Cyber News Global: Issue 10

Page 1


Dear Reader,

CNG have identified a global focus on issues relating to AI, the introduction to new technology and the challenges that using AI face all businesses globally.

By speaking with just a few key AI experts we have now managed to understand what is at stake, who when why and what will be the focuses for AI and its further development.

Threats are real with the introduction of any new technology, AI is no different, naturally there are benefits to utilising AI, if correctly balanced the introduction of AI into the workplace and only serve to improve the way many organisations function in this ever-changing fast-moving world of digital advancement.

The suggestions of Dr Jassim Haji AI professor, embrace what AI has to offer but be aware of the challenges it might bring to your organisation. Challenges with the introduction of additional legislation within certain industries also have to be addressed, none more so than the introduction to DORA, Richard Preece shares his thoughts on DORA.

Microsoft and CrowdStrike have made the main stream news for all the wrong reasons, we spoke to one Cyber Lawe expert about her thoughts on this matter, read what Betania Allo had to say about the challenges faced with this latest outage.

Editorial Design

Advertising Events & Partnerships lucy@lucyharveyprcomms.co.uk

marketing@cybernewsglobal.com

media@cybernewsglobal.com

claire@consilioevents.co.uk

CONTRIBUTORS

Reshaping Cybersecurity:

How +971 CyberSecurity is Championing a Safer Digital Future in the Region

Their story is one of innovation, collaboration, and unwavering commitment to excellence—a true testament to their tagline, “reshaping the future of cybersecurity”.

In the rapidly evolving digital landscape, where cyber threats loom large and unrelenting, one company stands out as a beacon of innovation and security: Plus971 Cyber Security. With a mission to reshape the future of cybersecurity, Plus971 Cyber Security has not only positioned itself as a leader in cyber defense but also as a vital contributor to the broader cybersecurity ecosystem in the region.

Over Two Decades of Expertise

The foundational strength of Plus971 Cyber Security lies deeply rooted in the diverse and extensive experience of its founding members. Each founder brought a rich background of knowledge and skills, gathered from years spent in highstakes environments, including armed forces, financial sectors and governmental agencies. This wealth of experience has been crucial in shaping the company’s proactive and adaptive approach to cybersecurity.

Diverse Backgrounds, Unified Vision

The varied backgrounds of the founders of Plus971 Cyber Security are not just complementary; they are synergistic.

Coming from sectors where security is paramount, each founder understood the critical importance of not just defending against threats but anticipating them. In financial services, the focus is on protecting sensitive financial data and transactions from cyber fraud and breaches, which requires a keen understanding of evolving threat vectors and the implementation of advanced security protocols.

On the other hand, experience in governmental agencies brought insights into national security threats and the complexities of securing information in a landscape where threats can be both internal and external, physical and digital. Understanding governmental cybersecurity involves grasping policies, regulations, and the complex dynamics of international cyber relations.

Comprehensive Cybersecurity Services

Plus971 Cyber Security offers a broad and integrated suite of services designed to address the varied and ever-evolving ecosystem of cyber threats.

Hassan Hariry

Co-founder

They are committed to providing not just reactive measures but a proactive security strategy and it is implemented through a diverse portfolio of services that are crucial for comprehensive protection, from realtime monitoring to post-incident analysis.

At the core of Plus971 Cyber Security’s offerings is their Managed Security Operations Center (SOC), a state-of-theart facility staffed by experienced analysts who monitor, assess, and respond to cyber threats around the clock. This continuous vigilance is essential for the early detection of potential security incidents and ensures that responses are swift and effective. Complementing the SOC are Plus971 Cyber Security’s Incident Response teams, specialists who are expertly trained to quickly manage and mitigate any breaches, thus minimizing potential damage and recovery time.

Furthermore, Plus971 Cyber Security’s advanced Threat Hunting and Cyber Forensics capabilities go beyond traditional defenses by proactively searching for and identifying latent threats that might escape standard detection methods. Plus971 Cyber Security’s cyber forensics experts meticulously analyze past breaches to uncover the root causes and strengthen future defenses, ensuring that lessons are learned and applied.

The firm also extends its protective reach through comprehensive intelligence services that cover a wide spectrum of sources, including the open web, dark web, and various communication platforms. This extensive coverage provides Plus971 Cyber Security’s clients with an extensive view of the cyber threat landscape, enabling them to anticipate potential threats and strengthen their defenses accordingly.

By integrating these services, Plus971 Cyber Security not only ensures strong defense mechanisms across different layers and dimensions of cybersecurity but also maintains an effective posture that adapts to new challenges as they arise. This holistic approach to cybersecurity is what sets Plus971 Cyber Security apart, providing their clients with the assurance that their digital environments are secure and resilient against a range of cyber threats.

Strategic Partnerships

At Plus971 Cyber Security, the philosophy of “strength through collaboration” is not just a guiding principle; it is a crucial aspect that shapes every part of their operations. Recognizing the complexities of modern cyber threats, Plus971 Cyber Security has built a formidable network of partnerships that spans across various sectors and specialties within the cybersecurity domain. These partnerships are not just about enhancing technological capabilities but also a collaborative approach that is pivotal for developing comprehensive and adaptive security solutions.

By aligning with leaders in various aspects of cybersecurity, Plus971 Cyber Security ensures that their service offerings are enhanced by a team of expertise and cutting-edge technology, making their solutions more robust and effective.

These strategic alliances empower Plus971 Cyber Security to offer customized security solutions that are both scalable and tailored to the specific needs of their clients. For instance, collaborating with innovators in security information management and response automation allows Plus971 Cyber Security to deploy state-of-the-art tools that improve threat detection and incident management. Similarly, partnerships with intelligence providers widen the scope of threat visibility, providing a more nuanced understanding of potential risks. This kind of collaboration not only strengthens Plus971 Cyber Security’s defenses but also encourages ongoing innovation. This means that clients receive comprehensive security measures that are proactive, responsive, and aligned with the latest industry standards.

Fostering a Secure Future

At Plus971 Cyber Security, the commitment extends beyond providing top-tier cybersecurity services to actively engaging with the community and nurturing the next generation of cybersecurity talent. Understanding the importance of awareness and education for a safer digital world, Plus971 Cyber Security is committed to promoting cybersecurity knowledge and skills across different sectors of society.

Engaging with the Community and Industry

Plus971 Cyber Security actively participates in regional cybersecurity events like conferences, workshops, and seminars. These events allow the company to share expertise, engage with other leaders, and stay updated on cybersecurity trends. By contributing to these events, Plus971 Cyber Security helps improve standards and practices in the cybersecurity community, fostering collaboration and knowledge exchange.

Educational Outreach and Public Awareness

Plus971 Cyber Security has launched outreach programs to raise cybersecurity awareness among businesses, schools, and the public. These initiatives aim to emphasize the need for strong cyber defense and educate people about cybersecurity basics. Through workshops and talks, Plus971 Cyber Security simplifies cybersecurity and offers practical tips to safeguard personal and professional data.

