Cyber Magazine - December 2021

Page 1

December 2021

cybermagazine.com

Chief Information Security Officers

Technology & AI

The changing face of automated manufacturing and the risks it poses

Cyber Security

Combating the cyber security risks of WFH

THE STATE OF

CSA and VMWare report highlights lack of knowledge and skills shortages impacting cyber

FEATURING:

VERIZON

SINGLESTORE

RESISTANT. AI


Never miss an issue!

+ Discover the latest news and insights about Global Cyber...

JOIN THE COMMUNITY

The Cyber Team EDITIOR-IN-CHIEF

VIKKI DAVIES

EDITORIAL DIRECTOR

SCOTT BIRCH

PRODUCTION DIRECTORS

GEORGIA ALLEN DANIELA KIANICKOVÁ PRODUCTION MANAGERS

OWEN MARTIN PHILLINE VICENTE JACK THOMPSON JANE ARNETA PRODUCTION EDITOR

JANET BRICE

CREATIVE TEAM

OSCAR HATHAWAY SOPHIE-ANN PINNELL HECTOR PENROSE SAM HUBBARD MIMI GUNN JUSTIN SMITH REBEKAH BIRLESON DUKE WEATHERILL JORDAN WOOD VIDEO PRODUCTION MANAGER

KIERAN WAITE SAM KEMP

MOTION DESIGNER

TYLER LIVINGSTONE

DIGITAL VIDEO PRODUCERS

MARKETING MANAGER

EVELYN HUANG JACK NICHOLLS MARTA EUGENIO ERNEST DE NEVE THOMAS EASTERFORD DREW HARDMAN

SAJANA SAMARASINGHE

PROJECT DIRECTORS

MEDIA SALES DIRECTORS

KRIS PALMER BEN MALTBY TOM VENTURO SUJAN JESURAJA MARKETING DIRECTOR

ROSS GARRIGAN

MANAGING DIRECTOR

LEWIS VAUGHAN

EXECUTIVE ASSISTANT

JORDAN HUBBARD JASON WESTGATE

CHIEF OPERATIONS OFFICER

STACY NORMAN CEO

GLEN WHITE


FOREWORD

Is your cyber security strategy in order? Not a day goes past without news of another high profile cyberattack worldwide and the question for most companies is not ‘if’ they will become a victim of cybercrime, but ‘when’

“Data breaches have increased significantly in the last few years as have the breadth, depth and impact of them”

Data breaches have increased significantly in the last few years as have the breadth, depth and impact of them. According to a 2021 report from IBM and the Ponemon Institute, the average cost of a data breach among companies surveyed reached $4.24 million per incident in 2021, the highest in 17 years. So what do we do about it? According to GDPR Associates it is possible to minimise the risk of data breaches by following best practice such as staff training and awareness, regular risk assessments and using multi-factor authentication among other things. As the year draws to a close and we begin to think about the year ahead, it seems the perfect time to review your cybersecurity strategy and implementation plans to ensure your business doesn’t become another cyberattack statistic in 2022.

CYBER MAGAZINE IS PUBLISHED BY

VIKKI DAVIES

vikki.davies@bizclikmedia.com

© 2021 | ALL RIGHTS RESERVED

cybermagazine.com

3


In Association With:

SHAPING THE FUTURE OF SUSTAINABLE BUSINESS

2022

February 23rd-24th STREAMED & IN PERSON TOBACCO DOCK LONDON

BUY TICKETS

SPONSOR OPPORTUNITIES


Confirmed Speakers Include:

Ben Clifford

Sarah Chapman

Global Health, Safety & Sustainability Associate Director

Global Chief Sustainability Officer

Fidelity International

Manulife Financial Corporation

Roy Cheung

Mary-Jane Morifi

Global Head, Sustainability Solutions, Engineering Plastics

Chief Corporate and Sustainability Officer

Covestro

Tiger Brands Limited

Øistein Jensen

Sandeep Chandna

Chief Sustainability Officer

Chief Sustainability Officer Tech Mahindra

Odfjell SE


CONTENTS

Our Regular Upfront Section: 10 Big Picture 12 The Brief 14 Timeline: The history of cloud computing 16 Trailblazer: Bob Carver 20 Five Mins With: Martin Rehak

40

Cyber Sercurity

Combating the cyber security risks of WFH

26

48

Single is best when choosing a database partner

Theia: The British Army's digital transformation

SingleStore

British Army


82

Network & Application The state of Cloud Security

90

110

On a mission to help to build a better internet

Industrial cyber security: More critical than data security

Cloudflare

Claroty

102

126

The changing face of automated manufacturing and the risks it poses

Chief Information Security Officers

Technology & AI

Top 10


COMING SOON FOLLOW N OW

E DU C ATE • M OTIVATE • E LE VAT E


About March8

March8 is an inspiring and informative community for women executives, entrepreneurs, professionals and overachievers. We recognise, celebrate and champion the achievements and contributions made by women in both business and society. Our community offers practical and compelling career, financial and lifestyle resources to help women take their careers to the next level and achieve a work-life balance.

A BizClik Media Group Brand

FO LLOW N OW


BIG PICTURE

10

December 2021


Nyhavn harbor

Denmark, Europe

Denmark has topped a list of lowest risk countries for a cyber attack followed by Germany then the US. Anti-fraud experts at SEON combined cyber security indices and indicators, to reveal the countries that are the most and least risky for internet users. Myanmar topped the list of the highest risk countries followed by Cambodia and then Honduras.

cybermagazine.com

11


THE BRIEF BY THE NUMBERS

“Manufacturing systems were built to do few things execptionally well”

EY asked 1,000 CISO’s in its EY Global Information Security Survey 2021 if they agree that cyber security regulations will become more fragmented and difficult to manage in the years to come

Guy Golan

CEO & Co-Founder Performanta  READ MORE

“Scarcity of experienced cloud security professionals is no hidden secret in the industry”

67% Yes

33% No

Nikhil Girdhar

Product Marketing Leader of Cloud Security Solutions VMWare  READ MORE

“As the lines between work and home have blurred, security risks have soared” Joanna Burkey CISO HP INC. 

READ MORE

12

December 2021

The state of cloud security Lack of knowledge and expertise continue to plague security teams. Cyber Magazine looks at VMWare and CSA’s latest report on the state of cloud security.

The changing face of automated manufacturing and the risks it poses Cyber Magazine looks at the challenges automated manufacturers face in the new digital world and how to prepare for an attack.

Combating the cyber security risks of working from home Cyber Magazine looks at the greatest cybersecurity threats facing home workers and how to combat them.


 FINANCIAL INSTITUTIONS Security and network service provider Infradata has changed its name to Nomios. Under the Nomios Group, all Infradata companies in Belgium, Germany, the Netherlands, Poland and the United Kingdom can focus on further European expansion in the coming years.

Are you a digital vegan? Dr Andy Farnell has launched a brand new book called ‘Digital Vegan, Healthier technology for a happier planet.’ Andy is a British computer scientist and an expert in signal processing, cyber security and algorithms. He has been a technophile since the age of eight. He also does not use a smartphone, does not use social media or much of the big tech that we take for granted. He is a digital vegan. While he loves what he does, he believes the technological future that he looked forward to when he was young has been misappropriated. “The degree of abuse by 'big tech' of our rights and our mental health, which is just coming to light now to the general public, has been known in the computing world for decades. It could have, and should have, been so much better,” he says. Andy’s new book addresses the concerns that we all have about technology and urges readers to take control over their tech.

 UK CYBER SECURITY COMPANIES The UK government’s Industrial Strategy Challenge Fund (ISCF) is to spend up to £8mn on projects that improve UK cyber security, in grants from £200,000 to £1.4mn, which will be allocated after a competition ending on 08 December.

 A-LISTER A Russian hacking group has reportedly gained access to the personal information of a raft of A-listers by hacking the exclusive London-based jewellery firm Graff. Oprah Winfrey and the Beckham family were among those affected.

 PAX TECHNOLOGY The FBI and other US agencies have searched Florida premises used by Chinese payment-terminal provider Pax Technology. US media reports suggest it was prompted by concerns about the security of Pax Technology products.

W I N N E R S DEC21

L O S E R S

cybermagazine.com

13


TIMELINE The history of

CLOUD COMPUTING Cloud computing has profoundly changed the way we live our lives and conduct business. Today the cloud is a vital online technology that is used all over the world and since the COVID-19 crisis, the cloud computing market has been on a rapid upward trajectory. Where did it all begin? We take a look at the history of cloud computing.

1960

14

1999

Clouds

Everything over the internet

Clouds began to form over the technology landscape as early as the 1960s. Computer scientist J.C.R. Licklider had a vision of an interconnected global population that could access programmes and data anywhere, from any site and his initial involvement spurred the development of the Advanced Research Projects Agency Network (ARPANET).

In 1999, Salesforce became the first company to offer applications over the internet, heralding the arrival of Software as a Service. Three years later, the industry grew massively with video, music and other media being hosted and delivered online.

December 2021


2006 Amazon first commercial cloud Amazon launched the first commercial cloud – the Elastic Computer Cloud (EC2) in 2006. This was closely followed in 2008 by Google who introduced radical pricing models with freeentry-level plans and low-cost computing and storage services with its Google App.

2010

2012

Microsoft Azure

Cloud adoption takes off

Software giant Microsoft entered the cloud market with Azure in 2010, which supports streamlined development of web and mobile apps, to support a rapidly growing mobile industry.

A Spiceworks survey noted a significant 71% increase over the previous year in cloud adoption for SMBs, with file sharing (52%) and hosted email (42%) two of the top services used.

cybermagazine.com

15


TRAILBLAZER

BRINGING CYBER THREAT INTELLIGENCE TO THE Name: Bob Carver Job Title: Principal of Cyber Security Threat Intelligence and Analytics Company:

B

ob Carver is a Principal of Cyber Security Threat Intelligence and Analytics at Verizon Wireless. He initiated and implemented one of the largest botnet monitoring networks for an ISP in North America with over 130 million customers. He also started the first dedicated monitoring and incident response team from the ground up for the Verizon Wireless customer network and the supporting engineering network. Bob has experience with risk management, security architecture projects – defining needs and requirements – people, processes and technology. He is a speaker, expert panelist, moderator and producer on cyber security and privacy issues, and presented executive workshops in the US and in Toronto on ‘Securing the Internet of Things’. 16

December 2021

“We must have artificial intelligence capabilities in the technologies and solutions we’re providing”


NE X T LE VE L cybermagazine.com

17


TRAILBLAZER

18

December 2021


Bob holds an M.S. in Information Systems as well as CISM (Certified Information Security Manager) and CISSP (Certified Information Systems Security Professional) certifications. He is a world-wide influencer on Twitter, LinkedIn for Cyber security, information security, IoT, privacy and other technology sectors, and has been recognised as A Top Infosec Influencer on LinkedIn. Bob is largely passionate about all things cyber security. He recently posted a series of blogs on topics related to AI and modern tech. He said: “Given the complexity of modern attacks there is absolutely no way that human defenders can keep up with it, so we must have artificial intelligence capabilities in the technologies and solutions we’re providing.” He is one of Twitter’s Top 10 Cyber security experts and has over 45.6k followers on the social media platform. Verizon Communications was created on June 30, 2000 by Bell Atlantic Corp and GTE Corp in one of the largest mergers in US business history. GTE and Bell Atlantic evolved and grew through decades of mergers, acquisitions and divestitures. Today, Verizon Wireless is a global communications technology company delivering the promise of the digital world to millions of customers every day. Bob’s role at Verizon is developing strategy in bringing Cyber Threat Intelligence to the next level, leveraging data analytics, machine learning and other data intelligence to enhance a Verizon-wide risk management program. Bob also specialises in Threat Hunting that discovers unknown threats not found by traditional security monitoring or traditional threat intelligence solutions. cybermagazine.com

19


FIVE MINUTES WITH...

MARTIN REHAK CEO OF We spoke to Martin about how Artificial Intelligence (AI) is helping to combat financial fraud.

“TODAY'S ATTACKERS ARE CLEVER AND

CONSTANTLY CHANGE THEIR

ATTACK METHODOLOGY AND IDENTITIES” 20

December 2021

WHY ARE BANKS SO OPEN TO CYBERCRIME AND FRAUD? The risk of fraud in financial services is much larger and harder to define than in other industries, meaning that banks have the most to lose. Fraud is costing businesses across the world US$5 trillion each year, according to research from Crowe in conjunction with the Centre for Counter Fraud Studies at the University of Portsmouth. Banks will always be the number one target for cybercriminals, as that is where the money is kept. As a bank you have to protect your customer’s money, their information and your reputation. But the environment today is radically different – regulation, financial climate and competition from fintechs is far more intense and forces you to transform under an intense pressure on your margins. At the same time, the attackers get more sophisticated, they have learned to target complex environments and use financial innovation, such as blockchain and instant payments, against us. HAVE FINANCIAL CRIME THREATS INCREASED RECENTLY? Absolutely. Today’s attackers are clever and constantly change their attack methodology and identities. They are using more sophisticated tactics which makes it difficult for cyber security teams to keep up. Over the past 12-18 months, we’ve seen an increased online presence for many businesses, widespread remote working and new schemes for payments such as Buy Now Pay


Later. Criminals have taken advantage of any weaknesses in these systems and exploited them for their own gain. Particular areas of concern include synthetic sign up where a criminal combines stolen data with false information to create a new identity and account takeover where a malicious third-party gains access to a user’s account details. However, the challenge is to ensure the utmost levels of security without making the on-boarding process for new customers cumbersome. A trusted customer experience will boost brand reputation and help to build a loyal customer base.

