Outdated systems placing maritime vessels at ris... » Maritime vessels are under significant threat of cyber-attack because many are carrying outdated sof... Blesma gears up for annual fundraising initiativ... » Fundraisers from all over the country are getting ready for Blesma Week – the fundraising initiative... Optex Systems announces $1.12 Million Purchase O... » RICHARDSON, TX: Optex Systems, Inc. has announced it has received a $1.1 million purchase order to s... Wargaming sponsors TANKFEST 2016 » Wargaming is once again partnering with The Tank Museum, Bovington, to sponsor TANKFEST, one of the ... Symetrica presents compact and ultra-light weara... » Berkeley, CA: Symetrica has introduced a prototype wearable detector system that provides high-sensi... Encode launches first security analytics and res... » London, UK: Encode recently launched SaaS version and its managed security monitoring solution, offe... BeyondTrust CEO named finalist for the EY Entre... » PHOENIX: BeyondTrust has announced that its CEO, Kevin Hickey, has been named a finalist for the EY ... TALKTALK ADOPTS SKYGUARD’S MYSOS LONE WORKER ... » TalkTalk, the UK’s leading value for money provider of broadband, mobile and TV services, has turned... Tools, skills and budgets can help developers figh... » Tel Aviv, Israel: Checkmarx has  announced that three recent reports highlight the challenge faced b... Logicalis Europe announces membership of Global ... » London, UK: Logicalis Europe has announced that it has become the first corporate member of Unlockin...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

UK: Ahead of the upcoming SANS Abu Dhabi 2013 event, a leading security expert highlights several trends in the region.

“There is certainly a lot more discussion and interest both public and behind closed doors on the topic of cyber security,” says James Tarala, a highly respected security expert and Senior SANS instructor, “The government of Qatar is now looking at new draft legislation and countries such as the United Arab Emirates and Saudi Arabia are clearly interested in avoiding incidents such as last year’s breach at Saudi Aramco in which hackers penetrated the organisation’s systems and infected some 30,000 devices with malicious software code.”

 

According to Tarala the Middle East reflects the wider global landscape where other commentators such as Richard Clarke suggest that 100% of the Fortune 500 have been breached in some significant way. “Events like Stuxnet indicate that cyber warfare is also a tangible element which is made more complicated by the evolving political landscape across the region. There are also more targeted attacks originating from and impacting organisations within the region – a number we believe has grown over the last two years in certain major Middle Eastern countries.”

The region has a number of Computer Emergency Response Teams (CERTs) and over the last year SANS has been involved in helping to organise formal, cross border gatherings to help InfoSec professionals share knowledge and help strengthen defences. “The Critical Security Controls is a methodology that has been endorsed by a number of governmental departments and enterprises and if you look at the evidence, it is clearly able to stop a large number of common attack methods.”

In 2011, Research from the Australian Government Defence Signals Directorate indicated that simply implementing the Critical Controls effectively stopped over 85% of the attacks against monitored targets. As co-author of the SANS SEC566: Implementing and Auditing the Twenty Critical Security Controls - In-Depth course, Tarala believes defensive measures are essential but organisations also need to deal with breaches.

“No environment can ever be 100% secure all the time as applications, networks and people constantly change,” he explains. “So if a breach does occur, the course helps teach a method of dealing with the breach while re-securing the perimeter quickly and effectively.”

“In my view, the need for Information security professionals across the Middle East region is rising and anybody keen to understand a key fundamental set of skills for both defending against and dealing with the result of a computer breach should seriously consider implementing the guidance from the controls,” he concludes.

SANS SEC566: Implementing and Auditing the Twenty Critical Security Controls - In-Depth will be returning to the SANS Abu Dhabi 2013 event this March.