Securing The Paris Olympic Games

As the opening ceremony of the 2024 Paris Summer Olympics is fast approaching and the organisers are becoming increasingly focused on cyber security. 

Indeed, French President Emmanuel Macron has said  that Russia was trying to undermine the Paris Games through a disinformation campaign. 

 Its not just fake news and disinformation, large scale  international events offer a vast attack surface providing an attractive  very enticing opportunities for cyber criminals. There is growing concern about the damaging potential of cyber attacks to disrupt the Olympics this year.

Cyber criminals, hacktivists and state actors of all kinds will be heavily tempted to spoil the party. The Olympic Games’ IT system itself will be targeted, including ticketing, press rooms and stadium access systems. TV broadcasts as well as the power supply to physical venues are also at risk. 

The Tokyo Games in 2021 suffered and estimated 450 million cyber attacks and the organising committee for the Paris 2024 Olympics expects to receive eight times as many, around 3.5 billion. At the March InCyber Forum that recently took place in Lille, Vincent Strubel, the director general of the French National Agency for the Security of Information Systems (ANSSI) said that this year's Summer Games being held in Paris would be a cyber target, especially for foreign states keen on “disrupting the opening ceremony or causing problems in public transportation”. 

While Strubel expressed confidence that France was prepared fo attacks by cyber criminals, that means it is  essential to anticipate a range of cyber security threats during the event.

With the collaboration between the Paris 2024 Organising Committee, the French Ministry of the Interior, and leading cyber security firms, a robust framework has been established to safeguard the event from cyber threats. In comment, Richard Hummel, the threat intelligence lead at Netscout said "Cyberwar knows no borders, with international events such as the upcoming Paris Summer Games often prime targets for attackers. Whether they are states, criminals, or hacktivists, the potential targets are numerous... DDoS attacks in particular are a significant threat, capable of making online services inaccessible, with repercussions that can be catastrophic from a security perspective, as well as reputationally or even financially."

According to Hummel cyber security preparation for Paris are an an absolute priority, with collaboration between security experts, governmental agencies, private companies, and international organisations being vital to neutralising cyber threats before they materialise. 

The goal will be to avoid the incidents that have disrupted previous Olympic Games. For example, the 2018 Winter Olympics  when the official website was unavailable for twelve hours following a cyber attack and the Olympic stadium’s Wi-Fi network was cut off. At the 2008 Olympic Games in China ten years earlier, a piece of malicious code called Olympic Destroyer knocked domestic TV screens offline during the spectacular opening ceremony.

In Cyber     |     Inside The Games     |     Net Scout     |     Westminster Security     |     In Cyber   |  Sentinal One   | 

Cybel Angel     |     Inside The Games

Image: IoC

You Might Also Read: 

Major Sporting Events Are Open Targets:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Evolving Cybersecurity Vulnerability Landscape
A Record Increase In 2024 Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.