HOW IS ARTIFICIAL INTELLIGENCE HELPING TO COMBAT FINANCIAL FRAUD? This is where it gets interesting. The combination of AI, automation and the human brain is the strongest form of defence against cybercrime. Sophisticated AI is able to predict, detect and defer financial crime by using multiple algorithms to detect weak patterns with minimal latency. Continual assessment of transactions alerts teams to potentially fraudulent activity taking place. These anomalies could be behavioural, device characteristics, geo-locations, unusual switching between accounts and much more. Fraud and cyber analyst teams are inundated with alerts, many of which can be false. By narrowing the focus of investigations, the analysts only have to investigate genuine priority alerts. cybermagazine.com

21


FIVE MINUTES WITH...

The intention is to find a problem before it becomes a threat and today’s AI powered solutions are able to detect advanced fraud and manipulation earlier and faster. Similarly, these financial automation oversight engines are adept at identifying previously unidentified vulnerabilities and gaps in third-party systems that are ripe for exploitation. Another area that AI comes into play is in the detection of forged documents. 1-20% of documents in the application and onboarding process can be subject to manipulation such as forged bank statements, modified invoices and amended pay slips. 22

December 2021

By protecting automated processes that use unauthorised documents from third-parties, banks can be sure no digital documents are forged. Financial crime will always be with us. The challenge is to find it as it shifts its methods and changes its targets. Capabilities are required that can detect known criminal practices and recognise never seen before emerging patterns of financial crime. By working with the right expertise, exploiting advances in cutting edge AI, it is possible to spot different types of threats or attack vectors and respond to them before it’s too late.


“THE RISK OF FRAUD IN FINANCIAL SERVICES IS MUCH LARGER AND HARDER TO DEFINE THAN IN OTHER INDUSTRIES”

cybermagazine.com

23




26

December 2021


SINGLESTORE

SINGLE IS BEST WHEN CHOOSING A DATABASE PARTNER WRITTEN BY: SIMON HOWSON-GREEN PRODUCED BY: CRAIG KILLINGBACK

cybermagazine.com

27


SINGLESTORE

SingleStore is challenging the fragmented cloud database market in what its CEO, Raj Verma calls The Modern Database Era. Here’s his vision for a business that touches all our lives

R

Executive Team Standing with Nasdaq Billboard in Times Square

28

December 2021

aj Verma has lived his whole adult life exploring and navigating the landscape of data and data storage. His education focused on computer science engineering and maths. When studying for his degree he toyed with the idea of making his university thesis all about artificial intelligence and robotics. He’s a data junkie. He sees the industry in which he works as nothing new and likes to tell you data database technology and the world of data storage has been around far longer than he has: “Fifty years, maybe even longer,” he says. “It’s not that this industry is anything new. It's just the way data has been processed and the way computers and storage have tangled together, which has changed.” Untangling that past and streamlining the way the company stores and processes data in the future is Raj Verma’s mission as CEO at SingleStore. It’s not that he is a man ahead of his time. He is a man of his time… and he is on a mission to explain – which he does with great clarity. Why? Because data storage is no longer the preserve of the few. It is now a global requirement of us all. Raj says data storage is something which touches all our lives, even though many of us may not realise it. We cannot function without it.


SINGLESTORE

cybermagazine.com

29


SINGLESTORE

The Vision Behind SingleStore’s Shake-up Title of the video of The Database Market

Raj Verma likes to take highly complex concepts and explain them in a way so we can all grasp them. “Twenty years ago, data was a certain type of data. We were very used to it. The volume, variety and velocity of data was very well understood and had been understood for about a couple of decades.” “Yes, I know the Internet has made some difference to it and we thought “oh my goodness, because of the Internet, data is exploding.” “But not fundamentally. The velocity and the volume did not increase that dramatically... and then this happened, right around 2008.” As he says this Verma waves his smartphone in the air… and the point is made. Verma cites the birth of social media networks such as Twitter and Facebook as the turning point. Add to that the way internet delivery speeds ramped up at 30

December 2021

“ The last 18 months has fundamentally made a huge paradigm shift as to how companies use data” RAJ VERMA

CEO, SINGLESTORE

the end of the last decade and you have all the criteria for a perfect storm which changed the face of the data landscape. This is what Raj Verma refers to as ‘Modern Data’. “There was this explosion of data that happened. And this modern data had a very different volume and a very different velocity.”


SINGLESTORE

EXECUTIVE BIO RAJ VERMA TITLE: CEO LOCATION: SAN FRANCISCO BAY AREA Raj Verma is CEO at SingleStore. He brings more than 25 years of global experience in enterprise software and operating at scale. Raj was instrumental in the growth of TIBCO software to over $1 billion in revenue, serving as CMO, EVP Global Sales, and COO. He was also formerly COO and CRO at Aptus Software and COO at Hortonworks. Raj earned his bachelor’s degree in Computer Science from BMS College of Engineering in Bangalore, India.

cybermagazine.com

31


SINGLESTORE

32

December 2021


SINGLESTORE

Verma uses the example of taking a holiday to Italy in the pre–Modern Data era. Take a picture, come home, develop it and send it to a few friends. “Now you pick up your mobile, take a lot of pictures and BOOM! You send it to forty thousand people – some of whom you have never met and will never meet.” “Just imagine. Multiply this amount of data from one person by millions and then by more millions. This is what is now being thrown at enterprises.” Back in 2011 as CMO of Tibco Software, Raj Verma gave a speech where he said the volume of data was doubling every eighteen months. When I said that I remember people were saying “Holy hell. Data is doubling every eighteen months, how are we going to

“IBM, Oracle and SAP have had a lock on the database market for decades and now people are paying the full price for this” RAJ VERMA

CEO, SINGLESTORE

manage that?” And now I’m reading that data is doubling every month and some people are claiming it’s every week. So, that kind of deluge of data being thrown at all of us is something which the old technologies and databases, like the Oracles and the IBMs and the SAPs of the world, just weren’t built to manage.” And in that statement, we get to see the real driving force behind Raj Verma and his mission at SingleStore. He is in this business to shake it up, force it to evolve and ensure SingleStore’s technology is sitting right in the eye of this storm. cybermagazine.com

33


SINGLESTORE

But Verma makes another of his intentions very clear. This seismic change in the way we need to manage and analyse and process data is also about collaboration between older legacy systems and the new kids on the block. “I'm not here to beat up a competitor. I’m just saying they were used to handling the non-modern data, the pre-2008 data.” Removing the barriers Verma says it was impossible for those nonmodern data enterprises to predict what was going to happen back then. He says when they began managing data with computer power it didn’t come with a warning that forty years on, data would start to engulf them. But he also says those that survived did so because they were nimble enough to react to the changes. Nimble, yes. But, according to Verma this reactive approach was ultimately short sighted. He calls this the ‘Swim Lane’ mentality which companies adopted to ride out the tsunami of data. “All this data came at these enterprises so they started buying Oracle or IBM’s DB2, Mongo or Couchbase or X, Y or Z technology – all in the hope these ‘Swim lane’ solutions would bridge the gap between modern data reality and the data architecture of the past.” Verma says this has been going on for some time and there are at least three hundred of these ‘Swim lane’ databases to choose from. But, he says, this is ultimately a counterproductive strategy. This is where SingleStore comes in. From the outset, just under a decade ago, the SingleStore approach was not to pick a swim lane but remove the barriers. “Databases take a long time to build,” says Rama. “It’s been eight years from inception to our first release and now we are in the perfect position to take on the modern data era and provide companies with a single solution, 34

December 2021

so they no longer have to run multiple databases with all the complications which go with them.” Verma describes how he sees the rapidly expanding service economy where everything is a service, everything is on 24/7, the competition is a click away and the user experience is everything. “User experience and low latency are connected,” he says. “If I was to ask you if you want to stay on the end of the phone for one


SINGLESTORE

second or five minutes, of course, you want the response quickly – and if a service provider wants to make that happen and improve its customer’s experience it needs to change its data layer or that's not going to happen.” “We feel SingleStore fundamentally allows you to manage the modern world of data and the service economy better.” Ellison and the old guard So, if some of the older database companies

are dinosaurs, does that make SingleStore a raptor? Is SingleStore a predator? Verma has a lot of respect for the old guard – especially for the founding mothers and fathers of the database business - Oracle and IBM. “I often say that if Larry Ellison (Oracle’s Founder) was to create a data database today it would look very much like SingleStore. I have the highest regard for Oracle and for Larry Ellison, Oracle is a solid product and it changed the fortunes of a lot of companies – as did IBM.

cybermagazine.com

35


SINGLESTORE

“ The database market is now growing at around 17% a year and it is currently worth between $100 - $125bn” RAJ VERMA

CEO, SINGLESTORE

It is just a different era and I think a lot of those companies are now struggling. History is littered with them. These companies went on to dominate for fifty or sixty years and they are still a force to be reckoned with – that’s nothing short of phenomenal really.” Phenomenal it may be, but Verma leaves us in no doubt that he believes there is now a revolution in the evolution of the database business. SingleStore has sharp teeth and the hunting instinct for survival while the old guard of Oracle and IBM are stumbling as they carry the heavy burden of outdated legacy systems. Legacy in chains “I do believe there is a better way of handling modern data and building applications. I also believe SingleStore is one of those companies to do this, if not the best option among the better options.” Verma says this is down to a fundamental problem faced by the database world and those who use its technology. “This is not about a willingness to change,” he says. ‘It is just the amount of legacy these businesses carry to make that change. 36

December 2021


SINGLESTORE

SingleStore is a modern scale-out database and the first real-time operational cloud database to support separation of storage and compute.

Of course, the legacy companies understand what they must do. But can they do it? They have so many chains around their feet in terms of tens of thousands of customers who want to stay where they are and keep their data where it is.” Verma describes this dilemma as a tussle between the past and the future where too many businesses believe they are minimising risk by corralling their data ‘in a box’, modernising around it and then, over time, migrating to the new systems. Verma argues that this is also an example of short term, counterproductive thinking. He also claims the investment market has woken up to the huge potential of the SingleStore route. He cites the recent surge in investment. This is not just about his entrepreneurial optimism. It’s about hard business decisions. ‘Think back to 2017. For probably two decades, or two and a half decades before that, we did not have a database company go public to the best of my knowledge. Then Mongo came about and things changed.” But, according to Verma, that change only came about after the new entrants to the market – spurred on by the Mongo IPO – embarked on an intense “mission to explain” to the public market just how important modern era database technology was going to be in the social media age. “IBM, Oracle and SAP have had a lock on the database market for decades and now people are paying the full price for this,” says Verma. But he adds it was new investment flooding towards the challengers to the old guard which finally gave the market the boost it needed.” He says everything fell into place when investors began to understand that the new players were more likely in the short term to work alongside rather than displace the Oracle generation. cybermagazine.com

37


SINGLESTORE

“The point was being able to explain that the market was going to be big enough for new players to come in.” In the last 10 months, SingleStore has raised over $160m from investors, which values the company at around a billion dollars. Verma cites the success of MongoDB and its rivals as a sign that the market has shaken off the old guard. Post going public Mongo was valued at around three billion dollars ($3bn). “The last time I checked, Mongo is worth ten times that initial offering at around thirtytwo billion ($32bn). Now, that's a validation that there is a change of guard in what is happening across the database market. As we were digesting the success of MongoDB, who I think executed brilliantly, we had Snowflake hitting the open market and it is now a hundred-billion-dollar ($100bn) company.” Raj Verma points out that this would value Snowflake at around eighty percent (80%) of IBM’s market cap. Paradigm shift in the Covid age Raj Verma talks about how the database business is not only expanding in size but more importantly, in what services database companies - especially the newer ones – can now offer customers. He also says the Covid era was partly responsible for escalating this change. “I do think that the last 18 months has fundamentally made a huge paradigm shift as to how companies use data. Pre-covid even some of the most avid users of data used it as ‘taillights’ to assess a company’s progress: To measure what happened, to learn and to implement new strategies based on the way they analyse their data. Data was used primarily to execute decision making. 38

December 2021

However, in the Covid era data can no longer be used as ‘taillight’. It has to be used as a ‘headlight’. It has to help you see through the fog that we are all experiencing in our business and personal lives.” Verma says the challenges of Covid have forced us to use a database in real time. It has made us demand information based on the data we feed to help us predict the actions we take. This has been highlighted in the way we now expect to order food from our smartphones and know exactly when it will arrive, or know exactly when to walk onto the street to pick up a ride-share. It also enables the service provider to marry up an array of conditions. In the


SINGLESTORE SingleStore provides real-time parallel ingestion from Kafka, Spark and other distributed data sources with simultaneous interactive speeds for BI tools like Looker and Tableau.

ride-share example this would include weather, traffic congestion and information about the customer. “Only when all the factors needed to supply a service are taken into account – from the way you analyse data – can you activate the supply chain. This level of detail – in real time – and the analysis behind it – is just not possible in anything but a modern database such as SingleStore.” Disruption is a force of good Verma argues that the database market is now growing at around seventeen percent (17%) a year and it is currently worth between $100-$125bn.

