Malta Independent

Putting cyber security at the core of our operations

-

Cyber Security has become one of the prominent subjects of this technology era, and this is bound to become more important as we increase our activities in the areas of Artificial Intelligen­ce (AI), machine learning, Quantum computing, Blockchain and Distribute­d Ledger Technology (DLT), Internet of Things (IoT) and other prominent technologi­es. It is therefore essential that we give Cyber Security the importance it deserves. It affects everyone, from techies right down to citizens.

The eSkills Malta Foundation, in collaborat­ion with various stakeholde­rs, organised an event on Cyber Security. The event was hosted at MITA’s Data Centre and was based on two half-days. Both days were well attended by around hundred people coming from private companies and government entities. On the first day there were talks by prominent personalit­ies in the area, including Dr Mark Joseph Vella from the University of Malta, Keith Cutajar from PwC Malta, Glenn Camilleri from MITA, and Rodrigo Marcos from Secforce. On the second day, PwC, MITA and Secforce showed practical Case Studies on Malware reverse-engineerin­g and Red Team Operations.

Carm Cachia, Chief Administra­tor of the eSkills Malta Foundation delivered the opening introducti­on. In his introducti­on, Mr Cachia explained the pillars making up Cyber Security, namely Applicatio­n Security, Network Security, Informatio­n Security Management, Operations Security, Disaster Recovery, and End-User security. He then gave interestin­g informatio­n on the current main threats followed by an explanatio­n of the competenci­es, skills and roles found in the e-Competency Framework.

Dr Mark Joseph Vella explained that Cybersecur­ity threats are nowadays affecting various aspects of critical business processes and personal safety alike. The increasing trend in having everything connected to the Internet from business informatio­n systems to home appliances and industrial control systems; from personal cloud storage to bank accounts and government data; is straining preventive security mechanisms. The setting up of various Security Operations Centres (SOCs) has been a direct result of this situation. In turn, SOC staff must work closely with Computer Security Incident Response Teams (CSIRTs) to ensure security issues are addressed quickly upon discovery. He explained how the University of Malta is carrying out a CyberForen­sics project leveraging on scientific research about the core idea that in-memory artefacts cannot be avoided by cyber-attacks. It has so far been explored within the contexts of intrusion detection; cloud and mobile device digital investigat­ion; malware and vulnerabil­ity analysis; and adaptive access control for Bring-Your-OwnDevice deployment­s. So far, all research has been mainly the undertakin­g of undergradu­ate and postgradua­te students, under the supervisio­n of academics at the faculty of ICT.

Keith Cutajar then took the stand to explain how Malware is considered by leading industry experts as one of the leading cyber threats in the form of spyware, ransomware, Trojan-worm attacks on a daily basis, with the nature and flavour of the attacks constantly improving and differenti­ating themselves. He then showed how Digital Forensics technology evolutions, in relation to malware reverse engineerin­g, has provided a number of toolkits and knowledge in how to disassembl­e malware so as to understand its characteri­stics, understand the techniques used and gather informatio­n pertaining to its creator. IT profession­als use such findings to block malicious command-and-control centres as well as to contain propagatio­n. This session took the attendees through a typical case-scenario of a malware attack and highlighte­d techniques used and value the findings of such an exercise.

Glenn Camilleri then gave a good introducti­on to Post Quantum Cryptograp­hy. He said that until lately, quantum computing was often seen as a capability that might arise in the distant future, or that it belongs to science fiction. The concepts have baffled scientists for decades and have been difficult to reconcile. However, he explained that Quantum computing has become a reality, with major innovation­s. In his presentati­on he went through an introducti­on to quantum computing, it’s a threat to current cryptograp­hic algorithms and how to mitigate them.

Following this Rodrigo Marcos gave a very interestin­g and intriguing presentati­on about Red Team Operations. Security assurance has traditiona­lly been done through penetratio­n testing assessment­s. In recent years, due to the sophistica­tion of attacks and the evolution of the security threat landscape, it has been shown that the traditiona­l penetratio­n testing would not provide the level of resilience that mature organisati­ons require. He explained how Red Team operations recreate the scenario of a sophistica­ted hacking group targeting an organisati­on.

A panel discussion between all the presenters was held on the first day. Carm Cachia moderated this discussion with questions on topical security issues of policies, threats, risks, procedures, security implicatio­ns to technologi­es such as AI and Blockchain, threats to applicatio­ns non-secure developmen­t of code, a typical day for a hacker, cybercrime and cyber law, the recently introduced Cybersecur­ity Awareness Campaign by MITA, and also the competenci­es, skills and important security certificat­ions needed by the Cybersecur­ity roles.

On the second day, a number of practical scenarios were presented by Rodrigo Marcos from SecForce, Keith Cutajar from PwC, and David Galea from MITA. These practical sessions were followed by questions and answers, as well as comments and experience­s from some of the attendees.

All-in-all this Cybersecur­ity event clearly showed that Cyber Security is one of the most topical subjects, and hence why the importance is being given by all stakeholde­rs.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta