Credential Stuffing: Fight Back Against Bot Attacks

by Michael Lynch, InAuth Chief Strategy Officer

Credential compromise—which encompasses the theft, spilling and stuffing of user account information – has remained the methodology of choice for committing fraud for a long time. It entails infiltrating a company’s systems, stealing credentials like email addresses, user IDs and passwords, and then either using them directly for theft or selling them on the dark web to other criminal actors.

Its longevity can be attributed to ongoing success enabled by several systematic failures, including end-users’ propensity to recycle passwords from site to site, companies’ failure to identify and report compromises in a timely manner, weak systems security measures, as well as a hefty return on investment for fraudsters.

Credential stuffing plagues both businesses and end-users who transact across digital channels in increasing numbers and with increasing frequency, resulting in both hard-dollar costs and other, less obvious, but equally costly, ramifications.

Fortunately, the risk of credential compromise can be mitigated if you know what to look for and appropriate technology measures are deployed to combat it before it happens.

Credential compromise includes a complex ecosystem of activities and exploits common consumer behaviors. After obtaining credentials through fraudulent means, fraudsters must then test the validity of the credentials in order to demand a higher price for the information. One means of testing credentials involves credential stuffing, in which criminal actors employ automated means (bots) to test stolen passwords en masse against websites.

Credential stuffing involves mass testing of stolen login IDs and passwords using bots to automate the process. Bots in this context refer to malware infecting one or more computers or mobile devices that allows a criminal actor to takeover, control and use the infected machines to perform automated tasks, such as attempting account logins over numerous sites using stolen credentials. Bots are essentially the tool cybercriminals use to weaponize stolen credentials.

Bots: A Vexing Problem

Bots can be particularly vexing for enterprises that operate over self-service digital channels. Traditionally deployed over desktop machines, bots are also now leveraging mobile devices. Bots are masters of impersonation, making them difficult to detect on the surface, often appearing as typical device configurations, using a different IP address for every attempt and operating on known browsers, like Chrome or Safari. The very nature of commandeering an armada of ordinary machines makes bots exceptionally effective.

In many cases, bots can be engineered to make Web traffic appear to originate in the U.S., while actually originating in China or Russia, for example. Bots are also increasingly growing more sophisticated – they can load JavaScript, hold onto cookies, and can randomize their IP address, headers and user agents. And they employ multiple methods of accessing the sites they attempt to test, including headless browsers, browser automation tools, and man-in-the-browser malware, in addition to the ability to execute JavaScript, etc.

Fortunately, using a combination of low and high-tech approaches to detection, enterprises can reduce the likelihood and damage inflicted by a bot attack.  Using a variety of techniques to identify and screen-out bots is a crucial factor in slowing and stopping them before they inflict costly damage both in terms of expense and reputation.

Combating Bots

On the low-tech end of the spectrum, a bot attack may appear as a spike in site traffic or velocity. Where traffic refers to an increased number of visits, velocity refers to a spike in traffic generated by one device. Either statistic may be affected based on how widely the bot is distributed.

Site statistics should be reviewed regularly to identify traffic patterns and investigate if anything unusual appears. Other out-of-the-ordinary occurrences to remain on the lookout for include a higher-than-usual login failure rate and downtime precipitated by increased site traffic.

In addition to employing a keen sense of observation, higher-tech solutions also exist to slow or stop bots.

Technology that can detect potential velocity attacks can be used identify and screen-out the bots. These solutions work by flagging devices that are used to perform multiple unusual behaviors (usually at a high rate of speed). If a device performs multiple login attempts on multiple accounts over a short period of time, this could signal the use of a bot.

However, many of these bot detection tools fall short of true identification because they rely on IP addresses or cookies in their model. This method of identification is easily thwarted by sophisticated bots that change their IP address continually or clear/disallow cookies. Sophisticated bots like these require more sophisticated screening technologies.

Such tools make it easier to employ both static techniques, such as detecting the presence of malware on the device, and a more complete behavioral analysis—detecting a high number of attempts, a high number of failures, unusual traffic patterns, unusual location or repeated attempts from the same location, unusual speed of access attempts—that is more accurate and not so easily fooled.

