IISF Event Report - February Chapter Meeting
Location: Dublin, Ireland
Cyber recovery best practices and their alignment with evolving regulations like DORA (Digital Operational Resilience Act) and NIS2 (Network and Information Systems Directive 2).
Regulatory Landscape: The presentation highlighted the key pillars of DORA (risk management, incident reporting, testing, third-party risk management, and information sharing) and NIS2, emphasizes their relevance to various organizations, especially within the financial sector and critical national infrastructure.
Three-Pronged Approach to Cyber Resilience: Mr. Twomey advocates a three-part strategy: reducing the attack surface (basic security hygiene), detect and respond (using analysis tools and incident response plans), and recovery (secure backups and robust recovery processes).
Importance of Immutable Backups: The speaker stresses the criticality of immutable backups, stored in physically and logically segregated environments (ideally air-gapped), to protect against ransomware attacks that target backup systems. He emphasizes that simply having backups isn't enough; they must be protected and accessible.
Cyber Recovery vs. Disaster Recovery: A key distinction is drawn between cyber recovery (focused on ransomware and targeted attacks) and disaster recovery (focused on natural disasters or site failures). Cyber recovery often involves a more complex, iterative process of identifying the last clean data copy and rebuilding systems, unlike the faster failover capabilities of disaster recovery.
Segregation of Duties: The importance of separating the teams managing primary data and cyber recovery is highlighted to mitigate insider threats.
Cyber Recovery Vault: Twomey describes a conceptual cyber recovery vault—an isolated, air-gapped copy of critical data—used for testing and recovery. This vault uses a pull-based replication method to enhance security.
Runbooks: The presentation emphasizes the crucial role of detailed runbooks that document the step-by-step recovery process, including contact information, procedures, and restoration steps.
While the presentation was largely general in scope and reach, it did mentions Dell's Cyber Sense tool for analyzing backups and identifying clean recovery points, significantly reducing recovery time.
Highlights:
Real-world examples of ransomware attacks and their impact on recovery efforts were shared, illustrating the challenges and complexities involved. The discussion of RPO (Recovery Point Objective) emphasized the realistic expectations of recovery time, acknowledging that a 24-hour RPO is ambitious but achievable with proper planning and tools.
The Q&A session addressed practical concerns about securing runbooks and managing the cyber recovery vault, providing further insights into implementation details.
Rising Cyber Threats: Cyber threats are increasing, impacting businesses of all sizes through various methods like phishing and ransomware attacks. The speaker highlights the significant financial and reputational damage these attacks can cause.
Regulatory Compliance: Numerous regulations (GDPR, PCI DSS, NIS2, etc.) mandate cybersecurity compliance, with hefty fines for non-compliance. New regulations are emerging to address AI-related risks.
SMEs and Cybersecurity: SMEs, despite representing a large portion of the economy, often lack the resources and expertise to implement robust cybersecurity measures. Existing solutions are often too complex and costly for them.
AI and Cybersecurity: AI is rapidly being adopted by both legitimate businesses and malicious actors. AI can enhance attacks (brute force, denial of service, impersonation) and requires proactive, AI-powered defenses.
Best Practices: The speaker recommends proactive security measures, managed services for 24/7 monitoring, robust cloud security, strong identity and access management (IAM), careful API management, data security (at rest and in motion), mobile device security, and seeking help from third-party organizations for strategy and compliance.
Coro's Solution: The presentation touched on Coro's modular cybersecurity platform as a solution tailored to the needs and resource constraints of SMEs.
HIGHLIGHTS
- The emphasis on the vulnerability of SMEs and the need for tailored solutions.
- The discussion of AI's dual role in both enhancing and combating cyberattacks.
- The stark warning about the significant financial penalties for non-compliance with cybersecurity regulations.
- The practical advice on best practices and the importance of proactive security measures.
All presentations including the Q&A session are now available to view via the IISF member's area (Meeting Downloads tab) login to view
If you are interested in finding out more about the IISF, or would like to attend one of our Chapter Meetings as an invited guest, please contact the
IISF Secretary:
By email:
secretary@iisf.ie
By post:
David Cahill
GTS Security,
Exo Building,
North Wall Quay,
Dublin 1,
D01 W5Y2
Enhance your Cybersecurity knowledge and learn from those at the coalface of information Security in Ireland
Invitations for Annual Sponsorship of IISF has now reopened.
Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more