Threat Hunting Reduces Hacker Residence on a Breached Site

Average dwell time, where a hacker inhabits a breached system, is 200 days, said Bob Stasio of DreamIt Ventures, a cybersecurity company that hunts for intruders on organization systems. He has worked in security positions for IBM, NSA, FAA and NASA. Addressing Cyber Security Summit 2018, Stasio said that 80 percent of hacks are stopped […]

Read more

Bruce Schneier: Government Needs to be Part of the Cybersecurity Solution

“Everything today is a computer,” declared Cyber Security Summit 2018 keynoter Bruce Schneier, CTO, IBM Resilient. IoT is the “computerization” of the whole world, making exponentially complex the safeguarding of most of our devices. Schneier, author of many security-related books and the popular Schneier on Security blog, presented “Click Here to Kill Everybody,” the name […]

Read more

Email Continues to Account for 90% of Phishing Attacks

Based on their behavior, cyber attackers seem to agree that old, proven tools are hard to beat. Email remains a cost-effective go-to tool for launching a cyber assault, relying on a little help from the human element. Brandon Reid, Enterprise Sales Manager at Mimecast, an email security company, presented Anatomy of an Email-Borne Attack at […]

Read more

Cyber Security Summit Notes: Four Current Top-Line Policy Trends

Public policy trends drive what will happen with future cybersecurity regulation. Matthew Rhoades, Managing Director of the Cybersecurity and Technology Program at the Aspen Institute, reviewed four current top-line trends to attendees at Cyber Security Summit 2018. Rhoades’ list and comments: Data security and sensitivity is a driver in current discussions and legislation, domestically and […]

Read more

Patient Safety Unites Rival Medtech Firms

Cybersecurity challenges are turning natural competitors into willing collaborators as companies try to ward off the shared threat of attack.  By Michael Border “Oops, your important files are encrypted,” a May 2017 pop-up advised on the screens of an estimated 200,000 computers worldwide. The culprit was WannaCry, a cryptoworm that attacked computers running the Windows […]

Read more

Arduous Search Yields Security Best Practices

Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. […]

Read more

Target Cyber Security Chief Shares His Formula for Building a Loyal Team

Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers had worked at General Electric Corp. He is the man who came aboard two years ago as Senior Director of Cybersecurity to steer the team […]

Read more

Understanding Human Element in Cybercrime is Key to Stemming the Problem

  Summit Keynote Speaker Dr. Shima Keene presented The Nexus of Cybersecurity, Crime and Terrorism. She is a Director of the Conflict Studies Research Centre, Oxford, UK, and is affiliated with many law enforcement intelligence organizations. She advises on matters relating to national and global security including terrorism, organized crime, economic crime, cyber-crime and governance. […]

Read more

FireEye Threat Analyst Lists Current Cyberattack Statistics

Kevin Thompson, Threat Analyst for FireEye, earlier worked as a cyber analyst for the CIA, covering Eastern Europe and Russia and briefing numerous government agencies on future potential incidents. His analytical work has been used in Presidential Daily Briefings and as a case study in multiple training classes. He now educates FireEye clients and partners […]

Read more

Risks Factors Growing, Cyber Defense Only Partly Defined

Truman Center Policy Program Manager Dan Paltiel, a keynote speaker at Cyber Security Summit 2016, spoke on the current state of cyber defense in Cyber After 2016: Protecting Your Network in the New Political Environment. Earlier he was Program Coordinator and Research Assistant in the Strategic Technologies Program at the Center for Strategic and International […]

Read more

Teasing Out Data Jumble to Make Plots and Actors Emerge

Senior Product Manager Bob Stasio of IBM i2 Safer Planet was keynote speaker for Cyber Security Summit 2016. Prior to joining IBM, Mr. Stasio worked in threat intelligence programs at Bloomberg and global financial firms. He also has deep government experience having served at NSA’s Cyber Center, U.S. Cyber Command, U.S. Army’s Signals Intelligence Corps, […]

Read more