Aside from bot detection, deploying security solutions that employ multi-factor authentication (MFA) is also a smart strategy for detecting and preventing fraud across the board. Solutions that facilitate a shift away from traditional password reliance offer the strongest level of identity verification. A permanent device ID is a way to identify a device and its riskiness. A mobile phone, for example, has thousands of unique identifying attributes that are part of the device itself and can be used to uncover and analyze risk factors that could lead to potentially fraudulent activities.

Credential compromise isn’t going away any time soon. It’s essential that security professionals employ every weapon in their arsenal—from monitoring, to bot detection, device authentication, identity verification and malware prevention solutions—to avoid costly financial and reputational damage.
About the Author

Michael Lynch is InAuth’s Chief Strategy Officer and is responsible for developing and leading the company’s new products strategy, as well as developing key US and international partnerships. He brings two decades of experience in key roles within financial services, consulting, and Fortune 500 companies, specializing in security and technology leadership.

 

(173)

Share

The Reality of Cyberwarfare

Earlier this year, it was exceedingly popular for tech journalists to write columns about the future of international conflict: Cyberwarfare. Instead of (or in addition to) building and maintaining physical armies of human soldiers and advanced weaponry, it was written that governments would soon develop arsenals of computer programs designed to launch attacks on countries’ digital assets, pilfering sensitive data or disabling vital systems. In most of these posts, journalists used language to indicate that cyber warfare will occur in a not-so-distant future — but a future nonetheless.

Well, it seems that future has arrived.

North Korea’s Recent Cyberattacks

While North Korea’s failed attempts at developing long-range nuclear weaponry might dominate the news cycle, the communist country claims a long list of successful attacks on global powers — using only computers. For years, North Korea has perpetrated some of the most heinous cyberattacks in history, pilfering millions of dollars, debilitating large corporations, and stealing state secrets. Kim Jong Un’s army of hackers, which the American government has dubbed “Hidden Cobra,” have become increasingly bold, and their current cyberattacks are at least as devastating as conventional weapons.

Most recently, the FBI issued alerts regarding two types of malware developed by Hidden Cobra to infiltrate Western companies and governments. Both viruses spread through typical vectors — compromised downloads or links — and allow North Koreans remote access to Western devices, and both viruses seem to have been in use for at least a year, possibly more. The objective of this malware seems to be gaining intel on aerospace, telecommunications, and financial industries in the U.S. U.K. and U.S. intelligence agencies have linked other serious malware attacks with Hidden Cobra, including the WannaCry ransomware which shut down much of the U.K.’s National Health Services as well as other vital European businesses.

Yet, this is hardly the beginning. In 2014, one obviously North Korean attack incapacitated Sony, bringing down servers and leaking sensitive employee information, because the movie studio produced a satirical film about an assassination plot on Kim Jong Un. In 2016, Hidden Cobra gained access to the South Korean military intranet, stealing a significant number of incredibly classified U.S. and South Korean plans — including a very real assassination plot on Kim Jong Un. Additionally, last year the Bangladesh Central Bank lost $101 million to North Korean fraud, and most of those funds have not been recovered. It seems that Hidden Cobra is capable of infiltrating and ravaging nearly any device and organization with its cyberattacks.

What This Means for Regular People

Fortunately, though Hidden Cobra is obviously effective, it isn’t especially advanced. North Korea’s favored tactics include spear phishing, or disguising malware as content from a trusted source, and watering hole attacks, which requires corrupting a popular website and placing weaponized content there. There are some hints and whispers of more powerful techniques, like the development of botnets, but as yet, behavior of this type cannot be tied directly to Pyongyang like the other attacks are.

Furthermore, Hidden Cobra rarely attacks individuals. Though personal devices may fall victim to some of the North Korean malware floating around the web, computers not connected to high-profile organizations seem to be of little concern to North Korean hackers — so far.

