Blackberry to Present ‘The Intersection of the Connected Worker and the Internet of Things’ at Cyber Security Summit 2017

Blackberry to Present ‘The Intersection of the Connected Worker and the Internet of Things’ at Cyber Security Summit 2017

Chris Greco, Senior Director Solutions Development at Blackberry, will present “The Intersection of the Connected Worker and the

Internet of Things” on Tuesday, Oct. 24, during Cyber Security Summit 2017 at the Minneapolis Convention Center.


Today, the smartphone is the primary communication and computing device for many consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off-campus mobile workers who are becoming increasingly connected by rich real-time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.

Greco’s session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how best to address them.
Greco is the Senior Director of Solutions Development at BlackBerry Ltd. He has 15 years of industry experience and currently leads the enterprise technical product management team and the enterprise security certifications team at BlackBerry with a focus on enterprise software and mobility. Over the years, Greco has worked with governments on implementing secure software solutions and security certifications and assurances like NIAP, Common Criteria, FedRAMP.
About BlackBerry
BlackBerry® is a leading software and services company dedicated to securing the Enterprise of Things.
BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things (IoT) can thrive. Our software platform, BlackBerry Secure, is a comprehensive mobile-native approach to security that addresses the entire enterprise from end point to end point.
With software and services from BlackBerry, enterprises in a range of industries – from healthcare to financial services — are empowered to:

  • Identify and mitigate cybersecurity threats.
  • Manage and secure a diverse and growing set of endpoints such as smartphones, tablets, wearables and laptops.
  • Protect files and IP by enabling users to securely access, share and collaborate.
  • Develop powerful applications, workflows and business processes.
  • Unify crisis communications within and between organizations.
BlackBerry holds 80-plus security certifications and is listed in the top position in all six categories of Gartner’s high-security mobility management study. The company is ranked among the top 10 percent of all cybersecurity providers. All G7 governments and 15 of G20 are BlackBerry customers. BlackBerry Unified Endpoint Management (UEM) software is the most widely-deployed among Fortune 500 companies.
Based in Waterloo, Ontario, the company was founded in 1984 and operates in North America, Europe, Asia, Middle East, Latin America and Africa. For more information, visit www.BlackBerry.com.
Cyber Security Summit 2017
Cyber Security Summit is a public-private collaboration with support from industry, government, and university leaders who gather to discuss security trends and solutions. The 7th Annual Summit will bring together senior executives, risk managers, military representatives, policymakers, lawyers, academics, and technology leaders. Topics, content and speakers are driven by an Advisory Board composed of leaders from diverse critical infrastructure operators and commercial market sectors. Cyber Security Summit 2017 will take place Oct. 23-25 at the Minneapolis Convention Center.
Go to cybersecuritysummit.org to learn more.
Source: NEWSWIRE
Security Protocol That Protects Majority of Wi-Fi Connections Has Been Hacked: How to Protect Yourself

Security Protocol That Protects Majority of Wi-Fi Connections Has Been Hacked: How to Protect Yourself

Image © Real Business

NordVPN gives advice on and commentary due to major security protocol hack

The security protocol currently used to protect

the vast majority of Wi-Fi connections has just been broken – meaning that hackers who are within physical range of someone’s home can crack anyone’s Wi-Fi password, spy on their internet activity and intercept any unencrypted data streams.

This is due to a severe flaw in WPA2 protocol, and the proof-of-concept exploit is called KRACK (Key Reinstallation Attacks). It allows hackers to eavesdrop on any Wi-Fi traffic passing between computers and access points.

The US-CERT has recently distributed an advisory to about 100 organizations, warning that the discovered weakness can allow an attacker to decrypt network traffic from a WPA2-enabled device and hijack connections. Depending on the network configuration, it is also possible hackers could inject and manipulate data.
The attack works by exploiting a four-way handshake used to establish a key for traffic encryption. During the third step of the process, the supposedly unique key can be resent multiple times. If a hacker can get it resent in a certain way, they can reuse it in a manner that completely undermines the encryption.
“Past experience shows that these types of vulnerabilities don’t get easily fixed,” said Marty Kamden, CMO of NordVPN. “Home Wi-Fi users are especially vulnerable, as they do not have enough information how to deal with the threat. ISPs can take years to switch to routers with a safer protocol. That’s another situation where users should take their Internet security into their own hands. Everyone should assume that their network is now vulnerable, and take precautions. Virtual Private Networks – VPNs – remain the strongest defense from these types of vulnerabilities.”
A VPN will add an extra layer of security on the entire device by rerouting one’s online data through a ‘tunnel’ secured with military-grade encryption, ensuring that no third parties can eavesdrop on it. However, a VPN will not help if configured on one’s router. A user’s devices must be connected to VPN from within your network.