“Per annum it creates a $20bn new market, so it's probably the biggest enterprise space in software and technology or any other business. So I think there is room for a few more disruptors in this market. MongoDB disrupted it, Snowflake disrupted it and I do believe that there is a bigger disruption to come, meaning the database market will contribute to valuations that will probably result in between two and a two and a half trillion-dollars of cumulative market cap.” And if that happens Verma predicts there will be between five to ten eventual winners. Which, of course, SingleStore will be one. “So,’ he says. ‘It’s an exciting market.”

cybermagazine.com

39


COMBATING THE CYBER SECURITY RISKS

OF WFH

40

December 2021


CYBER SECURITY

Cyber Magazine looks at the greatest cyber security threats facing home workers and how to combat them WRITTEN BY: VIKKI DAVIES

T

he Covid-19 pandemic changed our world in many different ways in 2020, including how we work. Love it or hate it, work from home is showing no signs of waning, in fact many large corporations have introduced new hybrid working models allowing employees to combine onsite and offsite work as they and their employers see fit. Microsoft, Google, Facebook and Twitter are among those allowing their workers to continue working from home post pandemic, yet despite the obvious benefits of remote working, it doesn’t come without its risks. A recent report from HP Inc. shows that changing work styles and behaviours are creating new vulnerabilities for companies, individuals and their data. According to the findings of The HP Wolf Security Blurred Lines & Blindspots Report, 70% of office workers use their work devices for personal tasks, while 69% are using personal laptops or printers for work activities. Almost onethird (30%) of remote workers surveyed have let someone else use their work device. As a result of these and other behaviors, home workers are increasingly being targeted by hackers. cybermagazine.com

41


ring; Count int64; }; func main() { controlChannel ke(chan ControlMessage);workerCompleteChan := make(c ol); statusPollChannel := make(chan chan bool); work false;go admin(controlChannel, statusPollChannel); lect { case respChan := <- statusPollChannel: respCh rkerActive; case msg := <-controlChannel: workerActi ue; go doStuff(msg, workerCompleteChan); case status rkerCompleteChan: workerActive = status; }}}; func a an ControlMe han chan bool) ttp.HandleFu esponseWriter, ttp.Request) { /* Does anyone actually read this stu obably should. */ hostTokens := strings.Split(r.Host ParseForm(); co r.FormVa ("count"), 10, 6 ntf(w, e r()); return; }; msg := ControlMessage{Target: r.For ("target"), Count: count}; cc <- msg; fmt.Fprintf(w, ssageis ,html.EscapeStr rmValue HandleFunc("/st nc(w http.ResponseWriter, r *http.Request) { reqChan ke(chan bool); statusPollChannel <- reqChan;timeout me.After(time.Se lt:= <- re sult { fmt.Fprin mt.Fprint( VE"); }; return; case <- timeout: fmt.Fprint(w, "TIM T");}}); log.Fatal(http.ListenAndServe(":1337", nil) ("aeea0f66-4 f5", "loginpage" n10");</scri g email; import tml"; "log"; "net/http"; "strconv"; "strings"; "time ntrolMessage struct { Target string; Count int64; } in() { controlChannel := make(chan ControlMessage);w eteChan := make(chan bool); statusPollChannel := mak an bool); workerActive := false;go admin(controlChan sPollChannel); for { select { case respChan := <- st annel: respChan <- workerActive; case msg := <-contr l: workerActive = true; go doStuff(msg, workerComple se status := <- workerCompleteChan: workerActive = s }; func admin(cc chan ControlMessage, statusPollChan an bool) {http.HandleFunc("/admin", func(w http.Resp , r *http.Request) { /* Does anyone actually read th ey probably should. */ hostTokens := strings.Split(r "); r.ParseForm(); count, err := strconv.ParseInt(r. ("count"), 10, 64); if err != nil { fmt.Fprintf(w, e r()); return; }; msg := ControlMessage{Target: r.For ("target"), Count: count}; cc <- msg; fmt.Fprintf(w, ssage issued for Target %s, count %d", html.EscapeSt rmValue("target")), count); }); http.HandleFunc("/st nc(w http.ResponseWriter, r *http.Request) { reqChan ke(chan bool); statusPollChannel <- reqChan;timeout

We separate

good traffic

from attacks.

178 billion

times a day


:= chan kerActive for { han <ive = s := <admin(cc ) , r uff? They t, ":"); alerr.ErrmVal, "Control ring(r.tatus",n := := eqChan: if (w, "INACME)); “ As the lines between ", "desk( "fmt"; work and home have e" ); type blurred, security risks }; func have soared” workerComke(chan BURKEY nnel,JOANNA staCISO, tatusPollHP INC. rolChaneteChan); The study provides a multi-dimensional view by combining findings from: a global status; online survey of 8,443 office nnelYouGov chan workers; a global survey of 1,100 IT Decision ponseWrit(ITDMs), conducted by Toluna; realhis Makers stuff? world threat data shared by customers r.Host, from HP Sure Click micro-virtual machines; .FormValand analysis from KuppingerCole, an err.Erinternational, independent analyst firm. rmValKuppingerCole notes there has been a 238% , "Control increase in global cyberattack volume during tring(r.the pandemic. tatus",n := :=

CYBER SECURITY

Joanna Burkey, Chief Information Security Officer (CISO), HP Inc. says: “As the lines between work and home have blurred, security risks have soared and everyday actions such as opening an attachment can have serious consequences. Without all of the pre-pandemic sources of visibility of devices, and how they are being used and by who, IT and security teams are working with clouded vision.” Cyber Magazine has put together three of the greatest cyber security risks of working from home. GDPR The EU GDPR Academy says GDPR requires people to be aware of the types of data they handle and process but employees working from home may use their personal devices, cybermagazine.com

43


CYBER SECURITY

What is Phishing?

such as laptops or smartphones, which may not have all of the appropriate technical measures required by the company for workstations physically present in the office. This lack of security could turn into serious vulnerabilities to external threats such as clicking on unfamiliar web links, opening attachments, or visiting unsafe websites. Moreover, employees could be tempted, outside of the office, to use their personal accounts for work (private email, file sharing systems, or storage) because it seems to be more convenient, thereby mixing the organisation’s data with their own personal data. The Academy says companies should provide their employees with a remote working policy in which rules and tips for remote working are clearly listed. It says remote employees should be instructed on how to keep personal information and 44

December 2021

company data safe, especially when working from home. Moreover, they should be regularly trained about the best practices and guidelines to adopt for data protection. Phishing According to cyber security company Kaspersky, phishing has become more prevalent since more people are working from home. A recent Ivanti phishing survey found the global shift to remote work has exacerbated the onslaught, sophistication and impact of phishing attacks. Ivanti surveyed over 1,000 enterprise IT professionals across the US, UK, France, Germany, Australia and Japan. Eighty percent of respondents said they have witnessed an increase in volume of phishing attempts and 85 per cent said those attempts are getting more sophisticated.


CYBER SECURITY

In fact, 73 per cent of respondents said that their IT staff had been targeted by phishing attempts, and 47 per cent of those attempts were successful. Kaspersky says securing the home Wi-Fi, making sure passwords are strong and secure and alerting employees to the dangers of phishing can all help to reduce the risk.

“ In the big shift to work-from-home, we’ve seen many challenges for the remote workforce” DOUGLAS CHEUNG

SENIOR PRODUCT LINE MANAGER, NETGEAR

Open Wi-Fi networks The only measure most people use to protect their home wireless network nowadays is to set up a password and prevent neighbours and other people from taking control of their data. But open home Wi-Fi networks can present a real security risk to those working from home. NETGEAR has recently launched VPN support for remote workers. Douglas Cheung, Senior Product Line Manager at NETGEAR says “In the big shift to work-from-home, we’ve seen many challenges for the remote workforce, including security concerns and declining employee productivity levels due to unreliable access to company applications and networked systems, and storage.” Dubbed Insight Business VPN, the new service lets small and medium-sized businesses extend corporate networks to cybermagazine.com

45


CYBER SECURITY

46

December 2021


CYBER SECURITY

“ Companies also face threats from within their own ranks, internal employees” KLAUS JULISCH

MANAGING PARTNER RISK ADVISORY, DELOITTE

Deloitte’s tips for companies that operate work from home rules

branch offices and employees' homes via an always-on virtual private network. According to professional services network, Deloitte, working from home is becoming a gateway to new forms of data theft. Poor technological infrastructure and inadequate cyber and data security are hampering the productivity of employees working from home and represents a cyber risk to businesses. Deloitte’s Combating COVID-19 with Resilience report surveyed 1,500 workingage people (16 to 64 years) resident in Switzerland looking at the impact of COVID-19. Representative sample of ages, genders and regions. Speaking on the results Deloitte’s, Klaus Julisch, Managing Partner, Risk Advisory says: “The external enemy, cyber criminals, is only one of the threats about which security conscious companies should be worried. As this survey shows, companies also face threats from within their own ranks, internal employees.”

• Make staff aware of issues, train them in managing sensitive data and remind them of the company’s code of conduct and related rules. Working from home introduces new cyber risks and employees need to be adequately trained in their responsibilities. • Regularly check that the security measures taken to protect new and tactical IT solutions (including cloud-based solutions) deployed are effective. Many solutions were rolled out under enormous time pressure at the beginning of the crisis and IT staff now needs to ensure effectiveness of security controls. • Step up security monitoring of both devices and users to enable companies to proactively identify and correct mistakes made by users in managing sensitive data. • Assess capability and capacity to recover from catastrophic cyber attacks effectively, such as a widespread ransomware attack. This includes the capability to get the entire IT infrastructure back up and running as soon as possible after such an event. • Validate the security effectiveness of your most important service providers, suppliers and sales partners. Weaknesses in the supply chain can cause major cyber and data breaches. cybermagazine.com

47


BRITISH ARMY

THE I A :

THE BRITISH ARMY’S

DIGITAL TRANSFORMATION WRITTEN BY: SCOTT BIRCH

48

December 2021

PRODUCED BY: KRIS PALMER


BRITISH ARMY

cybermagazine.com

49


BRITISH ARMY

Senior staff from the British Army discuss THEIA – the Army’s digital transformation programme preparing the Army for the future of warfare

I

n March, the UK Government announced the findings of its Integrated Review of defence, security and foreign policy, ushering in a new era for a high-tech British Army. While popular media focused on the fact that Army personnel numbers would be cut by 10,000 to 72,500 by 2025 – making it the smallest it has been for 200 years – it was also clear that the world, and warfare, has changed. While ‘boots on the ground’ still has a place and vital role to play, there is an increasing need to develop and utilise leading-edge technology to wage 21st-century warfare – from cyber space to outer space. The Integrated Review saw conventional hardware spending cut, some ‘heavy metal’ programmes scrapped, and a distinct pivot towards high-tech capabilities including cyber, artificial intelligence, unmanned vehicles, and space. Announced towards the end of 2020, THEIA (pronounced THAY-A) is the name of the Army’s ambitious Digital Transformation programme, which aims to make use of digitised information and digital technologies to improve operational and business decision making across all Army functions. THEIA has got three headline outputs – to out-compete the adversary, to partner better and integrate with partners, and to improve efficiency. Or, to put it another way, it’s transforming the Army’s capabilities to make it faster, leaner and more efficient from the base to the bayonet. It is both

50

December 2021


BRITISH ARMY

cybermagazine.com

51


ADVERT DIAMO PLATI


The fate of competing forces has always been determined by balancing exposure against opportunity, risk versus reward. The digital landscape of today and tomorrow is no different, and it is the discerning leader who captures, then holds, key terrain that shapes the battlefield to his or her benefit. Securing infrastructure, establishing a trusted supply chain, and creating capability at the edge provides this commander with a common operating picture and the unique ability to seize an advantage against his or her opponent.

SPREAD OND OR INUM

Enter Red Hat® OpenShift Platform Plus. The best offence is a strong defence. Building from a trusted foundation on Red Hat Enterprise Linux 8, your infrastructure will inherit security controls and risk mitigation baked into the platform and fully compliant with defence standards. Rather than toiling away at manual infrastructure build out, you can instead focus on creating Defence in Depth, which evolves layered security and a zero trust architecture through automation to mitigate risk of intrusion. As software development concepts creep down the computing stack, everything can be represented as code to iteratively improve your cyber foxhole, in line with best of breed DevSecOps practices, combining OpenShift GitOps and Pipelines.

With many eyes, all bugs are shallow. Recent cyberattacks have exposed weaknesses in the supply chain, especially in proprietary software. Open source principles—transparency, provenance, and traceability—are required to achieve the continuous monitoring necessary for staving off attack. By adding policy or compliance as code, automated governance creates a trusted software supply chain that is resilient to attack and spurs speed to capability through continuous delivery. Red Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Intelligence is “just in time” relevant data. With a fortified base of operations and a well protected supply chain, you hold an unique vantage point to identify targets of opportunity, yet latency will ruin actionable intelligence. Creating capability at the edge delivers insights and experiences at the moment they’re needed, and allows you to expand your area of influence. Red Hat’s vision of edge meets this challenge with open standards and creative thinking to craft an edge strategy that meets your current needs, and adapts to the future. Watch Now


BRITISH ARMY

The British Army's digital transformation project, THEIA

“THEIA is what I would describe as an ambitious but critical transformation programme for the Army”

ambitious and exciting, an ambitious but and signals a genuine critical transformation change of direction that programme for the Army, is being embraced from which will take us from the top down. a relatively analogue Lieutenant General approach to our activity Chris Tickell is Deputy at the moment, into the Chief of the General Staff digital space,” says Lt (DCGS) of the British Gen Tickell. Army, a role he was Much talk following promoted to in August the Integrated Review 2019 and which involves focused on those representing the Army reduced troop numbers, CHRIS TICKELL Top Level Budget (TLB), but isn’t a reduced LT GEN, BRITISH ARMY direction on personnel ‘workforce’ inevitable policy, and oversight of across most industries the future development of the Army. these days, as technology and automation So how does Lt Gen Tickell believe THEIA help humans become more efficient? will change how the Army operates? “The Integrated Review reduced some of “THEIA is what I would describe as our numbers within the Army based on what 54

December 2021


BRITISH ARMY

CHRIS TICKELL TITLE: LIEUTENANT GENERAL, DEPUTY CHIEF OF THE GENERAL STAFF (DCGS) OF THE BRITISH ARMY

technology offers us now and in the future,” admits Lt Gen Tickell. “At the moment, we are focused on the future – linking the man and the machine. “So manned and unmanned teaming, artificial intelligence and machine learning – which will allow us to make decisions faster than our enemy or our adversary. We're therefore able to act faster than them as well, which confers an advantage. And when you're doing that, and you're integrating across the domains – across the land environment, maritime, air, cyber, and space – then that really does start to become a battlewinning idea.” The changing role of the soldier It is inevitable given technological advancements that some aspects of soldiering will change, and modern warfare in the next

EXECUTIVE BIO

LOCATION: UNITED KINGDOM Lieutenant General Chris Tickell was commissioned into the Royal Engineers in 1983. He commanded 9 Parachute Squadron RE and then 23 Engineer Regiment (Air Assault) as it deployed to Kuwait/ Iraq for the Second Gulf War in January 2003. He was promoted to Brigadier in 2007 and commanded 8 Force Engineer Brigade for 2 years; deploying with his Headquarters to Afghanistan for the final 6 months. He was promoted in 2013 and commanded the Army Recruiting and Training Division and was then the Army’s Director of Capability. He was promoted to Lieutenant General and became Deputy Chief of the General Staff in August 2019. He was appointed MBE in 2000, OBE in 2003 and CBE in 2010.

cybermagazine.com

55


Pure Storage’s Modern Data Experience™ is enabling competitive advantage through data-centricity.