Ultimately, average citizens with strong antivirus software have little reason to fear Hidden Cobra when it comes to protecting their personal devices and data. However, because North Korea can efficiently penetrate organizations of major size and scope, regular people may still suffer from data leaks, server shutdowns, and other large-scale attacks. Unfortunately, there is little that laypeople can do to ensure such protection; rather, business and government leaders must take responsibility for defense in the age of cyberwarfare.

How Cyberwarfare Might Escalate

Organizations are just beginning to accept that establishing cyber-defenses is a necessary cost of doing business. However, it isn’t enough to keep up with emerging attack tactics; organizations — especially government agencies — must be well ahead of Hidden Cobra and similar attackers to ensure safety and security. Yet, the U.S.’s cybersecurity standards are woefully out of date, leaving nearly every organization (and by extension, every citizen) vulnerable to North Korea’s cyberattacks.

Smart machines are rapidly being accepted as valuable tools to hackers — but they could just as easily work as forces of good. Indeed, cybersecurity experts agree that automation is the future of cyberwarfare. Machine learning allows programs to take in huge amounts of data to find trends and patterns. This can help organizations recognize looming attacks and help them develop stronger defense tactics before those attacks are successful.

Undoubtedly, cyberwarfare will get worse before it gets better. Experts predict a future of near-constant harassment by government-sponsored hacking teams, like Hidden Cobra or Russia’s Fancy Bear. The chaos in cyber-systems undermines prevailing international order, which benefits states looking to grab power fast. The only viable solution is to band together likeminded organizations with cutting-edge defense tactics that make cyberattacks less fruitful. Otherwise, it could be cyber nuclear winter relatively soon.

 

(179)

Share

Uber data breach – comment from Balabit

Csaba Krasznay, Security Evangelist, Balabit.
In the case of the Uber data breach, it has been reported that the hackers were able to access a private area of Github, and from there gain Uber’s log in credentials to Amazon Web Services – the area where Uber stored this data.  It is well established security best practice to implement a formal password policy for privileged accounts, including changing default passwords as a matter of course, but the truth is this is no more than a first line of defence.  Professional cyber-criminals have a multitude of techniques to hack privileged account credentials, so if organisations really want to mitigate the risk of a breach they have to put in place technology that monitors behaviour after the point of authentication. In other words, we have to assume that hackers are already inside the system, and look for triggers that can point to a malicious presence on the network.  Passwords alone provide a very thin level of cyber-defence against today’s hackers.
 These countermeasures should be kept in mind even in a DevOps environment as these resources are becoming an increasingly popular target for cybercriminals.

(66)

Share

Paradise loss

British businesses face renewed threats from hackers following the recent ‘Paradise Papers’ document leak, according to a leading cyber-security expert.

Andy Cuff, managing director of Computer Network Defence (CND), is warning all companies to be prepared for more sophisticated
attacks.

As the leaked information has proven to be a commodity with great value, hackers will be more motivated to steal similar data.

It is likely they will start to target areas geographically and will go after IP addresses without knowing which companies they belong to.

The information gained can then be sold to the highest bidder or used as leverage or to embarrass governments and countries.

The Paradise Papers were a huge leak of documents focused on offshore finance, which exposed businesses, celebrities and high net worth individuals.

Names mentioned included F1 star Lewis Hamilton, former footballer Gary Lineker, global computer and phone giant Apple and even heir to the throne Prince Charles.

As with last year’s Panama Papers leak, the documents were obtained by the German newspaper Süddeutsche Zeitung.

There were more than 1,400GB of data leaked, containing about 13.4 million documents.

With the high level of media interest around the world, organised hackers and nation states with nefarious motives will have been alerted to the potential benefits of data theft.

Andy, whose company is based in Bath and has offices on the Isle of Man, said: “After the Paradise Papers leak every business is at greater risk because it was proven beyond doubt that this type of information is an increasingly lucrative commodity.

“The extreme level of media interest will have also been observed by several rogue nation states who could use the information to influence the public opinion of other countries.

“They will know that stealing this type of information may facilitate the blackmail of influential people for their own nefarious gain, but also that its disclosure may embarrass an entire nation.

“These motives are strong and businesses really need to take extra security measures to ensure they are not victims.

