Crown Prince attends Saudi Cup horse race in Riyadh    Bergwijn, Benzema lead Al-Ittihad to dominant 4-1 Clasico win over Al-Hilal    Saudi U-20 team secures spot in 2025 FIFA U-20 World Cup with last-minute winner over China    Saudi Media Forum concludes with key industry partnerships and award recognitions    Hamas hands over six Israeli captives in latest prisoner exchange    US and Ukraine near deal granting US mineral rights in exchange for military aid    Israeli forensic institute confirms remains of hostage Shiri Bibas    Australia presses China for answers over reported live-fire exercises near its coast    PIF seeks to expand US investments despite restrictions, says governor Al-Rumayyan Saudi sovereign fund launched 103 companies across 13 sectors, aims to attract more foreign talent to Saudi Arabia    Saudi minister holds high-level talks at FII Miami to boost AI, tech, and space partnerships    Al-Ettifaq stuns Al-Nassr with late winner as Ronaldo protests refereeing decisions    King Salman: Our nation's path has remained steadfast since its founding    Imam Mohammed bin Saud: The founder of the First Saudi State and architect of stability    King Abdul Aziz: Founder of the Third Saudi State and leader of modern Saudi Arabia    'Neighbors' canceled again, two years after revival    Al-Tuwaijri: Not a single day has passed in Saudi Arabia in 9 years without an achievement Media professionals urged to innovate in disseminating Kingdom's story to the world    Proper diet and healthy eating key to enjoying Ramadan fast    Saudi Media Forum panel highlights Kingdom's vision beyond 2034 World Cup    AlUla Arts Festival 2025 wraps up with a vibrant closing weekend    'Real life Squid Game': Kim Sae-ron's death exposes Korea's celebrity culture    Bollywood star Saif Ali Khan 'out of danger' after attack at home in Mumbai    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Experts call for boosting necessary cyber security culture as threats grow
Published in The Saudi Gazette on 09 - 09 - 2019

Under the theme "Cyberspace, The New Frontier Deception, Orchestration and Blackholes", VirtuPort inaugurated the 7th edition of the Middle East and North Africa Information Security conference 2019, Monday in Riyadh.
The conference was attended by world experts and international companies specialized in cybersecurity.
The CEO of the VirtuPort, Eng. Samer Omar, stressed, during his inaugural speech, on the importance of the new edition that comes at a time of growing cyber threats. The conference will play an integral role in sustaining the communications between senior information security professionals in the MENA region, and contributing to strengthening the necessary cyber security culture; such as compliance, legislation, governance, cloud security and others.
According to Bahi Hour, SE Director at META - Attivo Networks, 87% of breaches took minutes or less. Additionally, only 3% of breaches were discovered as quickly, while, 68% of them took months or years to be discovered.
During his speech titled ‘Deception-based Threat Detection Myths & Realities – Changing the Game on Modern-day Attackers', Bahi Hour stated that according to the Mandiant 2018 M-Trends Report, the time taken to discover the breaches and attacks is up to 106 days. This number increases in the Middle East & Asia Pacific where companies take even more time to discover the breaches.
"Despite the misconception that deception is hard to deploy, the reality is machine learning, centralized management, and artificial intelligence make this easy", Said Hour. He further added "another widely held misconception is that deception won't work against Real Attackers, the reality is accurate, realistic, and authentic Deception technology can fool even the most experienced attackers".
During his speech titled "Connected Threat Defense', Hussam Abu-Rida, Technical lead at Saudi Arabia – Trend Micro, pointed out, "Borderless enterprise and rising sophistication of threats has made it harder than ever for IT to protect their organizations". He further added "typically, these organizations are deploying a variety of security products from different vendors, which makes it harder manage the many points of security".
"Our vision is to make the world safe for exchanging digital information. From a product perspective, this means that organizations need to be in a position to manage risk before, during and after an attack", Abu-Rida explained, "This requires a layered approach to security – leveraging a range of techniques that all work together – sharing threat intelligence across the enterprise and speeding the time to response".
Yasser Elmashad, a cyber security specialist at F5, said during his speech during the conference that his company published a specialized report titled " Lessons Learned from a decade of DATA breaches ". The researchers analyzed 433 confirmed breaches in 37 different areas across 27 countries. The report concluded, 35% of breaches occurred as a result of attacks targeting application services, such as Apache, Node.js, etc., while 33% of attacks targeted user IDs, meaning that 86% of successful breaches occurred at the app developer's or owner's end rather than at cloud service providers end.
During the "Protecting your applications and data in an evolving risk environment" session, Moataz Al-Tarif, F5 Head of Presales Saudi, Egypt and North Africa, reviewed a report by Garner that the number of IoT devices and solutions will reach to nearly 20.4 billion devices. Currently, 50% of the world's population is online, but the use of the IoT platform is still limited. Furthermore, 50% of the companies surveyed confirm security concerns remain the biggest argument against the prevalence of the Internet of Things.
George Daglas, Co-founder and Chief Operations Officer at Obrela Security Industries, explained speech titled "Building Cyber Perceptibility" that at Obrela, they use electronic security analysis, complex risk management strategies and to protect their clients dynamically by identifying, analyzing and preventing cyberthreats in the shortest possible time.
He added: "Some external factors that contribute to the increase of cyber-attacks risks include the rapid development of technology and the high profitability of cybercrime, while the internal obstacles faced by companies against cyber threats are the lack of specialized human resources and the existence of internal communication problems within companies, in addition to the geographical separation factor. "
Over the past three years, more than 11.7 billion records and more than 11 terabytes of data have been leaked or stolen in publicly disclosed incidents, said Patrick Grillo, Senior Director, Security Strategy at FORTINET, at the #MENAISC2019. He further explained explained that the Shamoon 2 virus - for example - penetrated a number of oil and gas companies across the Gulf and scanned the discs behind political messages, and in December last year the virus Shamoon 3 paralyzed and infected a number of Gulf IT companies.
He gave the conference some lessons learned from the Shamoon Viruses 1 to 3 highlighting " organizations need to install and strengthen identity management systems and access privilege, install multi-factor authentication technology, develop emergency response solutions, and implement strategies for periodic security assessments and testing."
On his part, David Williamson, Director, Cisco Customer Exeprience explained that despite that most companies automate by using such tools as Microsoft SCCM, SolarWinds, people generally hesitate to automate in their own organizations. This is because they fear that it'll go wrong and cause unintended, serious consequences on their network and systems – due to bad input data, failure of automated process or failure of automated controls.
As 5G enters the markets around the globe, Lee Chen, Founder and CEO of A10, explained that the most common challenge facing 5G technology is security. He went on to explain "94% are concerned about security in 5G while 62% think DDoS protection is most important. It seems then that better security measures will surely improve the integration of 5G into our digital lives."
Moreover, during the #MENAISC2019, he shed light on cyber attacks on IOT are slowly becoming the norm. Recent Data from 2018 have concluded that peak attack size has reached a whopping 1.7 Terabits per second.
During his speech, Roland Daccache – Team Leader – Systems Engineering – META at CrowdStrike, warned that adversaries are Getting more sophisticated and smarter. Nation states attack are the most sophisticated and are considered to be a non-malware attack which helps the virus avoid detection by antivirus, IDS, next-gen firewalls, etc. Adding to that, they may look like a typical IT admin and will not exploit vulnerabilities. – SG


Clic here to read the story from its source.