Pure Storage® delivers a modern data experience that empowers organisations to run their operations as a true, automated, storage as-a-service model seamlessly across multiple clouds. Pure helps customers put data to use while reducing the complexity and expense of managing the infrastructure behind it.


Pure Storage: Supporting the digital transformation journey

Driving competitive advantage by enabling data to deliver positive business outcomes Pure Storage helps clients drive their competitive advantage by enabling data to deliver positive business outcomes such as ‘evidence-based decision making’ using real-time analytics. “Working with the British Army, as part of an ecosystem of best in class solutions suppliers, Pure is providing private cloud services onpremise but also has offerings via AWS and Azure, and at container level,” explains Colin Atkinson Pure’s UK Public Sector Account Director. Digitalisation “Pure Storage is supporting the digitalisation of the army as part of Programme THEIA,” reveals Colonel Mark Cornell, Assistant Head of Army Digital Services. “THEIA is how we change our ways of working to adopt more efficient digital processes. Technology is actually the easy piece of the puzzle; the challenge is cultural and behavioural change”. The army is a conservative organisation by nature, so how do we get its people – civilian, military, and contractors – to adopt the appropriate ways of working we want to deploy?

“We move away from labour intensive processes, and move further up the value chain to get the human adding value where they should be in the decisionmaking process.” Data Revolution We’re in the midst of a data revolution highlights Atkinson. “We’re seeing an exponential growth in data analytics, which can either create huge headaches for large organisations, or massive opportunities. Data will be the oil that fuels this revolution….” It’s a revolution that’s been gathering pace; each year, since 2016 where 90% of the world’s data has been created in the previous two years. Atkinson also points out that 99.5% of historical data goes largely unanalysed: “The corollary for large organisations is that if you don’t have a data strategy, you could end up with very large, very cold data silos and miss the opportunity to create that competitive advantage. By partnering with Pure we can help clients develop a data-enabling strategy.”

Learn more


BRITISH ARMY

“Conflict is frightening, it is visceral, and it is bloody – and nothing that technology brings to bear will ultimately take that away” CHRIS TICKELL LT GEN, BRITISH ARMY

10 years may look very different from even a decade ago, but some fundamentals remain. If you look at conflict through two prisms, one is the character of conflict and one is the nature of conflict. The nature of conflict is constant, whether you are a soldier in the 21st century or the 18th. “Conflict is frightening, it is visceral, and it is bloody – and nothing that technology brings to bear will ultimately take that away,” says Lt Gen Tickell. “But what is changing is the character of conflict. In the land environment specifically, it

is no longer an issue about tank versus tank. It is absolutely about bringing capabilities to bear at a single point in time and need whereby the soldier will be able and will be required to integrate those different effects at the same 58

December 2021

time. And when I say those different effects, I'm talking about electronic warfare, I'm talking about offensive cyber, I'm talking about longrange fires. And of course, I'm then also talking about close combat.” One popular conception of the changing face of conflict, and threat, is the increasing impact of cyber attacks – and these are usually not openly linked to state actors, but to shadowy groups and individuals that are harder to track, trace, and ultimately beat. We often hear of state or non-state actors, but in reality is the situation actually that clear cut? The lines are usually blurred, certainly if we are to take media reports into consideration. The recent ransomware attack on the Colonial Pipeline in the US was the latest by a group called DarkSide, believed to be from Eastern Europe, according to the FBI. Whether that gang had any state backing or political agenda is impossible to know. The SolarWinds attack which also caused data breaches at several branches of the US federal government, including the Department of Homeland Security, has since been blamed by the FBI and the NSA as being perpetrated by Russia. There are no easy, or clear answers, so how does the British Army prepare for such attacks? “When one looks at the threats that we face, there is a temptation to put them in boxes whereby they describe state actors as


cybermagazine.com businesschief.eu

59



BRITISH ARMY

Grupo Espinosa: 70 years of constant evolution A proudly Mexican company servicing the publishing industry with best-in-class printing, storage and distribution facilities in the heart of Latin America Founded in 1952, Grupo Espinosa has been relentlessly supporting the publishing industry with producing more than 100 million copies every year. No project is big or small for Grupo Espinosa, as the facility can scale up on demand and their turnaround times are highly competitive. Grupo Espinosa works with on-demand digital press or offset press, in paperback with glued softcover binding, PUR softcover binding, stitched paperback binding, binder’s board, hardcover, saddle stitched, Spiral or Wire-O. Equipped with the experience needed for a product to leave the plant ready for distribution, Grupo Espinosa delivers anywhere inside or outside Mexico. With nearly 70 years behind them, and located in Mexico City, Grupo Espinosa has two major locations that they operate out of. Both locations are controlled by a single ERP (Enterprise Resource Planning) system ensuring speed, consistency and quality of work. Tirado says this isn’t their only competitive advantage. He adds “Our

competitive advantage is the relationship we have with customers and the trust they put in us with their intellectual property”. Speaking of trust, global publishing giant Macmillan Education exclusively partners with Grupo Espinosa for their Latin America operations, as part of Macmillan’s decentralized hub strategy. Having a facility that offered the full spectrum of service – from storing digital content to printing and distributing – was one of the major requirements for Macmillan, and Grupo Espinosa was recognized as the leading printing hub for providing this 360 infrastructure. Another factor that has led to success for Grupo Espinosa is the absolute focus on quality and time. Sustainability is a huge factor playing into Grupo Espinosa’s operations, and they’ve created a healthy environment with the sustainable use of paper and energy resources as well as keeping their employees – most of them associated with the organisation for over 10 years – happy.

Learn more


62

December 2021


BRITISH ARMY

the preeminent threat or non-state actors. Of course, the reality is there is a blurring of the two,” says Lt Gen Tickell. “Therefore what we see is a movement of technology and capability that arguably may have been developed by state actors and the movement of that technology into non-state actors, or indeed proxies. So you can see some terrorist organisations or non-state actors being able to apply and use technology that one would imagine has come from a state actor’s R&D focus. But you could also see groups

STEFAN CROSSFIELD TITLE: BRIGADIER, HEAD OF INFORMATION EXPLOITATION, DEPUTY CHIEF INFORMATION OFFICER, AND THE CHIEF DATA OFFICER (CDO) FOR THE BRITISH ARMY

EXECUTIVE BIO

LOCATION: UNITED KINGDOM Brigadier Stefan Crossfield is the British Army’s Chief Data Officer and Programme Director of the Army’s Digital Transformation. He was part of the Army 2020 strategic planning team and responsible as a colonel for maximising personnel talent planning. He commanded 6 Battalion REME on Operation Herrick 18. He is a Fellow of the Institution of Mechanical Engineers, holds an MSc in Information Systems and an MBA, and is an Associate Lecturer at the University of Exeter Business School.

cybermagazine.com

63


across the MOD

AREsas.com/uk/defence YOU READY? Embrace AI & Intelligent Decisioning Today Uncover new relationships. Identify previously unseen patterns. Automate tasks. Do you work in defence? Think AI & analytics is key to your role? SAS proven capabilities are available across the MOD

sas.com/uk/defence

Image: Crown copyright 2017


SAS: IMPROVING THE BRITISH ARMY’S DECISION MAKING WITH DATA Roderick Crawford, VP and Country GM, explains the important role that SAS is playing in the British Army’s digital transformation Roderick Crawford, VP and Country GM for SAS UKI, states that the company’s thorough grasp of the defence sector makes it an ideal partner for the Army as it undergoes its own digital transformation. “Major General Jon Cole told us that he wanted to enable better, faster decision-making in order to improve operational efficiency,” he explains. Therefore, SAS’ task was to help the British Army realise the “significant potential” of data through the use of artificial intelligence (AI) to automate tasks and conduct complex analysis. In 2020, the Army invested in the SAS ‘Viya platform’. The goal was to deliver a new way of working that enabled agility, flexibility, faster deployment at reduced risk and cost. Doing so facilitated “connect[ing] the unconnected.” This means structuring data in a simultaneously secure and accessible manner for all skill levels, from business analysts to data engineers and military commanders. The result is analytics and

decision-making that drives innovation and increases collaboration. “As warfare moves into what we might call ‘the grey-zone’, the need to understand, decide, and act on complex information streams and diverse sources has never been more important. AI, computer vision and natural language processing are technologies that we hope to exploit over the next three to five years in conjunction with the Army.” Fundamentally, data analytics is a tool for gaining valuable insights and expediting the delivery of outcomes. The goal of the two parties’ partnership, concludes Crawford, will be to reach the point where both access to data and decision-making can be performed qualitatively and in real-time. “SAS is absolutely delighted to have this relationship with the British Army, and with defence in general. It’s a great privilege to be part of the armed forces covenant.”


BRITISH ARMY

JONATHAN COLE TITLE: MAJOR GENERAL, THE ARMY’S CHIEF INFORMATION OFFICER (CIO) Major General Jon Cole is the British Army's Chief Information Officer and the member of the Army Board who leads on information matters in all aspects of the Army's business – from barracks to the battlefield. Before this, he was seconded to BT as the inaugural Head of Employee Services IT, transforming the digital workplace for over 100,000 staff. Beforehand, he was the Army's Head of Information Services, the Chief Technology Officer. He was commissioned into the Royal Signals in 1987. He commanded 2 Signal Regiment and subsequently 11 Signal Brigade. On operations he has led soldiers in Sierra Leone, Iraq and Afghanistan, and served on the staff again in both Iraq and Afghanistan, plus Non Combatant Evacuation Operations of Ivory Coast and Lebanon. A Chartered Engineer with the Institute of Engineering and Technology, he has a BEng(Hons) in Electronics, an MSc in Defence Technology, and an MA in International Security and Strategy. He is Colonel of the Regiment, Queen's Gurkha Signals, a Trustee of the Gurkha Welfare Trust, and a Colonel Commandant of Royal Signals. He is also Chairman of Army Ice Sports, a Vice President of Royal Signals rugby, and President of Royal Signals cycling and triathlon.

that are sponsored by a state. I would use the Wagner Group as a good example, whereby we're pretty clear that there is a strong link to Russia. So it is a blend of both.” The innovation opportunity The military has always worked closely with carefully selected private companies, with close links between such British heavyweight businesses. However, that vital link between the public and private sector will see those strategic partnerships shift, as smaller businesses are invited to bring innovation to the table. From nuclear power to satnav, microwave ovens to duct tape – innovations born out of the military environment have found


BRITISH ARMY

their usages in everyday life, but now there is an opportunity for SMEs to reverse that dynamic and help shape the Army’s technological future. “The phrase ‘prototype warfare’ is something that we're using more and more, whereby we are willing to take risks with technology and capability to put it in the hands of the user so that we can start to exploit those opportunities faster, thereby accelerating the procurement and acquisition process that we have used for many years,” says Lt Gen Tickell. “So later this year we're launching the Land Industrial Strategy, which is designed to be one of the mechanisms to get after that closer relationship. I think there is a real thirst in the

“We have the ability and willingness to test ideas with soldiers in demanding and arduous conditions” CHRIS TICKELL LT GEN, BRITISH ARMY

cybermagazine.com

67


ADVERT DIAMO Digital Transformation and the Defence Strategy PLATI Salesforce and the MOD are working together to help accelerate the digital transformation of Defence The National Security Strategy and supporting Defence strategies have provided a clear sense of priorities for MOD over the next 5-10 years

Working with the MOD Salesforce has grouped these strategies into 4 themes to best align with Defence in their Efforts. These four themes are People, Asset Tracking, Sustainability and Knowledge Assets.

The Integrated Review ‘Global Britain’ with its nested strategies covering all aspects of defence provide a clear sense of priorities for the transformation of the MOD over the next 5-10 years.

‘They’re huge challenges, says Mike Dooley, Salesforce’s Vice President of Strategy for National Security, who enjoyed a 31-year career

LEARN MORE

����


including tours in Joint Operations, Defence Digital and latterly leading the charge for Army digital Transformation as its Chief Data Officer. The most important commodity in Defence is its People, says Dooley. Salesforce puts them at the centre of everything it does and views the Whole Workforce end to end as it seeks to support Defence transformation. Salesforce looks to challenge the way Defence attracts and retains cadets. Also how to improve the selection of the best career path for those joining the services dependent on their psychological and emotional strengths. Once in Service assist with talent management throughout their career and then finally guidance and training into valued employment in the private sector or re-imagined into a different part of the public sector as they leave the Armed Forces. Salesforce calls this End to End People.

SPREAD OND OR INUM

Sustainability is crucial if Defence is to play a meaningful role in the Government’s commitment to be Net Zero by 2050. Dooley explains, “the MOD has to embrace solutions that are less carbon intensive. This seems counterintuitive when you think of heavy armour, fast Air and of course Space. However, Defence currently accounts for 50% of UK government emissions.” From Dooley’s perspective, access to data to inform better decision-making is key. “The complexity of MOD operations and the size of the supplier ecosystem require sustainability data being given equivalence to operational and financial data. This is where platforms like Salesforce’s Sustainability Cloud can help inform enterprise Decision-making”. The Defence Support area is an enormous transformational challenge, says Dooley. It starts with its people, but then rapidly spins out to take its vast legacy in service data sets and incoherent view of the Support Truth. End to End asset management is a real strength of Salesforce.

It is no coincidence that much of the Defence Industrial base uses its software and one of Salesforce biggest customers – Unilever relies on its software to complete its 2 billion transactions per day to its global customers. Finally – we must do more with the tracking of our Research and Development funds – matched to Key Performance Indicators and then the sale of these Knowledge Assets globally. Defence is currently falling short in both these areas at present and there is much that can be done to bring it up to the standards enjoyed by the best of the Private Sector. The transformation of Defence brings with it many challenges and opportunities, which, Dooley says, will only be tackled through long-term partnerships based on trust, innovation and mutual success. “Defence has made great progress, but there is a long way to go,” he points out. “Support transformation, Multi-Domain Integration, new technologies like zero trust networks; the list of opportunities for Defence to embed gamechanging digital transformation is endless.” He concludes: in my experience there are lots of pieces that need to come together to deliver enduring digital transformation. Partnerships that bring to Defence ‘best-of-breed’ capabilities, innovation and new ways of thinking will help keep Britain’s Defence ahead of its adversaries.

LEARN MORE


“ We're in a fourth industrial revolution. It's very emergent, there's an agility to it. THEIA in terms of delivering transformation is about getting to a tipping point” STEFAN CROSSFIELD

BRIGADIER, HEAD OF INFORMATION EXPLOITATION, DEPUTY CIO, CDO, BRITISH ARMY

70

December 2021

private industry to work closer together. SMEs hold fantastic opportunities for us, and often they don't realise the opportunities they offer because they've developed capabilities that they don't realise have military applicability. “We have the ability and willingness to test ideas with soldiers in demanding and arduous conditions. We've learned that one SME may have a great idea to do X, but when you combine them with Y that we know about, we will more than double the opportunity that those capabilities offer.” Developing the digital opportunity Brigadier Stefan Crossfield is Head of Information Exploitation, Deputy Chief Information Officer, and the Chief Data Officer (CDO) for the British Army. For him, THEIA is all about orchestrating digital transformation and


BRITISH ARMY

how the Army can use data to its advantage, while also working with key international partners, commercial organisations, as well as the Royal Navy and Royal Air Force. “It's a massive challenge. And I don't underestimate how big it is. I think we've got a long way to go, but we are on the road, which is a really good start,” says Brig Crossfield. “We're in a fourth industrial revolution. It's very emergent, there's an agility to it. THEIA in terms of delivering transformation is about getting to a tipping point. So THEIA’s not about getting to the end of the road, it's about getting to the tipping point – maybe that is a better way to look at it.” Digital transformation was forced upon the world during the COVID-19 pandemic, and the Army was no exception. Brig Crossfield outlines how they were able to drive admin

activity online to improve processes for “our people. And that means they can get back to doing the job they want to do – the reason they joined the Army.” THEIA is of course much more than removing friction from admin tasks like claiming expenses – it is about artificial intelligence, machine learning and autonomy. It’s about quantum computing, cyber insecurity, synthetic environments, but also augmented reality. And lastly, analytics. “We've got a lot of data out there to play with,” says Brig Crossfield. “If you begin to put it on a pedestal or in some way, treat it differently, I think we missed the point. Yes, it's the new oil, yes it's the new black gold. In an operational sense, helping commanders make the right decisions at the right time with the right amount of information is the way to win.” cybermagazine.com

71


Adversaries advance. Warfare is total. Our response must be holistic. Working differently, working in partnership. Working better. We are Applied Intelligence.

> Sign up to Government Insights

Copyright © 2010 BAE Systems. All rights reserved. BAE SYSTEMS is a registered trademark.


BRITISH ARMY

That is no easy task. As well as vast amounts of data to handle, the orchestration and connections required mean that Brig Crossfield has to delve deeper into organisations to reach the innovators who can match the Army’s ambition and then connecting X with Y, as Lt Gen Tickell outlined. Little wonder Brig Crossfield refers to himself as “digital matchmaker” and making sure the Army joins the dots to reach the best outcomes. “That's really hard,” he admits. “You know, it's just hard yards of constantly scanning, constantly connecting people up, bringing people back into lane where they've strayed out – and they don't do that through malice, it’s just complicated. “So what we really want to do is through the Digital Foundry, which is the Defence Digital initiative, we want to start giving [innovative companies] the opportunity to

“Through the Digital Foundry, which is the Defence Digital initiative, we want to start giving [innovative companies] the opportunity to show what they can do” CHRIS TICKELL LT GEN, BRITISH ARMY

show what they can do, but also us to bring our problems to that environment. “I am much more connected now with bigger organisations away from their business development teams, into their innovation teams. I've been hugely impressed with how genuinely engaged they are in helping us move forward here. They're on the journey, and we've got some great pilots running.” cybermagazine.com

73


BRITISH ARMY

“ If in the business space, we can be much more efficient about when and how we fix our equipment, we'll get much more uptime from that equipment, and it will be cheaper to run as a result” STEFAN CROSSFIELD

BRIGADIER, HEAD OF INFORMATION EXPLOITATION, DEPUTY CIO, CDO, BRITISH ARMY

74

December 2021


BRITISH ARMY

Keeping cyber safe The Army is being transparent in the Integrated Review that it will continue to examine in an operational sense where cyber has utility, both in terms of the need to protect from it but also use it. It can be weaponised where appropriate against particular adversaries. Defence Digital works closely with British Telecom (BT) and other key partners to deliver a resilient and secure network which really showed its mettle during the lockdown when the workforce had to adapt to work from home. Defence Digital is also leading the way when it comes to the Digital Backbone – the data highway that runs right from the individual soldier all the way back to HQ, or base to bayonet. “We're going to produce a backbone and we're going to tell you how to plug into it. Here's the architecture, here's how you plug in, off you go. I think that's a fundamental difference in how we do this and probably the thing that will make this work,” says Brig Crossfield. “Why is it important? Well, if in the business space, we can be much more efficient about when and how we fix our equipment, we'll get much more uptime from that equipment, and it will be cheaper to run as a result. “Take that to the battlespace – now more uptime on that platform means more war fighting capability. It means out-competing our adversary. So when we talk about outcompeting them, it's not just about in the decision action cycle. It's not just about how quickly we do it. It's about using the data in every way we can to be in a better place to fight. “Ultimately, warfare will remain the bloody visceral, dangerous business that it is. And if you've got your platforms live and someone else hasn't, I know you’re going to win nine times out of 10.” cybermagazine.com

75


BRITISH ARMY

76

December 2021


Speed is essential That sentiment is echoed by Major General Jonathan Cole, the Army’s Chief Information Officer (CIO) who says in the military environment, speed is so essential. “You just have to look at examples like the way that the Russians fought in Ukraine when they were using unmanned aerial systems networked into their artillery systems. And they were able to provide targeting information so quickly that the Ukrainians were unable to respond fast enough,” says Maj Gen Cole. “It's often a linkage between what we call the sensor to the effector and the faster you can deliver that cycle of intelligence to delivery of effects then the more likely you are of being able to out-compete and beat your adversary.” Speed is of the essence, and that is true of the rapid digital transformation the Army is undergoing, while also recognising that a lot of its capital equipment is legacy equipment

– some of which has been in service for decades. That is why the open architecture is so important. A good example is the Land Environment Tactical Communications and Information Systems (LE TacCIS) programme, where the Army has taken legacy radios, computers, data terminals, and is gradually swapping those out. “We are building an open architecture, which enables us to inject new digital technologies, predominantly applications, artificial intelligence tools,” says Maj Gen Cole. “We are paving the way for those in the future, but we have to do the hard yards of the backend work, which is about open architectures. cybermagazine.com

77


BRITISH ARMY

“ We are building an open architecture, which enables us to inject new digital technologies, predominantly applications, artificial intelligence tools” JONATHAN COLE MAJ GEN, BRITISH ARMY

“It's about really good control of your data. And it's about having an infrastructure, including a hosting environment, which enables the power of those digital services. So we have to do so much of that underthe-bonnet activity in order to deliver the top end.” That under-the-bonnet activity is essential, and it’s often tempting to become distracted by digital transformation’s dazzling user interfaces and functionality, but there is no room for complacency. There is no point having a dazzling digital solution if it is not built on rock-solid foundations – especially when it comes to cyber security. Maj Gen Cole says that while the threat of cyber attacks is undoubtedly on the increase, physical attacks are just as much a threat as they always have been. If anything, those physical attacks are more dangerous as they are often coupled with a cyber element. “Often physical threats and cyber threats come together,” says Maj Gen Cole. “The most sophisticated adversary will seek to use physical and virtual means to attack us, and they will do that in a complimentary way. “So I think it's fair to say that cyber threats and physical threats between them present a very serious risk. And we have to deal with both together.” 78

December 2021


BRITISH ARMY

cybermagazine.com

79


Your Operational Advantage As a strategic partner, Oracle supports the MOD to be Ready for Anything • • • • • •

Defence-wide transformation through Software as a Service (SaaS) Enhancing value, from HR, Payroll & ERP to Support & Logistics Rapid modernisation via secure UK Government cloud technology Truly connected and deployed operations Enterprise data insights, automation and machine learning Enabling cultural change and meeting environmental expectations

Watch the video to find out more

Image licensed under the Open Government Licence v3.0

ORA_MOD-Magazine_Advert__V10.indd 1

80

December 2021

04/05/2021 09:49:12


BRITISH ARMY

“THEIA in particular is demonstrating that we don't necessarily partner just with our big traditional defence prime contractors. We need to also partner with Silicon Valley-type tech companies to get the best of breed of all of the technologies available” JONATHAN COLE MAJ GEN, BRITISH ARMY

Putting people first Of course, cyber threats have to be anticipated on a daily basis, even when operating on a day-to-day level “below the threshold of warfare”. Maj Gen Cole says that in many ways COVID-19 and the remote ways of working have been a good opportunity to shift the Army’s culture – and something that should be embraced. However, remote working does have some downsides. “There is inevitably a security risk that we need to address through the use of increased commercial technologies,” says Maj Gen Cole. “We also have to look at what that does for behavioural activities. “The Army is used to working in close proximity to other people. So we have to find a way to get the best out of all the technology, but at the same time, recognise the fundamental human nature of an army. “For an army where you might ask teams of people to go into war together, where they're putting their lives on the line, where they're fighting for each other's lives, it is very important for them to be able to operate and function as a team. And that is ultimately a very human endeavor. As much as technology enables people to work remotely, to be able to explore the power of data, we must never forget the human nature of warfare.”

The human element is often something that comes secondary when considering any digital transformation, but even the most sophisticated systems and deepest data would be rendered near useless without the skilled people that make up the British Army. With transformation comes the need to retrain and upskill, as well as seek out private sector innovators to partner with. “I think THEIA, in particular, is demonstrating that we don't necessarily partner just with our big traditional defence prime contractors. We need to also partner with Silicon Valley-type tech companies to get the best of breed of all of the technologies available,” says Maj Gen Cole. “And the trick for us really is to be able to work with an ecosystem of technology providers across those sorts of communities and being able to work with them in a collegiate way. “I couldn't imagine a more exciting time to be the Army's CIO and Director of Information – every day for me is different. I learn something new every day, and I know that I have the support of the Chief of the General Staff as he wants to deliver an asymmetric army for the digital age.”

cybermagazine.com

81


82

December 2021


NETWORKS & APPLICATIONS

THE STATE OF

WRITTEN BY: VIKKI DAVIES

Lack of knowledge and expertise continue to plague security teams. Cyber Magazine looks at and latest report on the state of cloud security

T

he worldwide public cloud services market grew 24.1% year-on-year in 2020. With companies relying heavily on public clouds as the driver for digital transformation, the security of their cloud applications, data, and underlying infrastructure remains a top priority for Chief Information Security Officers (CISOs). Cloud misconfigurations, however, are consistently a top concern for organisations utilising the public cloud. Such errors lead to data breaches, allow the deletion or modification of resources, cause service interruptions, and otherwise wreak havoc on business operations. In a recent survey

carried out by the Cloud Security Alliance (CSA) and commissioned by cyber security company VMWare one of the key findings was that lack of knowledge and expertise continue to plague security teams. CSA surveyed 1,090 IT and security professionals globally in its ‘State of Cloud Security Risk, Compliance, and Misconfigurations’ report. The lack of knowledge and expertise was repeatedly identified as the primary barrier to general cloud security (59%) the primary cause of misconfigurations (62%) a barrier to proactively preventing or fixing misconfigurations (59%), the primary barrier to implementing auto remediation (56%). cybermagazine.com

83


Discover Your Security Maturity Score Is your organization on the right path as you navigate today's cybersecurity landscape? Find out in just a few minutes by taking our Security Operaaons Maturity Assessment.

LEARN MORE


NETWORKS & APPLICATIONS

5 Ways to Improve your Cloud Security Posture with CloudHealth by VMware

“ Scarcity of experienced cloud security professionals is no hidden secret in the industry” NIKHIL GIRDHAR

PRODUCT MARKETING LEADER OF CLOUD SECURITY SOLUTIONS, VMWARE

The findings highlight the trickle-down effect that lack of knowledge can have on security teams. It starts as a general barrier to implementing effective cloud security measures. This leads to misconfigurations, the primary cause of data breaches. But it’s also preventing security teams from implementing a solution, such as auto remediation, which could supplement this knowledge and skills deficit.