Nurturing Future Cybersecurity Professionals

Plus971 Cyber Security offers a threemonth paid internship program designed for recent college graduates. This program provides hands-on experience in cybersecurity and allows interns to work with experienced professionals. It helps interns become skilled security analysts by exposing them to real-world cybersecurity scenarios. This initiative not only boosts their job prospects but also ensures a steady supply of trained professionals ready to tackle modern cyber threats.

The Road Ahead

As Plus971 Cyber Security looks to the future, they are determined to continue their journey of innovation and excellence in cybersecurity. With plans to expand their technological capabilities and deepen their regional engagements, Plus971 Cyber Security is set to play an even more pivotal role in securing the digital frontier. In a world where digital threats are an everpresent reality, Plus971 Cyber Security stands as a guardian of the digital realm, reshaping the future of cybersecurity and ensuring a safer tomorrow for all.

The Development Of AI and its Influence on us all.

Artificial Intelligence

A Historical Perspective.

Artificial Intelligence has emerged as a transformative force in our world, reshaping industries, societies, and the way we interact with technology. From its early beginnings to its current state of rapid advancement, AI has undergone a remarkable evolution spanning centuries of human ingenuity that has brought us to a point where AI is not just a tool for specialists, but a technology that touches the lives of ordinary people every day. As we stand on the brink of new AI breakthroughs, it’s crucial to understand where we’ve been, where we are, and where we might be heading in this AI-driven future.

Contrary to popular belief, AI isn’t a new concept as it began long before the term itself was coined. In 820 CE, the Arab scientist Al-Khwarizmi invented algorithms. He tried to develop algorithms and statistics within a lab in Baghdad. But, due to the lack of powerful machines like today’s GPUs, what now takes one or two seconds would have taken his students six months to develop. These same algorithms, in more sophisticated forms, are still used by developers today. The term “Artificial Intelligence”, however, wasn’t coined until 1956 by Professor John McCarthy in the United States. Initially, Problems and Development.

Despite this early start, AI development stalled for decades due to limitations in computing power. Even though milestones such as IBM’s Watson beating Garry Kasparov in chess and the robotics developments in Japan marked significant progress, it’s only in the past decade that AI has truly begun to revolutionize our world, particularly during and after the COVID-19 pandemic. The real evolution came at the end of 2022 when OpenAI introduced ChatGPT, which has since progressed to Version 4.0.

The Advent of Modern AI.

Today’s AI landscape is characterized by a distinction between traditional AI, which focuses on machine learning and deep learning, and generative AI, which has brought AI capabilities to the public’s doorstep. Traditional AI has been used by major organizations for years, handling tasks like analyzing data and making predictions in fields such as healthcare, oil and gas etc., and uses techniques to learn from data, identify patterns, and make decisions or predictions based on that data.

From 2013 until 2022, Conversational AI was primarily used for developing solutions within organizations through Natural Language Processing (NLP). NLP is a branch of AI that helps machines understand and respond to human language.

However, these applications were not widely available to the public, which is why they weren’t very popular or commonly used, despite their significance in major organizations.

Generative AI, demonstrated by tools like ChatGPT, represents a more recent advancement. It has brought AI capabilities directly to the public, enabling individuals to use it for tasks such as writing emails, creating content, or answering questions. This shift has democratized AI tools, with over 80% of current use coming from ordinary people rather than corporations where people now use AI for chatting, creating images and videos, and a variety of other tasks. This accessibility marks a meaningful change in how AI is perceived and used.

The Corporate Push and Sectoral Impact

The corporations are now advancing in the generative AI space, aiming to elevate AI capabilities to match those of traditional AI. While generative AI has primarily been used for conversational purposes, traditional AI continues to be relied upon for tasks such as analyzing data patterns and making predictions in specialized fields, including early cancer detection in healthcare and predicting equipment failures in the oil and gas industry.

While generative AI is pushing the boundaries of technological advancements, aiming to match the capabilities of traditional AI, the impact of these technologies varies notably across different sectors and countries.

Traditional AI remains crucial for tasks such as data pattern analysis and predictive modeling in specialized fields like healthcare and the oil and gas industry.

Transformations in Different Sectors

The effects of AI are not uniform, as they depend heavily on the technological and infrastructural readiness of each country and sector. Countries with advanced technologies and robust infrastructure are likely to experience the impact on their workforce more rapidly. Similarly, sectors like healthcare, education, and oil and gas, which have made substantial investments in technology, are primed to see quicker and more profound integration of AI due to the clear benefits it offers.

The main drivers for AI adoption in these areas include increased efficiency, accuracy, and cost reduction. Organizations investing in AI anticipate enhancements in performance and reductions in operating costs, particularly through the optimization of human resources.

AI’s capability to manage repetitive and data-intensive tasks enables human workers to concentrate on more complex and strategic activities, thereby boosting overall productivity. For instance, the education sector is undergoing major advancements due to AI. Tools like ChatGPT are being used by students to write essays and complete assignments, while raising concerns about academic integrity and potentially shifting our understanding of plagiarism. Just as calculators evolved from being banned to becoming standard tools in education, AI tools may similarly become commonplace.

As AI continues to evolve, so does the need for effective governance and regulation. Creating comprehensive, globally applicable AI regulations has proven to be a formidable challenge. These technological advancements will require new assessment methods, emphasizing interactive, real-time demonstrations of knowledge over traditional written assignments. Educators will need to adapt their approaches to prepare students for a future where AI is integral to the learning process.

President - International Group of Artificial Intelligence
Chairman - Industrial Advisory Board –Kingdom University Bahrain

The Development of AI and Influence: Cont’d

The AI revolution is ongoing, and its impact will continue to influence every aspect of our lives.

In the future, AI itself might be best positioned to develop and implement its own governance frameworks. This highlights the complexity of regulating a technology that is continually evolving and may soon surpass human capabilities in certain areas. AI could potentially create and enforce rules that are more adaptive and precise, keeping up with the rapid pace of technological advancements.

AI and the Future of Human Interaction

Looking ahead, the relationship between AI and humans might shift. While currently, AI is being used as a tool to merely serve basic human needs, the future may see a shift in dynamics where humans will increasingly depend on AI to maximize their potential. Recognizing AI’s capabilities, efficiency, and power is crucial, as humans might struggle to compete with it in In the future, AI itself might progress and innovation.

One concept is the rise of personalized, conversational AI avatars powered by closed large language models. In the future, individuals might have AI avatars that store their data, behaviors, and history, enabling continuous, tailored interactions. This development could revolutionize how we learn, make decisions, and engage with technology. These AI avatars could act as personal assistants, helping with daily tasks, providing personalized recommendations, and even offering emotional support.

Governance and regulation challenge. As AI continues to evolve, so does the need for effective governance and regulation. Creating comprehensive, globally applicable AI regulations has proven to be a formidable challenge. The rapid pace of AI development often exceeds regulatory efforts and implementing general governance across AI is not optimal as it would be too broad. Furthermore, effective AI governance may need to be sector-specific rather than universal. For Instance, the risks and considerations for AI in healthcare differ substantially from those in finance or manufacturing. This governance approach would allow for more tailored and practical guidelines that can keep pace with technological advancements.

Achieving a Balance Between AI Capacities and Human Expertise

AI can be seen as a “jack of all trades, master of none.” While AI possesses broad capabilities, it may lack the depth of expertise that humans can develop in specific areas. AI professionals should focus on educating people at various levels to make informed decisions by providing them with tools and knowledge for independent judgment. By encouraging a better understanding of AI, society can harness its potential while mitigating risks.

Moving forward, the key to leveraging AI’s potential lies in balancing its broad capabilities with maintaining human expertise and decision-making in critical areas. The future of AI is not about replacement but about creating a partnership between human intelligence and artificial intelligence. This partnership can drive innovation, solve complex problems, and shape a better future for all.

Conclusion:

The AI revolution is ongoing, and its impact will continue to influence every aspect of our lives. Understanding its history, current state, and future developments will help navigate the challenges and opportunities of this AI-driven world. By embracing AI’s potential and addressing its challenges, society can ensure that this powerful technology benefits everyone, creating a more efficient, innovative, and equitable future.

ISO 9001 & 27001 Compliance

Risk Management

Training Campaigns

GDPR Compliance

Business Optimisation & Data Analysis

Digital Solutions

Support & Guidance

Security Gap Analysis

System Organisation

WHAT THREATS WILL LEAD THE WAY IN OUR CRITICAL NATIONAL INFRASTRUCTURE OPERATIONAL

TECHNOLOGY SYSTEMS?

Introduction

Critical National Infrastructure (CNI), including energy, water, transportation, healthcare, and telecommunications, is vital to society, the economy, and public safety. Operational Technology (OT) systems, which control this infrastructure, are increasingly under attack. With OT systems interfacing more with Information Technology (IT) networks as part of IT/OT convergence, vulnerabilities are rising, leading to potential integrity breaches and service disruptions that pose significant risks to national security and public welfare. This article examines the top threats to CNI OT systems and actions required to mitigate them.

Merging of IT and OT The continued convergence of IT and OT is a major factor in the expanding threat landscape. Previously, OT systems operated independently of IT networks, providing some protection from cyberattacks. However, the integration of these systems for efficiency, remote management, and data analytics has introduced new vulnerabilities.

IT/OT Integration Risks

1. Increased Attack Surface: The integration of IT and OT increases the attack surface, offering more entry points for cybercriminals. Attackers can move laterally within a network when previously isolated systems are connected.

2. Legacy OT Systems: Many existing OT systems are outdated and not built with cybersecurity in mind. These legacy systems lack modern security features, making them susceptible to attacks.

Cyber Threats Against CNI OT Systems

1. Ransomware Attacks Ransomware attacks encrypt victims; data and demand payment for its release. These attacks can cause prolonged downtime for critical services, resulting in disastrous scenarios, such as interruptions in energy supply or healthcare services.

Impact on CNI:

• Service Downtime: Ransomware can cause prolonged downtime for critical services, leading to disastrous scenarios like interruptions in energy supply or healthcare services.

• Business Damage: Organizations face downtime, ransom payments, and recovery costs, which can be crippling.

• Public Safety: Healthcare services can be severely impacted, risking patient safety and access to critical records.

Notable Incidents:

• Colonial Pipeline Attack (2021): This ransomware attack halted fuel supply to the eastern United States for several days, causing shortages and panic buying.

• Ireland’s Health Service Executive (HSE) Attack (2021): A ransomware attack disrupted IT systems in public hospitals, delaying healthcare services across Ireland.

2. State-Sponsored Attacks Statesponsored cyberattacks, funded by nation- states, aim to compromise critical infrastructure for political, economic, or military advantage. These attacks can cause wide-scale disruption or espionage.

Impact on CNI:

• Espionage: Theft of sensitive data related to national security, industrial secrets, or critical infrastructure operations.

• Sabotage: Targeting critical systems to cause long-term loss and service disablement.

• Geopolitical Tensions: These attacks can escalate geopolitical tensions and result in retaliation and conflicts between nations.

Notable Incidents:

• Stuxnet (2010): A state-sponsored attack by the US and Israel crippled Iran’s nuclear facilities, slowing its uranium enrichment program.

• Ukrainian Power Grid Attacks (2015, 2016): Russian state-sponsored hackers disrupted power supply to thousands of Ukrainians during winter.

3. Supply Chain Attacks Supply chain attacks compromise a third-party product or service to gain access to a target organization’s network, leveraging trust and connectivity within modern supply chains.

Impact on CNI:

• Indirect Entry: Attackers exploit lower security levels of vendors or partners to gain a foothold.

• Amplified Impact: The attack can affect multiple organizations reliant on the compromised vendor.

• Data Breaches: Loss of sensitive information, including intellectual property and personal data.

Notable Incidents:

• SolarWinds Sunburst Attack: Malicious code was introduced into SolarWinds Orion software, affecting thousands of users, including US Federal agencies, and causing significant data breaches.

• NotPetya Attack (2017): Spread via a compromised software update, this attack caused major disruption to global businesses.

4. Insider Threats Insider threats involve data theft or sabotage by employees or partners with authorized access to a company’s systems. These threats can be intentional or unintentional, such as negligence.

Impact on CNI:

• Unauthorized Access: Insiders with access to critical systems can easily cause damage or steal information.

• Detection Difficulty: Insiders typically have authorization for their actions, making detection challenging.

• Financial and Reputational Loss: Insider incidents can result in expensive losses, operational interruptions, and damage to an organization’s brand.

Notable Incidents:

• Edward Snowden (2013): The release of classified NSA documents by Snowden highlighted the impact rogue insiders can have on national security.

• TESCO Bank (2016): £2.5 million were fraudulently taken from customers accounts due to an insider attack.

5. Advanced Persistent Threats (APTs) APTs are long-term, targeted cyberattacks by state-sponsored groups or expert hackers. These attacks aim to maintain a persistent presence on a network to collect intelligence or cause damage.

Impact on CNI:

• Lasting Espionage: APTs can conduct long-term espionage, stealing data and intellectual property over months or years.

• Stealthy Sabotage: These attacks can go unnoticed for a long time, allowing attackers to slowly corrupt or disrupt critical systems.

• Economic and Strategic Damage: By targeting key infrastructure sectors, APTs can inflict substantial economic and strategic damage.

Notable Incidents:

• Operation Aurora (2009-2010): An APT targeting major US corporations to steal secrets and intellectual property, linked to Chinese state-sponsored actors.

