Cybersecurity Compliance Frameworks

Photo by Markus Winkler on Pexels.com

Cybersecurity is a top priority for businesses of all sizes. Cybersecurity compliance frameworks offer a structured approach to managing cybersecurity risks, improving overall security posture, and potentially meeting regulatory requirements.

Here is a summary of some of the most popular frameworks:

  • NIST Cybersecurity Framework (CSF): Developed by the National Institute of Standards and Technology (NIST), the NIST CSF is a voluntary framework that emphasizes six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. It provides a flexible and customizable approach that can be adapted to any organization’s specific needs. (https://www.nist.gov/cyberframework)
  • PCI DSS (Payment Card Industry Data Security Standard): This mandatory framework is enforced by the PCI Security Standards Council (PCI SSC) and applies to any organization that processes, stores or transmits cardholder data. It comprises a set of 12 core requirements, which are organized into six key control objectives. (https://www.pcisecuritystandards.org/)
  • HITRUST CSF (Health Information Trust Alliance Common Security Framework): Built on the NIST CSF foundation, HITRUST CSF specifically addresses the security needs of the healthcare industry. However, its applicability extends beyond healthcare. It incorporates HIPAA (Health Insurance Portability and Accountability Act) compliance requirements, making it a valuable tool for healthcare organizations. (https://hitrustalliance.net/hitrust-framework)
  • CIS Critical Security Controls (CIS Controls): Developed by the Center for Internet Security (CIS), CIS Controls are a prioritized set of actionable recommendations that address the most common cyber threats. Implementing these controls can significantly reduce risk and improve an organization’s overall security posture. (https://www.cisecurity.org/)
  • COBIT (Control Objectives for Information and Related Technology): This framework, developed by ISACA (Information Systems Audit and Control Association), focuses on aligning IT governance with business objectives. It provides a comprehensive framework for managing IT processes, ensuring alignment with strategic goals. (https://www.isaca.org/resources/cobit)
  • ISO 27001 (International Organization for Standardization): ISO 27001 is an internationally recognized standard that outlines the requirements for an Information Security Management System (ISMS). ISMS is a risk-based approach to managing an organization’s information security. Achieving ISO 27001 certification demonstrates that an organization has implemented best practices for information security and that its information assets are protected. (https://www.iso.org/standard/27001)

The best framework for your organization depends on several factors, including your industry, size, regulatory requirements, and security goals. Some organizations may benefit from implementing a single framework, while others may need to adopt a combination of frameworks to address their specific needs. By understanding and implementing a relevant cybersecurity compliance framework, your organization can significantly improve its security posture, reduce the risk of cyberattacks, and potentially achieve regulatory compliance.

Safeguarding the Future: My IoT Security Lecture at Lund University

Last Thursday, I had the honor of delivering an online lecture at Lund University, focusing on IoT security. The lecture addressed the core threats targeting IoT systems and the essential security measures to protect these devices from potential harm. In an increasingly interconnected world, the critical role of IoT security cannot be overstated.

As we continue to witness the exponential growth of IoT devices, it is crucial to prioritize security measures. The potential consequences of a security breach can be catastrophic, and we must remain vigilant in safeguarding our digital assets.

It is always a pleasure to share my expertise and insights on cybersecurity and IoT to guide the next-generation. I appreciate the opportunity and eagerly await what the future has in store.

My First Lecture at the University of Malta

Snapshot of the title slide captured prior to the lesson.

I initiated the Applied Cryptography course at the University of Malta on Monday evening. As a cyber security professional and academic with a strong commitment to the field of information security, I am genuinely excited to be leading this specialized academic course this year.

Throughout the introductory lecture, I delved into the foundational concepts of cryptology, emphasizing its profound relevance within contemporary security applications. The pedagogical discourse traversed a diverse spectrum of topics, encompassing cryptographic mechanisms, the examination of classical substitution ciphers and their formal representations, a concise introduction to cryptanalysis, and more.

I am excited to be a part of this journey and look forward to the next lecture in this course on Monday!

The Diamond Model of Intrusion Analysis

Photo by Michael Morse on Pexels.com

In the world of cyber security, effectively processing data and turning it into actionable intelligence is crucial. While the Cyber Kill Chain® and the MITRE ATT&CK Framework are commonly used methodologies, there is perhaps a lesser-known alternative called the Diamond Model of Intrusion Analysis. Developed in 2013 by renowned cyber security professionals, Sergio Caltagirone, Andrew Pendergast, and Christopher Betz, this model is an indispensable resource for cyber security professionals. It offers a simple yet powerful way to analyze and document intrusion incidents.