“Hackers will quickly move onto new targets if the one they are trying is clearly secure.

“Internet computer addresses can be defined geographically – enabling hackers to target tax havens and British Overseas Territories with ease. They won’t discriminate between companies, or look at which is most immoral.

“Every business is at risk because hackers will steal any sensitive, valuable or potentially embarrassing data that they can get their hands on.

“If a nation state is backing these attacks then the hackers can do their work with virtually unlimited resources and with impunity.”

(49)

Share

FinTech’s Influence On Financial Services Reaches New Milestone

UK’s largest fintech event representing full eco-system of industry sees banks embracing and partnering their technology

Fintechs – once a thorn in the side of global financial organisations – have proven their worth across the world of finance, as major banks are now adopting their agile and user-friendly platforms.  A major event in London on 6 and 7 December will host the entire eco system around fintech – where all the progress the industry has made will be showcased and celebrated.

From market agitators to worthy global contenders

The majority of global financial services companies plan to increase fintech partnerships as 88% express concern they will lose revenue to innovators, according to a new PwC global report, Redrawing the lines: FinTech’s growing influence on Financial Services.   A large majority of global banks, insurers and investment managers intend to increase their partnerships with FinTech companies over the next 3 – 5 years and expect an average return on investment of 20% on their innovation projects.

 

The UK’s largest fintech event

FinTech Connect Live, the UK’s largest and best-attended fintech event by audience numbers, exhibitors and speakers takes place on 6 and 7 December at ExCeL London, where the full ecosystem of the industry will be represented.  Hosting more than 3000 delegates from 50 countries and 200 exhibitors, while featuring 250 speakers across 5 major conferences, FinTech Connect Live covers all of the major trends, innovations and challenges affecting financial services businesses and their customers.

Every sector of FinTech represented

Showcasing startups, fast growth SMEs, incumbent financial institutions, government agencies, the investment community, blue chip technology providers, professional services, accelerators, incubators and regulatory authorities, all key sectors will be covered through in-depth presentations and panel discussions.

Five dedicated fintech conferences: FinTech Live, InsurTech Live, PayTech Live, Cloud Finance Live , FinTech Founders Forum

Delegates will be able to target the areas of greatest interest.  The two-day conference programme is broken down into five main conferences: FinTech Live (covering the fall-out of BREXIT and its impending impact on UK fintech, PSD2 and open banking, alt-fi, artificial intelligence, blockchain and future trends), InsurTech Live, PayTech Live, Cloud Finance Live and the FinTech Founders Forum, with keynote sessions covering major market drivers and inhibitors before the agenda breaks into a series of micro-conferences.

Speakers: From government, big banks to disruptors

Featuring more than 250 speakers, FinTech Connect Live will host keynote presentations from senior authorities such as Stephen Barclay, Economic Secretary to the Treasury, in addition to Theresa May’s Business Ambassador for FinTech, Alastair Lukies.  Big banks and professional service giants ranging from Barclays, Santander, HSBC, Lloyds Banking Group, Ernst & Young and RBS will share their views on the revolutionary solutions which are shaping the future of fintech.  Other emerging names such as Metro Bank, Starling Bank, Revolut, Tandem Bank, Syndicateroom, Kantox and LendInvest make up a raft of challenger banks, FX providers and alt-fi companies, who are the rising stars of the industry.

Steve Clarke, founder of FinTech Connect Live, now in its third year, commented:

“Financial institutions and fintechs face a number of challenges currently, but as is often the case, they create opportunities, and the most innovative businesses will prosper.  The impending PSD2 and GDPR legislation will see financial institutions forced to rethink management of customer data while at the same time providing tremendous opportunity to new market entrants.  The extent to Brexit’s impact on issues such as funding, talent management and trade is still unknown and these are all key subjects we will explore. With thought leaders covering every aspect of fintech we expect the event to be a hothouse of ideas, networking and business.”