“Internet users should also look for firmware patches for their routers. Depending on their configurations, they could be potentially exploited,” added Marty P. Kamden.
For more information about staying safe online, visit NordVPN.com.
International Community Comes Together at OASIS to Advance OpenC2 Standard for Automated Defense Against Cyber-Attacks

International Community Comes Together at OASIS to Advance OpenC2 Standard for Automated Defense Against Cyber-Attacks

Anomali, Arbor Networks, Centripetal, Cisco, Cryptsoft, EclecticIQ, FireEye, ForeScout, Fornetix, FS-ISAC, G2, IBM, LookingGlass, McAfee, NC4, NEC, New Context, Phantom, Swimlane, Tanium, ThreatQuotient, U.S. DoD, U.S. NSA, U.S. NIST, and Others Define Open Command and Control (OpenC2)

Organizations and government agencies from Asia, Australia, Europe, and the U.S. are joining forces to advance a standardized language for cyber operations command and control. The work of the new OASIS OpenC2 Technical Committee enables defenders to respond to cyber-attacks in machine-speed. It also helps ensure greater interoperability among products.
Cyber threats are realized in seconds while human responses can take weeks. By providing a common language for machine-to-machine communication, OpenC2 makes it possible for defenders to conduct automated, coordinated, tactical threat responses more accurately and at speeds greater than those previously possible.
Most environments include hundreds of types of systems and devices. Without OpenC2, every device needs to be manually configured or sent commands in real time. This not only slows down incident response, it introduces the potential for human error. With OpenC2, defensive actions can be applied automatically to vulnerable devices in the environment.
“As cyber threats continue to proliferate and accelerate, the community needs foundational mechanisms for coordinating, exchanging, and executing defensive responses at machine speed,” said Neal Ziring, Technical Director, Capabilities Directorate, U.S. National Security Agency (NSA). “OpenC2 will fill a critical gap in our standards landscape and drive interoperability that will be crucial for cyber defense.”
OpenC2 is platform- and product-agnostic. It complements active cyber defense approaches. Using OpenC2, organizations can devise ways of preventing specific threats and share those methods with others in precise, machine-readable terms. Receiving organizations can apply the mitigation directly to their environments without concern about interoperability.
“Moving OpenC2 to the OASIS international standards body is a major milestone and has had a very positive impact on the effort,” said Joe Brule of the NSA, co-chair of the OASIS OpenC2 Technical Committee. “OpenC2 now has in excess of 100 members representing 54 organizations from industry, government, academia, the financial sector, power grid and other major stakeholders. Broad participation will facilitate the development and deployment of OpenC2.”
“We are in strong support of OpenC2 adoption, and we encourage the community of practitioners and vendors to work together to establish and implement this standard so that we can reduce the complexity of our integrated systems and increase the speed at which we can respond to attacks,” added Sounil Yu of Bank of America, who co-chairs the OASIS OpenC2 Technical Committee along with Brule.
Laurent Liscia, CEO and executive director of OASIS, said, “We’re excited to have OpenC2 at OASIS. It’s a strong specification, with solid industry support. OpenC2 is a welcome addition to our cybersecurity portfolio. Many members of the OASIS Cyber Threat Intelligence (CTI) Technical Committee, which advances the STIX and TAXII standards, are also involved in OpenC2.”
Support for OpenC2
ForeScout Chief Strategy Officer, Pedro Abreu, said, “OpenC2 and ForeScout benefit from each other in a unique manner. ForeScout’s device identification and classification engine provides the much-needed fine grained distinction between devices all the way from legacy server systems to modern IoT gadgets and anything in between. OpenC2’s action framework through actuators provides the capability to define an abstract course of action for incident response. With the combination of both, organizations can take a quick contextual action at machine speed to reduce their attack surface.”
