We can help with SG Cyber Safe Certification

PrivaBroadcast

State of the Cloud 2022 - Cloud Security Trends you should take note of

Cloud Security Trends

According to Gartner, the public cloud services market grew by 17.5 percent in 2019 ($214.3 billion up from $182.4 billion in 2018).

As cloud investments will continue to surge in the future, organisations would face a big challenge of managing cloud security risks. Here are a few trends that will shape cloud security in 2020:

Cyber Risk Virtual Meetups: Mega C-Suite Series

With the entire world mostly moving online, our Executive Advisor Shamane Tan has wasted no time in bringing her acclaimed Cyber Risk Meetups (of more than 3,000 cyber security professionals across Australia, Singapore and Japan) to the digital platforms as well. We are proud to be a community supporter as she launched the Mega C-Suite Series, seeking to bring real insights from various C-executives.

Episode 1 featured guest speaker Dan Lohrmann, a renowned government CISO from the US where he shared some stories of his personal failure and successes over the past few decades. The episode covered his Cyber Storm days to how he built the pandemic playbook for H1N1 all the way to how he nearly got fired as a CISO.

Cyber Insurance vs Security Policies: Financial and Reputational Risks

Data breaches are rampant in the world of business today. Hardly a week goes by without a reported breach or fines that range into the millions of dollars. This new age of security has brought about a change in the way that organisations structure their risk, and their insurance. Unfortunately for many, their over-reliance on cyber insurance to bail them out when they suffer a breach leaves them with a “customer last” security policy.

Increase in cyber attacks due to COVID-19 pandemic

Threat actors around the world have been trying to take advantage of the coronavirus pandemic situation by registering coronavirus related domains and selling them at a discounted price on the dark web. The average number of registrations for such domains have increased almost 10 times over the past few weeks.

Yellow Team + Red Team = Orange Team

Mr Builder: ‘I only had 14 days to build this web app, I don’t have time to keep up with the demands of continuous testing and security.’

Mr Breaker: ‘Your application has insufficient transport layer protection and insecure direct object references and don’t even get me started on the security misconfigurations’.

Mr Builder (Yellow) loves to build, and Mr Breaker (Red) loves to break. It is no wonder why these two do not get along. In many cases, the builders would wait for a penetration test excel sheet from the breakers, google their way to change a few configurations of the code and get back to their job of building more apps/ softwares.

Account Data Compromise

An ADC (Account Data Compromise) event occurs when a third-party attacker or a group of attackers gain unauthorised access to cardholder data that is held within an organisation in either electronic or physical form. Even though the number of ADC events may vary year by year, it takes only one ADC event to negatively impact an organisation.

Red Teaming vs Penetration Testing

Many organisations don’t fully understand the difference between vulnerability scanning, a penetration test, and Red Teaming.

In our latest article, we discussed the difference between a vulnerability scan and a penetration test. Read the full article here.

This article explains the difference between a red team assessment and a penetration test and which assessment is best suited for your organisation.

Quantifying Cyber Risk

As more business processes increase their reliance on data, information security is not just a technical issue anymore. The bigger question, however, is around adoption of an effective risk management framework that not only quantifies risk but also improves executive decision making.

One such structured and defensible framework is FAIR (Factor Analysis of Information Risk).

Scroll to Top