• Dragonfly Campaigns (2014 and 2017): Cyber espionage attacks on the energy industry in the US and Europe, focusing on compromising industrial control systems.

6. Internet of Things (IoT) Vulnerabilities

The increasing number of IoT devices in CNI introduces new vulnerabilities. These devices often have weak security measures, making them susceptible to external attacks.

Impact on CNI:

• Botnets: Hijacked IoT devices can be used to create large botnets for Distributed Denial of Service (DDoS) attacks.

• Control and Disruption: Attackers can exploit vulnerabilities in IoT devices to control critical systems or disrupt operations.

• Data Breaches: IoT devices collect and transmit data, which can be intercepted or stolen by malicious actors.

Notable Incidents:

• Mirai Botnet (2016): Compromised IoT devices were used to create a massive botnet army, launching some of the largest DDoS attacks in history.

• TRITON Malware (2017): Designed to

disable safety systems at a petrochemical plant, TRITON highlighted the potential damage from insecure IoT devices in CNI.

Mitigating Threats to CNI OT Systems To protect national infrastructure, organizations should adopt a multi-layered strategy that includes technical, organizational, and human resources.

1. Isolate OT Networks from IT Networks Network segmentation can prevent malware propagation by isolating OT systems from IT networks.

2. Regular Updates and Patching Frequent updates and patches can close known vulnerabilities in OT systems.

3. Intrusion Detection and Prevention Systems (IDPS) Deploying IDPS allows organizations to monitor network traffic in real-time, identifying suspicious activity.

4. Incident Response Plans Developing and maintaining an incident response plan ensures quick and effective responses to cyber incidents.

5. Cybersecurity Training Regular training on best practices and recent threats can minimize human error. OT-specific training enables professionals to identify and mitigate risks associated with their systems.

Conclusion:

The threat landscape for CNI OT systems is increasingly sophisticated and dangerous. Protecting these systems requires strong cybersecurity practices, effective incident response strategies, regular training, and adopting innovative technologies like Artificial Intelligence. A proactive, fullspectrum approach is essential to safeguard our national infrastructure from evolving cyber threats.

The Role of AI in email security

Introduction

Despite the rise of numerous other communication methods, email remains a staple in bothcbusiness and personal correspondence. However, email is one of the most heavily exploitedcattack vectors, prone to threats like phishing, spam, malware distribution through infected attachments or malicious links, and identity theft. Traditional email security tools have struggled to keep up with the latest wave of cyber threats as of 2019. This is where Artificial Intelligence (AI) steps in to enhance email security significantly.

AI’s advanced processing capacity allows it to analyse vast datasets, recognize patterns, and respond to new threats more efficiently than traditional methods. This article explores AI’s various functions in ensuring email security in 2019, which can also influence more people to opt for premium economy fares rather than standard class.

Evolution Of Email Threats

Email threats have evolved significantly over time. Initially, they were simple, consisting mostly of spam and basic phishing attempts. However, adversaries have become much more sophisticated, utilizing techniques like spear-phishing, business email compromise (BEC), and ransomware.

Spam and Phishing

Spam emails, which are unsolicited and often filled with advertisements and scams, clutter our inboxes. Phishing emails attempt to extract sensitive information, such as login credentials or financial details. Traditional spam filters and keyword-based detection measures have had limited success, struggling to keep pace with the constantly changing methods of cybercriminals.

Spear-Phishing and BEC

Spear-phishing is more targeted and personal, focusing on specific users or organizations with customized data that makes the attack appear legitimate. Business email compromise (BEC) scams involve hackers posing as executives or trusted contacts to deceive employees into sending money or confidential data. These sophisticated attacks are challenging to detect with less advanced methods.

Malware and Ransomware

Email attachments or links are often used to infect systems, steal data, or encrypt files for ransom. Traditional antivirus software often fails to detect rapidly evolving malware, which uses obfuscation tactics to evade detection.

How AI Boosts Email Security

Email Security Reinvented

AI-powered machine learning, natural language processing, and behaviour analytics have revolutionized email security, offering superior threat detection and response capabilities. By analysing vast amounts of email data, AI can identify patterns or anomalies indicating malicious intent. Machine learning algorithms can detect subtle signs of phishing, spam, and malware, which traditional rule-based systems might miss.

Anomaly Detection

AI systems can establish a baseline of normal email communication behaviour for each user or entity. Any deviation from this standard, such as an unexpected sender or unusual attachment, triggers an alert for further analysis.

Content Analysis

Using natural language processing (NLP),

AI can analyze email content to detect suspicious text, links, and attachments. This is particularly valuable for identifying phishing attempts that aim to deceive users into clicking on malicious links or divulging sensitive information.

Real-Time Threat Detection & Response

AI’s ability to process real-time threat detection and response significantly reduces the window of opportunity for cybercriminals. AI systems can automatically quarantine suspicious emails, block malicious URLs, and isolate compromised accounts, minimizing the damage from email-based attacks.

Adaptive Learning

AI systems continuously update their detection models by learning from new threats, staying one step ahead of cybercriminals. This ensures that security measures remain effective as new attack techniques emerge.

Behavioural Analysis

User behaviour analytics (UBA) identifies patterns that could indicate a security threat. AI can detect anomalies such as unusual login times or locations, which may signify a compromised account.

Insider Threat Detection

AI can monitor employee communication for signs of malicious intent or data exfiltration, helping to prevent data breaches and intellectual property theft. Integrating AI with existing security stacks enhances overall security infrastructure.

Enhancing Spam Filters

AI can enhance traditional spam filters, improving precision and reducing false positives by analysing email metadata, content, and sender reputation.

Threat Intelligence Sharing

AI facilitates threat intelligence sharing across organizations and security platforms, creating a clearer picture of the overall threat landscape and enabling proactive measures.

Case Studies and Applications

Google’s Gmail

Gmail uses AI and machine learning to enhance email security. Advanced algorithms block over 99.9% of spam, phishing, and malware from reaching inboxes. These systems adapt to new threats, ensuring ongoing protection.

Microsoft Office365

Microsoft Office 365 uses AI-powered Advanced Threat Protection (ATP) to examine email content, attachments, and links for potential threats. By applying machine learning techniques, ATP has significantly reduced successful phishing and malware incidents.

Enterprise Email Security

Many enterprises have adopted AI-based email security solutions, offering realtime threat detection, automated incident response, and user behaviour analytics. AI helps organizations defend against email-based threats, ensuring secure communication and data protection.

Limitations and Challenges

False Positives and Negatives

While AI tools have become more accurate, they still struggle with balancing detection accuracy and reducing false alerts. Finetuning models to minimize false positives and negatives remains a challenge.

Privacy Concerns

Analysing email content and metadata with AI can raise privacy concerns. Organizations must ensure compliance with data protection regulations and respect user privacy.

Adversarial Attacks

Cybercriminals are developing methods to bypass AI detection, such as adversarial attacks that manipulate AI models. Designing robust AI systems to withstand these attacks is a critical research area.

