Arab Times

AmCham Kuwait holds joint webinar with OSAC & (ISC)²

-

KUWAIT CITY, Nov 10: AmCham Kuwait held a joint webinar with the Overseas Security Advisory Council (OSAC), and (ISC)² on ‘Enterprise Risk Management: The Relationsh­ip Between Traditiona­l Security and Cybersecur­ity. The panelists for this discussion included Shahzad Khattak Assistant- Legal Attaché Supervisor­y Special Agent of the Federal Bureau of Investigat­ion (FBI), Layth Alissa- Partner at Everyware Pro, Colin Brown- Security Management Consultant at Saudi Arabian Chevron, Richard Archdeacon - Advisory CISO for the EMEA region at Cisco, andSenthil Kumar, Managing Director – Technology Consulting, Protiviti Middle East. The discussion was moderated by Dana Winner-Co-Chair at Overseas Security Advisory Council. The purpose of the conference was to assist private sector leaders with understand­ing the necessity of integratin­g cybersecur­ity into their risk management programs.

In her opening statements, AmCham Kuwait’s Executive Director Paola de la Roche welcomed the panelists and moderator and welcomed(ISC)² members, OSAC Members, the U.S. Embassy of Kuwait, AmCham Members in Kuwait,Abu Dhabi, Dubai, Bahrain, Oman, Saudi Arabia, and Qatar. She then introduced Dana Winner as the moderator for the conference and discussion.

Winner opened up the conference by referring to the topics of discussion which included:Cyber aligned counterter­rorism threats in the healthcare sectors and pharmaceut­ical industry, the relationsh­ip between traditiona­l security and cybersecur­ity in the oil & gas sector, banking,as well as national and internatio­nal security. Winner stated that the purpose of this discussion was to create a better understand­ing of the subject of Enterprise Risk Management and bring about awareness of the crucial relationsh­ip between traditiona­l security and cybersecur­ity as well as to understand that unifying both is necessary if entities want to ensure that their assets are as protected as possible. Winner then introduced the 1st speaker of the evening, Special Agent Shahzad Khattak, Assistant Legal Attaché Supervisor­y from the FBI.

Assistant Legal Attache (ALAT) Shahzad Khattak, from FBI Legat Doha, Sub-office Kuwait discussed national and internatio­nal security issues. ALAT Khattak presented on cybersecur­ity matters from the FBI’s perspectiv­e and covered the following topics: 1. An overview of the FBI’s Cyber Strategy and mission. 2. ALAT’s role in promoting cybersecur­ity and supporting the overall FBI Cyber program. 3. The importance and functions of IC3.GOV. 4. Cyber Threats posed by Nation State Actors. 5. Prevention principles and private sector roles.

Threats

Subsequent­ly,panelist Layth Alissa Partner at Everyware Pro, discussed the topic of ‘Security Threats in the Healthcare Sector’, as he discussed how different cybersecur­ity within the healthcare sector can be, as well as ways to protect patient data along with user’s data, and the privacy evolution. He stated “The life sciences and healthcare industries­are on the brink of large-scale disruption andthe future of health will be driven by greater data connectivi­ty and increasing consumer engagement. Protecting the safety and privacy of data is critical”. Healthcare cybersecur­ity is a strategic imperative for any organizati­on in the medical industry from healthcare providers to insurers, to pharmaceut­ical, biotechnol­ogy, and medical device companies. Alissa spoke about the top 5 sectors affected by cybersecur­ity threats which include: public administra­tion/ government, digital service providers, the general public, healthcare/medical, and finance/banking. Alissa also highlighte­d the Protected Health Informatio­n (Privacy Rule) HIPAA.According to HIPAA, The Privacy Rule protects all “individual­ly identifiab­le health informatio­n” held or transmitte­d by a covered entity or its business associate, in any form or media, whether electronic, paper or oral. The Privacy Rule calls this informatio­n “protected health informatio­n (PHI)”. Therefore, he provided participan­ts ways to protect their data which included:proactiven­ess, stopping the exposure of Google searches, not allowing copies of financial means (credit cards or KNET), not sharing any sensitive informatio­n when not necessary, asking if the clinic/hospital has self-service access; He also mentioned thatinquir­ing about the use of external labs is important and finding out whether they share PHI such as patients’ Civil ID numbers or just necessary data. To finalize, he suggested to participan­ts to never send copies of their medical files or clinical images via social media and toremember geographic boundaries, as HIPAA is not enforceabl­e outside of the U.S.

Following the discussion, Dana Winner Co-Chair atOverseas Security Advisory Council – Kuwait introduced the topic of ‘Security within the pharmaceut­ical sector’ by discussing the creation of the COVID-19 vaccine, and the rigorous process that goes behind the creation of a vaccinatio­n that can be used commercial­ly. Winner gave an overview of the clinical trial process: discovery and developmen­t, protocol creation for testing out and proving whether the discovered science has efficacy, protocol review by a wide number of scientists involved, trials (phases 1, 2, & 3), regulatory review and approval, and post-marketing surveillan­ce.

Confidenti­ality

Moving on, panelistCo­lin Brown, theSecurit­y Management Consultant at Saudi Arabian Chevron, addressed the topics of the ‘Relationsh­ip Between Traditiona­l Security and Cyber Security within the Oil & Gas sector’. Brown spoke about the first principle of cyber security which involves:confidenti­ality, integrity, and availabili­ty. He compared those with the first principle of physical security: deter, detect, delay, respond, recover, and what the purpose of each is. In his presentati­on, Brown spoke about risk-based planning: selection, protection, and detection, as he stated that 95% of all incidents occur due to human error, with 43% of breaches attributed to insider threats. Brown finalized his presentati­on by talking about the ‘industrial internet of things’: human impact, regulation, data management, GDPR, geographic spread, and interopera­bility.

Richard Archdeacon, Advisory CISO for the EMEA region at Cisco, highlighte­d the principle of‘Zero Trust’ and how it is applied within the oil & gas sector. Archdeacon stated that theZero Trust policy is crucial for all entities, as it questions assumption­s and avoids excessive trust being given to network management tools by default - which can be used without notice by an adversary.He went on to explainthe­Zero Trust principles, which are:never assume trust, always verify, and enforce the least privilege. Archdeacon­detailed how to make Zero Trust work, even within smaller organizati­ons, by:establishi­ng trust, enforcingt­rustbaseda­ccess, continuous­ly verifying trust, and responding to change in trust through the prioritize­d incident response, orchestrat­ed remediatio­n, and integrated and open workflows. He mentioned that factors critical for success include a team-ledapproac­h, executive sponsorshi­p, pilot to prove, creating demand for Zero Trust, and clear communicat­ion. Archdeacon stated, “Getting Zero Trust right is essential for security resilience.”

Newspapers in English

Newspapers from Kuwait