For the second year in a row, we had the privilege of attending AISA CyberCon, one of the premier events in the cybersecurity calendar. As expected, the event delivered an exceptional lineup of speakers and discussions, covering a diverse range of critical topics. Below, we share our key takeaways from the sessions we attended.

AI and the Rise of LLMs

A prominent theme this year was the responsible use of artificial intelligence (AI), particularly in the context of language learning models (LLMs). The cybersecurity industry is increasingly focusing on the ethical and secure implementation of AI systems.

Notably, the ISO organisation recently introduced a new standard, ISO 42001, aimed at guiding organisations in developing a structured management system for AI and LLM usage. This framework emphasises:

  • Risk assessment: Identifying potential impacts of AI and machine learning.
  • Policy creation: Establishing robust policies and control sets tailored to mitigate identified risks.

With the rapid evolution of AI, frameworks like ISO 42001 will be instrumental in ensuring organisations can leverage these technologies responsibly and securely.

Loading...

Incident Response and the Role of ASD

The Australian Signals Directorate (ASD) highlighted their role in supporting incident investigation and response. One key takeaway is that information shared with ASD during investigations is not passed to regulators, creating a safer environment for organisations to seek assistance without fear of regulatory repercussions.

A standout example shared was the swift identification of Alexandr Ermakov, a cybercriminal responsible for a large-scale attack in Australia. The proactive approach of the affected organisation, combined with ASD's expertise, played a crucial role in tracking the attacker and mitigating the impact of the breach.

Loading...

Threat Intelligence: Moving Beyond the Buzzword

Threat intelligence is often touted as a cybersecurity must-have, but misconceptions abound. Many senior executives treat it as a buzzword, expecting results with minimal understanding or strategic alignment. However, effective threat intelligence demands a clear purpose and scope.

Organisations should address these core questions at various levels:

Strategic:

  • Who is likely to target your organisation?
  • Why are they attacking or planning to attack?

Operational:

  • How might the attack happen?
  • Where is the attack likely to originate and impact?

Tactical:

  • What specific targets or vulnerabilities are attackers aiming for?

By answering these questions, organisations can prioritise resources, enhance incident response, and stay ahead of potential threats.

Additional Highlights from CyberCon

Other noteworthy topics and discussions included:

  • MFA (Multi-Factor Authentication): Its role in bolstering authentication and authorisation mechanisms.
  • Cloud Security: Strategies to secure data and applications in cloud environments.
  • Break Glass Accounts: Emergency access protocols, with references to the ISM for best practices.
  • AI General Intelligence: Exploring its future trajectory and the associated cybersecurity risks.
  • Ransomware Reporting: Compliance requirements under new cybersecurity laws.
Loading...

Closing Thoughts

We extend our gratitude to AISA and all the speakers who shared their insights and expertise. Their contributions not only enriched the attendees but also advanced the collective mission of making the digital world safer.

A special acknowledgment goes to all cybersecurity professionals. Your efforts behind the scenes often go unnoticed, but your vigilance keeps countless threats at bay. Thank you for your invaluable work in safeguarding our online environments.

Here’s to another year of collaboration, learning, and innovation in cybersecurity!

Author
Brad Fabiny

DQS Product Manager - Cyber Security and auditor for the ISO 9001, ISO 27001 standards and information security management systems (ISMS) with extensive experience in software development.

Loading...