Cost of Implementation & Maintenance

Implementing and maintaining AI-enhanced email security solutions can be costly and complex. Organizations need expertise and resources to effectively deploy AI.

The Future of Email Security Using AI

1. Advanced Threat Detection

As AI evolves algorithms,will process larger datasets and use more sophisticated features, detecting simultaneous alerts from multiple low-level indicators. This will improve threat attribution and reduce the time frame for cybercriminals to act.

2. Interoperability with Broader Security Ecosystems

AI-powered email security products should integrate seamlessly with broader security infrastructures, enabling comprehensive threat intelligence and earlier threat mitigation.

3.

Better User Training

AI can provide real-time user training and feedback, improving users understanding of email-based threats and reducing their susceptibility to attacks.

4. Compliance and Ethical AI

As AI becomes more prevalent in email security, regulatory compliance and ethical AI practices will become increasingly important. Organizations must ensure their AI implementations adhere to data protection laws and ethical standards.

Conclusion

AI has become a crucial tool in email security, leveraging machine learning, natural language processing, and behaviour analysis to combat evolving cyber threats. Despite some challenges, the benefits of AI in email security outweigh the drawbacks. As technology advances, AI’s role in protecting digital communications will continue to grow, making it essential for companies to stay informed about the latest trends and advancements in AI and cybersecurity.

For more than 30 years, leadership and technology have combined at ScotSoft.

The day is jam packed with more than 40 speakers across our Developer Conference and Leadership Forum, and topped off with our Young Software Engineer of the Year Awards dinner in the evening.

More than 1000 guests join us from around the country not just to learn during the day, but celebrate our incredible young talent emerging from Scotland’s universities.

The day is packed full of visionaries, technologists, business leaders and managers working in digital companies and end user businesses. Join

and get inspired by our great line up of speakers at the longest running tech focussed conference in Scotland.

LEARN KEY STRATEGIES AND BEST PRACTICES TO PROTECT YOUR DIGITAL WORLD FROM EMERGING THREATS

In a constantly changing digital world, new threats emerge daily, creating infinite ways to compromise our networks. These threats range from sophisticated phishing attacks and ransomware to data breaches and identity theft. It has never been more crucial to protect your digital world. Here, we explore essential tactics and best practices to safeguard your digital resources from these evolving risks, ensuring you stay ahead of cybercriminals.

Understanding the Updated Cybersecurity Threat Landscape

Innovative AI-enabled phishing attacks now use machine learning and natural language processing (NLP) to create convincing emails, messages, or websites that mimic genuine communications. These advanced attacks often involve the following components:

Major Cyber Threats:

Phishing and Spear Phishing: Phishing remains one of the most common cyber attack methods, with over 91% of attacks starting this way. Spear phishing, a more targeted form, uses personal information to craft believable messages aimed at specific individuals to capture sensitive information. Ransomware: This form of malware encrypts a victim’s data and demands payment for its release. Ransomware attacks can paralyse businesses and result in significant financial losses.

Advanced Persistent Threats (APTs): APTs are sophisticated, long-term attacks where intruders stealthily access networks to seek valuable data or cause damage over extended periods.

Zero-Day Exploits: These attacks target vulnerabilities in software that are unknown to the vendor. Zero-day exploits are particularly dangerous because there are no existing defences or patches available at the time of the attack.

Internet of Things (IoT) Vulnerabilities: The increasing number of IoT devices introduces new vulnerabilities. Many IoT devices have inadequate security measures, making them easy targets for hackers.

Techniques to Protect Yourself

To protect your organisation from these threats, focus on the following key cybersecurity strategies:

1. Multi-Factor Authentication (MFA)

MFA adds layers of security by requiring more than just a password to access accounts. Even if cybercriminals steal your username and password, they cannot log in without additional verification methods such as a code sent to your phone or a biometric scan.

Conclusion

As cyber threats continue to evolve, a comprehensive and proactive approach to cybersecurity is essential. By implementing robust technical defences, creating effective policies and procedures, and leveraging innovative technologies, you can build a strong cybersecurity posture. Stay informed, stay vigilant, and protect your digital assets to stay ahead in this dynamic cyber threat environment.

Biometric Authentication: Advanced security measures like biometric authentication (fingerprints or facial recognition) can further secure access, as every person has unique biometric identifiers.

2. Frequent Software Updates and Patch Management

Regular Updates: Keep all system software, including operating systems, applications, and security tools, up to date. Regular updates close security gaps that hackers could exploit.

Automated Patch Management: Use automated solutions to apply critical updates as soon as they are available, reducing the need for manual intervention.

3. Enhance Endpoint Security

Antivirus & Anti-Malware: Employ enterprise-grade antivirus and anti-malware solutions to detect and prevent malicious software from infiltrating your systems.

Endpoint Detection and Response (EDR): Implement EDR solutions to monitor endpoint activities in real time and detect potential threats.

4. Data Encryption

Encryption: Use strong encryption methods to protect sensitive data both in transit and at rest. Encryption ensures that stolen or intercepted data remains unreadable without the decryption key.

Encrypted Communication Channels: Utilise VPNs and SSL certificates to secure data transferred over the internet.

5. Regular Backups

Frequent Backups: Regularly back up your data to ensure that you can restore it in the event of a ransomware attack or other data loss incidents.

Remote/Offline Backups: Store a copy of your backups in an offsite and offline location to protect against threats that could compromise primary data.

6. Robust Network Security Solutions

Firewalls: Deploy firewalls to monitor and control network traffic based on security rules.

Intrusion Detection and Prevention Systems (IDPS): Use IDPS to identify and prevent unauthorised network access attempts.

Cybersecurity Awareness and Training: Best Practices

Human error is often a significant factor in successful cyberattacks. Therefore, fostering a security-aware culture through training and awareness is crucial.

Best Practices for Training:

1. Regular Security Training: Host quarterly training sessions to teach employees about phishing, safe browsing, and password management.

2. Engaging Trainings: Implement interactive training modules, quizzes, and simulations to enhance learning and commitment to cybersecurity practices.

3. Phishing Simulations: Conduct regular phishing simulations to assess employees’ ability to recognise and respond to phishing attacks. Provide feedback and additional training as needed.

4. Security Policy and Procedures: Develop and enforce clear cybersecurity policies. Educate employees about their roles in maintaining security and create a detailed incident response plan with regular tests.

5. Password Hygiene: Promote the use of strong, complex passwords and encourage the use of password managers to securely store and manage passwords.

Emerging Technologies in Cybersecurity

New technologies are enhancing our ability to combat cyber threats:

1. AI and Machine Learning

Threat Detection: AI and ML can analyse large datasets to identify trends and anomalies indicative of

Cyber threats. These technologies improve the accuracy and speed of threat detection.

Automated Responses: AI-driven systems can automate responses to detected threats, such as quarantining affected systems or deactivating malicious IPs.

