Features list

advertisement
FORWARD FEATURES 2015
(This list is subject to change)
JAN-FEB 2015
PREDICTIVE ANALYTICS
Predictive analytics doesn’t necessarily mean seeing an attack before it happens but, rather, helping
security professionals identify and track unknown malware, wherever it may be hiding. Because predictive
technologies are in their infancy, gaining a baseline understanding of the foundations upon which they are
being developed is a good first step, when exploring this new area.
WHAT DOES 2015 HOLD IN STORE FOR YOU?
What will be the big security issues in 2015 and are you ready to deal with them? From cybercrime, to
BYOD, to insider threats, one thing is certain: the rate, intensity and sophistication of attacks will only
increase. We ask some of the industry’s leading experts to predict what will be the biggest concerns in
2015.
MOBILE SECURITY/DEVICE MANAGEMENT
With mobile devices now seemingly everywhere and more and more applications flooding the market,
mobile monitoring and device management have never been so vital. As employees connect their own vast
mix of mobile devices to the enterprise – bringing devices designed for the consumer market into business
environments and then placing business and personal data side-by-side – security has become both
increasingly important and complex. What strategies should you introduce to reduce risk? How do you
ensure you are always in control of these devices, rather than the other way round? Computing Security
finds out.
MARCH-APRIL 2015
IDENTITY & ACCESS MANAGEMENT
Identity & Access Management (IAM) is regarded as essential for any organisation intent on ensuring
optimum management of electronic identities. Why? Because IAM technology can be used to initiate,
capture, record and manage user identities – and their related access permissions – in an automated
fashion. This ensures that access privileges are granted according to one interpretation of policy alone, and
that all individuals and services are properly authenticated, authorised and audited.
However, poorly controlled IAM processes may well lead to regulatory non-compliance, because, should
the organisation be audited, management will be unable to prove that company data is not at risk of being
misused. This feature looks at how you can avoid the latter situation and ensure you have an IAM system
in place that protects you from such exposure.
SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT)
Security information and event management (SIEM) is a technology solution developed with the goal of
introducing greater intelligence and automation into the collection, correlation and analysis of log and alert
data, which, in turn, should allow security analysts to focus on what is most important. SIEM is all about
improving efficiency by enhancing the ability to deal with the mushrooming amount of data generated by
network and security devices. Or being able to detect an attack designed to elude a firewall or IPS (but not
both). Or even making reporting and documentation (for compliance purposes) more efficient. But how do
you justify the cost of investing in SIEM to the board in this straitened times? What are the compelling
arguments? And what is the likely ROI? We ask the experts.
PEN TESTING
A penetration test, or pen test, is a method of evaluating computer and network security by simulating an
attack on a computer system or network from external and internal threats. The process involves an active
analysis of the system for any potential vulnerabilities that could result from poor or improper system
configuration, either known and unknown hardware or software flaws, or operational weaknesses in
process or technical countermeasures. This analysis is carried out from the position of a potential attacker
and can involve active exploitation of security vulnerabilities. But can it detect all attacks? How
sophisticated is it? And are the dark forces getting too clever to be caught now, even by these latest
technologies?
MAY-JUNE 2015
INTERNET OF EVERYTHING
The Internet of Everything (IoE) brings together people, process, data and ‘things’ to make networked
connections more relevant and valuable than ever before. The IoE effectively turns information into actions
that create new capabilities, richer experiences, and real economic opportunity for businesses, individuals,
and countries. The Internet of Things (IoT), a broad concept plotting to make vast amounts of our physical
world interactive, IP-enabled, and ‘smart’. As billions of devices connect via the Internet, exchanging
information and taking autonomous actions based on continuous input, we will face a paradigm change that
will transform our personal lives and revolutionise business, warns research company Forrester’s Andrew
Rose. “These radical transformations will pose unprecedented data privacy and security challenges to
security and risk (S&R) professionals.” He states. How do organisations ensure that they don’t walk blindly
into this wave of opportunity and risk? How can they make the IoT work for them, rather than against?
HUMAN ERRORS/RISK
According to the ‘IBM Security Services 2014 Cyber Security Intelligence Index’ report), over 95% of all
incidents investigated recognise human error as a contributing factor. While organisations try to employ a
litany of different security controls in an attempt to limit their risk of becoming the victim of a security
incident or breach, human error is one factor that can’t always be controlled or relied upon. Considering
that each lost data record cost companies, on average, $145 per record in 2013, decreasing the human
factor is ideal for any company that wants to stay in business these days.
Some of the most common human errors include:

