Please configure

Behind the scenes of a cyber-attack webinar – What did we learn? 

Below are the key takeaways from last week’s discussion with New Zealand’s IT leaders, Josh Bahlman and Geoff Burt of Spark, Nick Baty of CCL, with special guest Rob Cochrane, former CIO for NZ Police.

New Zealand is more than ever a target for cybercriminals around the globe. A topical example - NZX's distributed denial-of-service (DDoS) attack "brought the NZX to its knees for almost a week". DDoS is a disruption of the normal traffic of a specific server, service or network – an example of cybercriminal’s malicious attempts to threaten or hold organisations hostage.

This is by no means the only case - other financial, legal and health institutions have similarly been at the forefront of local and global hacking campaigns.

Resolving cyberattacks can also be more complicated behind the scenes than it looks. 

Early DDoS attacks for example were volumetric – that is, sending a high volume of traffic down the data pipeline so no more could be sent.

Last year, multi-targeted multi-layered attacks on financial institutions took people offline. When hackers attacked NZX, less covered in the media was that less than 10 minutes before each attack Spark was also under attack, an attempt to limit Spark from stepping in to help. And every time they attack, hackers often modify their attacks to keep you busy somewhere else. Resolving security attacks using newer methods can be a matter of finding a needle in a haystack.

Opportunistic cybercriminals have also preyed on fear and vulnerabilities stemming from COVID-19, highlighting the uneasy reality that cybercriminals are willing to put lives at risk. 

Notification requirements

What has changed with the New Zealand privacy law? Changes to the Privacy Act mean it's mandatory to report breaches, which has accelerated the transition of responsibility from the IT department to the top level of leadership – including CEOs and government ministers. The potential legal and reputational fallouts now mean that not reporting breaches is a risk beyond what most organisations are willing to bear. 

The state of play for cybersecurity

Organisations and people get the need for it now more than ever. The challenge is three key questions: -What/Where are their most important information assets, What do they need to invest in, and What is their risk appetite? 

Organisations have changed their ways of working almost overnight (an estimated 5 years of change adoption occurring in 2 months), there has been increased stressors on ill-prepared security personal and corporate equipment. 

As staff need to work from home and access information, the network systems and business protocols haven't necessarily kept up with these evolving requirements. Neither has the mindset shift required to work securely from home. 

Couple this with a shortage of skilled IT professionals – and you have the global ingredients for a perfect digital storm.

From a people perspective, corporate leadership and IT are often on different pages, lacking awareness of what the other is dealing with.

Where is the industry going?

Today, the starting point is often understanding security as holistic: look at the supply chain, looking at suppliers, the compliance regimes you have to adhere to, your technology services – your providers but also the hardware, your servers, your racks, the laptops, the desktops the phones – all represent things that require consideration.

On the flipside, also remember it's easy to boil the ocean – and get overwhelmed with all these issues, particularly for smaller organisations.

Assessing and securing the environment should be based on understanding dependencies and taking an end-to-end perspective to addressing them.

Where to start? Points on a robust security system

  1. Invest in the basics, now, to start building self-reliance and resilience 

  2. Develop – and test - your BCP plan 

  3. It's a team sport – work to align all departments, all leaders, all staff on goals and processes 

  4. Establish the right levels of redundancy and how much downtime (or risk) you can tolerate 

  5. Strong endpoint protection – think patching, micro-segmentation, and firewalls 

  6. Test often, with standard, continuous monitoring, coding, and testing cycles – think DevSecOps and your CI/CD pipeline 

  7. Elevate the cyber security ‘literacy’ of both the corporate leadership and board level 

  8. Collaborate – talk to your upstream providers to understand what they're doing, you're doing, and what you are doing together. 

  9. Build internal capability – aka the "human firewall" 

  10. Test your threat detection programme. When was the last time you ran a desktop security exercise? 

  11. Empower your workforce – when they're skilled and capable they're a powerful asset – aka the "human firewall" 

  12. Align your IT systems – from data, web applications to IoT for critical national providers 

  13. See cybersecurity as part of your business value proposition – both internally and externally 


Lastly, it’s important to acknowledge that security requires time, patience, and investment. Once you establish the baseline controls and test effectively, you should then consider where you made add additional security value. 

Otherwise, you will be the one that wears the impact and risk, not the cybercriminals.

Watch the full webinar now

 

Ready to talk cybersecurity for your business?

Contact us now and one of our experts will be in touch

Please configure