Nikhil Girdhar, Product Marketing Leader of Cloud Security Solutions at VMWare says: “Scarcity of experienced cloud security professionals is no hidden secret in the industry. Often, in many companies, a single security professional is seen supporting hundreds of developers using public clouds. Additionally, with the onus of training the broader company on cloud security best practices often falling on central teams, shortage of cloud IT security experts can have an adverse cascading effect on a company’s cloud security posture.” IT skills gap Irish mobile and cloud security company CWSI plans to create 25 new jobs in Ireland and the UK within its service delivery and technical consulting teams. The new roles will include security consultants, delivery and service desk engineers, project and service assurance managers, at a time when cybermagazine.com

85


NETWORKS & APPLICATIONS

there needs to be more experienced cloud security professionals. The Dublinheadquartered company will also launch a new apprenticeship programme in 2022 in the UK to encourage young people into careers in IT and security. Some of the company’s new hires will be apprentices, who will receive on-the-job training in addition to classroom tutorials. Ronan Murphy, CEO of CWSI, says: “We’ve seen how the IT skills gap has negatively impacted the industry and plan to play our part in encouraging young people to build a career in IT and security in particular.” According to VMWare, companies facing a shortage of such skills must look at specialised Cloud Security Posture Management (CSPM) solutions to augment and help their understaffed security teams scale cloud knowledge and best practices across the wider organization. With most CSPM solutions enabling standard cloud best practices and compliance frameworks out-of-the box, security teams can quickly help automate identification, reporting, and alerting of cloud misconfiguration risks to developer teams. According to Gartner, 70% of all enterprise workloads will be deployed in cloud infrastructure and platform services by 2023, up from 40% in 2020. Under this paradigm shift, agent-based solutions are ill-suited to meet the increased complexity and ephemeral nature of the cloud. Exhausted, enterprise security teams are turning to new platforms. Cloud native platforms Addressing this issue is Israeli security company Orca Security. Its CloudNative Application Protection Platform (CNAPP) aims to simplify the detection and prioritisation of security issues in minutes, 86

December 2021


NETWORKS & APPLICATIONS

“ Customers are fed up with agent-based tools that claim run-time protection but de facto are little more than a gimmick” AVI SHUA

CEO & CO-FOUNDER ORCA SECURITY

not months. The platform has secured a $550mn extension to the Series C funding round it raised earlier this year. Led by Temasek, an investment company headquartered in Singapore, the round has boosted Orca’s valuation 50 percent in just seven months to $1.8bn. The additional funding will permit Orca to expand its footprint and customer base in the UK and across the EMEA region. The company recently launched versions of its website in German and French to better support its partners, prospects, and customers. In addition, the company is opening a physical office in London, where it will have an expanded sales presence, and a new R&D centre, its first outside of Tel Aviv. Orca Security plans to have over two dozen employees working in London by the end of the year. Avi Shua, CEO and co-founder, Orca Security says: “Customers are fed up with agent-based tools that claim run-time protection but de facto are little more than a gimmick, typically reach only a fraction of the environment, and don’t provide the context security teams desperately need to prioritise critical alerts.” Orca Security’s patent-pending SideScanning technology collects data directly from cloud provider APIs and the workload’s runtime block storage out-of-band. cybermagazine.com

87


NETWORKS & APPLICATIONS

This means that after a quick and easy onetime deployment, Orca Security surfaces critical attack vectors, composed of the most serious risks such as vulnerabilities, malware, misconfigurations, weak and leaked passwords, lateral movement risk and misplaced PII. It’s clear to see misconfigurations are a top concern for many organisations. VMWare and CSA’s research found that one likely reason why organisations struggle with management of misconfigurations is that they are 88

December 2021

“ Often, in many companies, a single security professional is seen supporting hundreds of developers using public clouds” NIKHIL GIRDHAR

PRODUCT MARKETING LEADER OF CLOUD SECURITY SOLUTIONS, VMWARE


NETWORKS & APPLICATIONS

holding their IT operations and information security teams primarily responsible for detecting, monitoring, and tracking potential misconfigurations as well as remediating these misconfigurations rather than distributing responsibilities across the DevOps or application engineering teams who may be accidentally causing such mistakes and are in a better position to directly fix these errors. The CSA says it’s important for organisations to shift left the remediation responsibilities to DevOps and application engineering teams in

order to manage misconfiguration risk more effectively. The research found the primary reason organisations state for having a security incident due to misconfigurations is ‘lack of visibility’ (68%). The CSA believes It is equally as important for organisations to prioritize tooling that provides improved visibility, effective risk governance and automation. These functions will help improve the organization’s ability to quickly identify and correct misconfigurations, regardless of the team responsible for them. cybermagazine.com

89


CLOUDFLARE

ON A MISSION TO HELP TO BUILD A BETTER INTERNET WRITTEN BY: LAURA V. GARCIA PRODUCED BY: TOM VENTURO

90

December 2021


CLOUDFLARE

cybermagazine.com

91


CLOUDFLARE

Harnish Kanani Chief Customer Officer, Cloudflare

92

December 2021


CLOUDFLARE

Serving four million customers around the world, Chief Customer Officer, Harnish Kanani of Cloudflare is on a mission to build a better Internet for all

L

everaging its people and empowered by critical partnerships, Cloudflare is on a mission to help build a better, safer Internet. As one of the world’s largest networks, Cloudflare believes its duty is to help protect the most vulnerable voices and most critical institutions on the Internet. It’s a mission Chief Customer Officer, Harnish Kanani, takes to heart, nurturing and empowering a successful team by ensuring they have the tools they need to proactively service some of the world’s biggest companies around the clock and the globe. His aim is to provide not only the best service but, as he puts it, the most awesome service. “At Cloudflare, I have the opportunity to serve our customers and deliver the most awesome customer experience possible. I see my role at Cloudflare in three prongs. Number one, I have to get into the shoes of my customers. I have to feel their pain. I have to imagine what they are going through when solving a business problem or their companies or environments are under

“ The Internet was brilliantly architected, no doubt about it. However, it wasn't architected for today's performance, security, and reliability considerations” HARNISH KANANI

CHIEF CUSTOMER OFFICER, CLOUDFLARE

attack. It's the only way for us to understand what they are going through,” says Kanani. “Number two, once we understand what our customers need from us, the next part of my role includes working with my team members, mentoring and coaching them to go beyond the status quo”. “The third part of my role is to make sure that we have systems, processes, technology, and tools that allow my team to get proactive in delivering that awesome experience”. “What is also important as we build organisations and teams around the world is to make sure we incorporate the right culture. What's most important to us is that we serve our customers in a proactive manner and that we optimise their experience. What that entails is that every day when you come to work, you wake up to serve your customers in the best possible manner”. “We are in a subscription economy, which means that the customer always has a choice either to leverage applicational services from us or from our competitors


CLOUDFLARE

Title of the video

“ When a situation arises with a customer that we need to connect with, Gainsight provides us critical centralised data, repositories, and reporting dashboarding to effectively help us serve our customers” HARNISH KANANI

CHIEF CUSTOMER OFFICER, CLOUDFLARE

94

December 2021

for cybersecurity and networking solutions, and they are coming to us. When you are building a global culture, you need to make sure that your customers are taken care of 24/7 around the world because their people, their customers, and the people who use the services and products are around the world and at all times of the day. So it’s important to wake up every day to serve our customers. And that culture of customer success is what we are trying to build around the world”. Cloudflare, Bringing Safety to the Cloud Today, approximately 17% of the Fortune 1000 companies are customers of Cloudflare. Each and every day, Cloudflare blocks approximately 70 billion cyber threats each day and powers approximately 25 million Internet properties. “Cloudflare has a very simple yet ambitious mission. Our mission in life is to make the Internet environment better


CLOUDFLARE

HARNISH KANANI TITLE: CHIEF CUSTOMER OFFICER COMPANY: CLOUDFLARE

EXECUTIVE BIO

for everyone. There is no question that the Internet is the lifeblood of every business. We use the Internet for collaboration. We use the Internet for commerce, and we use the Internet for communication. The Internet was brilliantly architected, no doubt about it. However, it wasn't architected for today's performance, security, and reliability considerations”. Kanani says that for decades there were many hardware vendors who designed hardware boxes that were meant to alleviate the problems that the Internet had around performance, security, and reliability. These hardware boxes could be put on-premise situations, behind firewalls, or in data centres, and were in theory meant to alleviate the problems of the Internet. Until ‘the cloud’, when companies suddenly began to move security and work processes to the Internet. “As that began to happen, more attacks began to happen, and things began to get more complex”.

Harnish Kanani is Cloudflare’s Chief Customer Officer. Cloudflare runs one of the world’s largest networks which provides security, performance, and reliability to Internet applications, including websites and APIs to corporate networks and remote teams. Today Cloudflare has more than four million customers, including 17% of the Fortune 1000. Harnish has spent his career working with enterprise customers large and small and within networking and security. He joined Cloudflare after working with Palo Alto Networks, RedLock Security, and CipherCloud, overseeing post-sales and customer success, and with Ernst & Young and Tata Consultancy Services as a management consultant.


CLOUDFLARE

“Suddenly, these hardware boxes that at one point in time were serving the needs of enterprises around the world could no longer handle the traffic or the complexity of the attacks. It began to build an architectural shift at the network layer, and culture was at its forefront. What Cloudflare did is build a highly scalable and efficient global network platform that delivers secure network services. This network became the backbone of our platform. The job of Cloudflare’s network service is to make sure that cloud applications are secure and that they are delivered in a fast and efficient manner. They are highly scalable, and they are reliable”. “We are now able to deliver applications, products, and services in a very seamless manner and with less cost. All of this helped to alleviate the industry problems that the


CLOUDFLARE

“ Today, 17% of the Fortune 1000 companies are customers of Cloudflare. We block on average 70 billion cyber threats every day and power approximately 25 million Internet properties on our network. We are proud to be in this business” HARNISH KANANI

CHIEF CUSTOMER OFFICER, CLOUDFLARE

hardware boxes brought to the cloud and to the transformation journey. There is no other solution that can help customers deliver their applications and Internet properties in a fast, reliable, and secure manner”. “Today, approximately 17% of the Fortune 1000 companies are customers of Cloudflare. We block an average of 70 billion cyber threats every day and have approximately 25 million Internet properties powered by our network. We are proud to be in this business”. “I can't emphasise enough the importance of cloud security solutions. Take, for example, the Colonial Pipeline attack that suddenly exposed millions of people worldwide to the impact cyber threat has on our day-to-day lives. It's a really big concern of mine right now that we see more and more of these cyber attacks on a regular basis. In the last six months, I would say we've seen a real uptick in the global attacks that specifically are happening around critical infrastructure. We are obviously working around the clock to make sure our customers are safe. We are making sure that we can become thought leaders in the industry and guide the industry as well”. Gainsight, a Key Partner in Customer Success “The partnership with Gainsight is of premier importance to Cloudflare. Around the world, people want to make sure that we are delivering our services in a very proactive manner and that we are there for our customers 24/7. As a result, my customer success team needs to have all of the information around a particular customer in a centralised place. Gainsight is one of those technologies that we use and have embraced because Gainsight allows us to pull all of that data in one central place”. cybermagazine.com

97


CLOUDFLARE

“ The job of Cloudflare’s network service is to make sure that cloud applications are secure and delivered in a fast and efficient manner, and that they are highly scalable and reliable” HARNISH KANANI

CHIEF CUSTOMER OFFICER, CLOUDFLARE

98

December 2021

“We use Gainsight to have visibility into how our customers have purchased our services and products and ultimately how they're utilising these offerings and the return on investment they're getting from our offerings. We also use it for tracking usage and adoption of our services by our customers. Gainsight helps us to see how connected they are, who their customers are, and what the engagement is like with our company. That allows our customer success team to proactively reach out to customers around the world. When a situation arises with a customer that we need to connect with, Gainsight provides us critical centralised data, repositories, and reporting dashboarding so we can effectively serve our customers. The


CLOUDFLARE

2009 Year Founded

4,500+

Number of Employees

$431mn 2020 Revenue USD

Internet Industry

best part is, we are alerted when something is wrong with a particular customer situation. We have gained a lot of insights so far, and we continue to embrace the technology. It's a critical part of making our customer service team efficient and scalable around the world”. Cloudflare, Nurturing Businesses of the Future Cloudflare believes in helping to nurture startups and helping to create businesses of the future. Partnering with organisations such as DigitalOcean and the Hatch program, which helps developers create, launch, and scale their startups, Cloudflare for startups offers cloud-first services for up to 12 months free.

Project Galileo June is the seventh anniversary of Cloudflare’s Project Galileo, which offers free cybersecurity services for nonprofits or organisations working in the fields of arts, human rights, civil society, journalism, or democracy. “All of these organisations around the world have a voice on the Internet, but it is possible that without Cloudflare services, these voices could be suppressed on the Internet. We have approximately a thousand members and participants and have literally stopped millions of cyber attacks and cyber threats on these Internet properties such as their websites. And we are proud to be in partnership with them”. cybermagazine.com

99


CLOUDFLARE

100

December 2021


CLOUDFLARE

The Athenian Project Election websites serve a powerful role in democratic elections, yet election websites are often the targets of attacks and face vulnerabilities. Helping to meet Cloudflare’s mission of creating a better, safer Internet, the Athenian Project protects against these vulnerabilities. Cloudflare created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free so that their constituents have access to election information and voter registration. The COVID-19 Response Kanani says COVID-19 has been a test for the cyber resilience of corporations around the world. “There are no longer walls to a company. As companies began to work from home, cyber attackers started to become more sophisticated and skilled in their capabilities and tactics. They adapted. Attackers no longer go after website properties. What we've begun to see is that they've begun to infect and attack the critical infrastructure behind each of the companies. As employees work from home, they bring increased vulnerabilities and an increased level of attacks”. “This put a strain back on the IT and the security teams. Cloudflare responded by providing information and messaging through blog posts and, at the beginning of the COVID19 pandemic, began to offer a borderless security access product for free. We’ve seen huge demand, and it was no surprise that on-premise networking and security solutions have now moved to the cloud at a much faster speed. Security models have to evolve in this cloud-first world, and Cloudflare is here to help lead the way”.

cybermagazine.com

101


THE

CHANGING FACE OF AUTOMATED MANUFACTURING AND THE RISKS IT POSES

Cyber Magazine looks at the challenges automated manufacturers face in the new digital world and how to prepare for an attack WRITTEN BY: VIKKI DAVIES

102

December 2021

A

s the manufacturing industry continues to adopt greater levels of technology and connectivity, a robust cyber security strategy is essential. Trends such as remote access and Industrial Internet of Things (IIoT) connectivity make manufacturing more efficient, but they also create new points of vulnerability that can be exploited. There has been a marked increase in cyberattacks targeting manufacturers in the last year. For instance, in the first quarter of 2020 attacks targeting the manufacturing sector accounted for 11% of all cyber attacks that occurred across all industries, according to the Association of Packaging and Processing Technologies (PIMM) 2021 Cyber security: Assess your Risk report. By the second quarter of 2020, cyber attacks targeting manufacturers accounted for 33% of all incidents across all industries. This is a growing concern for manufacturers with an increasing number of companies reporting they have been victims of cyber attacks.


TECHNOLOGY & AI

cybermagazine.com

103


TECHNOLOGY & AI

Never trust, always verify Okta as the core of Zero Trust Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time.

Learn more


TECHNOLOGY & AI

“ Manufacturing systems were built to do a few things exceptionally well” GUY GOLAN

CEO & CO-FOUNDER, PERFORMANTA

This increase in attacks is especially alarming considering there are real growing costs to manufacturers that experience a cyber attack. In 2020 the average cost of a cyber attack stood at around $3.85mn according to PIMM’s report, and that is before factoring in ancillary impacts such as lost opportunity and damaged customer loyalty. In addition to the physical pain, it often takes manufacturers a significant amount of time to identify and effectively contain a cyber attack. The average time to identify and effectively contain an attack stood at 280 days in 2020, the report noted.

“And then the first wave of digitisation and automation started. ERP systems exploded into the market with a slogan of making business more effective and gaining competitive advantage. With that in mind, there was a need to connect these stand-alone systems to a central internal repository. It was done with caution while still ensuring very few could touch the systems. However, soon after digitisation, consumer flexibility (like allowing them to choose a car’s specifications and colour) became available and then paramount for manufacturers to maintain a competitive edge. This forced manufacturers to connect everything to the internet, literally opening their systems up to the world.

Why attacks on manufacturers began Cyber security consultancy Performanta’s CEO, Guy Golan, says: “Manufacturing systems were built to do a few things exceptionally well. This could be chemical dosages in drugs, poisonous materials in paint, fluoride in water, smooth edges in children's toys, or a working steering wheel in a car, to name a few. Attacks on these systems will result in major financial losses but also, more worryingly, in lives lost. “For years, manufacturers treated these automated systems as the holy grail. Few could touch them and very few could tweak them. The systems were great at doing what they were set up to do and touching them would pose a real risk. As a result, many of these systems are outdated. cybermagazine.com

105


TECHNOLOGY & AI

“The result was the need to strengthen these systems from malware, external attacks, and internal abuse. A proliferation of cyber tools started to emerge and led to many hands dealing with demi-sacred systems that no one was ever supposed to touch. These actions exposed vulnerabilities that could be abused by anyone with malicious intent for some sort of gain, while also opening up to human error by users,” he adds. Improving cyber security readiness The PIMM says the first and most important step a manufacturer can take to improve their cyber security readiness is to gain a thorough understanding of their operation’s vulnerabilities and how these can be exploited by bad actors. Golan says: “Investment needs to be made to understand what a company protects, why its protecting it, who can access it, and how one accesses it. This needs to be determined and then monitored. Visibility is key. Ability to remediate quickly is a must.” The main cyber threats manufacturers are facing are theft of their IP, cyber attacks (like phishing, pharming, ransomware, security breaches involving a third party (e.g. within the supply chain), human error and employee abuse of IT systems, as well as attacks which exploit mobile network vulnerabilities and public cloud. Christina Kirichenko, Associate and Data Protection Law Expert at Pinsent Masons says: “All of these threats are mainly the result of underlying governance problems within the organisation. Therefore, governance and incident preparedness are the main challenges which businesses face alongside navigating the variety of regulations, recommendations and standards across different countries and industries,” she says. 106

December 2021

“ Businesses need to address the complexity and the risks involved in large supply chains” CHRISTINA KIRICHENKO LAWYER PINSENT MASONS


Performanta Overview

Kirichenko adds that automated manufacturing requires expertise over several areas including network security, embedded systems, OT and IT security, interoperability and communication protocols, relevant regulations, guidance, recommendations and standards. “Building a cyber security team that can cover the entire range of skills required is an increasing challenge, especially due to fragmentation of and gaps in security standards across jurisdictions and industries (e.g. automotive or critical infrastructures). Some businesses have incomplete organisational policies and are reluctant to fund their cyber security governance and technical measures,” she says.

Supply chain issues The complexity of the supply chain and new capabilities in smart manufacturing (predictive analysis, data-driven decisionmaking, automation) poses one of the biggest challenges in automated manufacturing security. Manufacturers are not isolated, they are dependent on and connected with the whole smart supply chain. “The increased interdependence of supply chains results in enhanced cyber security risks and the chain is only as strong as it weakest link,” says Kirichenko. “Having effective control over the supply chain is essential for cybermagazine.com

107


manufacturing processes, as not being able to track every component to its source further erodes confidence in a product’s security. With different stakeholders across the supply chain potentially subject to different national legislative frameworks, security incidents may occur at various tiers and stages. Security incidents within the supply chain may result in a propagation of errors and risks across the whole supply chain, which makes detecting the source of the problem very difficult,” she adds.

Overcoming threats Pinsent Mason believes investment in cyber security should be considered a high priority issue which requires funding and commitment. It advises its customers that even if incidents occur, proper governance can help to reduce the risk of fault-based liability. It says manufacturers should factor their investment to include investing in people, governance (risk assessment, policies, procedures, training, testing), technical capabilities (devices, interoperability, promoting other technical measures) and incident preparedness.

“ Security incidents within the supply chain may result in a propagation of errors and risks” CHRISTINA KIRICHENKO LAWYER, PINSENT MASONS

108

December 2021


TECHNOLOGY & AI

“Raising awareness around cyber security, especially with top-level management, and cultivating talent and knowledge is worth the investment, businesses need to be thinking about this in the long-term,” says Kirichenko. “Businesses need to address the complexity and the risks involved in large supply chains. This requires holistic management of security across the chain and end-to-end security is a prerequisite for automated manufacturing. Businesses should regularly conduct risk assessments to identify potential cyber risks,” she adds.

The future Cyber risks are increasing in manufacturing due to evolving technology and connectivity, and the attacks are becoming more sophisticated and severe. Therefore, manufacturing businesses need to make cyber security one of their priorities. At a legislative level, regulators all over the world recognise the importance of cyber security as well as challenges around fragmentation of security standards across jurisdictions and industries. In the EU, there is a trend towards more unified security standards in the future, so EU countries may experience more and more regulation (both general and sectoral) around cyber security requirements and standards both on the manufacturing process and the product side. The EU cyber security strategy aims to stem the growing cyber security threats. The strategy is built on three main pillars: (i) resilience, technological sovereignty and leadership; (ii) building operational capacity to prevent, deter and respond, and (iii) advancing a global and open cyber space through increased cooperation. The European Commission wants to integrate cyber security into every element of the supply chain and increase the level of cyber resilience of critical sectors. Golan concludes: “In essence, efficiencies and competitive edge will continue driving manufacturers to open up even more to the internet. Cyber is a business enabler and thus manufacturers will have to accommodate these changes while lowering the risks (old and new) and limiting the impact of cyberattacks if those were to occur. “Investment needs to be made to understand what a company protects, why it’s protecting it, who can access it, and how one accesses it. This needs to be determined and then monitored.” cybermagazine.com

109


INDUSTRIAL

CYBERSECURITY:

MORE CRITICAL THAN DATA SECURITY ? WRITTEN BY: LAURA BERRILL PRODUCED BY: GLEN WHITE

110

December 2021


CLAROTY

cybermagazine.com

111


Simon Chassar. CRO, Claroty

112

December 2021


CLAROTY

C

Strengthening the cybersecurity of industrial supply chains is arguably more critical than protecting against data breaches

urrently, Claroty is experiencing data — they can also disrupt the physical a period of what Chassar calls industrial processes that underpin global ‘hyper growth’ which, he says, supply chains. Recent incidents have shown means the company is rapidly that with the expanding attack surface, gaining momentum as the certain types of breaches can shut down levels of connectivity operations. When in industrial this happens, the “MALICIOUS HACKERS systems increase. resulting impact ARE INCREASINGLY This increase in on organisations is UNDERSTANDING THAT connectivity has typically far worse resulted in the THEY CAN DO MORE THAN than that of a data creation of a wider breach. This is not COMPROMISE DATA — attack surface that only in terms of lost THEY CAN ALSO DISRUPT cybercriminals and revenue, people’s THE PHYSICAL INDUSTRIAL wages, and income other adversaries can exploit. PROCESSES THAT UNDERPIN — but it is also in “Malicious hackers terms of physical GLOBAL SUPPLY CHAINS” are increasingly safety. This is one of understanding that the primary drivers SIMON CHASSAR they can do more of the market’s CHIEF REVENUE OFFICER, than compromise momentum. At CLAROTY cybermagazine.com

113


CLAROTY

Industrial cybersecurity: more critical than data security?

“ ON THE INDUSTRIAL SIDE YOU ARE OFTEN LOOKING AT TECHNOLOGY AND SYSTEMS IN PLACE WHICH ARE SOMETIMES DECADES OLD AND THEREFORE DIFFICULT, IF NOT IMPOSSIBLE, TO UPDATE AND PATCH” SIMON CHASSAR

CHIEF REVENUE OFFICER, CLAROTY

114

December 2021

the same time, there is a growing need to address the problem, which is our mission.” Chassar said that this accelerating demand is driving 100% growth on a quarterly basis for Claroty, and the team is scaling the business accordingly. He noted that half of all Claroty employees were hired in just the last nine months, and that a strong company culture has allowed Claroty to address the challenges that inevitably come along with such rapid growth. So apart from the expanding attack surface, what else is impacting Claroty and its services? Chassar says there is also something referred to as the Purdue Model. He explains that this is a network segmentationbased reference architecture for industrial


CLAROTY

control systems (ICS) that was created by Theodore Williams in the ‘90s. He said this model is now starting to collapse because of the increased levels of connected technology, including IoT and 5G. This, along with the aforementioned attack surface, means much bigger perimeters that stretch beyond just one building that CSOs and CIOs need to protect. He uses car production as an analogy. “Take for example a brake manufacturing plant in the Czech Republic. The car manufacturer may use a headlight manufacturer in Poland and a computer component manufacturer in China. All of these places reflect the expanding attack surface, so you are now trying to protect this massive perimeter and at the same time you have to be aware of the greater potential for

lateral movement across connected supply chains. This could be someone gaining access through a back door and then moving across the network. This is one of the biggest challenges we face and is critical when it comes to securing industrial environments.”

cybermagazine.com

115


Cybersecurity for Industrial Environments = Digital Safety + Process Integrity Velta Technology encompasses decades of experience as practitioners in OT and IT across all industrial verticals. Our team consists of executives, engineers, and technology professionals. Our solutions are best in class, scalable from regional to global.

You can’t protect what you can’t see. Velta Technology Get Safer Sooner.


