BitDepthFeatured

Strengthening cybersecurity for your business

3 Mins read

Above: Lt Gen (Ret) Vincent Stewart. Photo by Laura Hatcher, press image courtesy LockHeed-Martin.

BitDepth#1395 for February 27, 2023

At the TT Internet Governance Forum in January convened by the TT Multistakeholder Group, cybersecurity professionals considered the essentials of hardening ICT business systems in the session The ART of Cybersecurity: Attacks, Risks and Threats.

Lieutenant General (ret) Vincent Stewart, director of the Port of Spain firm CyberEYE warned that, “It doesn’t matter how big or small you are; the cavalry is not coming. The adversary is interested in your network, and you are going to have to think your way through how you will defend that network.”

“That adversary ranges from nation states to criminals to hacktivists to people who just want to make your life miserable.”

Ricardo Martinez, Chief Revenue Officer of the DigitalEra Group, warned of the changing motivations of black hat actors.

“Before it was kind of an honour or just an ego boost to say I hacked an organisation,” Martinez said.

“Today it’s, I got money in the bank and now I have my cryptocurrency and I can go buy a Ferrari with it; so this is a very different kind of motivation driving these adversaries.”

Insurance isn’t a solution he said.

“Businesses buy it as a way of avoiding doing anything to protect themselves. If something happens, I’ll just tap into that. What we’ve seen from cyber insurance providers is that they are making it more difficult to tap into those resources. They won’t just give you blank-check cyber insurance.”

“Now they’re asking to see your security programs. Show us that you have all these mitigating tools in place. You need a baseline of cybersecurity awareness and a program established before you can access it.”

“What’s also missing is an incident command structure,” said Fortinet’s Caribbean Systems Engineering Manager, Emmanuel Oscar.

“In the private sector and even certain governments, there seems to be a lack in of planning for disaster recovery or business continuity.”

“When something happens, you don’t just run around. We focus on what’s happening. Usually, companies are most vulnerable when there’s an incident and they have to look at a secondary type of attack.”

“This is where partnership with experts or services can help and add value to your incident response. This is where cooperation in governance and between different islands and different entities can be important.”

Emmanuel Oscar

Key to incident planning for cybersecurity attacks, explained Anthony Peyson, president of the International Information System Security Certification Consortium’s Caribbean Chapter, is knowing how long your organisation can continue before it fails.

“It is a difficult thing. I remember asking a CEO that question, and there was difficulty in answering that question. Every CEO, every business owner doesn’t want to think about something like that but it’s very important for you to think about that. How long would it take to get back up and running so that you would know how much you will spend on the resources to protect your business.”

“Your best firewall is an educated workforce,” Stewart said.

“There are some very basic things that organisations can do, no matter how many resources they have. They have to know what their network configuration looks like. They must have updated operating systems. They’ve got to have antivirus and malware protection. They’ve gotta educate their workforce. They can’t be lazy about passwords.”
“It’s stunning to me. Organisations that I go into and the password is password. Some of them get really clever, and they do uppercase P and they add 1234 on the back-end and they think that that’s sufficient.”

“While you may not think your identity is important, the adversary wants your identity because they can use that to move laterally inside your organisation inside your network. So how do we protect our identity?”

“We don’t change our phone numbers very often, and in many cases, if I’ve got your phone number, that’s a pretty good start to understanding your identity. And building from there, to your e-mail, the address of your organisation.”

“Corporations will probably, and maybe this is too stark, will probably do the minimum. At least two organisations that I had the opportunity to look at had assessments that identified their vulnerabilities. They knew what the risks were, and they decided not to invest in mitigating that risk.”

“Unless governments and institutions apply consequences for failure to act and hold these organisations accountable, they will continue to do only the minimum and only what will generate the revenue margins to keep their business in place.”

“So I’m a strong proponent of holding organisations and corporations accountable with significant consequence, so they understand the loss of revenue when they are compromised.”

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedPress Releases

Samsung extends Knox security to its home appliances

2 Mins read
Knox Matrix is a security solution that comprehensively protects connected devices and networks using private blockchain technology.
Press Releases

Samsung announces US$7 billion profit attributable to AI chips

1 Mins read
This extraordinary growth is primarily attributed to the surging demand for high-end chips essential for powering AI applications.
BitDepthFeatured

Practical steps to reducing cybersecurity risks

4 Mins read
The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

The silence of the breaches

1
0
Share your perspective in the comments!x
()
x