Enterprises today face a threat landscape that continues to evolve and become increasingly more perilous. Corporates recognize the need for their companies to become resilient at the same time acknowledging the importance of cyber security.
Cyber Battlefield is a war with real losses of assets and sometimes lives.
The most important here is to constantly innovate the methods you fight in this war and be one step ahead, to achieve that you have to know your enemy and think like him.
The Insurtech meetup, held in Munich, brought together a record number of the movers and shakers of Insurtech and Fintech industry.
Albert ( a.k.a cyberhulk), was presenting the principles of cybersecurity activities and informative references. Taking the audience on an intellectual and emotional journey, his speech comprised the controlled attack strategies and activating mitigation techniques.
By introducing basis for using deception in cyber security to detect attacks, he came up to a conclusion that the effect of inserting deceptive tar traps into cyber security activities means a change in the hacking game.
Today, it’s not clear how thoroughly cyber security professionals embrace this well-established military tactic beyond lip service that deception is a good idea.
The methods for deception detection comprise the following parameters such as deterrence, detection, and honeypots.
The scenario-driven approach, usher in a new paradigm, is to understand access points of your organization which has the lowest priority or are not connected to vital information, expose them as backdoors, put honeypots and start detecting your enemies activities.
LACS movement promises to enlarge community and build a well working system of techniques and best practices around it.
It also encourages to get connected and enforces collaboration around a shared vision which is intended to create a movement of a new LACS approach. The effectiveness of lean approach lies in performing tests and security improvement with small batches previously testing them on a wide range of vulnerabilities and performing white hacking tests.
As a closure of meetup, we should acknowledge not be naive in the cyber battlefield. It is a war with real losses of assets and sometimes lives. The most important here is to continuously innovate the methods you fight in this war and be one step ahead, to achieve that you have to know your enemy and think like him.