The Chief Information Security Officer (CISO) Workshop Training
The Chief Information Security Office (CISO) workshop helps accelerate security program modernization with reference strategies built using Zero Trust principles. The workshop covers all aspects of a comprehensive security program including strategic initiatives, roles and responsibilities, success metrics, maturity models, and more. Videos and slides can be found here.
Australians and Australian businesses should be aware of Business Email Compromise (BEC) threats this tax time. BEC occurs when cybercriminals access email accounts to steal your sensitive and financial information, or commit fraud by impersonating employee or company email accounts to obtain money or data.
What can you do?
Preventative and protective measures are simple, cost effective and immediately beneficial.
The ACSC is encouraging Australian individuals and businesses to strengthen their email security by taking the following steps:
Set secure passphrases for each account.
Set-up multi-factor authentication.
Exercise caution when opening attachments or links.
Think critically before actioning requests for money or sensitive information.
If you’re a business, establish clear processes for workers to verify and validate requests for payment and sensitive information.
Use the ACSC’s learning resources
Individuals and businesses can learn how to protect their email accounts and know what to do after an email attack by using our easy-to-follow guides found here, including:
There are so many maturity models that help us evaluate, assess, and benchmark the effectiveness of our security programs.
Maturity Models, by nature, are structured at various levels for continuous improvement. Hence, these further help in “suggesting/recommending” directions to what capabilities or improvements are needed to improve the performance of these security programs.
Sharing some of the maturity models for reference:
Microsoft has released an open-source cyberattack simulator that allows security researchers and data scientists to create simulated network environments and see how they fare against AI-controlled cyber agents.
This simulator is being released as an open-source project named ‘CyberBattleSim‘ built using a Python-based Open AI Gym interface.
The Microsoft 365 Defender Research team created CyberBattleSim to model how a threat actor spreads laterally through a network after its initial compromise.
“The environment consists of a network of computer nodes. It is parameterized by a fixed network topology and a set of predefined vulnerabilities that an agent can exploit to laterally move through the network.”
“The simulated attacker’s goal is to take ownership of some portion of the network by exploiting these planted vulnerabilities. While the simulated attacker moves through the network, a defender agent watches the network activity to detect the presence of the attacker and contain the attack,” the Microsoft 365 Defender Research Team explains in a new blog post.
To build their simulated environment, researchers will create various nodes on the network and indicate that services are running on each node, their vulnerabilities, and how the device is protected.
Automated cyber agents (threat actors) are then deployed in the environment, where they randomly select actions to perform against the various nodes to take control over them.