Taking place at ExCel London on Wednesday 6 and Thursday 7 December, FinTech Connect Live opens daily from 9:00 – 17:30

(76)

Share

Frost&Sullivan, J’son&Partners, Baker McKenzie, KPMG on the Future of Business in the Digital Economy at All-over-IP 2017

Gazing intensely into their respective crystal balls, Frost&Sullivan, J’son&Partner, Baker McKenzie and KPMG are coming to All-over-IP 2017 next week with predictions for 2018 and beyond, highlighting digital transformation, Industry 4.0, Cybersecurity, Big Data, Artificial Intelligence, Identity Management and their impact on businesses in Russia.

If you haven’t already registered to visit, fill in the form online to learn how you can leverage the show services to make more connections with the right local distributors, system integrators and end-users.

Global Analyst Keynotes at All-over-IP 2017

  • Frost & Sullivan. Three Megatrends That Will Drive Businesses Into the Next Decade: Cyber Security, Big Data, Artificial Intelligence.
  • J’son & Partners. Understanding the Fourth Industrial Revolution in Russia.
  • Baker McKenzie. Smart Environment: High Expectations for End-Users and Challenges for Regulatory Agencies.
  • Benefits of Using Access Control Automation. Theory and Practice of Selecting an IDM Solution.
  • J’son&Partners. Services Powered by Smart Cities.

In 2017, All-over-IP offers the most powerful technology environment for Russian IT and security professionals with 16 conference halls, 90 hours of technology insights non-stop, 130 speakers, over 100 global and local exhibiting vendors – during 3 days. See for 2017 All-over-IP Agenda >>

Fill in the form online to visit All-over-IP 2017!

Join All-over-IP 2017 to educate the Russian market on advanced technology, connect with key sales-partners, get quality leads, increase your brand awareness, network with the local industry. Companies interested in exhibiting in 2018 should contact Alla Aldushina at aldushina@groteck.ru or Olga Fedoseeva at fedoseeva@groteck.ru.

10th Annual International ALL-OVER-IP 2017

Founded in 2008, All-over-IP is a networking platform for global IT, surveillance and security vendors, key local customers and sales partners where they share knowledge and exchange ideas that are financially rewarding for business. All-over-IP Expo brings together major brands to ensure the best marketplace for the latest technology and innovation, and to lead customers to the Next Big Thing.

Sponsored by AxxonSoft, Basler AG, dormakaba, Dahua Technology, Speech Technology Centre and Intra. Supported by The Russian Biometric Society.

 

10th All-over-IP International

November 22–24, 2017

Russia, Moscow, Sokolniki Expo

www.all-over-ip.ru

 

(78)

Share

BT and Airbus host 3 day shipping vessel cyber attack competition in London

42 of the UK’s most promising amateur cyber sleuths will compete in an ultra-realistic cyber defence simulation which will see them protect a fictional shipping company from live cyber-attacks.

The competition, which is a culmination of a year of qualifying rounds, is known as the Cyber Security Challenge UK Masterclass. The event will take place in an industrial-style simulated Security Operating Centre (SOC) in the home of British Shipping, Trinity House in London. It has been developed this year by global telecoms firm BT, in partnership with world-leading aeronautical company Airbus, leading networking and cyber security firm Cisco and the Cyber Technology Institute at De Montfort University. The competition is also supported by Checkpoint, Darktrace, 4 Pump Court, the National Crime Agency and the Bank of England.

The competition will see candidates take on the role of security consultants, brought in to investigate a suspected insider threat at fictitious shipping company Fast Freight Limited. They soon discover that a newly appointed COO is to blame for the missing files and that he has been working with cybercrime group Scorpius – a ‘notorious’ crime syndicate attacking organisations across the world and extorting them for money. Across the two-days challenges will defend the company from cyber-attacks, conduct forensic analysis and help to build a case against the corrupt COO, all using top-quality tools from the industry consortium’s portfolio and a unique platform created by the team at De Montfort University’s Cyber Technology Institute.

Caroline Noakes, Minister for Government Resilience and Efficiency said: “We face a shortage of cyber security professionals, not just here in the UK but worldwide. To address this, we are doing more than ever before to inspire people to pursue a career in cyber security. We will continue to work in partnership with organisations like the Cyber Security Challenge UK to make Britain secure, confident and prosperous in the digital world.”

