Medical Care |

Medical Care

##SEVER##

/t/timreview.ca1.html

 

Timreview.ca

Technology Innovation Management Review TIM Lecture Series
The Expanding Cybersecurity Threat
It used to be that not a month would go by without some new data breach being reported. Then it seemed not a week would go by. Today, we see daily reports about some new attack vector, some new cyber- espionage group, some new kind of cyber-attack occurring against our critical networks and our critical data. Vice President of Global Government Affairs & Cybersecurity Policy Globally, a wide range of threats are being detected across many platforms and devices. There is also wide The TIM Lecture Series is hosted by the Technology range of attackers, from highly-organized criminal en- Innovation Management program at terprises to individual cyber-criminals to "hacktivists" Carleton University in Ottawa, Canada. The lectures (i.e., politically motivated actors) to state-sponsored provide a forum to promote the transfer of knowledge groups. The variety of threats and motivations make Sy- between university research to technology company mantec's task of identifying threats and developing pro- executives and entrepreneurs as well as research and tections an increasing challenge and drives its focus on development personnel. Readers are encouraged to the attackers' tactics, techniques, and procedures share related insights or provide feedback on the (TTP). A detailed understanding of the attackers is es- presentation or the TIM Lecture Series, including re- sential in building effective defenses against them.
commendations of future speakers. Today, the key categories of threats raised by attackers The first TIM lecture of 2015 was held at Carleton Uni- versity on February 19th, and was presented by Cheri F. McGuire, Vice President of Global Government Af- 1. Data breaches: more than 550 million identities were
fairs & Cybersecurity Policy at Symantec exposed due to data breaches in 2013, and Symantec ex- McGuire provided an overview of Symantec's view of pects this number to soon exceed 1 billion, which is the expanding cybersecurity threat and the measures equivalent to nearly 1 out of every 7 people on the plan- the company is employing to mitigate the risk for com- et, or about 1 in 3 Internet users. And, data breaches are panies and individuals. The slides from her presenta- becoming increasingly broad: intellectual property, tion are available here trade agreements, and business agreements, are often now the target, not just credit card data, etc. 2. Mobile and social: a key area where threats are prolif-
To begin, McGuire provided background on Sy- erating and where social engineering is carried out (i.e., mantec's systems for identifying and evaluating cyber- attackers gather personal data about persons of interest threats around the world, which it uses as a basis for via social networks and then use it to make targeted developing protection measures. In particular, she de- emails more convincing). scribed Symantec's Global Intelligence Network (GIN), a massive array of monitoring systems, attack sensors, 3. Ransomware: malware that locks a computer and en-
and decoy accounts, combined with the world's crypts the data, then demands payment for decryption. largest vulnerability database and capability for big Ransomware is becoming increasingly prevalent: Sy- data analytics, which together provide real-time in- mantec observed a 500% month-on-month increase in sights on what is happening on a global scale.
ransomware in 2013.
Technology Innovation Management Review TIM Lecture Series – The Expanding Cybersecurity Threat
Cheri F. McGuire
4. Cyber-espionage: the identity of malicious intruders
cooperate and share high-level information, support is not always known, and the distinctions between cat- prosecutions of cyber-crimes, and develop an ecosys- egories of attackers is not clear-cut: one group may tem approach to cybersecurity. This approach also re- pose as another to obscure their identities and inten- flects the shift towards a defense that is not solely tions, particularly when the attacks are initiated by na- founded on signature-based technologies (i.e., antivir- us software), but reflects an increasingly sophisticated, layered approach to cybersecurity. 5. Internet of Things: innovation in this area is happen-
ing very quickly, but the security is a step behind. Sy-
