Securing The Paris Olympic Games

As the opening ceremony of the 2024 Paris Summer Olympics is fast approaching and the organisers are becoming increasingly focused on cyber security. 

Indeed, French President Emmanuel Macron has said  that Russia was trying to undermine the Paris Games through a disinformation campaign. 

 Its not just fake news and disinformation, large scale  international events offer a vast attack surface providing an attractive  very enticing opportunities for cyber criminals. There is growing concern about the damaging potential of cyber attacks to disrupt the Olympics this year.

Cyber criminals, hacktivists and state actors of all kinds will be heavily tempted to spoil the party. The Olympic Games’ IT system itself will be targeted, including ticketing, press rooms and stadium access systems. TV broadcasts as well as the power supply to physical venues are also at risk. 

The Tokyo Games in 2021 suffered and estimated 450 million cyber attacks and the organising committee for the Paris 2024 Olympics expects to receive eight times as many, around 3.5 billion. At the March InCyber Forum that recently took place in Lille, Vincent Strubel, the director general of the French National Agency for the Security of Information Systems (ANSSI) said that this year's Summer Games being held in Paris would be a cyber target, especially for foreign states keen on “disrupting the opening ceremony or causing problems in public transportation”. 

While Strubel expressed confidence that France was prepared fo attacks by cyber criminals, that means it is  essential to anticipate a range of cyber security threats during the event.

With the collaboration between the Paris 2024 Organising Committee, the French Ministry of the Interior, and leading cyber security firms, a robust framework has been established to safeguard the event from cyber threats. In comment, Richard Hummel, the threat intelligence lead at Netscout said "Cyberwar knows no borders, with international events such as the upcoming Paris Summer Games often prime targets for attackers. Whether they are states, criminals, or hacktivists, the potential targets are numerous... DDoS attacks in particular are a significant threat, capable of making online services inaccessible, with repercussions that can be catastrophic from a security perspective, as well as reputationally or even financially."

According to Hummel cyber security preparation for Paris are an an absolute priority, with collaboration between security experts, governmental agencies, private companies, and international organisations being vital to neutralising cyber threats before they materialise. 

The goal will be to avoid the incidents that have disrupted previous Olympic Games. For example, the 2018 Winter Olympics  when the official website was unavailable for twelve hours following a cyber attack and the Olympic stadium’s Wi-Fi network was cut off. At the 2008 Olympic Games in China ten years earlier, a piece of malicious code called Olympic Destroyer knocked domestic TV screens offline during the spectacular opening ceremony.

In Cyber     |     Inside The Games     |     Net Scout     |     Westminster Security     |     In Cyber   |  Sentinal One   | 

Cybel Angel     |     Inside The Games

Image: IoC

You Might Also Read: 

Major Sporting Events Are Open Targets:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Evolving Cybersecurity Vulnerability Landscape
A Record Increase In 2024 Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.