Speaker Series #2 – Flavio Aggio, WHO
World health organization promotes health, keeps the world safe, and serves the vulnerable.
Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient.
Humans are the weakest and strongest links in cybersecurity. Cyber security is all about risk.
Cybersecurity threats are increasing in complexity and frequency. Systems and data support strategic operations and objectives. An incident could result in disastrous impact to budget level and operations and objectives.
Key important accelerated components:
- Multi-Factor authentication for all It services.
- Integrated SOC with SIEM, EDR, and Vulnerability Management
- Threat Intelligence (elimination of impersonation)
- DMARC was implemented in 30 days and WHO impersonation dropped by 70%.
Planned components to be implemented:
- Email advance threat protection
- Global Cloud Proxy
- Application vulnerability scanning integrated with DevOps
- Vulnerability Management including patch management
- Deception technology
- Zero Trust strategy: no perimeter, no safe place inside of any organization. (WHO deployed this strategy to combat cyber attacks during the pandemic)
Covid-19 lessons learned:
- Work to change the user mindset is that IT ensures 100% security
- Monthly phishing exercises make users understand faster and better cyberattacks
- Communicate often, but not too much. Communication overload is common during cyber attacks.
- Concentrate on “What’s in it for me?”
- Collaborate and share information with external organizations.