Finally, McGuire provided a list of best practices for mantec believes that, to be effective, security must be businesses to help protect against cyber-threats: built into products as they are being developed, not "bolted on" later. 1. Employ defence-in-depth strategies In terms of targets, McGuire highlighted critical infra- 2. Monitor for network incursion attempts and vulner- structure (e.g., power grids, transportation networks, manufacturing sectors, financial systems) as an import-ant area of concern. 3. Antivirus on endpoints is not enough McGuire also highlighted the increase in web-based at- 4. Secure websites against man-in-the-middle attacks tacks: in 2013, Symantec blocked 23% more web at-tacks than in 2012. However, targeted attacks are of 5. Protect private keys particular concern, such as emails targeted at persons of interest using personal data gathered to increase the 6. Use encryption to protect sensitive data apparent authenticity of the communication. Such tar-geted emails are designed to trick people into taking ac- 7. Ensure all devices on company networks have secur- tions that they would not otherwise take if they understood the consequences. Examples include spear-phishing (i.e., sending an email to a person of interest) 8. Implement a removable media policy and watering holes (i.e., drawing targets to infected websites, where the malware lies waiting to infect visit- 9. Be aggressive with updating and patching 10. Enforce an effective password policy Beyond Symantec's efforts to develop its products and services, the company has also been actively pursuing 11. Ensure regular backups are available public–private partnerships to help counter the ex-panding cybersecurity threat. These partnerships are 12. Restrict email attachments both private-to-private and private-to-public; Sy-mantec is working with other companies and with 13. Ensure an infection and incident response proced- many government agencies that span policy, opera- tions, law enforcement, as well as education and aware-ness. Such partnerships are motivated by the desire to 14. Educate users on basic security protocols Technology Innovation Management Review TIM Lecture Series – The Expanding Cybersecurity Threat
Cheri F. McGuire
About the Speaker
Cheri McGuire is Vice President for Global Govern-
ment Affairs and Cybersecurity Policy at Symantec,
where she is responsible for the global public policy
agenda and government engagement strategy,
which includes cybersecurity, data integrity, critical
infrastructure protection, and privacy. She currently
serves on the World Economic Forum Global
Agenda Council on Cybersecurity, and on the
boards of the Information Technology Industry
Council, the US Information Technology Office in
China, and the National Cyber Security Alliance. She
also is a past board member of the IT Information
Sharing and Analysis Center, a former member of
the Industry Executive Subcommittee of the Presid-
ent's National Security Telecommunications Advis-
ory Committee, and a former Chair of the US IT
Sector Coordinating Council. Ms. McGuire is a fre-
quent presenter on technology policy issues, includ-
ing testifying five times before the US Congress on
cybersecurity, privacy, and cybercrime. Prior to join-
ing Symantec, she served as Director for Critical In-
frastructure and Cybersecurity in Microsoft's
Trustworthy Computing Group, and she has held
numerous positions in the Department of Home-
land Security, Booz Allen Hamilton, and a telecom
engineering firm that was acquired by Exelon Infra-
structure Services. She was also a Congressional
staffer for seven years. Ms. McGuire holds an MBA
from The George Washington University and a BA
from the University of California, Riverside.
This report was written by Chris McPhee. Citation: McGuire, C. F. 2015. TIM Lecture Series – The
Expanding Cybersecurity Threat. Technology Innovation
Management Review
, 5(3): 46–48.
http://timreview.ca/article/881
Keywords: cybersecurity, cyber-attacks, cyber-threats, data breaches, cyber-
espionage, social engineering, malware, ransomware, scareware, antivirus,
private-public partnerships, Symantec

Source: http://timreview.ca/sites/default/files/article_PDF/TIMLS_McGuire_TIMReview_March2015.pdf

Ausgabe23.qxp

Nummer 23, März 2007 P.b.b. Verlagspostamt 1010 Wien - Erscheinungsort Wien Zeitschrift der Misrachi Österreich Von Purim bis Pessach Purim in Kürze von Raw Pardess B u c h t i p p Teddy Kollek s.A. Aus der Bewegung VON PURIM BIS PESSACH Zu Purim feiern wir den Sieg über Von Purim bis Pessach

Jdd 7-3 cover 1-4:cover

COPYRIGHT © 2008 JOURNAL OF DRUGS IN DERMATOLOGY INCREASE IN COLLAGEN TURNOVER INDUCED BY INTRADERMAL INJECTION OF CARBON DIOXIDE IN RATS Julio Cesar Tavares Ferreira MD,a Alessandra Haddad MD PhD,b Simone Arruda Navarro Tavaresc a. General Surgeon, Member of the Brazilian College of Surgeons, Member of Brazilian Medical Society for Intradermal Therapy b. Plastic Surgeon, MSc in Reconstructive Plastic Surgery from the Federal University of São Paulo – Escola Paulista de Medicina,