{"id":15143,"date":"2018-06-22T00:00:00","date_gmt":"2018-06-21T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/key-themes-and-takeaways-from-infosecurity-europe-2018\/"},"modified":"2022-12-09T06:15:57","modified_gmt":"2022-12-09T06:15:57","slug":"key-themes-and-takeaways-from-infosecurity-europe-2018","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/key-themes-and-takeaways-from-infosecurity-europe-2018\/","title":{"rendered":"Key themes and takeaways from Infosecurity Europe 2018"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/03\/InfosecurityEurope2018.jpg\" style=\"width: 600px; height: 350px\"><\/p>\n<p dir=\"ltr\">\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\"><a href=\"http:\/\/www.infosecurityeurope.com\" target=\"_blank\" rel=\"noopener\">Infosecurity Europe<\/a><\/span> &#8211; Infosec for short &#8211; is the largest and most comprehensive information security conference on the continent.&nbsp;<\/p>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">This year\u2019s event at <\/span><a href=\"https:\/\/olympia.london\" target=\"_blank\" rel=\"noopener\">Olympia London<\/a> brought together 400 exhibitors and nearly 20,000 delegates. I was back there this year (<a href=\"https:\/\/www.identifiglobal.com\/news\/5-key-talking-points-from-infosecurity-europe-2017\/40755\/\" target=\"_blank\" rel=\"noopener\">after a great event in 2017<\/a>) for three days of interesting insights and networking.<\/p>\n<p>\n\tLast year, the skills gap, GDPR and AI were on everyone\u2019s lips: here are the topics that were creating a buzz twelve months on.<\/p>\n<h2>\n\tEndpoint security<\/h2>\n<p>\n\tInfosec 2018 asked its attendees a big question with a great many aspects: \u201cdo you actually know your network?\u201d How many devices are connected, and how many other networks are within your range? How many of those are secure? What\u2019s being held on your servers, potentially visible?&nbsp;<\/p>\n<ul>\n<li>\n\t\t<strong>You may like:&nbsp;<\/strong><a href=\"https:\/\/www.identifiglobal.com\/news\/5-key-talking-points-from-infosecurity-europe-2017\/40755\/\" target=\"_blank\" rel=\"noopener\">5 key talking points from Infosecurity Europe 2017<\/a><\/li>\n<\/ul>\n<p>\n\tGDPR has asked businesses to perform data audits, bringing to mind downloads, automated backups and archives that they may have forgotten &#8211; or never knew about to begin with. The end points of our networks are blurrier than they should be &#8211; as is so much of information security.&nbsp;<\/p>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\"><a href=\"http:\/\/www.infosecurityeurope.com\/en\/exhibitor-directory\/Company-Content\/?coId=268931\" target=\"_blank\" rel=\"noopener\">Crowdstrike\u2019s strategy talk<\/a><\/span> on cybercrime and statecraft built on the buzz of election interference, troll farms and data selling, exploring how data leaks become part of government and business strategy. <a href=\"http:\/\/www.infosecurityeurope.com\/conference\/conference-programme\/?so=3&amp;startRecord=129&amp;rpp=64#\" target=\"_blank\" rel=\"noopener\">Responses need to work the same way<\/a> &#8211; collaboratively, with businesses, governments and law enforcers building around the idea that leaks are to be prevented, not exploited or covered up. Endpoints also need to be carefully monitored &#8211; security needs to be kept up in <a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/58172\/Securing-the-Future-of-Work\" target=\"_blank\" rel=\"noopener\">transient locations<\/a> that are part of the network purely because workers are using them.<\/p>\n<h2>\n\tIoT<\/h2>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">Physical security was high on the agenda and <\/span><a href=\"https:\/\/www.infosecurityeurope.com\/en\/Exhibitors\/3249899\/Pen-Test-Partners\" target=\"_blank\" rel=\"noopener\">Pen Test Partners<\/a> ran an attention-grabbing demo on their stand. The team demonstrated how to hack the archaic coding of a ship and change the weights that were logged for each cargo, making the ship look underloaded and creating \u2018invisible\u2019 weight on board. Result: a lopsided vessel with more weight on one side, that\u2019ll tip over as soon as it leaves port. The goal was to demonstrate the real life consequences of security compromises, beyond the often abstract concepts like \u201cdata breach\u201d.<\/p>\n<p>\n\t<script src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">\n\t\tShip hacking, live @ stand D120 <a href=\"https:\/\/twitter.com\/Infosecurity?ref_src=twsrc%5Etfw\">@Infosecurity<\/a> Europe, come get your socks! <a href=\"https:\/\/t.co\/1z9lx01HR5\">pic.twitter.com\/1z9lx01HR5<\/a><\/p>\n<p>\t\u2014 Pen Test Partners (@PenTestPartners) <a href=\"https:\/\/twitter.com\/PenTestPartners\/status\/1003927937664634880?ref_src=twsrc%5Etfw\">June 5, 2018<\/a><\/p><\/blockquote>\n<p dir=\"ltr\">\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">This is all crucial as the Internet of Things extends, bringing more and more devices into networks &#8211; many of which are designed with other priorities in mind before security. <\/span><a href=\"https:\/\/www.techtarget.com\/contributor\/Lars-Lydersen\" target=\"_blank\" rel=\"noopener\">Lars Lydersen\u2019s<\/a> keynote on securing the IoT made it clear that cheap IoT devices aren\u2019t currently up to scratch &#8211; but they could be. The functionality to secure IoT devices already exists, but the will to secure them is lacking.<\/p>\n<h2>\n\tGDPR<\/h2>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">Nearly a month after GDPR rolled out, it\u2019s still top of mind for many Infosec attendees &#8211; and many are now in a position to predict post-GDPR trends with greater confidence. <\/span><a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/61030\/EU-GDPR-is-Here--Now-What-Smart-Security-Measures-to-Protect-Personal-Data-Privacy\" target=\"_blank\" rel=\"noopener\">The third day\u2019s keynote<\/a> made it clear that <a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/59593\/How-to-Tackle-the-GDPR-A-Typical-Privacy-Security-Roadmap\" target=\"_blank\" rel=\"noopener\">implementing our GDPR strategies on time<\/a> is only the beginning.