Cybersecurity And Media Companies

Cyber Security expert and former Chief of Staff at the Department of Homeland Security Paul Rosen said at the C-Tech Cyber Security event,

“Broadcast and media companies, like so many others, are seeing two things, an increased frequency of cyber-attacks, and an enhanced sophistication and complexity to such attacks,”

Companies must take responsibility: the reality is that creative media and broadcasting companies are high targets because of their valued content. Knowing your valued assets and being prepared is key, Rosen explained.

“Hackers have the “ability to do great damage to companies, financial, reputational and operational…You can’t eliminate cyber risk in an interconnected world, but you can do a lot to mitigate it.”

Rosen said: “Cyber incidents have legal, practical and policy consequences and addressing cyber security is becoming a mainstream focus of companies.”

The increasingly higher volume of cyber breaches is driving awareness, Rosen said: “Company employees from the board of directors down recognise the need to understand the risks associated with cyber security and protect their businesses from attacks.”

Ultimately it is culture driven; you have to instill cyber ethics across the company.

“Allocating appropriate resources is critical. It can be costly to put in place adequate preventative and response resources, but the cost of ignoring today’s cyber threats can be significantly higher.

“This is why so many business executives at the highest levels are embracing cyber security.”

Mitigating Risk

Rosen oversaw the United States Department of Homeland Security’s (DHS) response to some of the most sensitive and complex challenges including significant cybersecurity events.

Rosen said: “Companies should have a risk-mitigation strategy and a response plan in place to respond when an incident occurs.”

His experience within DHS made clear, “it is inevitable that security breaches will occur, which is why businesses can’t afford to ignore them,” he continued, “If businesses in this industry are going to operate in an interconnected world, media and broadcasting companies need to address what they’re going to do to lessen the cyber threat while continuing to advance their business.

“In homeland security, it is all about promoting security by identifying and minimising risk, while at the same time facilitating business and lawful trade and travel.”

This philosophy can be applied across all sectors, including the valuable content created by the broadcast industry. “When it comes to pre-release media content, big dollars are at stake if there is a hack of that content or a security breach before it is released.”

“Media and broadcasting companies need to address what they’re going to do to lessen the cyber threat while continuing to advance their business”

Rosen said there is good news. Companies and organisations can implement a number of concrete steps to be ready for attacks. “Working with a law firm and forensic firm before an incident occurs” is a useful strategy to have in place.

“Some examples of important prevention measures include regularly patching and backing up your network, and maintaining an updated incident response plan: know the first five steps you’re going to take in the first hours of a beach, including who your outside counsel is.”

He said: “Every threat actor has a motivation, which is important to understand. A nation state actor may have a different motivation than a criminal organisation, for example.

“One may want money while another may be looking to embarrass an executive or business, or may want to conduct an influence campaign by taking over or interfering with broadcasting or media.”

To Pay or Not to Pay

The issue of ransomware and whether a company decides to pay ransom is a complicated decision.

Rosen explained the host of tactics employed by hackers. He said: “One common attack method are phishing emails, where the goal is to get a person to click on a link which leads to malware being downloaded onto a computer or network.”

“Ransomware has presented some unique and interesting issues when it comes to cyber security”

Rosen explained: “Whether to pay a ransom is a business decision, but it may have practical and legal implications that companies together with their counsel should consider. Some of the practical implications include figuring out what bitcoin is and how to get it, if that’s what the attackers want. Who makes the decision within the company about whether you are going to pay, and are you going to coordinate with law enforcement?

“If you are inclined to pay the ransom, companies may also consider whether will be making yourself a target for future attacks? Will hackers see your company and industry as a viable target for future attacks?”

He explained, “Ultimately, when a company is faced with losing $10 million a day, or paying a $10 thousand ransom, executives may see a strong business reason to pay.”

It’s an IT security issue but needs to be understood company-wide. “But there are also potential legal implications of paying a ransom, including US sanctions laws and anti-money laundering controls that companies should explore with counsel,” Rosen said.

“Cyber security hygiene is a growing and an important component to any major business, and I think it’s only going to continue to grow.

“Hackers will find new ways to infiltrate networks, and whether it’s the broadcasting and media industries or some other sector, as long as there is a desire for what you have or to manipulate what you’re doing, the threat of cyber-attacks will continue,” Rosen stated.

Rosen said the key for broadcast companies is: “Plan and prepare in order to mitigate the risk of attacks. And practicing your response to an incident will make you better and more prepared for the real thing.”

IBC.org:

You Might Aso Read: 

French Media’s Emergency Meeting After Isis Hack:

Hackers Steal Game of Thrones Script:

Disney Says Film Hack Threat Was A Hoax:

« Machine Learning is Transforming Data
UK 'biggest audience' In EU For Jihadist Web Content »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

National Cybersecurity Preparedness Consortium (NCPC) - USA

National Cybersecurity Preparedness Consortium (NCPC) - USA

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.