Hail Region municipality engages residents in city planning    Riyadh to host Saudi-UK expo "GREAT FUTURES" in May    Ukraine war: US secretly sends long-range missiles to help Kyiv    Searching for missing loved ones in Gaza's mass graves    Saudi Arabia welcomes panel's report on UNRWA's performance    IMF opens first regional office in Riyadh Al-Ibrahim: Saudi Arabia confirms commitment to diversifying its economy    Deputy tourism minister: Government fees in hospitality sector down 22% in 2024    EU raids offices of Chinese security equipment maker in subsidy probe    Saudi Shoura Council assistant speaker meets US Congress advisors    Abuthnain: Saudi Arabia achieves 77% reconciliation in labor disputes    King Salman undergoes routine medical checkup in Jeddah    Columbia's anti-war protesters dig in despite mass arrests and disciplinary action    Belgian man whose body produces alcohol in rare condition acquitted of drunk driving    Al Hilal's comeback effort falls short in AFC Champions League semi-finals    Australian police launch manhunt for Home and Away star Orpheus Pledger    Spice Girls reunite at Posh's 50th birthday    Swedish rider Eckermann wins 2024 Show Jumping World Cup in Riyadh    Aspiring fencer Josh Brayden aims for Olympic glory    Revenues touch SR3.7 billion in Saudi cinema sector since 2018    Beijing half marathon: Top three stripped of medals after investigation    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Experts call for boosting necessary cyber security culture as threats grow
Published in The Saudi Gazette on 09 - 09 - 2019

Under the theme "Cyberspace, The New Frontier Deception, Orchestration and Blackholes", VirtuPort inaugurated the 7th edition of the Middle East and North Africa Information Security conference 2019, Monday in Riyadh.
The conference was attended by world experts and international companies specialized in cybersecurity.
The CEO of the VirtuPort, Eng. Samer Omar, stressed, during his inaugural speech, on the importance of the new edition that comes at a time of growing cyber threats. The conference will play an integral role in sustaining the communications between senior information security professionals in the MENA region, and contributing to strengthening the necessary cyber security culture; such as compliance, legislation, governance, cloud security and others.
According to Bahi Hour, SE Director at META - Attivo Networks, 87% of breaches took minutes or less. Additionally, only 3% of breaches were discovered as quickly, while, 68% of them took months or years to be discovered.
During his speech titled ‘Deception-based Threat Detection Myths & Realities – Changing the Game on Modern-day Attackers', Bahi Hour stated that according to the Mandiant 2018 M-Trends Report, the time taken to discover the breaches and attacks is up to 106 days. This number increases in the Middle East & Asia Pacific where companies take even more time to discover the breaches.
"Despite the misconception that deception is hard to deploy, the reality is machine learning, centralized management, and artificial intelligence make this easy", Said Hour. He further added "another widely held misconception is that deception won't work against Real Attackers, the reality is accurate, realistic, and authentic Deception technology can fool even the most experienced attackers".
During his speech titled "Connected Threat Defense', Hussam Abu-Rida, Technical lead at Saudi Arabia – Trend Micro, pointed out, "Borderless enterprise and rising sophistication of threats has made it harder than ever for IT to protect their organizations". He further added "typically, these organizations are deploying a variety of security products from different vendors, which makes it harder manage the many points of security".
"Our vision is to make the world safe for exchanging digital information. From a product perspective, this means that organizations need to be in a position to manage risk before, during and after an attack", Abu-Rida explained, "This requires a layered approach to security – leveraging a range of techniques that all work together – sharing threat intelligence across the enterprise and speeding the time to response".
Yasser Elmashad, a cyber security specialist at F5, said during his speech during the conference that his company published a specialized report titled " Lessons Learned from a decade of DATA breaches ". The researchers analyzed 433 confirmed breaches in 37 different areas across 27 countries. The report concluded, 35% of breaches occurred as a result of attacks targeting application services, such as Apache, Node.js, etc., while 33% of attacks targeted user IDs, meaning that 86% of successful breaches occurred at the app developer's or owner's end rather than at cloud service providers end.
During the "Protecting your applications and data in an evolving risk environment" session, Moataz Al-Tarif, F5 Head of Presales Saudi, Egypt and North Africa, reviewed a report by Garner that the number of IoT devices and solutions will reach to nearly 20.4 billion devices. Currently, 50% of the world's population is online, but the use of the IoT platform is still limited. Furthermore, 50% of the companies surveyed confirm security concerns remain the biggest argument against the prevalence of the Internet of Things.
George Daglas, Co-founder and Chief Operations Officer at Obrela Security Industries, explained speech titled "Building Cyber Perceptibility" that at Obrela, they use electronic security analysis, complex risk management strategies and to protect their clients dynamically by identifying, analyzing and preventing cyberthreats in the shortest possible time.
He added: "Some external factors that contribute to the increase of cyber-attacks risks include the rapid development of technology and the high profitability of cybercrime, while the internal obstacles faced by companies against cyber threats are the lack of specialized human resources and the existence of internal communication problems within companies, in addition to the geographical separation factor. "
Over the past three years, more than 11.7 billion records and more than 11 terabytes of data have been leaked or stolen in publicly disclosed incidents, said Patrick Grillo, Senior Director, Security Strategy at FORTINET, at the #MENAISC2019. He further explained explained that the Shamoon 2 virus - for example - penetrated a number of oil and gas companies across the Gulf and scanned the discs behind political messages, and in December last year the virus Shamoon 3 paralyzed and infected a number of Gulf IT companies.
He gave the conference some lessons learned from the Shamoon Viruses 1 to 3 highlighting " organizations need to install and strengthen identity management systems and access privilege, install multi-factor authentication technology, develop emergency response solutions, and implement strategies for periodic security assessments and testing."
On his part, David Williamson, Director, Cisco Customer Exeprience explained that despite that most companies automate by using such tools as Microsoft SCCM, SolarWinds, people generally hesitate to automate in their own organizations. This is because they fear that it'll go wrong and cause unintended, serious consequences on their network and systems – due to bad input data, failure of automated process or failure of automated controls.
As 5G enters the markets around the globe, Lee Chen, Founder and CEO of A10, explained that the most common challenge facing 5G technology is security. He went on to explain "94% are concerned about security in 5G while 62% think DDoS protection is most important. It seems then that better security measures will surely improve the integration of 5G into our digital lives."
Moreover, during the #MENAISC2019, he shed light on cyber attacks on IOT are slowly becoming the norm. Recent Data from 2018 have concluded that peak attack size has reached a whopping 1.7 Terabits per second.
During his speech, Roland Daccache – Team Leader – Systems Engineering – META at CrowdStrike, warned that adversaries are Getting more sophisticated and smarter. Nation states attack are the most sophisticated and are considered to be a non-malware attack which helps the virus avoid detection by antivirus, IDS, next-gen firewalls, etc. Adding to that, they may look like a typical IT admin and will not exploit vulnerabilities. – SG


Clic here to read the story from its source.