6/1/2023 0 Comments Dragon audit reviewRansomware is a very simple, but effective malicious software that affects both home users as well as government departments, courts, hospitals, universities, large enterprises, small medium enterprises or even non-government organizations (NGOs). However, phishing and BEC attacks require special attention as an increasing number of organizations move their email service to SaaS1 services, such as Microsoft Office 365 or Google G Suite. Slides: 2021 Security PredictionsĬEO Scam or Business Email Compromise (BEC) has been around for many years and we always have an impression that email spams are well controlled. Therefore, I think it may be a good opportunity in the beginning of 2021 to share my views on the security predictions specially for the community. I can’t share the details of my investigations, but I have a strong feeling of the pain points how the blue teams faced. In 2020, we participated quite a number of cyber forensics and IR investigations. I don’t have a crystal ball to tell me what will happen in 2021 but reviewing past year incidents allow me to have a sense of what may happen in Hong Kong this year. I have to re-read all of my Weekly Intelligence Summary again and prepared a list for him (see attached). He asked me to provide him the most critical incidents in Hong Kong because he is reviewing on how to allocate cybersecurity resources for his organization. A few days ago, a friend of mine gave me an urgent call early in the morning. In 2020, I started writing a Weekly Intelligence Summary which forced me to monitor all cyber threats or incidents that may have significant impacts to the financial industry in Hong Kong and APAC regions. Sometimes, I even converted the predictions as part of a short exam questions. I usually download prediction reports and pick 1 or 2 for my students for their side reading. I have further updated the C-RAF 2.0 Technical Implantation Tool by mapping the relevance sections to the security frameworks such as TRM, FFIEC and CIS.įive years ago, I put 1 or 2 slides for the HKU MSc Malware Analysis courses in the first lecture. On Jan 18, Monetory Authority of Singapore (MAS) has issued a revised Technology Risk Management Guidelines (TRM) to keep pace with emerging technologies and shifts in the cyber threat landscape. In this webinar, I shall share out and discuss on how to use my C-RAF 2.0 Technical Implantation Tool together with my recommended implementation guidelines on the Maturity Assessment Domain 4, 5 and 6. I have also created an Excel spreadsheet (C-RAF 2.0 Technical Implantation Tool) which contains the 7-Domains dive into the respective 26 Control Components of the Maturity Assessment with my implementation guides for my own easy reference. I have studied the official document and all referenced materials to prepare this follower’s handbook as quick reference for my friends in financial industry. The initiative is underpinned by three pillars: the Cyber Resilience Assessment Framework (C-RAF), the Professional Development Programme (PDP), and the Cyber Intelligence Sharing Platform (CISP).Īs a long term follower of the initiative, I spent some time to study on what are actually changed on the CFI 2.0, or mainly the C-RAF 2.0. The Hong Kong Monetary Authority (HKMA) announced on 3 November 2020 the launch of an upgraded Cybersecurity Fortification Initiative (CFI) 2.0, following industry consultation. Webinar: A follower’s handbook: C-RAF 2.0 Use Cases for ATT&CK-based Detection and MitigationsĪ field guide for deployment of Azure Sentinel’s Log Analytics and Implementation of Logic Apps as Automation playbooks for response
0 Comments
Leave a Reply. |