Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion
Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16
Here are some of the topics discussed at this year’s summit:
Malware
Malware continues to be an ever-growing challenge for IT and Security. Ransomware alone accounts +100,000 victims daily.
Number of daily Ransomware victims. Crazy high. Preso @ Information Summit 2016 #summitbuzz16 pic.twitter.com/eQDcGh3Wgf
— Diana Hwang (@DianaHwang01) June 9, 2016
Online Applications
It’s not if you’ll get hacked, it’s when. So how do you respond? People, processes, and technology need to work together to address today’s security threat.
It's not if you'll get hacked, it's when. So how do you respond? Awesome panel discussion, Q&A #summitbuzz16 pic.twitter.com/RLaDyLxeEq
— MassBay Community College (@MassBayCommCol) June 9, 2016
Governance, Risk Management, and Compliance (GRC)
While we would all like to think that our organization makes risk-based decisions, frequently it is compliance checklist items that get the most attention. We need to remember to not get caught up in just the check boxes.
https://twitter.com/JenVesp/status/740928251904839680
Who are the Targets?
Employees are spearphished, rat’d and ransomware’d every day! Additionally, intranets are vulnerable, insecure and exploited daily.
Anti-virus is dead!
If it’s REACTIVE and it’s only 70% EFFECTIVE, what happens with the other 30% of MALWARE? Breach prevention is the key.
No Smartphone is secure. Not a one.
There are HUNDREDS of MILLIONS of malware downloads currently in the Google Play store, Microsoft App Store and Apple iTunes store. BYOD is a risky proposition without careful planning.
Well, dang it! >> "No Smartphone is secure. Not a one." -@SnoopWallSecure's @miliefsky #summitbuzz16 pic.twitter.com/6oNb5kb1RF
— Lee Koh (@eunleekoh) June 9, 2016
Takeaway: So How Do We Keep Our Data Safe?
- People, processes and technology need to work together to address today’s security threat. Security frameworks and proactive risk assessments are necessary
- Robust vendor risk assessments are necessary to do business securely with third party providers
- Breach response readiness, planning, and tabletop exercises should be part of a comprehensive security program
Thank You and See You Again Next Year!
Finally, a thank you to all who sponsored and attended. It is through your participation that the success of our summit is possible. We are happy to report we raised funds for MassBay scholarships that will, among other things, support students exploring a career in cyber security!
Thank you to all participants #Summitbuzz16 you ensure our #cybersecurity students can reach their goals! pic.twitter.com/0jsIQyIgpH
— MassBay Community College (@MassBayCommCol) June 9, 2016
Also check out:
- Diana Hwang from Tech Target / Search Security had a great piece on the summit.
- Photos from the event on our Facebook page.
Learn more about our Information Security Services:
Penetration Testing >
Network Assessment >
Application Security >
Governance, Risk and Compliance (GRC) >