&nbsp;<\/p>\n<div class=\"embed-responsive embed-responsive-4by3\">\n\t<iframe class=\"embed-responsive-item\" src=\"https:\/\/www.youtube.com\/embed\/WRlOUNaPTuQ\"><\/iframe><\/div>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">Understanding the legalese and the implications of GDPR were high on the agenda, with <\/span><a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/61411\/GDPR-Breach-Notification-Demystifying-what-the-Regulators-want\" target=\"_blank\" rel=\"noopener\">Symantec\u2019s Ilias Chantzos<\/a> modelling breaches and management in practical terms. Storing your data elsewhere now comes with additional responsibilities regarding data handlers\u2019 compliance. Cloud storage has become the industry standard for accessibility and usability reasons, but the compliance question will see the cultures around working from home and accessing data change. The overlap between GDPR and network endpoints is well understood by infosec professionals &#8211; but data needs to remain <a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/62522\/Right-People-Right-Data-Enabling-New-Ways-of-Using-Data-Securely\" target=\"_blank\" rel=\"noopener\">accessible by the right people<\/a>.<\/p>\n<h2>\n\tHuman behaviour<\/h2>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">Humans are the first line of defence in protecting organisations &#8211; and human behaviour links all the previous themes together. The <\/span><a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/61021\/Rethinking-Security-Teams-to-Address-the-Skills-Shortage-Secure-the-Business\" target=\"_blank\" rel=\"noopener\">information security skill shortage<\/a> is well known and remains a concern, but the solution demands awareness across organisations as a whole.&nbsp;<\/p>\n<h4 style=\"text-align: center\">\n\t<strong>&#8220;The right behaviour can be shaped at a system design level.&#8221;<\/strong><\/h4>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\"><a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/62510\/Tackling-Human-Error-Beyond-Security-Awareness\" target=\"_blank\" rel=\"noopener\">Hut Six\u2019s Simon Fraser<\/a><\/span> made a case for human error as the basic information security threat, describing a process for transforming staff from cyber threats to cyber allies. This means they need to understand why so much of what they\u2019re doing, for convenience\u2019s sake, is actually a threat to information security &#8211; and they need to be motivated into doing the right thing. The right behaviour can be shaped at a system design level &#8211; make the secure systems usable and convenient and people will want to use them &#8211; but that has to be coupled with a sense of informed responsibility among personnel.<\/p>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">It\u2019s going to take committed leadership from security analysts. Despite concerns about deep learning AI putting the analyst out of a job, <\/span><a href=\"http:\/\/www.infosecurityeurope.com\/en\/Sessions\/62359\/Workshop-4-How-Human-Intelligence-the-Security-Analyst-Can-Thrive-in-an-Autonomous-AI-World\" target=\"_blank\" rel=\"noopener\">the Forest Tree workshop<\/a> showed that the future really holds a change of remit. AI will relieve the mundane tasks, but the analysts will be driving effectiveness and value at the strategic level, leading the business transformations that will keep firms secure.<\/p>\n<h2>\n\tThe Cumberland Arms<\/h2>\n<p>\n\tIt\u2019s not all work, of course. And I have to say the nearby Cumberland Arms has a decent selection of ales on draft. Recommended!<\/p>\n<p>\n\t<br \/>\n\tInformation security moves at an amazing pace, and too many businesses are finding themselves left behind. As the entire culture of data protection changes to focus on devices, endpoints and strategic vulnerabilities, more and more businesses will need to take on personnel who can lead the way in changing user behaviour among their staff.<\/p>\n<p>\n\t<span id=\"docs-internal-guid-f50517bf-7fff-7c85-4066-af8fbc9ce635\">The smart ones are already looking for the right people. <\/span><a href=\"https:\/\/www.identifiglobal.com\/advancedsearch.aspx?search=1\" target=\"_blank\" rel=\"noopener\">Start your job search with us today<\/a>, and make sure they come to you.<\/p>\n<p>\n\t<br \/>\n\t<em>Image (CC) Peter Ito, <a href=\"https:\/\/www.flickr.com\/photos\/peterito\/3058044385\" target=\"_blank\" rel=\"noopener\">via Flickr<\/a><\/em><\/p>\n<p dir=\"ltr\">\n\t&nbsp;<\/p>\n<div>\n\t&nbsp;<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Infosecurity Europe &#8211; Infosec for short &#8211; is the largest and most comprehensive information security conference on the continent.&nbsp; This year\u2019s event at Olympia London brought together 400 exhibitors and nearly 20,000 delegates. I was back there this year (after a great event in 2017) for three days of interesting insights and networking. Last year,&hellip;&nbsp;<a href=\"https:\/\/www.identifiglobal.com\/news\/key-themes-and-takeaways-from-infosecurity-europe-2018\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Key themes and takeaways from Infosecurity Europe 2018<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":14364,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[43],"tags":[],"class_list":["post-15143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-training-events"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=15143"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15143\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14364"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=15143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=15143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=15143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}