Cybersecurity And Media Companies

Cyber Security expert and former Chief of Staff at the Department of Homeland Security Paul Rosen said at the C-Tech Cyber Security event,

“Broadcast and media companies, like so many others, are seeing two things, an increased frequency of cyber-attacks, and an enhanced sophistication and complexity to such attacks,”

Companies must take responsibility: the reality is that creative media and broadcasting companies are high targets because of their valued content. Knowing your valued assets and being prepared is key, Rosen explained.

“Hackers have the “ability to do great damage to companies, financial, reputational and operational…You can’t eliminate cyber risk in an interconnected world, but you can do a lot to mitigate it.”

Rosen said: “Cyber incidents have legal, practical and policy consequences and addressing cyber security is becoming a mainstream focus of companies.”

The increasingly higher volume of cyber breaches is driving awareness, Rosen said: “Company employees from the board of directors down recognise the need to understand the risks associated with cyber security and protect their businesses from attacks.”

Ultimately it is culture driven; you have to instill cyber ethics across the company.

“Allocating appropriate resources is critical. It can be costly to put in place adequate preventative and response resources, but the cost of ignoring today’s cyber threats can be significantly higher.

“This is why so many business executives at the highest levels are embracing cyber security.”

Mitigating Risk

Rosen oversaw the United States Department of Homeland Security’s (DHS) response to some of the most sensitive and complex challenges including significant cybersecurity events.

Rosen said: “Companies should have a risk-mitigation strategy and a response plan in place to respond when an incident occurs.”

His experience within DHS made clear, “it is inevitable that security breaches will occur, which is why businesses can’t afford to ignore them,” he continued, “If businesses in this industry are going to operate in an interconnected world, media and broadcasting companies need to address what they’re going to do to lessen the cyber threat while continuing to advance their business.

“In homeland security, it is all about promoting security by identifying and minimising risk, while at the same time facilitating business and lawful trade and travel.”

This philosophy can be applied across all sectors, including the valuable content created by the broadcast industry. “When it comes to pre-release media content, big dollars are at stake if there is a hack of that content or a security breach before it is released.”

“Media and broadcasting companies need to address what they’re going to do to lessen the cyber threat while continuing to advance their business”

Rosen said there is good news. Companies and organisations can implement a number of concrete steps to be ready for attacks. “Working with a law firm and forensic firm before an incident occurs” is a useful strategy to have in place.

“Some examples of important prevention measures include regularly patching and backing up your network, and maintaining an updated incident response plan: know the first five steps you’re going to take in the first hours of a beach, including who your outside counsel is.”

He said: “Every threat actor has a motivation, which is important to understand. A nation state actor may have a different motivation than a criminal organisation, for example.

“One may want money while another may be looking to embarrass an executive or business, or may want to conduct an influence campaign by taking over or interfering with broadcasting or media.”

To Pay or Not to Pay

The issue of ransomware and whether a company decides to pay ransom is a complicated decision.

Rosen explained the host of tactics employed by hackers. He said: “One common attack method are phishing emails, where the goal is to get a person to click on a link which leads to malware being downloaded onto a computer or network.”

“Ransomware has presented some unique and interesting issues when it comes to cyber security”

Rosen explained: “Whether to pay a ransom is a business decision, but it may have practical and legal implications that companies together with their counsel should consider. Some of the practical implications include figuring out what bitcoin is and how to get it, if that’s what the attackers want. Who makes the decision within the company about whether you are going to pay, and are you going to coordinate with law enforcement?

“If you are inclined to pay the ransom, companies may also consider whether will be making yourself a target for future attacks? Will hackers see your company and industry as a viable target for future attacks?”

He explained, “Ultimately, when a company is faced with losing $10 million a day, or paying a $10 thousand ransom, executives may see a strong business reason to pay.”

It’s an IT security issue but needs to be understood company-wide. “But there are also potential legal implications of paying a ransom, including US sanctions laws and anti-money laundering controls that companies should explore with counsel,” Rosen said.

“Cyber security hygiene is a growing and an important component to any major business, and I think it’s only going to continue to grow.

“Hackers will find new ways to infiltrate networks, and whether it’s the broadcasting and media industries or some other sector, as long as there is a desire for what you have or to manipulate what you’re doing, the threat of cyber-attacks will continue,” Rosen stated.

Rosen said the key for broadcast companies is: “Plan and prepare in order to mitigate the risk of attacks. And practicing your response to an incident will make you better and more prepared for the real thing.”

IBC.org:

You Might Aso Read: 

French Media’s Emergency Meeting After Isis Hack:

Hackers Steal Game of Thrones Script:

Disney Says Film Hack Threat Was A Hoax:

« Machine Learning is Transforming Data
UK 'biggest audience' In EU For Jihadist Web Content »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

EverC

EverC

EverC (previously EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.