For ‘Enterprise Risk Management: The Relationship Between Security and Cybersecurity’
AmCham Kuwait hosted a joint webinar with the Overseas Security Advisory Council (OSAC) and (ISC)² on “Enterprise Risk Management: The Relationship Between Traditional Security and Cybersecurity”. Federal Bureau of Investigation (FBI) Attaché Layth Alissa, Partner at Everyware Pro, Colin Brown, Security Management Consultant at Saudi Arabia Chevron, Richard Archdeacon, CISO Advisor for EMEA at Cisco, and Senthil Kumar, General Manager, Technology Consulting, Protiviti Middle East. The discussion was moderated by Dana Winner, co-chair of the Overseas Security Advisory Council. The goal of the convention is to help private sector leaders perceive the need to integrate cybersecurity into their threat control programs.
In his opening remarks, AmCham Kuwait Executive Director Paolos Angeles de los Angeles Roche welcomed the panelists and moderator and welcomed members (ISC)², OSAC members, the Embassy of the United States of Kuwait, AmCham members in Kuwait, Abu Dhabi, Dubai, Bahrain, Oman, Saudi Arabia, Arabia and Qatar. He then brought in Dana Winner as moderator of the convention and discussion.
The winner opened the convention by referring to discussion topics that included: cyber counterterrorism threats aligned in the pharmaceutical and healthcare industries, the relationship between classical security and cyber security in the oil and fuel sector, banking, as well as national and foreign security. The winner said the goal of this discussion is to create a greater perception of the topic of commercial threat control and raise awareness about the very important relationship between classic security and cybersecurity, as well as perceive that unifying the two is mandatory if entities need to ensure that their assets are as much as possible. The winner brought in the first speaker of the evening, Special Agent Shahzad Khattak, deputy deputy legal attaché and supervisor of the FBI.
Deputy Legal Attaché (ALAT) Shahzad Khattak, FBI Legat Doha, Kuwait sub-office, discussed domestic and foreign security issues. ALAT Khattak presented the FBI’s cybersecurity issues and covered the following topics: 1. A review of the FBI’s cyber strategy and mission. 2. ALAT role in selling cybersecurity and supporting the entire cyber program of the FBI. 3. La importance and purposes of IC3. GOV. 4. Cyber threats posed through state actors. 5. Prevention principles and roles of the personal sector.
Afterwards, panelist Layth Alissa Partner of Everyware Pro, addressed the most sensitive of “Health Care Security Threats”, discussing what other physical care cyber security can look like, as well as tactics to protect the knowledge of the patient and user, and the evolution of privacy. . He said: “The life sciences and physical care industries are at the breaking point of large-scale disruption and long-term physical care will see increased connectivity of knowledge and development of customer engagement. Array Protecting the security and privacy of knowledge is key. ” Cybersecurity in healthcare is a strategic imperative for any organization in the medical sector, from healthcare providers and insurers to pharmaceutical, biotech and medical device companies. Alissa discussed the five most sensitive sectors affected by cybersecurity threats, including: Public Administration/Government, Digital Service Providers, Consumers, Health/Medical, and Finance/Banking. Alissa also highlighted the HIPAA Protected Health Information (Privacy Rule). Under HIPAA, the privacy rule protects any “individually identifiable form of fitness” maintained or transmitted by a covered entity or its business associate, in any form or medium, electronic, paper, or oral. The privacy policy calls this inshapeation “protected fitness inshapeation (PHI)”. Therefore, it provided participants with tactics to protect their knowledge, including: be proactive, avoid Google search exposure in the most sensible way, prohibit copies of monetary means (credit cards or KNET), do not share any sensitive information when not needed, ask if the clinic/hospital has self-service access; He also commented that it is important to be informed about the use of external laboratories and if these percentages of PHI are as civil identity numbers of patients or simply To conclude, he advised that the participants never send copies of their medical records or clinical photographs through social networks. media and geographic boundaries, as HIPAA is not enforceable outside of the United States.