System misconfiguration

Poor patch management

Lost laptops or mobile devices

Disclosure of regulated (sensitive) information via incorrect email address

Opening infected attachments or clicking on unsafe URLS

Use of default usernames/passwords, or easy-to-guess passwords.
What should organisations be doing to defend themselves against such practices? Are they to blame
primarily for poor policy setting and monitoring? How do the best enterprises manage to get it right?
SECURE DATA ERASURE/E.O.L. IT
Organisations have an ever increasing volume of data stored across a multitude of media including virtual
systems, USB drives, tapes, memory cards, HDD - all of which requires managing. One of the biggest
challenges facing organisations, IT providers and IT recycling companies is ensuring end-of-life sensitive
data and intellectual property is erased securely and cost-effectively. Who should you turn to, in order to
get this right? What are the possible consequences of selecting the wrong vendor to manage this process
for you – and how do you know who you can really trust to dispose of your data – and possibly also
hardware – professionally and ethically?
JULY-AUGUST 2015
TARGETED THREATS
A targeted attack seeks to breach the security measures of a specific individual or organisation. Usually the
initial attack, conducted to gain access to a computer or network, is followed by a further exploit designed
to cause harm or, more frequently, steal data. Future attacks could be focused increasingly on the
modifying of data. The emergence of Stuxnet in 2010, for instance, revealed that targeted malware attacks
could be used to interfere with industrial control systems.
Analyzing the stages of an attack can provide insight into the tools, tactics and procedures of the attackers.
This behaviour helps indicate whether an attack can be linked to a broader campaign and helps build
intelligence that can be used to inform incident response procedures and help mitigate future advances by
the attacker. We investigate how businesses can keep themselves safe from such assaults.
MANAGED SECURITY SERVICES
Managed security services are designed to help you improve your information security – either by
outsourcing your security operations or supplementing your existing security teams. What Managed
security services providers promise is the expertise, knowledge and infrastructure that you need to secure
your information assets from Internet attacks, often saying that this can be done at a fraction of the cost of
in-house security resources. Does the reality live up to the promises, though? Or could you rely on your
own internal resources to deliver equally secure systems at lower cost, all under much tighter personal
control? Or would an MSP bring far better operational, financial and strategic efficiencies across the
enterprise?
ANTI MALWARE
Think of malware now and the name ‘Sony’ comes to mind. Soon after the devastating breach at Sony
Pictures Entertainment, the FBI was warning US businesses that hackers have used malicious software to
launch a destructive cyber attack in the US. Such attacks had been launched in Asia and the Middle East
previously, but none had been reported in the US. The FBI report did not say how many companies had
been victims of destructive attacks. Many believe that the Sony attack signals the onset of destructive cyber
attacks globally. How concerned should businesses in the UK be? How do they best protect themselves
from malware? Are the attackers fast gaining the upper hand?
SEPT-OCT 2015
CLOUD SECURITY
The market for cloud computing, in which software and information is available on demand via the Internet,
has surged in recent years. Market research firm IDC expects businesses worldwide to spend $57.4 billion
by 2014 – double that of only a few years previously. Does this signal a brave, new world of ‘cloud without
borders’ and is this necessarily the right way to go? How safe is your information in the cloud and who
really has control over it?
CYBERCRIME
One recent estimate of the cost of cybercrime to the UK put this at a staggering £27bn per annum (‘The
Cost of Cybercrime’, a report authored by business and technology consulting firm Detica, in partnership
with The Office of Cyber Security and Information Assurance in the Cabinet Office). A significant proportion
of this cost comes from the theft of IP from UK businesses, estimated at £9.2bn per annum, though the real
impact of cyber crime is likely to be much greater. The main loser – at a total estimated cost of £21bn – is
UK business itself, says the report, which suffers from high levels of intellectual property theft and
espionage. What is being done to protect UK businesses? Is it enough? Or are the cybercriminals getting
the upper-hand in a one-way battle?
DIGITAL IDENTITY (INC BYOD)
Having to disclose your digital identity, in exchange for the right to gain access to information or services
over the Internet, can be at odds with the need to retain control over personal data. One of the biggest
challenges for privacy is posed by the advance of ubiquitous computing: where computers are seamlessly
integrated in the environment – and (personal) data processing becomes increasingly invisible to the
individual. Users will generally not see what data is being processed, by whom and for what purpose. This
further decreases the possibility to control the disclosure of personal data and yet user control is key.
Digital identity management solutions could enhance online privacy by recognising anonymity as the
starting point, and by reducing the amount of personal information that is collected and passed to
transacting parties. But is this realistic in an ‘Internet of Everything’ world? And how does BYOD figure in
this equation? And CYOD also? We ask the experts for their views.
NOV-DEC 2015
APPLICATION SECURITY
Application security plays a pivotal role – through the use of software, hardware and procedural methods –
to protect applications from external threats. Indeed, security –once little much more than an afterthought in
software design – is becoming an increasingly important concern during development, as applications
become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of
threats. We look at how security measures built into applications and a sound application security routine
both serve to minimise the likelihood that unauthorised code will be able to manipulate applications to
access, steal, modify or delete sensitive data.
EXPLOIT PREVENTION TECHNOLOGY
Cybercriminals use exploits (a special type of malicious program which utilises vulnerabilities in legitimate
software) to secretly download malware which steals users’ personal data and money. Some exploits help
bypass antivirus protection, which makes this type of malware even more popular for cyber-attacks. What
steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities?
How can businesses get a clear understanding of the behaviour of legitimate software components and so
detect any unusual activity that might indicate an exploit is at work?
GOVERNANCE, RISK AND COMPLIANCE
Governance, Risk & Compliance (GRC) plays an important role in any organisation’s continuous risk management
approach. It touches all parts of the organisation and therefore must be considered as part of the overall corporate
strategy to be truly successful. At the same time, the GRC landscape is continually changing. To remain competitive,
companies must have a strategy in place that keeps pace with new legislation and stakeholder expectations. But
what are the steps any business has to take to get this right, specifically where overall security is concerned? What
are the obstacles that can surface along the way? And how do you balance all of these ‘musts’, so they align in such a
way as to bring greatest benefit to the business?
ENCRYPTION
Business and commerce rely on encryption to ensure their activities run smoothly. That reliance goes
beyond just e-commerce, as encryption serves to protect their valuable information from potentially being
stolen or altered. The ease with which they can now process information has been aided by the valuable
protections offered by encryption. At the same time, encryption can be used by enemies just as readily as
by us, so it is important to remain ahead of the curve, in terms of encryption technology. How do you this?
What is the right solution for your organisation? How do you stay ahead of the game, so your systems
aren’t breached?
If you are interested in contributing editorially to any of these features or marketing around them contact:
Edward O’Connor
Media Sales Consultant
Tel: 01689 616 000
Email: Edward.oconnor@btc.co.uk
Brian Wall
Editor of Computing Security Magazine
Email: Brian.p.Wall@btc.co.uk
Download