Cyber Security
Feature
sponsored by
LAUNCH OF INTERNATIONAL CYBER EXPO 2020
2-3 December 2020 – Olympia, London

Nineteen has announced the launch of International Cyber Expo 2020 (ICE2020) a dedicated global event uniting the worlds of cyber and physical security in the National Hall – Olympia, co-located with its market leading event – International Security Expo (ISE) 2-3 December 2020.

International Security Expo is the global premier event for government & end users within the counter terrorism and security space, attracting over 14,000+ vetted visitors, from over 115+ countries including 65+ hosted country delegations.

In the last edition of the event 37% of the entire ISE audience stated that ‘Cyber’ was one of their top priorities. Whilst the show already had a ‘Cyber Security Zone’ supported by ADS & Tech UK this large increase in interest in cyber coupled with the huge growth experienced by the industry as a whole, in terms of new companies and exports, specifically gave confidence to give this community its own dedicated global event.

Tristan Norman – Group Exhibition Director at Nineteen Group comments ‘There is no hiding from the increasing prominence of cyber security within the traditional physical security realm. With over 5342 visitors attending ISE 2019 to seek out suppliers and education specifically within cyber security.’

He continues ‘There is a large correlation between our audience who are interested in cyber and who also have responsibility for Critical National Infrastructure (CNI) – This is a perfect example of where the frequency of traditional physical security threats, is now superseded by the frequency of cyber-attacks from serious organised crime and terrorism on CNI. A fully blended and comprehensive security approach encompassing cyber and physical security is now paramount.”

International Cyber Expo will curate both high level content and exhibitors to address the convergence between cyber and physical security as well as other adjacent areas of cyber security which are relevant to the audience, anticipated to be in excess of 6000+ international vetted visitors.

EXHIBITION
Meet international exhibitors showcasing game-changing cyber products and services including Network Protection, Industrial Systems, Endpoint Security, Managed Services, Apps, Mobile Security, Identity & Access Management, Cloud Security, Threat Intelligence, Disaster Recovery and more...

Cybersecurity top priority in Europe

Cybersecurity. Companies tumble around each other for attention when it comes to digital security and protection against cybercrime. Cybersecurity is also a top priority within the European Community. Around this topic, a network of organisations, institutions and companies has been formed that deal with the subject from different angles. Together with CoESS, Euralarm published a brochure on the threats and possibilities of cybersecurity. Orgalim is emerging from the industrial business world. We spoke to Orgalim’s Christoph Luykx, Policy Director who is, among other things, responsible for the subject of cybersecurity.

Top priority
"Cybersecurity is indeed a top priority for us", he opens the conversation. "The companies we represent are inextricably linked to digital transformation. And our members also have a self-interest in this." Their machines, products and business models are largely digital and to a greater or lesser extent part of the Industrial Internet of Things. "Where machines connect or products collaborate digitally, a cyber-safe environment is a prerequisite. A robust security, that is to say, because that is the only way to safeguard economic interests and to create confidence in the digital single market.”

"The strategic and policy developments in Europe are numerous. The Cybersecurity Act provides some direction, but there is still much to be done - for members, companies and users. The Cybersecurity Act is mainly concerned with certification. Of processes, but increasingly also of products. There is also room for improvement in the involvement of stakeholders. We therefore certainly welcome the initiative to form a stakeholder group, to which Orgalim has put forward my candidature. However, it is necessary to keep the size of the focus group manageable. As with many other initiatives, the more participants there are, the greater the risk of fragmentation." The Cybersecurity Act is a nice first step on the way to a safe 'connected' world. Now that cybersecurity is taking shape in Europe, work can be done at the same time to broaden it to the rest of the world. Europe can occupy a global position by working on the global standard for cybersecurity.

"In addition, important improvements are conceivable when it comes to raising awareness," says Christoph Luykx. "There is a great challenge to improve this awareness within Europe. This requires instruments that are not yet available...

Drowning in your own network?

The network is no longer as simple as it was. Where there once was a geographically defined perimeter, walled in with bricks and mortar and propped up by a handful of endpoints and servers - there now sits something much more complex. As Enterprise IT has evolved so too has the difficulty in managing it. For all of the benefits that technological advancement has wrought, each has created new problems.

"Modern networks sprawl far past effective human reach, glittering with endpoints, devices and users. Amid that tangle, it is quite easy to leave a component exposed or a credential lying around - unfortunately an attacker needs only one of those to bring an otherwise well secured network tumbling down.

This problem has dogged enterprise security for years, and it has enlarged instep with digital transformation.

Take digital certificates. System administrators have to deal with tonnes of certificates in order to keep data secure. The task of actually overseeing, tracking and managing all that can be a burdensome job for many enterprises.

It’s not just hundreds of one kind of certificate they’re dealing with either. Each comes with their own idiosyncrasies, expiration dates and endpoint vulnerabilities. Admins must often contend with lost or forgotten certs, which can then lead to them unknowingly expiring and opening up downtime that can be critical to a business’ bottom line, whether it be the lack of e-commerce or a network intrusion not being detected, as seen in the Equifax breach. That brings added cost to time, energy and budget not to mention the fact that new documents must be submitted every time a publicly trusted certificate goes through the vetting process. That’s a lot of work and as digital transformations grow the IT infrastructure of the average enterprise, the demand for certificates is ever growing. While enterprises are struggling under that weight - adversaries can slip in...

Simplifying Secure Access in your enterprise
By: Prakash Mana, CPO & CTO, Pulse Secure

For many users, security is the antithesis of productivity. This is especially evident for access security, when a user is prevented from reaching a crucial application, information or resources. The clash between accessibility and compliance often are at odds and seemingly against the user. For many security professionals, humans are the weakest point in cyber defences. Time and again, users are the ones who fall for phishing emails, re-use passwords, operate vulnerable endpoints, and introduce unsanctioned devices and applications. Within an enterprise environment, they’re notorious for becoming unwitting outsiders by overriding security controls, ignoring security training and finding clever ways to work around defences, thus exposing the enterprise.

It’s not entirely the employees’ fault - security controls can often seem arcane and arbitrary. They can add obstacles to work efficiency and put seemingly meaningless roadblocks in between the employee and their job.

Because humans are the weak link in security, the best approach has been to invoke controls with the lightest touch where possible. Users need as close to a frictionless experience as possible - one that keeps them safe but doesn’t get in their way. However, depending on the situation and potential risk, invoking greater access control is necessary. As such, organisations are seeking technologies that enable conditional access...

More articles on Cyber Security can be found on our website
Just Click Here
...

To have your company included as a Featured Article in our next
Cyber Security feature in July 2020 or to take part in the
International Cyber Expo 2020 Preview in November get in contact with Henry on Tel +44 (0)1548 521862 or
Email [email protected]

Published by www.prosecurenewsonline.co.uk - Contact us on any of the options below

Henry Lott
Publisher Partner
[email protected]
Tel: 01548 521862 / 07828 035059
Karen Lott
Editorial Partner
[email protected]
Tel: 01548 521862 / 07828 035059

PROSecurenewsonline.co.uk published by
GMS Business Communications
Sandalwood Cottage, Fallapit Barns, East Allington, Totnes, TQ9 7QS

Tel +44 (0)1548 521862

Disclaimer & Copyright All rights reserverd
No part may be reproduced without the prior written permission of the Publisher. Whilst every care is taken, prices and details are subject to change and the publisher can take no responsibility for omissions or errors. No responsibility is taken for unsolicited submissions or the return of submitted items. The Publisher gives no guarantee of actual publication date.