{"id":1044836,"date":"2021-11-28T21:45:15","date_gmt":"2021-11-29T02:45:15","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/responding-effectively-to-the-evolution-of-the-cyber-threat-environment-lexology\/"},"modified":"2021-11-28T21:45:15","modified_gmt":"2021-11-29T02:45:15","slug":"responding-effectively-to-the-evolution-of-the-cyber-threat-environment-lexology","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/responding-effectively-to-the-evolution-of-the-cyber-threat-environment-lexology\/","title":{"rendered":"Responding effectively to the evolution of the cyber threat environment &#8211; Lexology"},"content":{"rendered":"<p><p>Impact of cyber attacks on organisations<\/p>\n<p>We live in an era of localisation and divergence of privacy laws evolving in response to rapidly developing technologies, including AI, quantum computing and the Internet of Things. Mr Friedberg observed that cybersecurity is clearly a key business concern which, if addressed incorrectly, can have significant financial and reputational repercussions.<\/p>\n<p>This year in particular has seen an uptick in cyberattacks by foreign states and state-sponsored agents, in pursuit of their geopolitical and economic goals, as well as cyber extortion by criminal threat actors. Such incidents highlight the importance of strong cybersecurity controls.<\/p>\n<p>Implementing robust cybersecurity, however, is a separate issue. Mr Friedberg highlighted the balancing necessary between implementing a zero trust policy for software updates and allocating appropriate resources to vet such updates. From a liability perspective, it seems somewhat absurd to require enterprises, particularly SMEs, to decompile all updates before deploying them. Mr Friedberg recalled an instance of decompiling one piece of software, suspected of being backdoored by a foreign agency, taking 12 weeks of reverse engineering.<\/p>\n<p>Mr Friedberg noted that, in most cases, threat actors do not need to rely on zero-day exploits due to many companies lacking basic cybersecurity protection. He emphasised that to manage this cybersecurity risk organisations should:<\/p>\n<p>The Board and executive leadership<\/p>\n<p>As organisations prioritise cybersecurity, efforts to ensure appropriate Board and executive leadership and cybersecurity governance are crucial. Mr Friedberg explained that there should be strong communication between the board and the CISO because there are no standardised methods for reporting on cybersecurity in the same way that companies report on profits. He also highlighted the dangers associated with isolating the CISO and recommended implementing measures to ensure that there is a collective responsibility for cybersecurity risk between the board and the CISO.<\/p>\n<p>Insurance<\/p>\n<p>The panel also discussed the tightening insurance market following significant losses in the ransomware space. A full transfer of risk and liability via insurance products is becoming increasingly difficult to find, with some insurers in certain jurisdictions stopping payment for ransomware attacks entirely.<\/p>\n<p>What could be done better?<\/p>\n<p>Mr Friedberg emphasised a few key areas for potential improvement in responding to ransomware:<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=1f857d9e-fd54-4cf2-921f-913be8aae926\" title=\"Responding effectively to the evolution of the cyber threat environment - Lexology\">Responding effectively to the evolution of the cyber threat environment - Lexology<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Impact of cyber attacks on organisations We live in an era of localisation and divergence of privacy laws evolving in response to rapidly developing technologies, including AI, quantum computing and the Internet of Things. Mr Friedberg observed that cybersecurity is clearly a key business concern which, if addressed incorrectly, can have significant financial and reputational repercussions. This year in particular has seen an uptick in cyberattacks by foreign states and state-sponsored agents, in pursuit of their geopolitical and economic goals, as well as cyber extortion by criminal threat actors <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/responding-effectively-to-the-evolution-of-the-cyber-threat-environment-lexology\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187748],"tags":[],"class_list":["post-1044836","post","type-post","status-publish","format-standard","hentry","category-evolution"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1044836"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1044836"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1044836\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1044836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1044836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1044836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}