Writing

Photo by FKS

Cybersecurity and the like

This year’s “FKS connect IT!” one-day conference will take place on 07 September 2023. In the very nice ambience Yu Garden Hamburg experts and interested parties from the security sector met. Here is the agenda:

Christian Schröder (FKS)
Opening of FKS connect IT! 2023 by the FKS management

Volker Kozok, Cybersecurity Expert
Nothing new in the West, Russian cyberwar and the impact on politics and business

Stefan Fritz, Senior Manager Channel Sales (Sophos)
Cybersecurity as a service - sense or nonsense?

Olaf Schindler, Senior Channel Account Manager DACH (Forcepoint)
Quo vadis IT security - Where is the market heading?

Andreas (Andi) Kaßler (SARK Solutions)
David Berger, Enterprise Account Manager (Pentera)

Sometimes you're just too late ... and what you can do about it

Jan Bräuer, Authorised Signatory (FKS)
How, what, when and where? Orientation and planning in an uncertain & complex IT world: information security made simple.

Oliver Listl, Senior System Engineer (Infinigate)
At some point it hits EVERYONE

Patrick Böhm, Team Leader Micosoft (FKS)
Tim Themann, Head of Professional Services (FKS)

consulting.365 - Structured for more security and resilience with Microsoft 365

Gabriel Zajusch, Sales Managed Services (FKS)
Tede Mertens, System Engineer (Veeam)

Ultra-Resilient Backup in the Hamburg Cloud

Heinz Mäurer, HP Wolf Security (HP Germany)
Time for a different Endpoint Security?

A small selection of topics

Overall, the conference was a great event. Impressive is the fact that FKS organised and implemented everything themselves. That means the moderation, sound, audio, speaker support, online stream … . Really great. And the food was also very good, despite the subtropical heat in the garden.

Quo vadis IT-Security - Where is the market heading?

I liked the presentation by Olaf Schindler (Forcepoint), because Olaf first dealt with the topic of Generative AI in general. Here is a good statement by Dr. Souhir Be Souissi:

There are virtually no limitations on how these systems can be combined with other technologies, especially with other, more classical forms of software. The output they (AI) produce, either in the form of text, code or images, can easily be used by other subsystems to form a general solution.

He also shed light on the concept of enshittification. This comes from Cory Doctorow and it deals with the deterioration of the usefulness of online platforms which he defines as a degradation of an online environment caused by greed:

Platforms die as follows: First they are good to their users; then they abuse their users to make things better for their business customers; finally they abuse those business customers to get all the value back for themselves. Then they die. I call this “enshittification”, and it is a seemingly inevitable consequence that results from the combination of the ease with which a platform changes the allocation of value, combined with the nature of a “two-sided market” in which a platform sits between buyers and sellers, holding each hostage to the other and grabbing an ever-increasing share of the value that is conveyed between them.

Source: https://en.wikipedia.org/wiki/Cory_Doctorow

Finally, he introduced the Forcepoint SASE - Secure Acces Service Edge concept, This is composed of Forrester’s SSE (Security Service Edge) models and Gartner’s SD-WAN model:

SASE

Source: The Practical Executive’s Guide to SASE - Whitepaper

He describes the goal as, “Empower your staff to take advantage of the latest innovations while protecting data.”

Sometimes you’re just too late … and what to do about it

I’ve become a big fan of Pentera as a tool, for continuously monitoring infrastructure for attack vectors. Pentera is not a protection tool. Pentera is the hacker. And that’s the only reasonable way to find out if my systems are hackable.

Pentera and Sark

David Berger and Andi Kaßler presented Pentera live and impressively showed what the tool can do. Every company should use Pentera and find out where the weak points in their infrastructure are. Sark Solutions offers a first introduction and insight into the possibilities.

The key messages about Pentera are as follows:

Ultra-Resilient Backup in the Hamburg Cloud

An equally good presentation came from Gabriel Zajusch (FKS) and Tede Mertens (Veema) on the topic of backup in the Hamburg Cloud (FKS). In doing so, they presented the “Data Protection Postcode 32110”. Here in brief:

3

3 Copies of the data

Analogue:

2

2 different media

1

1 offsite copy

1

Offline, air-gapped, immutable or insider protected

0

No errors after checking backups for recoverability

The term ultra-resilience is explained like this:

Time for a different Endpoint Security?

Heinz Mäurer (HP Wolf Security) gave the last, but no less good, talk on the topic of attacks via hardware and people - e.g. a laptop and its user. Here is a claim:

Inherent risk

The interface between man and machine remains the number one entry point - more than 85% of all attacks start with the human factor. Because: Employees can always be attacked in a similar way, even when using the most diverse tools - via emotional manipulation and social engineering (social hacking).

Furthermore, he notes that “new targets, old targets are being rediscovered”:

Significant and weighty here are the figures that in 2022 203 billion euros in damage were caused by cyber attacks in Germany. By comparison, federal tax revenues amounted to EUR 328 billion in 2022. Forecasts show that spending of EUR 6.9 billion on4 cybersecurity will continue to rise in 2022.

Conclusion

Cybercrime, cyberattacks, cyberwar and cybersecurity. It concerns all of us. We are not only talking about massive financial damage, but also reputational and emotional damage. It is therefore important to stay close to the solutions and not to shy away from taking costly and possibly uncomfortable paths. In business, but also increasingly in private life.

Read more