The Diamond Model is composed of four features: adversary, infrastructure, capability, and victim. The adversary represents individuals, groups, or organizations that exploit vulnerabilities to achieve their goals. Capability encompasses the tools, techniques, and methods used by adversaries, while infrastructure refers to communication systems like IP addresses and domain names. Victims can be individuals, organizations, or specific assets such as target email addresses. In addition, it delineates supplementary meta-features that bolster higher-level constructs, while also incorporating measurement, testability, and repeatability to deliver a more encompassing scientific approach to analysis.

Despite its unassuming appearance, the Diamond Model possesses the ability to swiftly navigate intricate and multifaceted details. The dynamics of a threat actor exist in a perpetual state of flux, as attackers continuously modify their infrastructure and capabilities. Moreover, when integrated with the Cyber Kill Chain® and other frameworks, it contributes to the establishment of a comprehensive cyber security framework. This integration facilitates a deeper understanding of threats and strengthens incident response capabilities, empowering a more proactive defense posture.

An example of using the Diamond Model in practice is found here.

Essential Skills for Effective Threat Hunting

Photo by Harrison Haines on Pexels.com

In today’s cyber security landscape, where cyber threats continue to evolve in sophistication, organizations must adopt proactive approaches to safeguard their networks and sensitive data. Threat hunting, a human-driven and iterative process, has emerged as a crucial aspect of cyber security. This article aims to highlight the essential skill set required to become a successful threat hunter.

Threat hunting tends to operate under the assumption that adversaries have already breached an organization’s defenses and are hiding within the corporate network. Unlike traditional security measures that tend to rely solely on automated detection tools and known indicators of compromise (IoCs), threat hunting leverages human analytical capabilities to identify subtle signs of intrusion that automated systems may miss.

A successful threat hunter requires a diverse skill set to navigate the complexities of modern cyber threats effectively. Here are some essential skills for aspiring threat hunters:

  • Cyber threat intelligence. Understanding cyber threat intelligence is foundational for any threat hunter. It involves gathering, analyzing, and interpreting information about potential threats and threat actors. This knowledge provides valuable insights into advanced persistence threats, various malware types, and the motivations driving threat actors.
  • Cyber security frameworks. Familiarity with frameworks like the Cyber Kill Chain and ATT&CK is invaluable for threat hunters. The Cyber Kill Chain outlines the stages of a cyber attack, from initial reconnaissance to the exfiltration of data, helping hunters identify and disrupt attack vectors. ATT&CK provides a comprehensive knowledge base of adversary tactics and techniques, aiding in the understanding of attackers’ behavior and their methods.
  • Network architecture and forensics. A strong grasp of network architecture and forensic investigation is crucial for analyzing network activity, identifying anomalous behavior, and tracing the root cause of security incidents. Additionally, threat hunters must be comfortable working with extensive log data and extracting meaningful insights from them.
  • Coding and scripting. Proficiency in coding and scripting languages, such as Python, PowerShell, or Bash, can be highly beneficial for threat hunters. These skills allow them to automate repetitive tasks, conduct custom analysis, and develop tools to aid in their investigations.
  • Data science. Threat hunting often involves dealing with vast amounts of data. Data science skills enable hunters to develop algorithms, create statistical models, and perform behavioral analysis, significantly enhancing their ability to detect and respond to threats effectively.
  • Organizational systems. Each organization operates differently, and threat hunters need to be well-versed in their organization’s systems, tools, and incident response procedures. This knowledge allows them to discern deviations from normal activity, leading to quicker response times and more accurate threat assessments.
  • Collaboration and communication. Threat hunters often work in teams and collaborate with other cybersecurity professionals. Strong communication skills are essential for sharing findings, coordinating responses, and effectively conveying complex technical information to non-technical stakeholders.

Threat hunting is not a one-size-fits-all approach, but a personalized, data-driven, and iterative process tailored to an organization’s unique risk profile. Cultivating a skilled team and proactive culture bolsters defenses against dynamic cyber threats. Staying informed, collaborating, and embracing technology ensures success in securing organizations from advanced adversaries.

Securing the University: My Information Security Awareness Session

Photo by ThisIsEngineering on Pexels.com

As technology continues to advance, so do the risks and threats associated with it. To protect ourselves and our institutions, it is crucial to remain informed and updated with the latest security trends and best practices. This was the main focus of my recent 45-minute security awareness session with the university technical staff.

