data?

Ensuring the safety of artificial intelligence (AI) necessitates a comprehensive strategy, which notably involves government regulation and adherence to industry best practices. The European Parliament’s adoption of the AI Act (AIA) underscores the significant role of external oversight in protecting fundamental rights and addressing ethical advancements in AI (Gasser, 2023). Given the crucial aspects of safeguarding information systems by ensuring confidentiality, integrity, and availability, it is imperative for AI to be trustworthy. This entails being valid and reliable, safe and secure, resilient, accountable and transparent, explainable and interpretable, privacy-enhanced, and fair with managed harmful bias (Tabassi, 2023, p. 12). To achieve these characteristics, the AI model must undergo training, receive feedback on ethical dilemmas, and be supervised and rewarded for accurately distinguishing between different types of fairness and implementing them.

References

Gasser, U. (2023). An EU landmark for AI governance. Science, 380(6651), 1203. https://doi.org/10.1126/science.adj1627

Tabassi, E. (2023). Artificial Intelligence Risk Management Framework

(AI RMF 1.0). https://doi.org/10.6028/nist.ai.100-1

By Reginald Kiryowa


  • What key elements are necessary to make a framework effective?

The critical aspect of any framework is stakeholder buy-in. A well-thought-out framework backed by solid data and research has a higher chance of success, but even the most well-crafted plan will fail if the people involved do not believe in it. To achieve this, leaders must maintain open communication throughout the implementation process and address any issues that may arise to ensure that stakeholders remain engaged and invested in the plan’s success.

By Hunter Patterson www.linkedin.com/in/hunter-patterson-2315641ba

 

4 Practical Ways for Businesses to Manage Cyber Risk

by Chuck Brooks

Link: 4 Practical Ways for Businesses to Manage Cyber Risk in 2024 (forbes.com)

 

 

Cyberattacks are becoming more common in the digital ecosystems we utilize for both personal and professional reasons. In the past year alone, hundreds of millions of private records from banks, ISPs, and retail establishments have been made available to the public.

The Covid pandemic's impact on work habits may be partly to blame for this rise in violations. The previous few years have seen a sharp shift in work to remote and hybrid workplaces. The evidence indicates that hackers took advantage of the gaps and vulnerabilities in the company's security after accepting this adjustment. The last two years have surpassed all prior records in terms of data lost due to breaches and the sheer volume of cyberattacks on people, corporations, and governments.

Businesses and governments are starting to grasp the seriousness and complexity of these cyber threats. Some of the biggest concerns are ransomware attacks, data breaches, DDoS attacks, misconfiguration, and major IT failures.

The recent wave of major industrial and government cyberattacks serves as an example of the growing threat. The usage of cutting-edge technologies like 5G, AI, and machine learning, as well as growing tactical cooperation among hacker organizations, poses new risks due to their increasingly sophisticated threats.

The reactive mindset has changed as a result of a series of wake-up calls, including significant intrusions by highly skilled threat actors against multiple high-profile targets (including Solar Winds, Colonial Pipeline, OPM, Anthem, Yahoo, and many more). These revelations have exposed a flawed approach to data defense and operating with passive preparedness.

For businesses, there are four basic ways to manage cyber risk in a growing digital threat environment. They include being 1) proactive in security, 2) continuously testing software code and applications, 3) having a risk management and resilience plan, and 4) preparing for the new landscape of emerging technologies.

 

The Need for Businesses to be Proactive in Security

Being proactive in the ever-evolving digital landscape means doing more than just hiring people and buying new equipment. Creating a cybersecurity framework is also essential since specific circumstances could necessitate the use of biometrics, analytics, encryption, authentication, tactical measures, and ongoing diagnostics and mitigation. Proactive cybersecurity helps to ensure business continuity, to put it briefly.

To maintain continuous business operations, risk assessment and incident handling are the main components of effective methods for minimizing the consequences of cyberattacks. It's critical to keep up with changes in the dangerous landscape and to be ready for anything that might happen. A risk management strategy needs to give top priority to situational awareness assessment, information sharing, and resilience planning.

A proactive cybersecurity commitment requires the completion of a cyber vulnerability risk assessment. This action item is one of the most crucial first steps in cybersecurity best practices. A risk assessment can help you improve overall operational cybersecurity and quickly deploy solutions to protect critical assets from malicious cyber attackers by quickly identifying and prioritizing cyber vulnerabilities.

A comprehensive risk management plan should include cyber-hygiene best practices, instruction, and training; use policies and permissions; network access configuration; code and application testing; device management; application limits; and regular network audits.

A security strategy's specifics can vary based on the circumstances, but the threads that hold it all together are situational awareness and meticulous communication skills for critical communications in an emergency. The United States government and businesses adhere to the National Institute of Standards and Technology's (NIST) slogan, which is "Identify, Protect, Detect, Respond, Recover."

 

The Importance of Testing Software Code and Applications

Software code testing is a crucial part of information technology product validation. If the testing process is not followed, the final product may include flaws that put a business or organization in danger. One way to ensure the ultimate quality of the goods in software development is to locate and fix errors and misconfigurations. The early detection and correction of flaws and misconfigurations in the software development lifecycle enable planning and cost savings.