2. Blockchain Technology

Secure Transactions: Blockchain provides a secure, immutable ledger for transactions, which helps prevent fraud.

Identity Management: Blockchain offers a decentralised and secure method for identity verification.

3. Behavioral Analytics

Behaviour Monitoring: Behavioural analytics can monitor user behaviour to detect abnormal activities that may indicate a security breach.

Fraud Detection: Similar to its role in cryptocurrencies, blockchain technology helps detect fraudulent activities by analysing transaction patterns.

Developing a Cyber-Resilient Organisation

Building a cyber-resilient organisation requires a comprehensive approach that integrates technology, processes, and people.

Steps to Enhance Cyber Resilience:

1. Managing and Evaluating Risk:

Risk Assessments: Regularly assess risks to identify vulnerabilities and prioritise mitigation efforts.

Risk Mitigation Plan: Develop strategies to address potential risks, including technical controls, policy changes, and employee education.

2. Business Continuity Planning (BCP): Develop a BCP to ensure essential business functions continue during and after a cyber attack.

3. Disaster Recovery Plans (DRP):

Create DRPs detailing processes for data recovery and system restoration postattack.

4. Third-Party Risk Management: Assess third-party vendors and ensure they meet your security standards. Include cybersecurity requirements in contractual agreements and define incident response responsibilities.

Influence of AI on Education in Upcoming 5 Years

Introduction

Artificial intelligence (AI) is significantly transforming multiple sectors, and the education sector is no exception. AI has the potential to revolutionise the learning and teaching process and the management of educational institutions. This article explores how AI technologies will reshape education over the next five years, from personalised learning plans to administrative efficiencies and beyond.

Personalised Learning

One of the most profound effects of AI in education is its potential to provide individualised learning experiences. Traditional education often delivers a one-size-fits-all approach, which can be ineffective for many students. AI offers the promise of customised learning experiences tailored to each students needs.

Adaptive Learning Platforms

AI algorithms in adaptive learning platforms detect students; capabilities, limitations, and pace based on their learning behaviours. These platforms can then fine-tune the curriculum and offer personalised resources to help students learn better. For example, a student struggling with algebra might receive additional practice problems and tutorials, while a student excelling in the subject could be provided with more advanced topics.

Intelligent Tutoring Systems

AI-driven intelligent tutoring systems (ITS) simulate one-on-one tutoring by replicating the behaviour of human tutors. These systems can understand a students individual knowledge level and fill in gaps, offering exactly what they need. Unlike human tutors, ITSs can provide learning support 24/7.

Automated Grading

Educators often spend significant time grading assignments and exams. AI can automate this process for multiplechoice tests, and advancements in natural language processing are paving the way for AI to assess open-ended questions and essays. This not only saves teachers time but also provides students with quicker feedback, facilitating faster progress.

Data-Driven Insights

AI-powered analytics can give teachers valuable insights into student performance. Byprocessing data collected from assessments and classroom activities, AI can identify trends and patterns that might not be apparent to a teacher. For instance, AI might alert educators to common student difficulties and recommend curriculum or teaching method adjustments.

Virtual Assistants

AI-powered virtual assistants, such as chatbots, can help teachers with routine tasks and answer basic student questions when teachers are unavailable. These assistants can provide information about assignments, deadlines, and other administrative matters, allowing teachers to focus more on teaching.

Administrative Efficiency

AI has the potential to automate timeconsuming administrative tasks in educational institutions.

Enrolment and Admissions

AI can streamline the enrolment and admissions process by analysing applicant data.Predictive analytics can help admissions officers identify applicants who are likely to be successful and contribute to the institution.

Resource Management

AI can optimise the management of resources such as classrooms, labs, and equipment by understanding usage patterns and predictive needs. For example, AI can assist in scheduling classes to fill rooms efficiently and avoid overlaps.

Predictive Maintenance

AI can also assist with predictive maintenance by gathering data from sensors and systems and analysing it to predict equipment failures. This allows schools to perform maintenance proactively, reducing downtime and costs.

Access to Education

AI can help democratise education, making it accessible to individuals regardless of their location, including those with disabilities or different first languages.

Online Learning Platforms

E-learning platforms are in demand, especially due to the COVID-19 pandemic. AI can enhance these platforms by offering personalised learning paths, virtual tutors, and interactive content. AI can also flag students who are falling behind and provide focused support to keep them on track.

Language Translation

AI-powered translation tools can minimise language barriers by translating educational material in real time, allowing students who speak different languages to access the same content.

Assistive Technologies

AI can assist students with special needs by providing tools such as speech-to-text and text-to-speech. These technologies can offer bespoke resources to help students with learning difficulties like dyslexia succeed.

Ethical Matters and Obstacles

AI can enhance traditional spam filters, Despite its potential, AI in education presents ethical issues and obstacles that need to be addressed.

Data Privacy

AI in education relies on collecting and analysing vast amounts of data. Educational institutions must deploy robust data protection mechanisms and inform parents about how, when, and why their childrens information is being collected and used.

Lifelong Learning

Bias and Fairness

AI systems are only as good as the data they are trained on. If the training data is biased, AI systems can perpetuate and even exacerbate these biases, leading to discrimination against certain students or groups. It’s crucial to ensure that AI outputs and practices are fair and continuously monitored.

Digital Divide

Students from underprivileged or remote areas with limited access to technology might not

The Future of AI in Education

Modified Curriculum Building Block

Conclusion

AI can enable lifelong learning by offering individualised educational opportunities. AIpowered platforms can provide busy adults with personalised experiences aligned with their career paths and learning styles.

Collaborative Learning Spaces

AI can facilitate collaborative learning by connecting students with peers and mentors worldwide. Virtual classrooms and AI-powered platforms enable collaboration on projects and knowledge sharing, overcoming geographic restrictions.

AI is poised to have a significant impact on education in the next five years. From personalised learning experiences and improved teaching tools to increased administrative efficiency and greater democratisation of education, AI has the potential to revolutionise the educational landscape. However, ethical considerations and challenges must be addressed to ensure that AIs benefits are realised equitably and responsibly. By balancing AIs strengths with human oversight, we can create an educational system that is inclusive, fair, and effective for all students. As

AI can analyse educational and student performance data to help educators design relevant courses. This data-driven approach ensures that curricula are updated and aligned with job market requirements.

Emotional & Social I.Q.

Future AI systems might identify emotional and social triggers in students, fostering a caring and nurturing environment that addresses their emotional needs alongside academic achievement.

THE

FAR-REACHING IMPACT OF THE OUTAGE

Fragile Infrastructure: The Microsoft-CrowdStrike Outage Wake-Up Call

The recent Microsoft-CrowdStrike outage sent shockwaves through the global business community, exposing the fragility of our interconnected digital ecosystem. This incident serves as a stark reminder that even the most sophisticated organizations are vulnerable to disruptions that can have far-reaching consequences.

