Public Security chief launches digital vehicle plate wallet service    'Action is in our nature': 4th Saudi Green Initiative Forum to be held at COP16    Pop hit APT too distracting for South Korea's exam-stressed students    Saudi Arabia's inflation rate hits 1.9% in October, the highest in 14 months    Mohammed Al-Habib Real Estate Co. sets Guinness World Record with largest continuous concrete pour    PIF completes largest-ever accelerated bookbuild offering in MENA region    Saudi Arabia signs renewable energy program with Azerbaijan, Kazakhstan and Uzbekistan at COP29    Australia and Saudi Arabia settle for goalless draw in AFC Asian Qualifiers    Human Rights Watch accuses Israel of mass displacement in Gaza amounting to war crime    Thousands of protesters march in Paris ahead of tense football match between France and Israel    Republicans win 218 US House seats, giving Donald Trump control of government    UN sounds alarm at Israel's 'severe violations' at key buffer zone with Syria    Order vs. Morality: Lessons from New York's 1977 Blackout    Saudi, Indian foreign ministers co-chair Cooperation Committee meeting in New Delhi    South Korean actor Song Jae Lim found dead at 39    Don't sit on the toilet for more than 10 minutes, doctors warn    'Marvels of Saudi Orchestra' to dazzle audience in Tokyo on Nov. 22    Saudi Champion Saeed Al-Mouri scores notable feat in Radical World Championship in Abu Dhabi with support from Bin-Shihon Group    Rita Ora is tearful in tribute to Liam Payne at MTV Awards    France to deploy 4,000 police officers for UEFA Nations League match against Israel    Al Nassr edges past Al Riyadh with Mane's goal to move up to third    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Experts call for boosting necessary cyber security culture as threats grow
Published in The Saudi Gazette on 09 - 09 - 2019

Under the theme "Cyberspace, The New Frontier Deception, Orchestration and Blackholes", VirtuPort inaugurated the 7th edition of the Middle East and North Africa Information Security conference 2019, Monday in Riyadh.
The conference was attended by world experts and international companies specialized in cybersecurity.
The CEO of the VirtuPort, Eng. Samer Omar, stressed, during his inaugural speech, on the importance of the new edition that comes at a time of growing cyber threats. The conference will play an integral role in sustaining the communications between senior information security professionals in the MENA region, and contributing to strengthening the necessary cyber security culture; such as compliance, legislation, governance, cloud security and others.
According to Bahi Hour, SE Director at META - Attivo Networks, 87% of breaches took minutes or less. Additionally, only 3% of breaches were discovered as quickly, while, 68% of them took months or years to be discovered.
During his speech titled ‘Deception-based Threat Detection Myths & Realities – Changing the Game on Modern-day Attackers', Bahi Hour stated that according to the Mandiant 2018 M-Trends Report, the time taken to discover the breaches and attacks is up to 106 days. This number increases in the Middle East & Asia Pacific where companies take even more time to discover the breaches.
"Despite the misconception that deception is hard to deploy, the reality is machine learning, centralized management, and artificial intelligence make this easy", Said Hour. He further added "another widely held misconception is that deception won't work against Real Attackers, the reality is accurate, realistic, and authentic Deception technology can fool even the most experienced attackers".
During his speech titled "Connected Threat Defense', Hussam Abu-Rida, Technical lead at Saudi Arabia – Trend Micro, pointed out, "Borderless enterprise and rising sophistication of threats has made it harder than ever for IT to protect their organizations". He further added "typically, these organizations are deploying a variety of security products from different vendors, which makes it harder manage the many points of security".
"Our vision is to make the world safe for exchanging digital information. From a product perspective, this means that organizations need to be in a position to manage risk before, during and after an attack", Abu-Rida explained, "This requires a layered approach to security – leveraging a range of techniques that all work together – sharing threat intelligence across the enterprise and speeding the time to response".
Yasser Elmashad, a cyber security specialist at F5, said during his speech during the conference that his company published a specialized report titled " Lessons Learned from a decade of DATA breaches ". The researchers analyzed 433 confirmed breaches in 37 different areas across 27 countries. The report concluded, 35% of breaches occurred as a result of attacks targeting application services, such as Apache, Node.js, etc., while 33% of attacks targeted user IDs, meaning that 86% of successful breaches occurred at the app developer's or owner's end rather than at cloud service providers end.
During the "Protecting your applications and data in an evolving risk environment" session, Moataz Al-Tarif, F5 Head of Presales Saudi, Egypt and North Africa, reviewed a report by Garner that the number of IoT devices and solutions will reach to nearly 20.4 billion devices. Currently, 50% of the world's population is online, but the use of the IoT platform is still limited. Furthermore, 50% of the companies surveyed confirm security concerns remain the biggest argument against the prevalence of the Internet of Things.
George Daglas, Co-founder and Chief Operations Officer at Obrela Security Industries, explained speech titled "Building Cyber Perceptibility" that at Obrela, they use electronic security analysis, complex risk management strategies and to protect their clients dynamically by identifying, analyzing and preventing cyberthreats in the shortest possible time.
He added: "Some external factors that contribute to the increase of cyber-attacks risks include the rapid development of technology and the high profitability of cybercrime, while the internal obstacles faced by companies against cyber threats are the lack of specialized human resources and the existence of internal communication problems within companies, in addition to the geographical separation factor. "
Over the past three years, more than 11.7 billion records and more than 11 terabytes of data have been leaked or stolen in publicly disclosed incidents, said Patrick Grillo, Senior Director, Security Strategy at FORTINET, at the #MENAISC2019. He further explained explained that the Shamoon 2 virus - for example - penetrated a number of oil and gas companies across the Gulf and scanned the discs behind political messages, and in December last year the virus Shamoon 3 paralyzed and infected a number of Gulf IT companies.
He gave the conference some lessons learned from the Shamoon Viruses 1 to 3 highlighting " organizations need to install and strengthen identity management systems and access privilege, install multi-factor authentication technology, develop emergency response solutions, and implement strategies for periodic security assessments and testing."
On his part, David Williamson, Director, Cisco Customer Exeprience explained that despite that most companies automate by using such tools as Microsoft SCCM, SolarWinds, people generally hesitate to automate in their own organizations. This is because they fear that it'll go wrong and cause unintended, serious consequences on their network and systems – due to bad input data, failure of automated process or failure of automated controls.
As 5G enters the markets around the globe, Lee Chen, Founder and CEO of A10, explained that the most common challenge facing 5G technology is security. He went on to explain "94% are concerned about security in 5G while 62% think DDoS protection is most important. It seems then that better security measures will surely improve the integration of 5G into our digital lives."
Moreover, during the #MENAISC2019, he shed light on cyber attacks on IOT are slowly becoming the norm. Recent Data from 2018 have concluded that peak attack size has reached a whopping 1.7 Terabits per second.
During his speech, Roland Daccache – Team Leader – Systems Engineering – META at CrowdStrike, warned that adversaries are Getting more sophisticated and smarter. Nation states attack are the most sophisticated and are considered to be a non-malware attack which helps the virus avoid detection by antivirus, IDS, next-gen firewalls, etc. Adding to that, they may look like a typical IT admin and will not exploit vulnerabilities. – SG


Clic here to read the story from its source.