This year, the global pandemic has radically shifted the way many of us work. This shift has brought with-it a new threat that does not directly affect computer systems, but rather us, the users of the systems.

In 2019, almost 200 million Ransomware attacks were registered. This number alone is already frightening. When seen in combination with the myriad of other threats that have been affecting our systems, it is almost mind boggling. This year, the global pandemic has radically shifted the way many of us work. This shift has brought with-it a new threat that does not directly affect computer systems, but rather us, the users of the systems.

As of the writing of this article, most of us are still working from home, a reality that has drastically modified the attack vectors in cyber space. Small and medium sized enterprises (SMEs) are now faced with a changed threat landscape. Thwarting these new threats often requires expensive and source consuming security solutions.

Solutions that will have a lasting impact on the IT threat landscape, as we are forced to find new ways to communicate with each other, new ways to work with our information technology, and new ways to protect our information.

Several threat vectors will now see an increased prominence, including any attacks directed towards workstations and personal communication devices, such as cell phones and tablets. The increasing importance of cloud solutions in this environment that shifts infrastructure into the cloud space, shifts threats into the same space, and initiates dangers resulting from misconfigurations and lack of visibility.

The way information and data are handled in a predominately home-office environment presents additional perils. The common “Bring Your Own Device” policy often leads to data stored on company cloud spaces finding its way into the private data storage of employees. This is turn can critically affect a company’s data security.

Secure connections to the different IT environments have become a baseline for securing data in transit. These connections are a good starting point in protecting the IT infrastructure and the data contained within, although they are often subject to common vulnerabilities and misconfigurations.

To address these novel threats, we must change the way we approach our risk mitigation measures. Many solutions, such as traditional Security Information and Event Management Systems (SIEMs), can be exceedingly costly and therefore not economically viable for many SMEs.

Suitable solutions can be made available by leveraging the changes in the work environment. This means that the use of cloud-based security systems must become as common place as the use of cloud infrastructure. The increasing relevance of cloud spaces brings with it a plethora of excellent features, like rapid scaling, that can greatly impact any potential response to identified risks.

One of the major factors in reducing risk to information on endpoint devices, whether it be laptops, tablets, or cell phone, has been and will continue to be active security monitoring. As common solutions have proven to be cost-prohibitive, a new approach to security monitoring must be considered.

Outsourcing security monitoring could facilitate a risk-based approach that identifies and addresses the most important information assets and their underlying vulnerabilities. The use of an external Security Operations Center (SOC) to monitor well-defined and specific VPN traffic, workstation security logs and data transfer events is a viable option to economically address some of the threats we are facing.

Our new reality has brought a new way of working and with-it new threats and significant challenges that will put many companies to the test. While there is no solution that offers complete protection, a risk-based approach that addresses company specific threats must become common practice.

Nikolaus Brandstetter, Head of Secure Networks, Communication and Cloud @ SGS Digital Trust Services

You may also like

UK/EU Summit - “Risk to Resilience”
icon External Engagement

UK/EU Summit - “Risk to Resilience”

Detlef Houdeau, Senior Director, Business Development at Infineon Technologies was a speaker at the inaugural UK/EU Summit organized by our newest Associated Partners Shared Assessments.

💡Under the theme “Risk to Resilience” the first event of this series was held in London and brought together professionals from different industries and regions. Detlef participated in the panel about the complex regulatory landscape and emphasized that new legislation like the EU AI Act, DORA and Hashtag#NIS2 continue to push the standard of care on cybersecurity and other risks.

Thanks to Shared Assessments for organizing such an amazing event and inviting the Charter of Trust to participate in this high-class panel alongside Andrew Moyad, CEO at Shared Assessments.
October 08, 2024
36th Cyber Security Day: Working together for more resilience in the digital future
icon External Engagement

36th Cyber Security Day: Working together for more resilience in the digital future

Strong networks and effective cooperation are the key to successfully shaping the digital future in Germany. Cybersecurity is a team effort, and that was again visible last week at the 36th Cyber Security Day in Berlin.

🌐On 26 September 2024, the Bundesamt für Sicherheit in der Informationstechnik (BSI), Alliance for Cyber Security, and the DIHK invited experts, companies, authorities and political decision-makers to jointly strengthen Germany's cyber resilience.

The event was a great mix of policy debate, practical exchange, workshop and networking under the motto ‘Stronger Together: Greater Resilience through Cooperation’.

✨ One of the highlights of the day was the closing panel with Claudia Plattner, President of the BSI, Dr. Stefan Saatmann, Deputy Head Berlin Office at Siemens, Konstantin von Notz, Member of the Bundestag for B90/Greens, and Alexander von Gernler, German Informatics Society, interchanging ideas to foster resilience through collaboration. Initiatives like the CoT baseline requirements and its huge potential for international harmonizing cybersecurity regulations were discussed as well.

Let’s all work together so that closer cooperation between the BSI and businesses bring more tangible effects to increase digital resilience. Special thanks to Nils Hasenau for providing the excellent photos and also to Simon Ulmer and Ralf König for attending the event.
October 01, 2024
Nordic Cyber Summit 2024
icon External Engagement

Nordic Cyber Summit 2024

The Charter of Trust at the Nordic Cyber Summit
What a great opportunity for Morten Kromann, Head of Industrial Security Denmark at Siemens, to present the Charter of Trust perspective on cybersecurity regulations like Hashtag#NIS2 at the Nordic Cyber Summit in Copenhagen.

This year the summit was again a formidable event to engage with top cybersecurity experts, share insights, and discuss strategies to navigate the ever-evolving threat landscape in the Nordic region with the theme “Fortifying the Future: Building Cyber Resilience in a Transformed World”.

A main aspect highlighted by Morten was the discrepancies between the NIS2 directive’s incidents reporting timeframe and related provisions adopted in other legislations. These regulatory overlaps create difficult compliance environments for industry and costly operational pressures which add to the fragmentation of the market instead of harmonizing it. That is why the Charter of Trust emphasizes streamlining reporting requirements stemming from these different legislative frameworks and developing single entry points for reporting on the national level.

These and more points will also be discussed during our next Security-by-default Webinar taking place on the 29th of October. Sign up to find out more what the Charter of Trust Partners views are on how to prepare for NIS2 and other regulations: https://lnkd.in/eh_z8Z63
September 16, 2024