Application security testing, which searches for potentially exploitable malware, misconfigurations, or code vulnerabilities in programs and apps, needs to be the first step in that assessment process. Preventiveness and preparedness start with identifying the knowns and unknowns in the code that underpins the different operating networks and applications that will define our digital future.

New code, especially third-party software, needs to be thoroughly identified, assessed, and validated before it is put on the network. The members of your cyber security team should monitor third-party advisory websites such as US-CERT and BugTraq for newly found vulnerabilities.

Even if there is a danger associated with fresh code, many apps and programs may already be operating on antiquated hardware that has security flaws and open doors. Thus, in addition to any new code, legacy code also needs to be checked for patches as part of a vulnerability assessment.

Every program is built on software code, and standards are required to maximize performance and spot flaws. Penetration testing and visibility scanning, which entail confirming and validating the susceptible source code, can accomplish this. The primary objective of the testing and validation techniques is to identify issues before they can contaminate devices and networks.

Software testing, evaluation, and validation are made considerably more difficult by the need to foresee the unknown threats that are typical of cybersecurity breaches, even though the known may be physical. One of these unknowns is locating concealed malware that is outside the reach of sandboxes, signature-based systems, and other behavioral detection methods.

The grim reality is that cyber-breaches are a dynamic threat since criminal hackers are always refining their tactics and skill sets. Cybercriminals these days employ increasingly complex evasion techniques, some of which can even disable malware detection tools. To get past machine learning code and evade anti-malware detection, these thieves usually employ stolen certificates that are sold on the dark web or underground market. Code injection and memory space alteration are used as an exploit kit is injected into the target system. Generative AI is significantly enhancing criminal hacker capabilities in those areas. The government and business sectors must work harder to address and contain cyber threat issues.

Beyond the use of conventional vulnerability scanners and manual penetration testing, testing needs to account for the tactical, behavioral, and ever-more-complex attack surface that hackers are targeting. It also needs to be automated to keep up with the speed at which the ever-evolving cyber world is changing. Developing defensive strategies and anticipating the moves of malicious cybercriminals are prudent measures to improve cybersecurity. It is accomplished through continuous validation testing.

Ongoing behavioral validation testing based on digital and human intelligence inputs makes it possible to close the gap in protection and discovery. Simulation results can be obtained quickly, frequently, and independently of the tester's skill level—a point that may introduce vulnerability.

 

Having A Plan for Business Continuity and Cyber-Resilience

Remedial measures are essential to continuity since breaches will always happen. To maximize resilience, industry and government entities should set up incident response plans that include mitigation, business continuity planning, and secure backup procedures in case networks and devices are compromised. Training and tabletop exercises can assist in implementing incident response plans in the event of a genuine incident.

Training information security personnel, establishing automated detection and backup systems, and optimizing response processes, cyber-resilience, and company continuity after an intrusion require ongoing development.

Since information sharing keeps the corporate and government sectors updated on the latest ransomware, viruses, malware, phishing, insider threats, and denial of service attacks, it also plays a critical role in resilience and business continuity. Sharing information also results in the creation of working procedures for resilience and lessons learned, which are essential for the success of commerce and the prosecution of cybercrimes.

 

Meeting The Security Challenges of Emerging Technology

Emerging technology is a tool that both threat actors and cyber-defenders can employ. The current state of cyber threats includes artificial and machine intelligence, quantum computing, the Internet of Things, 5G, virtual and augmented reality, and more.

A possible cybersecurity route that blends machine and artificial intelligence is automation. Artificial intelligence (AI) will significantly speed up security. It will enable real-time analysis and threat identification. Companies will be able to monitor activity within their system and spot any strange activity.

Artificial intelligence (AI) may be used by malevolent hackers to find vulnerabilities and automate phishing attempts, which will jeopardize continuity and resilience if it is not employed, or its implications are not recognized. AI and numerous other cutting-edge technologies will soon drastically change operational models and security. To preserve cyber-resilience and business continuity over the next 10 years, it will be imperative to tackle new and more sophisticated attacks.

Cybersecurity needs to take center stage if businesses are to thrive in today's complicated emerging technology threat environment. Being proactive instead of reactive makes sense for everyone working in the digital environment. Many proven cyber risk management approaches can be used to fortify defenses and plug holes. One theme runs through all risk postures: do not risk becoming complacent in the face of growing cyberthreats and dangers.

 

3 #Cybersecurity Trends to Watch - #AI #QuantumComputing & #SpaceTech

Avrohom Gottheil @avrohomg

Chuck Brooks highlights how AI aids in threat detection, while quantum computing poses new risks & opportunities. Are you prepared for these trends?

Link: Avrohom Gottheil on X: "3 #Cybersecurity Trends to Watch - #AI #QuantumComputing & #SpaceTech @ChuckDBrooks highlights how AI aids in threat detection, while quantum computing poses new risks & opportunities. Are you prepared for these trends? Reach out to get featured on the #AskTheCEO Podcast! https://t.co/Av1kiILkO8" / X

 

 

 

The Growing Cyber Threat to Industrial OT

Link to podcast: https://www.canva.com/design/DAGKqeyu_ec/vtnURgNtbzgXBR8atKPEqQ/edit

 

 

 

- By Chuck Brooks (SME, U.S. Department of Homeland Security)

Original link of post is here

Read more…