G2, Inc. President, Paul Green, said, “G2 is thrilled OpenC2 is gaining more traction in the OASIS community. Early on, we recognized the critical need for vendor-agnostic command and control in support of cyber defense and are proud that our design principles and early work on the syntax and vocabulary have been enthusiastically received. The wide adoption of OpenC2 will make it significantly easier for defensive systems to orchestrate their activities to address cyber threats in real time.”
LookingGlass CTO, Allan Thomson, said, “Cyber threats continue to increase in sophistication and speed, forcing cyber defenders to look for technologies that provide coordinated real-time detection and response. LookingGlass is excited to contribute our expertise and background to integrate threat intelligence and threat mitigation technologies in the new OpenC2 standard.”
NC4 Soltra Development Manager, Mark Davidson, said “Moving the standardization of interfaces and protocols for machine-to-machine, automated threat detection under Oasis’ Open Command and Control (OpenC2) technical committee will help ensure vendor interoperability. In the long run, the ability to quickly provide cyber-defenders the action part in the cybersecurity equation, will strengthen and support cyber defenses.”
NEC General Manager, Cyber Security Strategy Division, Toshiyuki Ishii, said, “NEC is very pleased to be part of the OpenC2 Technical Committee and continues to drive OpenC2 adoption with industry partnerships to benefit customers. NEC believes that a common language for defensive actions are crucial for proactively countering the cyber threat in real time. We are excited about the formation of OpenC2 TC and support its efforts through its contributing to and promotion of this global standard.”
New Context CEO, Daniel Riedel, said, “Our vulnerable attack surface is increasing, as are the adversaries targeting our systems and networks. Security automation is a force multiplier for defenders. New Context is committed to the development of OpenC2 as we are convinced that an open, vendor-neutral standard for driving interoperable machine-driven mitigation and incident response is essential in order to enable organizations to cope with the rising challenges and growing numbers of increasingly sophisticated cyber threats.”
Phantom CTO & Co-founder, Sourabh Satish, said, “Phantom’s partnership with the OpenC2 Forum began several years ago. The adversaries are using automation against us, so the only way to mitigate attacks at cyber-speed is with automation. With a strong specification and support from industry leaders like Phantom, the OASIS OpenC2 Technical Committee will make great progress in defining a standardized language for cyber operations command and control.”
Swimlane Founder and CEO, Cody Cornell, said, “The future of security is going to require high levels of interoperability, and the only way we get there is through open standards. That is why we are so excited about the work begin done collectively by the federal government, security vendors and the OpenC2 Technical Committee.”
Tanium Chief Security Officer, David Damato, said, “As the number of connected devices rapidly multiplies and the cyber threat grows, it’s become clear we need a common language for technologies to automatically communicate with each other, both within and across networks. This interoperability will help organizations operate at the speed needed to stop attacks. We support the development of the OpenC2 standard and applaud OASIS for bringing businesses and government agencies together to develop it.”
ThreatQuotient CTO, Ryan Trost, said, “Operationalization and use of cyber threat intelligence (CTI) across all tools within the infrastructure serves as the glue to accelerate detection and response. The adoption of open standards like OpenC2 to effectively use CTI and automate response is critical to achieve an integrated defense.”
More information
OpenC2 Technical Committee: 
https://www.oasis-open.org/committees/openc2/
Video: Introduction to OpenC2 
https://www.youtube.com/watch?v=kCooyNJoOrU
About OASIS
OASIS is a non-profit, international consortium that drives the development, convergence and adoption of open standards for the global information society. OASIS promotes industry consensus and produces worldwide standards for cyber security, privacy, cloud computing, IoT, SmartGrid, and other areas. OASIS open standards offer the potential to lower cost, stimulate innovation, grow global markets, and protect the right of free choice of technology. OASIS members broadly represent the marketplace of public and private sector technology leaders, users, and influencers. The consortium has more than 5,000 participants representing over 600 organizations and individual members in 65+ countries.