Veracity joins partners at BETT » Prestwick: Veracity has announced its attendance at the BETT Show for the first time. MMM Nigeria Ponzi Scheme And The Curse of ‘Herd Me... » What Is A Ponzi Scheme? Business Dictionary aptly defines a Ponzi scheme as a SCAM in which a GULLI... ExtraHop accelerates into 2017 with new SVP of mar... » SEATTLE: ExtraHop has announced that Bryce Hein has joined the company as SVP of Marketing and will ... Opengear deal with Hardware Group extends European... » Piscataway, NJ: Opengear has announced a new distribution agreement with Hardware Group serving chan... Veracity delivers essential data paper at the San ... » Prestwick: Veracity takes a leading slot in delivering a Paper explaining the critical differences w... Veracity to showcase expanded portfolio at Inters... » Prestwick: Veracity reflects its significant growth in the Middle East by announcing an enlarged com... IPSecurityCenter to help protect citizens at the... » CNL Software has announced that its award-winning technology will be utilized as part of the multi-a... Pulse Secure certified for U.S. Department of Defe... » SAN JOSE, CALIF: Pulse Secure has announced that Pulse Connect Secure 8.2 and Pulse Policy Secure 5.... ExtraHop predicts 2017 trends in IT, security an... » UK: ExtraHop has announced its top predictions for enterprise IT in 2017. Based on insight from cust... VTech takeover: Snom stays Snom » Berlin: Now being part of VTech, leading manufacturer of professional business IP phones, Snom Techn...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

UK: Ahead of the upcoming SANS Abu Dhabi 2013 event, a leading security expert highlights several trends in the region.

“There is certainly a lot more discussion and interest both public and behind closed doors on the topic of cyber security,” says James Tarala, a highly respected security expert and Senior SANS instructor, “The government of Qatar is now looking at new draft legislation and countries such as the United Arab Emirates and Saudi Arabia are clearly interested in avoiding incidents such as last year’s breach at Saudi Aramco in which hackers penetrated the organisation’s systems and infected some 30,000 devices with malicious software code.”

 

According to Tarala the Middle East reflects the wider global landscape where other commentators such as Richard Clarke suggest that 100% of the Fortune 500 have been breached in some significant way. “Events like Stuxnet indicate that cyber warfare is also a tangible element which is made more complicated by the evolving political landscape across the region. There are also more targeted attacks originating from and impacting organisations within the region – a number we believe has grown over the last two years in certain major Middle Eastern countries.”

The region has a number of Computer Emergency Response Teams (CERTs) and over the last year SANS has been involved in helping to organise formal, cross border gatherings to help InfoSec professionals share knowledge and help strengthen defences. “The Critical Security Controls is a methodology that has been endorsed by a number of governmental departments and enterprises and if you look at the evidence, it is clearly able to stop a large number of common attack methods.”

In 2011, Research from the Australian Government Defence Signals Directorate indicated that simply implementing the Critical Controls effectively stopped over 85% of the attacks against monitored targets. As co-author of the SANS SEC566: Implementing and Auditing the Twenty Critical Security Controls - In-Depth course, Tarala believes defensive measures are essential but organisations also need to deal with breaches.

“No environment can ever be 100% secure all the time as applications, networks and people constantly change,” he explains. “So if a breach does occur, the course helps teach a method of dealing with the breach while re-securing the perimeter quickly and effectively.”

“In my view, the need for Information security professionals across the Middle East region is rising and anybody keen to understand a key fundamental set of skills for both defending against and dealing with the result of a computer breach should seriously consider implementing the guidance from the controls,” he concludes.

SANS SEC566: Implementing and Auditing the Twenty Critical Security Controls - In-Depth will be returning to the SANS Abu Dhabi 2013 event this March.