After the discussion, Dana Winner, co-chair of the Overseas Safety Advisory Council – Kuwait, addressed the topic of “safety in the pharmaceutical sector” by discussing the creation of the COVID-19 vaccine and the rigorous procedure for the creation of a vaccine. which can be used commercially. The winner provided a review of the clinical trial procedure: discovery and development, creation of protocols to verify and demonstrate the effectiveness of discovery science, review of the protocol through a large number of scientists involved, trials (phases 1, 2, and 3), regulatory review and approval, and post-marketing surveillance.
Next, panelist Colin Brown, Chevron Saudi Arabia security enforcement representative, addressed the topics of the “relationship between classic security and cybersecurity in the oil and fuels sector. “Brown spoke about the first precept of cybersecurity that implies: confidentiality, integrity and availability. He compared them to the first precept of physical security: deterrent, detect, delay, react and what is the purpose of each. In his presentation, Brown talked about risk-based planning: screening, hedging and screening, as 95% said. of all incidents are due to human error, and 43% of breaches are attributed to insider threats. Brown concluded his presentation by talking about the “Industrial Internet of Things”: human impact, regulation, knowledge control, GDPR, geographic distribution, and interoperability.
Richard Archdeacon, Consulting CISO for EMEA at Cisco, highlighted the “Zero Trust” precept and how it is implemented in the oil and fuels industry. Archdeacon said that the Zero Trust policy is very important for all entities as it enforces scenario assumptions and prevents the top from accepting as true that it defaults to network control equipment which can be used without realize through an adversary. Array Continued with explain the precepts of Zero Trust, which are: never assume accept as true with, find out and enforce least privilege. Archdeacon has detailed how to make Zero Trust work, even within small organizations, by: building accept as true with, enforcing accept as true with access based on, frequently checking accept as true with, and responding to convert accept as true with incident reaction precedence, orchestrated remediation, and built-in, open workflows. He argued that critical points of good fortune come with a team-led approach, executive sponsorship, a shown driver, creating a call for Zero Trust, and transparent communication. Archdeacon said: “Achieving the Zero Trust right is imperative for security resiliency. “
To end the conference, Senthil Kumar, Managing Director – Technology Consulting, Protiviti Middle East spoke in depth about the concepts of embedded cybersecurity with Enterprise Risk Management (ERM) and Cybersecurity (CS) Workflow Framework in the banking industry while speaking in intensity. Kumar closed the discussion by emphasizing that cybersecurity is the duty of a few IT professionals, “cybersecurity is everyone’s business. “
Participants were then moved to meeting rooms with convention presenters to talk in depth about their topics.
-Ends-
About ABCK-AmCham Kuwait
ABCK-AmCham Kuwait is a non-profit organization operating since 1985 and is comprised of Fortune 500 companies, small and medium-sized businesses, and prominent American and Kuwaiti business leaders and entrepreneurs. ABCK-AmCham Kuwait acted as a defender of U. S. interests in the State of Kuwait. For more information, visit our online page on www. amchamkuwait. org or follow us on our social media channels @abck1985
Disclaimer: The content of this press release has been provided through a third-party third-party provider. This online page is not guilty of this external content and does not. This content is provided on an “as is” and “as available” basis and has not been modified in any way. Neither this website nor our affiliates guarantee the accuracy or endorse the views or reviews expressed in this press release.
The press release is provided for informational purposes only. The Content does not provide tax, legal or investment recommendations or reviews related to the relevance, price or profitability of any specific security, portfolio or investment strategy. Neither this nor our affiliates will be liable for errors or inaccuracies in the content, or for any action taken through you based thereon. You expressly agree that your use of the data contained in this segment is at your own risk.
To the fullest extent permitted by applicable law, this website, its parent company, subsidiaries, affiliates and the respective shareholders, directors, officers, employees, agents, advertisers, content providers and licensors shall be liable (jointly or individually) to you for any direct, indirect, consequential, special, incidental, punitive or exemplary damages, including, but not limited to, lost profits, loss of savings and loss of revenue, whether by negligence, tort, contract, or any other theory of liability, even if the parties have requested the option or may simply have foreseen such damages.