• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CTO FORUM 2011

June 27, 2011 by

CTO FORUM 2011 – COMMON RESPONSES TO A GLOBAL CHALLENGE
By Richard Pain

News reports of cyber attacks are continuing to appear with unsettling frequency. Whilst the news is quick to identify the incidents and issues surrounding cybersecurity, solutions remain elusive. In an effort to address this problem, the Commonwealth Telecommunications Organisation (CTO) hosted Second Annual Cybersecurity, Common Responses to a Global Challenge. The event brought together representatives from the Commonwealth states, industry and academia to cooperatively discuss and work towards managing the cyber threat.

“The commonwealth itself presents a very unique platform for … collaboration on cybersecurity” said Chief Executive Officer of the CTO, Dr Ekwow Spio-Garbrah. “This is because the Commonwealth … represents not only some 30% of the number of nations on earth, but also a critical mass of nations that subscribe to common heritage, common ideals, common administrative practices, common legal systems, and which therefore provide a unique opportunity for such collaboration.”

The threat landscape

Mr Marnix Dekker of the European Network and Information Security Agency, (ENISA) painted a very grim picture of the current cyber scenario. He explained that the high profile nature of recent victims of cyber attacks demonstrates the vulnerability to everyone else. The exploitation of software vulnerabilities, the human element and spear phishing have led to the penetration of the most security conscious organisations, Google, RSA and Lockheed Martin to name a few. Even relying on up-to-date antivirus software is not always enough. According to Mr Dekker, the Zeus Trojan, which infected thousands of computers and could be used to listen to keystrokes and take passwords, was detected on UK government computers. It was found that 55% of computers Zeus was detected on were protected with up-to-date antivirus software.

The list of sophisticated organisations that are falling victim to cyber attacks is long and growing. Even the most mainstream software like Microsoft Applications, Abode, Flash are being found to have vulnerabilities. Dekker identified the problem being that there is so much software with so many vulnerabilities, thus presenting attackers with a plethora of opportunities. Whilst patches can be produced, it is a losing battle. “It is really hopeless if you look at it, I think it is really hopeless” exclaimed Mr Dekker.

Fortunately though, there is a light at the end of the tunnel. Cloud computing presents the opportunity to centralise computing and improve security on the server side. Rather than us all having individually vulnerable computers and networks, cloud computing will be protected by security experts on the server side, thus offering greater security. Another glimmer of hope is the current system employed by apps and smartphones. At present, smartphones tend to run very basic operating systems with limited functionality. Apps can then be downloaded to expand functionality as desired. The clever trick is that some companies are checking the available apps for vulnerabilities and therefore preventing vulnerabilities before they can exploited. In this case, a professional team of computer experts can vet applications. These two growing technology sectors present new security opportunities that could reshape the way we use computers.

The UK’s approach

In the face of a difficult financial climate, Mr Neil Thompson, Director of the UK’s Office of Cyber Security & Information Assurance, commended the UK’s investment in cyber security. Emphasising the financial impact of cyber crime on the UK economy he pointed out the interrelated nature of the UK’s security and prosperity. Whilst cyber is designated as the, “fourth domain” it is one that influences and enables all others, making cyber a force multiplier. It can provide great benefits and efficiencies to a range of utilities, but in order to deliver this, c

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT