Securing The Paris Olympic Games

As the opening ceremony of the 2024 Paris Summer Olympics is fast approaching and the organisers are becoming increasingly focused on cyber security. 

Indeed, French President Emmanuel Macron has said  that Russia was trying to undermine the Paris Games through a disinformation campaign. 

 Its not just fake news and disinformation, large scale  international events offer a vast attack surface providing an attractive  very enticing opportunities for cyber criminals. There is growing concern about the damaging potential of cyber attacks to disrupt the Olympics this year.

Cyber criminals, hacktivists and state actors of all kinds will be heavily tempted to spoil the party. The Olympic Games’ IT system itself will be targeted, including ticketing, press rooms and stadium access systems. TV broadcasts as well as the power supply to physical venues are also at risk. 

The Tokyo Games in 2021 suffered and estimated 450 million cyber attacks and the organising committee for the Paris 2024 Olympics expects to receive eight times as many, around 3.5 billion. At the March InCyber Forum that recently took place in Lille, Vincent Strubel, the director general of the French National Agency for the Security of Information Systems (ANSSI) said that this year's Summer Games being held in Paris would be a cyber target, especially for foreign states keen on “disrupting the opening ceremony or causing problems in public transportation”. 

While Strubel expressed confidence that France was prepared fo attacks by cyber criminals, that means it is  essential to anticipate a range of cyber security threats during the event.

With the collaboration between the Paris 2024 Organising Committee, the French Ministry of the Interior, and leading cyber security firms, a robust framework has been established to safeguard the event from cyber threats. In comment, Richard Hummel, the threat intelligence lead at Netscout said "Cyberwar knows no borders, with international events such as the upcoming Paris Summer Games often prime targets for attackers. Whether they are states, criminals, or hacktivists, the potential targets are numerous... DDoS attacks in particular are a significant threat, capable of making online services inaccessible, with repercussions that can be catastrophic from a security perspective, as well as reputationally or even financially."

According to Hummel cyber security preparation for Paris are an an absolute priority, with collaboration between security experts, governmental agencies, private companies, and international organisations being vital to neutralising cyber threats before they materialise. 

The goal will be to avoid the incidents that have disrupted previous Olympic Games. For example, the 2018 Winter Olympics  when the official website was unavailable for twelve hours following a cyber attack and the Olympic stadium’s Wi-Fi network was cut off. At the 2008 Olympic Games in China ten years earlier, a piece of malicious code called Olympic Destroyer knocked domestic TV screens offline during the spectacular opening ceremony.

In Cyber     |     Inside The Games     |     Net Scout     |     Westminster Security     |     In Cyber   |  Sentinal One   | 

Cybel Angel     |     Inside The Games

Image: IoC

You Might Also Read: 

Major Sporting Events Are Open Targets:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Evolving Cybersecurity Vulnerability Landscape
The Risks Of NIST Non-Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.