Additional Content Download
In the summer of 2015, Hacking Team, a well-known cyber security firm, was itself the victim of a cyber attack, losing over 400GB of confidential data that included source code, internal documents and sensitive emails.The incident has raised several key questions: How do governments know who to trust when it comes to working with solution providers? Will sensitive data ever be secure enough? And what can be done legally when contractors don't fulfill their promises?
It is well known that the cyber threats to industrial control systems are increasing in pace and complexity, but the extent to which human operators and technical infrastructures are adapting to these threats is less clear. Ian Buffey, Technical Director, Industrial Control System Cyber Security at Atkins, has worked with control systems for around 25 years, with the last ten of those on security for a products company. This experience has given him a considerable perspective on how people are going about protecting their systems, mostly in the field of critical national infrastructure (CNI).
In a recent Oil & Gas IQ survey it showed that most concerns are aimed on Hackivism (61%) and State actors (Espionage 20% & Cyber Warfare 8%). How confident are you that your current defense mechanisms can handle/detect Hackivism?
Download this exclusive and complimentary infographic below and find out what the oil & gas community answered to key cyber security questions!
The new head of GCHQ has piled the pressure on large tech firms including Google, Apple and Twitter to facilitate more open communications with government to shore up data privacy and security laws. Robert Hannigan wrote an article in the Financial Times suggesting that web giants including Facebook, WhatsApp and Twitter have become "command-and-control networks... for terrorists and criminals.” This article marks the first public outing for Hannigan since he was appointed GCHQ’s new director in April. He insisted that terrorist groups like ISIL had infiltrated the internet and embraced the use of social media to target and recruit new members. "They [US technology companies and social networks] aspire to be neutral conduits of data and to sit outside or above politics,” Hannigan wrote. "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and
NATO is currently undertaking the largest multination cyber defence exercise that will test the Alliance’s ability to defend its networks against a number of threats. The exercise, Cyber Coalition 2014, is taking place Estonia and involves over 400 technical, government and cyber experts operating from dozens of locations from across the Alliance and partner nations.
The threat of Islamic militants goes beyond car bombs, suicide vests and crude knife and gun attacks; it’s also in the cyber domain...
Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College delivered this presentation entitled 'What’s Past is Prologue' at 2016's CDANS conference. Download for a copy of the presentation which covered the following points:
Professional military education (PME) as a two way street to aid commanders, industry leaders, and politicians in shaping success in future conflict –conflict that will most certainly include cyber warfare.
- Determining what future combat power is and how to produce, adapt, and operate it under degraded & denied conditions will be critical to winning future wars.
- Moving from a tactical defense to a strategic offensive in conflict will require a multifaceted approach from military services, politicians, industry,and academics.
- We’ve played this game before and we must play it again – and practice
The Cyber Defence & Network Security Conference (CDANS) returns for its 12th year next January.
CDANS 2018 will confront the challenge of securing the distributed network; the agenda explores how to enhance your approach to threat intelligence, incident response, training and remote asset protection.
To learn more about the key topics that will be discussed, and our expert speaker line up, download the draft agenda.