Cyber Risk Leaders Magazine Issue 2
Total Page:16
File Type:pdf, Size:1020Kb
THE MAGAZINE FOR SECURITY & TECHNOLOGY PROFESSIONALS | www.cyberriskleaders.com Issue 2, 2020 Top trends that Coronavirus should inform your victims of a COVID-19 security different nature: posture The targets of COVID-19 cyberthreats Does COVID-19 signal the end Critical- for fingerprint infrastructure recognition? attack attempted against Israeli water supply Invest in intelligence now to The law on cyber prepare Australia’s bullying and utilities for the trolling future RESPONSE & RECOVERY CYBER + COVID-19 Cyber Security PLUS Weekly Podcast highlights NEW BOOK REVIEW WE’RE BRINGING THE BEST IN CYBERSECURITY RIGHT TO YOU. This year, RSA Conference Asia Pacific & Japan will be a free virtual learning experience. This is an incredible opportunity to engage with a global cybersecurity community right from your home or wherever you might be. RSAC 2020 APJ will be packed with sessions and interactive activities designed to expand your knowledge, including: • Over 60 timely sessions, streamed live during Singapore business hours, or available later on demand. • Inspiring and forward-looking keynotes from RSA’s Rohit Ghai, Microsoft’s Ann Johnson, and author, performer and activist George Takei, who will be a special guest on The Hugh Thompson Show. • Three different Capture the Flag experiences. • Engaging networking opportunities including Ask the Expert Roundtables. Secure your spot today—for free—and join thousands of your peers for three days of learning and networking. FOLLOW US FOLLOW Register today at #RSAC www.rsaconference.com/mysecuritymedia-apj20 Search and find all upcoming featured security events Plus many more! www.mysecuritymarketplace.com Contents Editor's Desk 5 Shaping the future of data centres 8 Director & Executive Editor Submarine Cable Network: The Global Sovereign Asset 10 Chris Cubbage Energy security: Keeping the electrons flowing 12 Director Critical-infrastructure attack attempted against David Matrai Energy security: Keeping the electrons flowing Israeli water supply. 16 Art Director Stefan Babij The golden tax department and the emergence of GoldenSpy malware 18 Getting serious about security assurance 20 MARKETING AND ADVERTISING [email protected] Invest in intelligence now to prepare Australia’s utilities for the future. 24 Copyright © 2020 - My Security Media Pty Ltd GPO Box 930 SYDNEY N.S.W 2001, AUSTRALIA The golden tax department and Siloed response to cyber threats failing to protect E: [email protected] the emergence of GoldenSpy malware. Australian organisations. 28 All Material appearing in Cyber Risk Leaders Magazine Human error – Deliberate or unintentional? 30 is copyright. Reproduction in whole or part is not permitted without permission in writing from the publisher. The views of contributors are not necessarily those of the publisher. Top trends that should inform your COVID-19 security posture 36 Professional advice should be sought before applying the information to particular circumstances. How to reduce work from home risks in a post-COVID world 38 Does COVID-19 signal the end for fingerprint recognition? 40 CONNECT WITH US Coronavirus victims of a different nature: Human error – Deliberate The targets of COVID-19 cyberthreats 42 www.facebook.com/MySecMarketplace/ or unintentional? The law on cyber bullying and trolling 46 @MSM_Marketplace Why domestic violence is a workplace issue. 48 www.linkedin.com/company/my-security- media-pty-ltd/ Editor's Book review 50 www.youtube.com/user/MySecurityAustralia Human error – Deliberate or unintentional? www.australiancybersecuritymagazine.com.au www.mysecuritymarketplace.com Like us on Facebook and follow us on Twitter and LinkedIn. We Why domestic violence is a post about new issue releases, feature interviews, events and workplace issue. www.australiansecuritymagazine.com.au other topical discussions. Correspondents* & Contributors Also with: www.aseantechsec.com www.asiapacificsecuritymagazine.com Iain Strutt Brian Hussey Codee Ludbey Ray Griffiths, www.drasticnews.com www.chiefit.me Mark Sayer, John Young Dave Weinstein Geoff Nick de Bont Brenda van Visahl Samson Schomburgk Rensburg David Selvam, | | Michael Warnock www.youtube.com/user/ MySecurityAustralia www.cctvbuyersguide.com Editor's Desk “The prospect of high-intensity military conflict in the Indo- Pacific is less remote…including high-intensity military conflict between the United States and China.” AUSTRALIAN 2020 DEFENCE STRATEGIC UPDATE – July 1, 2020 n June, the cybersecurity ‘situation’ observed Strategic Update and 2020 Force Structure Plan, We maintain coverage of the COVID-19 across western liberal democracies was thrust acknowledging while the long-term impacts of pandemic. Adapting your respective