{"id":14635,"date":"2019-02-20T08:00:10","date_gmt":"2019-02-20T16:00:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/20\/news-8384\/"},"modified":"2019-02-20T08:00:10","modified_gmt":"2019-02-20T16:00:10","slug":"news-8384","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/20\/news-8384\/","title":{"rendered":"A Game of Risk with Broadcasters, Cyber Felons and Dragons"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 20 Feb 2019 15:21:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><i>Submitted<\/i><em>\u00a0by Steve Ng, Lead, Digital Platform Operations, Mediacorp<\/em><\/p>\n<p>Where there\u2019s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game <em>Dungeons &amp; Dragons<\/em>, dragons are intelligent, mythical foes defined by their fiery prowess \u2013 boasting magic resistance beyond just claws and bites.<\/p>\n<p>As digital TV takes centrestage with new over-the-top (OTT) platforms for content consumption across mobile, TV and radio, broadcasters must stay one step ahead of emerging risks or \u2018evolved dragons\u2019 to ensure digital ecosystems \u2013 and ultimately the end-user \u2013 emerge unscathed.<\/p>\n<p><strong>Dungeons are at stake<\/strong><\/p>\n<p>Fast forwarding to present day, the broadcaster in question is Mediacorp \u2013 a Singapore-based media and entertainment company that pioneered the development of Singapore\u2019s broadcasting industry with a vested stake in radio, TV and digital publishing.<\/p>\n<p>To put things into perspective, Mediacorp reaches 99% of Singapore\u2019s 5.6 million population weekly across its integrated media platforms.<\/p>\n<p>Now imagine the risks involved should cybercrime find its way into this fortress? The defacement of digital assets, proliferation of false propaganda can and will threaten to derail an entire broadcast network \u2013 from satellite distribution channels, to IP packets and ultimately the end-user.<\/p>\n<p><strong>Building sturdier, virtual dungeons \u2013 in the skies<\/strong><\/p>\n<p>We are well aware of how breach detection and forensics experts are needed to discover and mitigate cyber risks. But the idea of a perimeter and a castle keep is an old-fashioned view of cybersecurity.<\/p>\n<p>The cyber kill chain dictates that we must also build dungeons within those castles. Rather than endorsing security models that drive us to construct additional defences and filters that have an increasingly slim chance of stopping advanced threats, the focus within IT development and security must shift to emphasize more aggressive and proactive self-assessment. In other words, \u201coffense can inform defence.\u201d<\/p>\n<p>Continuous diagnostics and mitigation are first steps in addressing the use of intelligent metrics to empower greater cyber-situational awareness within our broadcasting network. For instance, we enlisted the help of Trend Micro to improve our security defences \u2013 by identifying suspicious IPs, we were able to fend off cyber felons almost immediately after detection.<\/p>\n<p>Our broadcast business runs on-premise whilst our digital TV business is hosted entirely on the cloud. From creation to consumption, media production networks and media storage locations need to be access-controlled in order to defend from intrusion, particularly as reputational risk is tremendous in broadcasting.<\/p>\n<p>The future of cybersecurity will be grounded in continuous monitoring and increasing the level of our adversaries\u2019 discomfort, so they no longer attack and\/or remain persistent within our networks. To this end, we engage Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>\u00a0Deep Security<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> platform as our underlying foundation for server security both on-premise and in the cloud. This is critical as Mediacorp has a diversified range of operating systems and Trend Micro provides end-to-end solutions that safeguard all our operating layers.<\/p>\n<p><strong>Evolving risks and human links <\/strong><\/p>\n<p>Perhaps more than anything else, organisations need to see cyberattacks as a business risk and leadership at the\u00a0highest levels have to take accountability, so we can move the needle on keeping such incidences at bay.<\/p>\n<p>The danger is that the eyes of the C-suite will often glaze over at too much talk of technology and then recoil at mentions of cost \u2013 money that would not be available for funding marketing or growth.<\/p>\n<p>This needs to change.<\/p>\n<p>To reinforce their dungeons, broadcasters need to do more than just adopt technical standards. They must also revise their overall approach to security at a human and logistical level.<\/p>\n<p>Internally, we have cybersecurity awareness programs in place to upskill employees \u2013 encompassing the C-level \u2013 over lunch-and-learn sessions and formal training programs for accreditation. On an infrastructure level, we make sure we are always on our toes by conducting regular, authorized simulated attacks on computer systems to evaluate our security preparedness in a virtual setting.<\/p>\n<p>Only then can we prevent content delivery from becoming a tragic misadventure.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons-2\/\">A Game of Risk with Broadcasters, Cyber Felons and Dragons<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons-2\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 20 Feb 2019 15:21:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Submitted\u00a0by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there\u2019s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons &#38; Dragons, dragons are intelligent, mythical foes defined by their fiery prowess \u2013 boasting&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons-2\/\">A Game of Risk with Broadcasters, Cyber Felons and Dragons<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,10629,4503,20965,714,20568],"class_list":["post-14635","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-cyberattacks","tag-cybercrime","tag-mediacorp","tag-security","tag-server-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14635"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14635\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14635"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}