At the end of the two days, each team will have to present evidence to a mock court of law, featuring real barristers, to ensure that all information has been obtained lawfully and that enough of a case has been brought to bring action upon the individual; a situation often faced by those in the cyber security industry where a crime has been committed.

The Masterclass is the grand finale of a year’s worth of online and face-to-face qualifying rounds, which has seen thousands of cyber amateurs compete against each other in qualifying competitions created by the Challenge’s sponsor community. This year the team will also be joined by six of the top talents from Cyber Security Challenge Singapore, to help build collaborative working networks between the two countries and showcase each nation’s talents.

Nigel Harrison, acting CEO of Cyber Security Challenge UK, said: “This event is designed to mirror challenges faced by leading industry experts, in order to identify the UK’s best talent. This year’s consortium has done an amazing job in constructing a truly engaging competition which the contestants can get stuck into. Traditional recruitment methods don’t work in the world of cyber security – often the most talented individuals don’t stand out on paper and events like this allow us to put the best talent in the country in front of many of the leading organisations in the country that are seeking more cyber security skilled workers.”

The final 42 British challenges represent the best amateur talent the country has to offer and will be assessed by government and industry experts on the same aptitudes sought by businesses today. These include technical proficiencies such as forensic analysis, incident response and live network monitoring, as well as soft skills including communication, leadership and management.

The cyber security industry is facing a critical skills shortage, with a projected shortfall of 1.8 million cyber security workers by 2022, according to a study by (ISC)². At a time when cyber-attacks are increasing in frequency and severity, the Challenge works with its sponsors like BT to bring more talented individuals, for whom there are no traditional pathways into the cyber security sector, to help defend the country’s economic prosperity. This aligns to the National Cyber Security Strategy, with the Challenge programme forming part of the Government’s £1.9 billion investment to significantly transform the UK’s cyber security

 

Over half of Masterclass finalists over the past six years have entered jobs in the industry. The best teams in this year’s Masterclass competition will win thousands of pounds of career-enabling prizes and the ultimate winner will be crowned the UK’s best cyber security talent of 2017.

 

Quotes from this year’s Masterclass consortium

 

Mark Hughes, CEO, BT Security, said: “This year’s Masterclass is very special for us at BT as we are not only supporting this exciting competition, but have been very much involved in the design of its final. It is through programmes like the Cyber Security Challenge that we can raise the profile of the industry and find tomorrow’s cyber experts that will help us close the skills gap in the industry. BT Security protects some of the best-known brands around the world as well as the critical national infrastructure in the UK. Only by attracting the best talent can we stay ahead and keep the nation safe from cyber threat.”

 

Kevin Jones, head of Cyber Security Architecture & Innovation, Airbus said: “Cyber security is of increasing importance not just to companies like Airbus, but also society as a whole.  In order to be able to combat the ever-growing cyber threat, we must be able to attract people to the sector who have the skills and competencies required.  Events like the Cyber Security Challenge UK plays a key role in showcasing the varied and challenging careers that are available within the cyber sector and provide a safe and representative environment within which the future cyber professionals can learn and develop the right skills and ethics.”

 

Scot Gardner, Chief Executive, Cisco UK & Ireland, said: “Whilst the attack that the candidates face may be fictional, the challenges are very real. Every industry is confronted with tackling security throughout their business. Whether through education and trust in their people, with the technology they use or the processes that they have in place. We’re delighted that our technology is able to help these individuals experience the environment as if it were a real-world scenario; detecting, evaluating and remediating the attacks underway as they progress throughout the event. Supporting the Cyber industry as it seeks ways to increase the availability of skilled professionals is very close to Cisco’s heart and we have just made a major commitment to the industry to ensure significantly increased numbers of individuals are suitably trained as threats continue to evolve.”

 

Professor Helge Janicke, Director of the Cyber Technology Institute and Head of the School of Computer Science and Informatics, De Montfort University said: “We were delighted to be invited to be part of the Consortium developing this year’s Masterclass final. Working alongside BT, Airbus and the other Consortium partners underlines our ethos of academia and industry working together to provide the full benefits to all of a safe, secure and resilient cyberspace.  As a sponsor of Cyber Security Challenge UK, we are also committed to nurturing future talent for the cyber security industry. In light of this, we are also pleased to be able to donate a fully-paid scholarship for our MSc in Cyber Security to one of the Masterclass winners.”

 

Dave Palmer, Director of Technology at Darktrace said: “Addressing the cyber skills shortage is instrumental to strengthening the nation’s cyber resilience. We find that the best cyber security professionals don’t always come from the most obvious of backgrounds, but from a wide range of areas and disciplines – from STEM subjects to humanities and arts. We are proud to support the Cyber Security Challenge UK Masterclass in the search for the next generation of cyber security talent.”

 

Paul Edmunds, NCCU Head of Technical Engineering at the NCA’s National Cyber Crime Unit, said: “The skills tested at the Cyber Security Challenge Masterclass have never been more vital to the UK. The NCA is a proud supporter of Cyber Security Challenge UK and those who qualified for this year’s Masterclass have done astoundingly well. They now have the best possible platform to showcase their talents and to learn more how they can contribute to the UK’s cyber security.”

 

Neal Semikin, Head of IT Security at the Bank of England said: “The Bank of England is pleased to be involved in the Cyber Security Challenge UK Masterclass for the third year running. Being a part of the Challenge enables us to get out and meet talented cyber enthusiasts who will be the new faces of the industry in the years to come. With ever changing and increasing threats, it’s more important than ever that those who will be keeping our organisations safe from potential threats and vulnerabilities in the future are given the opportunities to learn and hone their skills now.”

 

Matthew Lavy, Barrister at 4 Pump Court said: “If the corrupt COO is to be convicted for his crimes, it is not going to be enough for the competitors to work out what he did and how. They are also going to have to persuade the Court that their forensic work can be trusted – that the evidence is clean, that the chain of custody is secure, and that the logic of their analysis is sound. To do this they will have to explain the evidence they have and what it shows in language that a judge and jury can understand. I and my colleagues at 4 Pump Court are delighted to be helping put this year’s competitors through their paces by testing whether they have what it takes to give expert evidence in Court and play their part in ensuring not only that the cyber-attack stopped but also that justice is done.”

(189)

Share

14,500 Cybersecurity Professionals Join (ISC)² Online Community in First 30 Days

(ISC)² announced more than 14,500 cybersecurity professionals have joined the new online (ISC)² Community since its launch last month. The (ISC)² Community is an open forum for (ISC)² members and other security experts to connect, share best practices and help advance the cybersecurity profession.

“For me, (ISC)² give an opportunity to all members across the world to exchange their opinions and/or experience about a topic . As a result, we may see some new consideration about something we have not consider as important for our career. We see that currently, with the General Data Protection Regulation, which was considered by many people as an EU only issue and in fact impact a lot of business working with EU customers,” said Yves Le Roux, Co-Chair of the (ISC)2 EMEA Advisory Council, (ISC)².

“(ISC)² members represent some of the best minds in the cybersecurity field, and our new community provides a platform for them to directly collaborate on a wide range of issues, trends and workplace challenges,” said (ISC)² CEO David Shearer, CISSP. “It’s extremely exciting to see so many cybersecurity professionals join the community this quickly and immediately begin assisting one another with building careers, continuing their professional education, discussing proposed cyber legislation and more. The (ISC)² Community captures the pulse of the cybersecurity profession and offers tremendous insight into the challenges and opportunities security practitioners face every day.”

The (ISC)² Community is open to anyone interested in engaging cybersecurity professionals in discussions related to cyber, information, software and infrastructure security. Top conversations so far, include:

Join the Conversation

Visit community.isc2.org to learn what the world’s leading cybersecurity experts have to say about the latest security trends and issues facing the profession.

About (ISC)² 
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 125,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and EducationTM. For more information on (ISC)², visit www.isc2.org, follow us on Twitteror connect with us on Facebook.

(71)

Share