security Iforward in Australia to be on the national the pandemic are not yet clear, it has deeply posture is essential in a rapidly changing and centre stage. Much like Australia’s early call for altered the economic trajectory of the world, with unpredictable environment and there has been an independent international inquiry into the implications for national security. Stating “the immediate impacts on security technology, origin and cause of the COVID-19 pandemic, on conduct of ‘grey-zone’ activities are broadly being including the potential disruption of fingerprint June 19, Australian Prime Minister Scott Morrison applied with military and non-military forms of biometrics. With COVID-19 there was, and openly declared Australia was being targeted assertiveness and coercion being used to achieve continues to be, an influx of adapted cyber- by a sophisticated, state-based, cyber actor national strategic goals but without provoking attacks, with some reports that coronavirus- across a range of sectors, including all levels conflict. In the Indo-Pacific, these activities have related phishing attacks went up 667%, and of government, industry, political organisations, ranged from militarisation of the South China Sea every single country around the globe has now education, health, essential service providers, to active interference, disinformation campaigns been hit with at least one phishing attack related and operators of other critical infrastructure. and economic coercion.” to the pandemic. Longer term, we will also see Coinciding with these attacks, other countries As a middle-power, Australia is at the an increased focus on contactless biometrics were also reporting significant cyber-attack centre of a dynamic strategic environment and as part of multifactor authentication and other activity. Naturally, China is implicated. China is expanding cyber capabilities, and the willingness security systems such as entry management. AI acting widely belligerent, whilst enacting further of countries like China and non-state actors technologies and drone surveillance is being control over Hong Kong – taking one big step to use them, make for a complex strategic developed and rapidly deployed to help monitor closer to Taiwan. Releasing a massive, asymmetric ‘situation’. At our partnered Webinar on July 1 this the spread of the virus. Thermal cameras are cyber-attack against Australia and other countries was eloquently summed up by Mr. Yigal Unna, being installed in facilities and workplaces and sits alongside China’s trade and diplomatic Director General of the Israel National Cyber facial recognition will still work even when a disputes with the US, UK, Canada and India. Directorate - “the attack surface is on steroids.” person is wearing a mask. Contactless fingerprint It is well accepted that major power In this edition, we cover all aspects of recognition, iris scanning and face detection will competition has intensified and accelerated security technology and critical infrastructure become the norm for biometrics. as a result of the COVID-19 pandemic and the protection, starting with what is the central So, when you finally get to leave your home prospect of ‘high-intensity conflict’ in the Indo- element of the internet - data centres. The and head to work or enter a public place, likely Pacific is increasingly likely. For historical context world’s data is set to grow to 175 zettabytes it will be best to smile, beneath the mask – and what the status of the region was as the by 2025 and John Young examines how data because you’ll be on camera – thermal included pandemic unfolded, we include in this edition centre engineers need to keep pace with an and may even have a drone or robot pass you by my book review and podcast interview with ongoing data evolution. Connecting data centres with a public health announcement – because Professor Rory Medcalf, author of ‘Contest for is the cables and we get insights into the global this is 2020! And we’re just half way through it. the Indo-Pacific – Why China Won’t Map the submarine cable networks, a timely article with On that note, as always, there is so much Future’. China is certainly influencing it! the recent completion of the Japan-Guam- more to touch on and we trust you will enjoy On June 30 Australia announced the country’s Australia North Cable System, approximately this edition of Cyber Risk largest ever investment in cyber security, with 2,700 kilometres in length and a design capacity Leaders. Enjoy the read! $1.35 billion over the next decade, referred to of 30 terabits per second. Then next, we have as the Cyber Enhanced Situational Awareness Iain Strutt’s consideration to the power source and Response (CESAR) package to enhance and related energy security issues. These the cyber security