In addition to discussing fundamental security measures, I also covered the latest threat actors and threats in the cyber security landscape affecting universities and public institutions. This included state-sponsored actors, cybercriminals, hacker-for-hire groups, and hacktivists. I emphasized the potential consequences of a cyber attack, which can be severe and damaging, such as financial losses, reputational harm, and legal liability.

One alarming statistic I shared was that according to estimates from Statista’s Cybersecurity Outlook, the global cost of cybercrime is expected to surge in the next five years, rising from $8.44 trillion in 2022 to $23.84 trillion by 2027. This underscores the importance of taking proactive steps to mitigate potential risks.

While technical measures are essential, we also discussed the human element of security, including social engineering tactics like phishing emails or pretexting phone calls. Information security starts and ends with all of us, and it is crucial that everyone takes responsibility for protecting sensitive information and assets.

Here is a redacted version of the presentation. Additionally, I recently co-authored an article titled “Human Factors for Cybersecurity Awareness in a Remote Work Environment”, which delves into relevant and relatable cyber security aspects for remote employees.”

The Importance of Combining Research and Teaching

Photo by cottonbro studio on Pexels.com

As the world progresses, so too does the need for innovative research to support it. In many ways, research and teaching go hand-in-hand, with each feeding off the other to produce a well-rounded system of knowledge. In the field of cybersecurity, for example, teaching is essential to ensure that a new generation of workers is equipped with the skills they need to protect our online world. But research is also critical to staying ahead of the curve and developing new ways to combat the ever-evolving threats that target our digital lives.

The benefits of combining research and teaching are numerous. By keeping up with the latest advances in their field, teachers can ensure that their students are receiving the most up-to-date and relevant information. This helps to prepare students for the real world, where they will be expected to apply their knowledge to solve problems. Meanwhile, researchers can use their findings to inform their teaching, ensuring that the latest discoveries are passed on to the next generation.

But it is not just about staying up-to-date; research can also help to improve the quality of teaching. By constantly testing and refining their methods, researchers can develop more effective ways of imparting knowledge. This benefits not only the students who receive this improved teaching but also society as a whole, as a better-educated workforce is better equipped to meet the challenges of the 21st century.

It is clear, then, that research and teaching are two sides of the same coin. By working together, they can create a virtuous circle that benefits everyone involved.

IoT Security: A Guest Lecture at Malmö University

Today, I delivered a guest lecture in a Master’s course at Malmö University. The lecture that I gave was on the topic of IoT Security. In my lecture, I talked about the IoT, the importance of IoT security, and the different ways that IoT devices can be attacked and secured. I also discussed the challenges that the IoT poses to security and how we can address them.

After the lecture, I had an interesting discussion with some of the students about the topic of IoT security in which we especially talked about the importance of keeping our devices updated.

Overall, it was a good experience, and I am glad that I was able to share my knowledge with the students. I am always happy to help out and answer any questions that the students may have.

A Great Resource to Help you Learn about Cybersecurity

I find the collection of resources from GoVanguard to be quite helpful for anyone interested in a career in cyber security, whether it be in academia or industry.

Specifically, the GoVanguard InfoSec Encyclopedia is an excellent resource for beginners and experienced professionals alike. It contains a wealth of information on various aspects of information security and is constantly being updated with new and improved content. If you are looking to get into the field of information security, or simply want to learn more about it, the GoVanguard InfoSec Encyclopedia may be a great place to start.

Here is a look at their resource list:

This repository also covers “OSINT Tools Used” and “Exploitation Enumeration and Data Recovery Tools” in addition to the aforementioned resources.

Popular smart home brands may be allowing the police to conduct warrantless home surveillance

The security cameras in our smart homes from well-known smart home brands like Amazon and Google might not just be watching over our pets. According to an article in The Verge, they can also aid law enforcement in their investigations of crimes, but only if we do not mind the police viewing our footage without a warrant.

That implies that the police can access our private information without first presenting proof that an emergency situation exists. Police will probably only make use of this access for lawful objectives, such as preventing crime or attempting to locate a missing person in need of assistance. However, it does raise some issues regarding what may transpire when this technology becomes even more widely used and available.

What if, for instance, this access is utilized to locate and detain activists or protestors who have not breached any laws? Citizens may only exercise caution when shopping, be aware that their smart device may record personal information, and, if possible, enable end-to-end encryption.

If you have any questions about how to secure your smart home, do not hesitate to contact me.