As the outage unfolded, it became apparent that the impact extended far beyond the two tech giants. Airlines grounded flights, hospitals faced operational challenges, and businesses of all sizes experienced significant disruptions. The financial implications, loss of productivity, and reputational damage were substantial. This incident underscores the critical importance of robust business continuity and disaster recovery plans. Additionally, it highlights the need for organizations to diversify their IT infrastructure and reduce reliance on single points of failure.

A lot has been discussed lately about the instinct to invoke force majeure. The role of this concept in cybersecurity contracts deserves particular attention.

While this legal doctrine can provide relief in extraordinary circumstances such as war, natural disasters, pandemics, and the referred as “acts of God,” its applicability is limited in cases where the root cause is a preventable error. Here, it is unlikely to provide relief.

The root cause of the outage was a software update error, which generally doesn’t qualify as an unforeseen and uncontrollable circumstance. It’s crucial for organizations to carefully draft force majeure clauses, defining covered events with precision.

The outage also exposed gaps in current cybersecurity regulations. The rapid pace of software development and deployment outpaces the current regulatory landscape. While frameworks like the NIST Cybersecurity Framework provide valuable guidance, they lack the force of law to compel organizations to implement specific measures. Additionally, data privacy regulations like GDPR and CCPA focus on protecting individual data, but they do not adequately address systemic risks like supply chain attacks.

The potential legal ramifications for Microsoft and CrowdStrike are significant. Breach of contract, negligence, and product liability claims are possible, as well as class-action lawsuits. Both companies will face intense scrutiny from regulators and customers. This incident could lead to increased regulatory oversight of the tech industry and higher insurance premiums.

To effectively mitigate risks, organizations must adopt a multifaceted approach. This involves combining insurance coverage, robust business continuity planning, and welldefined incident response procedures with proactive measures like rigorous testing, real-world simulations, and independent audits. Diversifying security solutions and implementing a strong governance, risk, and compliance (GRC) framework further bolster an organization’s resilience.

JD, LLM, ALM, D.Eng (c), a globally recognized cyber law expert and policy leader.
Betania Allo

A robust Governance, Risk and Compliance (GRC) program is essential for managing risks and ensuring compliance. In an era of increasingly sophisticated cyber threats, organizations of all sizes are vulnerable. A strong GRC framework helps identify weaknesses, prioritize countermeasures, and effectively respond to incidents. It also demonstrates a commitment to security and accountability to stakeholders.

The legal landscape for tech companies is evolving rapidly. Beyond direct liability, organizations must consider potential claims from third parties involved in the incident. Data breaches resulting from the outage could trigger investigations and penalties under stringent data privacy regulations. Adhering to complex legal requirements is no longer optional. Proactive compliance, built on a foundation of risk assessment and employee training, is essential for safeguarding an organization’s reputation and bottom line.

Complying with regulations goes beyond merely avoiding fines; it involves understanding the intricacies of these rules and continuously benchmarking against best practices. Seeking expert guidance on global standards not only ensures effective protection against the escalating threat of cyber incidents but also fortifies organizational resilience, even if certain practices are not mandated in your jurisdiction.

The Microsoft-CrowdStrike outage is a wake-up call for the global business community. It highlights the urgent need for organizations to strengthen their cybersecurity posture, invest in robust testing and quality control, and diversify their IT infrastructure.

www.betaniaallo.com

betania@betaniaallo.com

LinkedIn:https://www.linkedin.com/in/

A strong GRC framework is the cornerstone of a resilient organization. By prioritizing cybersecurity, businesses can mitigate risks, protect their reputation, and build trust with customers.

HOW WE CAN DEFEND AGAINST AI-POWERED PHISHING ATTACKS

Traditional phishing attacks have evolved into one of the most significant threats to individuals and organizations. These attacks are becoming more sophisticated, especially with the advent of Artificial Intelligence (AI), making them harder to detect and block. AI-driven phishing attacks craft messages that can deceive even the most vigilant users. This article explores strategies to enhance resilience against such attacks and build stronger cybersecurity defenses.

AI-Powered Phishing Attacks Explained

Artificial intelligence (AI) is significantly transforming multiple sectors, and the education sector is no exception. AI has the potential to revolutionise the learning and teaching process and the management of educational institutions. This article explores how AI technologies will reshape education over the next five years, from personalised learning plans to administrative efficiencies and beyond.

AI-Powered Phishing Attacks Explained

Innovative AI-enabled phishing attacks leverage machine learning and natural language processing (NLP) to create targeted emails, messages, or websites that mimic legitimate communications. These attacks often involve:

Spear Phishing:

Unlike broad phishing attempts, spear phishing targets specific individuals or organizations. AI analyzes social media profiles, email patterns, and digital footprints to craft convincing messages.

Deepfakes:

Even if credentials are phished, the attacker would still need the second factor to gain access.

AI-Based Anomaly Detection:

AI solutions can detect anomalies in network traffic and user behavior, identifying potential phishing attacks through unusual login attempts or abnormal data access.

AI can generate highly realistic audio and video deepfakes, impersonating executives or trusted professionals to trick victims into revealing sensitive information or transferring funds.

Automated Phishing Kits:

AI-powered kits can develop and customize phishing emails, identify new victims, and manage large-scale campaigns, making it easier for hackers to operate with minimal effort.

Enhancing Technical Defenses

Businesses can strengthen their technical defenses against AI-driven phishing attacks by implementing these key measures:

Sophisticated Email Filtering: AIpowered email filters can identify and block phishing emails by evaluating content, sender reputation, and other indicators of suspicious messages.

Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring additional authentication factors beyond passwords.

Secure Web Gateways:

These gateways prevent access to phishing sites and malicious websites. AI analyzes real-time web traffic to identify and block threats.

Strengthening Human Defenses Nontechnical measures are equally important in combating AI-driven phishing: Vigilant Workforce:

Regular cybersecurity training sessions help employees recognize phishing emails and understand the importance of countermeasures. Simulated phishing exercises can test and improve employees detection skills. Phishing Awareness Campaigns: Ongoing awareness campaigns keep employees informed about the latest phishing tactics and social engineering trends. Newsletters, webinars, and open discussions reinforce key cybersecurity messages.

Phishing Reporting Mechanisms:

Easy and transparent reporting systems enable employees to report suspicious emails promptly, allowing the IT team to react quickly and contain potential threats.

Incident Response Plans:

Establishing and regularly updating an incident response plan ensures prompt action during a phishing attack. The plan should outline isolation procedures, communication protocols, and recovery steps.

Cooperation and Data Exchange

Addressing AI-driven phishing attacks requires collaboration and data sharing among businesses, industries, and government agencies:

Sector Alliances:

Join cybersecurity alliances within your industry to share threat information and best practices, enhancing collective defense against new threats.

Integration with Government: Collaborate with government authorities to stay informed about emerging threats and receive support in improving security measures.

