If 2015 was any indication, no company, regardless of size or industry, is immune to cyber security threats.
A PricewaterhouseCoopers survey of over 500 executives found that a record 79% of respondents had detected some form of security incident in the past 12 months. As these cyber threats continue to evolve, experts like Timothy Wallach from Seattle’s FBI Cyber Task Force and John Farley,Vice President and Cyber Risk Practice Leader for HUB International, as well as Steve Tabacek, co-founder and CEO of RiskLens say the key to prevention is for governments, businesses, and private consumers to both educate and evolve to protect themselves.
These top cyber security experts will equip the Seattle business and tech community with the latest in cyber security resources and best practices at a Tech in Focus: Trends in Cybersecurity session on Tuesday, January 12, from 4 to 6 p.m. at Data I/O. The program is being produced by WTIA.
Moderated by Adam Cecchetti, a founding partner and Chief Executive Officer at Deja vu Security and a contributing author to multiple security books, benchmarks, tools, patents, and DARPA research projects, the panel will discuss how cyber criminals are pushing government and industry to innovate. The experts will also share tips and tricks on how companies can protect themselves from cyber attack and what to do when the inevitable happens to them. Audience members will also get advice on meeting the demand for talent with IT security expertise to fill the shortage that 26.4% of organizations claim they’re experiencing, according to a recent study from 451 Research.
We asked panelist John Farley who provides advisory services to clients as a network security and privacy liability consultant about the threats confronting business today and what first steps should be taken in response.
Seattle24x7: What do you consider to be the #1 cyber threat today on a commerce and societal basis? In 25 words or less, what can a business entity do to protect itself?
Farley: The #1 cyber threat today would be the state-sponsored hacking groups that relentlessly attack our networks. Many of us live our daily lives through internet-connected products via mobile phones, cars, and medical devices. All of them are hackable. The threat extends to our critical infrastructure. Our power grid , nuclear facilities, key manufacturing plants and financial markets are exposed. Cyber risk has quickly become a matter of national security.
Seattle24x7: What solutions, techniques or approaches have you designed or implemented to take on cyber threats?
Farley: The number one way for businesses to protect themselves would be to create cyber risk awareness and change behavior at every level of an organization. It must start at the C-suite and extend to every employee to become part of the culture. Investment in technology is critical, but investment in employee education is equally as important.
I recognized long ago that you must devote resources to both pre-breach planning and post breach cost containment to effectively manage cyber risk. In my consulting role as a cyber risk insurance broker I was able to forge key relationships with cyber risk experts in various disciplines, including privacy attorneys, network assessment firms, IT forensics investigators, federal law enforcement, public relations firms and senior government officials. I have been able to leverage these relationships in a way that helps businesses develop best practices to prevent network intrusions. It also helps them respond to a data breach quickly and in compliance with various state and federal regulations. This is key to mitigating both financial and reputational harm for businesses in the aftermath of a data breach. Ultimately, these effort put our clients in a better light when they enter the cyber insurance market.
Seattle24x7: Can Internet activity be geo-walled by filtering out or blocking access from “inbound” IP addresses from unfriendly points of origin?
Farley: Technologies are being developed to pro-actively seek out threats before they penetrate a network. There are known IP addresses that are associated with criminal activity. If you can identify them ahead of time, you can take steps to lock your network’s doors and not answer the hackers when they come knocking.
Tech in Focus: Trends in Cybersecurity
When: Tuesday, January 12 from 4 to 6 p.m.
Where: Data I/O | 6645 185th Ave NE #100, Redmond, WA 98052
Moderator: Adam Cecchetti | Founding Partner, CEO | Deja vu Security
Timothy Wallach | Cyber Task Force Leader| FBI, Seattle office
Steve Tabacek | CEO and Co-Founder | RiskLens
John Farley | Vice President and Cyber Risk Practice Leader | HUB International