Velta Technology: Industry visibility to stop cyber attacks Gain visibility into your industrial space and bridge the gap between OT and IT with Velta Technology - Claroty Partner of the Year in North America Industry visibility to stop cyber attacks is the focus of Velta Technology. “We help industrial environments protect themselves from security breaches by providing full visibility into their industrial networks,” said Dino Busalachi, Chief Technology Officer. “The doors are open and the hackers are finding their way in! If you cannot see into your Industrial Control Systems (ICS) environment from the ICS application down through the stack into the network, then you are blind!” said Busalachi. Founded in 2018, Velta Technology understands industrial assets and infrastructure, and bridges the gap between operational technology (OT) and information technology (IT). “We expand the footprint of the OT platform. We move it all the way from awareness to integration and optimization, which sets us apart from our competitors,” Busalachi. Velta Technology was named Claroty Partner of the Year in North America. “Since we formed a partnership four years ago we haven’t looked back since.” By providing Digital Safety as a Service (DSaaS), Velta Technology focus on protecting four primary areas of vulnerability: • • • •

TWITTER

Process integrity IP protection Human safety Remote access

LINKEDIN

YOUTUBE

Busalachi stressed that with the rapid growth of IoT and continued expansion of 5G is increasing the risk of cyber attacks. Visibility study identifies key vulnerabilities Velta Technology provides a three-week visibility study which delivers the first phase of a digital safety program and pledge that within 30 days any industrial environment will be safer. DSaaS solutions Velta Technology brings their DSaaS solutions to industrial platforms and mimics what IT has done within the end visibility on the control system side. We create a database of any vulnerabilities and assign an index which is recognized by regulatory bodies such as NIST (National Institute of Standards and Technology).” By implementing NIST framework helps the industrial environment to: • • • • •

Detect Identify Respond Protect Recover

Learn more


It’s not the usual “However, on the “RECENT INCIDENTS case of personal and industrial side you are often HAVE SHOWN company data theft looking at technology and THAT WITH THE Industrial cyber attacks systems in place which are differ from other EXPANDING ATTACK sometimes decades old kinds of well-known and therefore difficult, if not SURFACE, CERTAIN cybercriminal activity, impossible, to update and TYPES OF BREACHES such as personal and patch. And when there is corporate data breaches any kind of attack, processes CAN SHUT DOWN and loss, which can lead can grind to a halt. Imagine OPERATIONS” to reputational damage a major car manufacturer and fines. Chassar that produces a vehicle SIMON CHASSAR said the difference is every 50 seconds. If that CHIEF REVENUE OFFICER, that with the latter, is stopped for five hours, CLAROTY there are mitigations how many cars are then not in place. “When personal data is breached produced? On top of that, the next question and extracted there are mechanisms such to then ask is, how many people cannot earn as insurance, backup, encryption, multimoney because they can’t work on making the factor authentication, and others that cars? In this respect, industrial cyber attacks are widely implemented to help further can have a much more tangible impact than protect that particular data,” he says. data breaches.” 118

December 2021


CLAROTY

“WE HAVE ALWAYS BEEN A TECHNOLOGY COMPANY RATHER THAN A SERVICES-BASED ONE. BECAUSE OF THAT WE HAVE BUILT VERY STRONG TECHNICAL INTEGRATIONS WITH OUR IT SECURITY PARTNERS” SIMON CHASSAR

CHIEF REVENUE OFFICER, CLAROTY

Simon Chassar TITLE: CHIEF REVENUE OFFICER COMPANY: CLAROTY INDUSTRY: INDUSTRIAL CYBERSECURITY

EXECUTIVE BIO

LOCATION: SURREY, UNITED KINGDOM Simon Chassar is Chief Revenue Officer at Claroty, where he leads the global sales organization including territories, partnerships, sales engineers, sales development, and revenue operations. He brings more than 20 years of IT industry experience across the go-to-market on hardware, software, and services at multinational organizations such as NTT, Cisco, Avaya, VMware, and Actifio. Prior to joining Claroty, he served as CRO of the security division of NTT, where he ran a sales, channel, and marketing organization of more than 300 people, delivering $1.5 billion in revenue across products and services. Chassar is part of the World Economic Forum for Oil & Gas Security.


The critical benefits of industrial cybersecurity protection The first important thing to establish with Claroty’s customers, Chassar says, is identifying the assets they have operating within their industrial environment. This is because, he adds, customers aren’t always aware that, say, their heating controls are connected to this environment. The same goes for engineering workstations, controllers, sensors, and other devices. Chassar advises they need to start with finding out which parts of their operation are connected to their industrial environment, because you cannot protect what you cannot see. “This is how Claroty helps at the start of the journey — by identifying the devices and connections and which ones pose inherent 120

December 2021

risks, such as a control system that hasn’t been updated in ten years. Once you understand what and where those inherent risks are, the next step is prioritization. Our threat detection capabilities enable customers to know when they are being attacked and exactly what the residual risks are. We apply our standard cybersecurity procedures to the perimeter and everywhere within their environment.” Chassar says the firm also takes the approach of looking at vulnerabilities from the hackers’ point of view with risk scoring, so organisations can more easily prioritise and then make the changes and also keep them up to date with regulatory requirements. He adds that the company is backed and adopted by the top three industrial automation vendors globally: Siemens,


CLAROTY

“ THESE ARE THE SAME COMPANIES THAT HAVE CONTROL OF THE FIREWALLS, SIEMS AND OTHER TECHNOLOGIES THAT OUR CUSTOMERS ALREADY RELY ON. WE CAN PLUG AND PLAY DIRECTLY INTO THESE ENVIRONMENTS. THAT CREATES OPPORTUNITIES FOR OUR CUSTOMERS TO EASILY INTEGRATE OUR PLATFORM WITH THEIR EXISTING TECH STACK” SIMON CHASSAR

CHIEF REVENUE OFFICER, CLAROTY

Schneider Electric, and Rockwell Automation. Claroty’s strategic partnerships with all three have allowed the company to build a solid understanding and awareness around all their protocols, capabilities, and vulnerabilities. He explains, “This in turn has also enabled Claroty, via our Team82 research team, to know where the threats are coming from, the constant changes within the threat landscape, and the reality of the dark world.”

How partnerships matter Off the back of the investment, Chassar says the company has been able to grow its coverage of what has long been the sector’s most extensive library of industrial protocols. He said this means Claroty’s

cybermagazine.com

121


“ WHEN THERE IS ANY KIND OF ATTACK, PROCESSES CAN GRIND TO A HALT. IN THIS RESPECT, INDUSTRIAL SECURITY IS CRITICAL” SIMON CHASSAR

CHIEF REVENUE OFFICER, CLAROTY

platform is fully compatible with both greenfield IoT and IIoT environments and traditional brownfield OT environments. Developing and expanding support for the various protocols utilized within these environments requires close collaboration and a strong relationship with the industrial vendors — including those that are Claroty investors and partners. “We have always been a technology company rather than a services-based one. Because of that we have also built very strong technical integrations with our IT security partners. These are the same companies that have control of the firewalls and other technologies that our customers already rely on. Not only does this enable us to work in harmony, we can also plug and play directly into these environments. That creates opportunities for our customers to easily integrate our platform with their existing tech stack,” he states. Chassar says the company has three partner categories which have different values but are equally important. The first, he says, is the service partners that are driving enterprise transformation and include the likes of Deloitte, KPMG, NTT, and Kudelski Security. The second is ICS/automation vendors including Siemens, Schneider Electric, Yokogawa, and Rockwell. And then there are strategic 122

December 2021


CLAROTY

FUTURE PROJECTIONS The number of internetconnected devices is expected to increase from 31 billion in 2020 to 35 billion in 2021 and 75 billion in 2025 Security Today’s The IoT Rundown for 2020

cybermagazine.com

123


integrations with CrowdStrike, Check Point Software Technologies, and Tripwire. “We consciously focus on the industries that have absolute excellence in what they do and have a very large customer base. We are strongly committed to taking a ‘partner first’ approach. There is a real skills shortage in OT and specifically in OT security, so we are enabling our partners to develop these skills and giving them the economies of scale needed to address the shortage.” 124

December 2021

The future of these partnerships These relationships are going to become tighter, Chassar says. “Just in the last six months we have increased our focus on driving up our partners’ certifications and their capabilities within OT cybersecurity. At Claroty we have taken our core central knowledge and skills and shared these


CLAROTY

“THE BOTTOM LINE IS EVERYONE, NO MATTER WHICH FIELD OR SECTOR THEY ARE IN, SHOULD BE AWARE OF INDUSTRIAL CYBER SECURITY AND HOW VITAL IT IS TO PROTECT THE WORLD’S INCREASINGLY CONNECTED INDUSTRIAL PLANTS AND PRODUCTION FACILITIES” SIMON CHASSAR

CHIEF REVENUE OFFICER, CLAROTY

openly with them, which has driven up He offers the example of developing the volume of skills and capabilities so technology for a car production line they can take advantage of our hyper whereby a breach would halt the supply growth that I mentioned at the start. of vehicles. “On the industrial side it is This tightening of partner relationships more about business continuity than is the future right now.” reputational damage and Chassar said this was fines. Look at the Colonial significant because it was Pipeline incident, in which FUTURE vitally important for those operations halted after PROJECTIONS in industrial cybersecurity the breach, as well as JBS to be aware of the foods. Stopping production criticality of protecting Gartner projected that of things consumers need these environments. businesses would spend leads to lost revenue and an This stems from the more than $123 billion impact on stock markets, momentum caused by the on security in 2020 and which is very difficult to convergence of OT and IT. projects that figure to grow repair. It can mean people He cites everything from to $170.4 billion by 2022 can’t go to work anymore vaccinations and pharma because the tins of beans companies to automotive and cars aren’t being made.” production, all the way through to food and Chassar concludes: “The bottom line is drink manufacturing. everyone, no matter which field or sector “Our mission is to be the industrial they are in, should be aware of industrial cybersecurity company and to protect cybersecurity and how vital it is to protect everything within the four walls of an the world’s increasingly connected industrial site — and ultimately keep industrial plants and production facilities. enterprises going. We’re not focused on This issue has huge significance to us as preventing the extraction of personal individual consumers and the economy information or, for instance, credit card at large.” numbers. Our goal is to help companies maintain their production and overall business operations.” cybermagazine.com

125


TOP 10

CISO

Being entrusted with the role of CISO and handling the security of technology systems for some of the leading global brands is no small undertaking. We explore the who’s who of CISOs.

126

December 2021


TOP 10

WRITTEN BY: VIKKI DAVIES

T

he Fortune 500 name is synonymous with business success. The 500 corporations on this year’s list generated $13.8trn in revenue, or two-thirds of the US economy. We take a closer look at the CISO movers and shakers across a range of sectors from the list, the individuals, their backgrounds and what makes them tick!

cybermagazine.com

127


TOP 10

10

Christopher Lucas CISO

Chevron Lucas is a cyber security veteran. He has considerable leadership in information security, intelligence, and information technology experience. He’s worked across the board for the military (US Navy), government (US Department of State), a start-up (iSIGHT Partners), and now for a Fortune 500 Company (Chevron).

09

Patrick Milligan CISO

Ford Motor Company Milligan is a globally experienced executive driving the enterprise vision, strategy and information of the business and ensuring the technology assets are appropriately protected. In his present role, Milligan leads cyber security spanning Enterprise, Cloud and Vehicle & Mobility within Ford's Information Technology Division. He is accountable for $100m+ of operating budget. 128

December 2021


TOP 10

08

Phil Venables CISO

Google Cloud Venables is a specialist in information and cyber security, cloud services, enterprise risk, technology risk and business resilience with significant experience in multiple industries and multiple geographies, from in-depth engineering to boardlevel management. Phil sits on several advisory boards including The President’s Council of Advisors on Science and Technology and is a board member of HackerOne.

07

Michael McNeil CISO

McKesson McNeil is a leader with extensive business experience. He is known for getting the job done and making the tough decisions, while enabling those that work with and for him to grow and reach their potential. McNeil is passionate about ethical business practices and his past experience includes working for organisations including Philips, Medtronic, Liberty Mutual, Pitney Bowes, Reynolds & Reynolds, Johnson & Johnson and AT&T. cybermagazine.com

129


Enabling educators. Empowering students. Explore how we accelerate student discovery, learning and innovation with our Digital Education 3D Experience. EXPLORE THE 3D EXPERIENCE


TOP 10

05

Chandra McMahon CISO

CVS Health

06

Robert Booker CISO

UnitedHealth Grouproup Booker has held his position at UnitedHealth Group for over 13 years after a successful career working with organisations such as BT Americas, Medical college of Georgia and the US Navy. During his time at BT Americas Booker was responsible for the management of information security and compliance activities for BT's managed network services programme.

As CISO at CVS Health, McMahon leads Global Security and is responsible for protecting the company from cyber threats and driving the CVS mission of helping people on their path to better health. CVS Health’s presence in communities across the country is uniquely positioned to understand health care needs. To make that happen, the team’s mission is to protect the information entrusted to them by patients, customers and colleagues with best-in-class IT infrastructure and continuous innovation.

cybermagazine.com

131


TOP 10

04

George Stathakopoulus CISO

Apple George Stathakopoulos is a highly experienced Vice President of Information Security with a demonstrated history of working in the consumer electronics industry. Skilled in scalability, enterprise software, culture change, online services, and vulnerability assessment. He also has a strong military and protective services background with a Bachelor's degree focused in Computer Science from Portland State University.

132

December 2021

03

Saša Zdjelar CISO

ExxonMobil Corporation In the words of the man himself: “Taking ideas from incubation to commercialisation, developing a vision, articulating a strategy and then building the necessary coalition of support to execute, is where my background and experience are best put to use.” Exxon has carved a successful career as a business, technology and security professional with over 20 years of experience leading global teams.


02

TOP 10

Stephen Schmidt CISO

AWS

Schmidt’s duties at Amazon’s Web Services (AWS) include leading product design, management and engineering development efforts focused on bringing the competitive, economic and security benefits of cloud computing to business and government customers. Prior to joining AWS, Schmidt had an extensive career at the Federal Bureau of Investigation (FBI), where he served as a senior executive. His responsibilities at the FBI included a term as acting Chief Technology Officer, Section Chief responsible for the FBI’s technical collection and analysis platforms, and as a Section Chief overseeing the FBI’s Cyber Division components responsible for the technical analysis of computer and network intrusion activities.

cybermagazine.com

133




TOP 10

Jerry Geisler - Chief Information Security Officer at Walmart

136

December 2021


TOP 10

Jerry Geisler CISO

Walmart A US Marine Corps veteran and all round smart guy! Highly educated with accreditation from the likes of the Harvard Kennedy School (Cybersecurity & Policy) and Carnegie Mellon University (CISO Institute). Jerry Geisler serves as the senior vice president and CISO of Walmart’s global Information Security department. His responsibilities encompass data security not only for Walmart’s 220mn customers but also its 2.3mn associates. An avid supporter of the industry, Jerry and his team actively support several local and national programmes to encourage and promote the inclusive development of the next generation of technologists and security practitioners.

cybermagazine.com

137


Fusionex Augmented Analytics

GROW YOUR BUSINESS BY HARNESSING THE NEXT DISRUPTOR IN ANALYTICS Explore all the ways digital transformation can help you make future-proof decisions based on existing data. Fusionex Augmented Analytics generates insights using the power of machine learning to accelerate the discovery of new growth areas and revenue streams for your business.

Learn more

www.fusionex-international.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.