Threat Intelligence Sharing:

Utilize threat intelligence platforms to share and receive information on phishing campaigns, tactics, and indicators of compromise. Combining AI and human insights enhances threat detection and response.

Technological Innovations Investing in promising technologies provides additional protection against AI-driven

Blockchain:

Blockchain technology can secure email communications by verifying the senders identity and the contents integrity, preventing email spoofing.

Behavioral Biometrics:

This technology monitors informal user behavior, such as typing patterns and mouse movements, to authenticate identity. Anomalies can indicate phishing attempts and trigger security responses.

Natural Language Processing (NLP):

NLP models analyze email language to detect phishing attempts. By understanding context and phrasing, NLP-based solutions can identify sophisticated phishing attacks that bypass traditional filters.

Continuous Improvement Cybersecurity requires continuous improvement through regular evaluations and updates:

Regular Audits:

Conduct security audits to identify and rectify vulnerabilities in systems and processes. Test phishing defenses and update them based on audit findings.

Penetration Testing:

Perform regular penetration testing to identify weaknesses in defenses against phishing attacks. Address identified

Feedback Cycles:

Establish feedback loops to learn from past incidents and strengthen defenses. Review phishing incidents to understand how they occurred and implement measures to prevent future attacks.

Conclusion

AI-driven phishing attacks pose a significant threat to cybersecurity. Organizations must deploy comprehensive strategies involving technical defenses, human awareness, intelligence-driven security operations, collaboration, and technological innovation. A proactive and multi-layered approach ensures that organizations stay ahead of AI-generated threats, safeguarding sensitive information and maintaining robust cybersecurity.

THE DIGITAL OPERATIONAL RESILIENCE ACT (DORA): ENSURING STABILITY IN FINANCIAL SERVICES

In the evolving landscape of global finance, operational resilience has become a paramount concern. The European Union’s Digital Operational Resilience Act (DORA) is a regulatory framework designed to bolster the resilience of financial services by addressing the complexities and interdependencies inherent in today’s digital world. This article explores the purpose, scope, and impact of DORA, particularly in comparison to similar regulations in the UK.

Understanding DORA

DORA stands for the Digital Operational Resilience Act, a regulatory initiative by the European Union aimed specifically at enhancing the operational resilience of the financial sector. The primary motivation behind DORA is the recognition that financial services are increasingly interconnected and dependent on digital technologies, which introduces new vulnerabilities and risks. The act mandates comprehensive risk management practices, continuity planning, and robust cybersecurity measures.

provides valuable insights into DORA’s framework.

He emphasises that DORA is grounded in principles established by the Basel Committee on Banking Supervision in 2019, which called for robust governance, operational risk management, business continuity, and third-party dependency management, among other things. The committee’s guidelines underscored the need for financial institutions to assume disruptions as a matter of when, not if, reflecting the critical importance of preparedness in today’s volatile environment.

Key Differences Between DORA and UK

Operational

Resilience Regulations

While DORA is a significant regulatory step for the EU, it is essential to understand how it compares to similar regulations in the UK. According to Preece, the UK has taken a slightly different approach, with its Financial Conduct Authority (FCA) and Prudential Regulation Authority (PRA) issuing separate but aligned guidelines. These UK regulations will come into full force by March 2025, shortly after DORA’s January 2025 implementation.

One of the primary differences lies in the scope and focus of the regulations. DORA is highly prescriptive and IT-focused, addressing digital aspects of operational resilience. In contrast, the UK’s approach is more holistic, considering a broader range of factors, including pandemics, property issues, and overall market stability.

This divergence reflects the UK’s relatively mature financial sector, which necessitates a more principles-based regulatory framework.

Coverage and Impact of DORA

DORA encompasses a wide array of financial services, from traditional banks to emerging sectors like crypto assets. It specifically targets over 20 different types of financial entities, ensuring that the entire spectrum of financial services is covered. Moreover, DORA extends its regulatory reach to critical third-party providers of IT services, recognising their pivotal role in maintaining the resilience of financial institutions.

For companies within DORA’s scope, the implications are significant. Firms must first confirm their inclusion under DORA and then align their practices with the act’s requirements. Even firms outside the immediate scope of DORA are encouraged to adopt its principles, as these practices represent robust operational standards applicable across various sectors.

Compliance with DORA involves adhering to stringent ICT risk management protocols, conducting regular operational resilience testing, and establishing clear reporting mechanisms for security incidents.

Additionally, firms must manage their thirdparty dependencies meticulously, ensuring a comprehensive oversight framework is in place. While these requirements might seem demanding, they are fundamentally rooted in good business practices essential for sustaining a resilient and secure financial operation.

Implementing DORA: Challenges and Best Practices

The implementation timeline for DORA is tight, with regulatory technical standards expected to be confirmed by July, leaving firms with only six months to ensure full compliance by January 2025. This timeline poses a considerable challenge, especially for larger financial institutions with complex operational structures.

Preece advises firms to adopt a methodical approach to compliance. The first step is to ensure that all stakeholders, from board members to operational staff, understand and are competent in their roles related to DORA. Firms should develop a clear, actionable plan for compliance, regularly review their progress, and make adjustments as necessary.

A critical aspect of DORA compliance is the ability to demonstrate credibility and competence to regulators. This includes not only having robust systems in place but also being able to show that these systems are effectively managed and continuously improved. Given the high stakes involved, particularly in the financial sector, regulators are expected to scrutinise compliance efforts

The Future of Financial Resilience

The introduction of DORA marks a significant step in the EU’s efforts to enhance the resilience of its financial sector. By setting high standards for operational risk management and cybersecurity, DORA aims to mitigate the risks associated with an increasingly digital and interconnected financial

Richard Preece - Chief Training Officer at OSP

While the potential for significant fines and regulatory actions looms, Preece suggests that regulators are likely to take a proportionate approach, much like with GDPR. Initial enforcement will focus on ensuring compliance and fostering a culture of resilience rather than immediately resorting to punitive measures. However, firms should not underestimate the importance of these regulations and must prioritise their compliance efforts.

In summary, DORA represents a critical evolution in the regulatory landscape of financial services. It underscores the importance of operational resilience in a digital world and sets a high bar for financial institutions to follow. By aligning with DORA’s principles, firms can not only achieve compliance but also enhance their overall resilience, ensuring they are well-equipped to navigate the challenges of the modern financial environment. As with any regulatory change, the key to success lies in thorough preparation, robust execution, and a commitment to continuous improvement.

Richard Preece at GDPR Submit Aberdeen

Cyber Experts provide insights into

Test your senior leadership capabilities with Cyber Escape Room challenges

Guest speakers from Intelligence services including MI6, GCHQ, and the NCSC An

Stunning venue at the beautiful Wokefield Mansion Estate Evening dinner on the Paddle Steamer The New Orleans Henley - on - Thames

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.