5 insights from the best practice in security, ScotSecure, event

Written by on April 28, 2016 in Guest Blog with 0 Comments

In summary of the best practice in security, ScotSecure, event, in Edinburgh last week, I have selected 5 key insights from the conference.

1. Increasing complexity

One of the most notable recurring trends was the increasing complexity of the security landscape. A number of speakers explored this issue, explaining how threats had become more sophisticated, targeted and diverse. To compound the problem, organisational structures have also become more difficult to police, due to extended supply chains and the blurred boundaries created by mobile devices and remote access requirements. If organisations are going to combat these issues, their security processes must evolve; they must prepare effectively, utilise new technology and get the whole team behind the strategy.

2. Escalating costs

DI Eamonn Keane, from Police Scotland’s Specialist Crime Division shared with the conference some figures which illustrated the rising cost of cybercrime and highlighted that we were now more likely to fall victim of crime online than offline. He also explained the adverse effect that breaches had upon business, through loss of trust, revenue and reputation. But whilst the impact of a cyber-attack is clear, a number of attendees cited that getting adequate resources to fund an effective cyber security strategy remained difficult, and this poses serious problems for IT and security professionals.

chart

 

The cost of Cybercrime continues to rise: Juniper Research suggests that global cyber-crime costs will reach $2 Trillion by 2019.

3. Information sharing

Scott Barnett, Cyber Intelligence Lead at RBS spoke about the value of collaboration and information sharing, discussing Government backed programmes designed to facilitate the pooling of threat intelligence across the Scottish and UK business community. Whilst this can provide crucial information on the evolving nature of threats, only a fraction of businesses are active participants of SciNet or CiSP.

For more information on getting involved with CiSP click here.

4. Encryption as protection

Encryption is often a central topic at security conferences, and this event was no exception. Several presentations cited the importance of encryption as a mechanism for safeguarding sensitive data and protecting individual privacy. But whilst encryption plays a crucial role in security, these same traits offer protection and anonymity to criminal elements and extremists, posing serious challenges to government, law enforcement and business. Prof. Bill Buchanan touched on this inherent Catch-22, before placing the whole discussion into context by showcasing how simply encryption can be breached during a live hack demonstration.

5. EUDPR: The new EU Data Protection Regulations

The impact of the new EU Data Protection Regulations is a topic that many businesses are keen to understand. Per Johansson, Head of the European Parliament’s Information Office in Edinburgh spoke about the new framework, explaining its value in harmonising data protection regulations across the EU and strengthening supervision and enforcement. But while the benefits of a single set of standards seems sensible in principle, the conference also discussed the inherent challenges faced by legislators in regulating such a fast moving space, with a number of commentators claiming that regulation will always lag behind requirement where technology is involved.

For a summary of the EUDPR, the EC have produced a factsheet.

It is clear that security will continue to be one of the most dominant issues for businesses, and it was great to see such a great array of IT leaders and security professionals from across Scotland coming together to share knowledge and discuss.

For more events from Scot-Tech, click here.

Tags: , , ,

Pete Swift

About the Author

About the Author: Pete gained a Master’s Degree in English Literature alongside Politics and Philosophy before progressing on to complete a Postgraduate MA in Journalism. His background spans public policy research and conference development, with extensive experience across a wide range of subjects, including: ICT, procurement, health, education, open data, digital public services and cyber security. You can follow Scot-Tech on Twitter @scot_tech. .

Subscribe

If you enjoyed this article, subscribe now to receive more just like it.

Subscribe via RSS Feed

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Top