It seems we still don’t get it that the data we have on our networks is valuable to others.
We don’t understand the scale of data theft or the scale of the recipients of the stolen information.
I bumped in to a guy the other day. Let’s call him Bob. He ran IT Security for a large mining equipment manufacturer named after a leaf munching worm.He told me he was not a target for hackers.
“They only target banks and credit card info… don’t they?”
I asked him if he had any IT security worries.
“Well I am worried the CEO will lose his laptop when he is travelling”
“Really? Where does he go to?”
“China. He has to go there to close down counterfeiting factories.”
“What? Factories making big mining trucks like yours?”
“Down to serial numbers, paint, and of course our brand name. They export them around the world to unsuspecting firms who think we made them.”
“Has your boss got the blueprints on his laptop?”
“No, of course not! They are held only on our core systems.”
“So how do you think they got the blueprints Bob?”
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities