Community Platform
Interests
  • Cloud computing
  • Cyber-security
This Year
No Points
Total
1166 Points
MIS Badge

Click here
to validate the recipient

Speaker Series #2 – Flavio Aggio, WHO

World health organization promotes health, keeps the world safe, and serves the vulnerable.

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient.

Humans are the weakest and strongest links in cybersecurity. Cyber security is all about risk.

Cybersecurity threats are increasing in complexity and frequency. Systems and data support strategic operations and objectives. An incident could result in disastrous impact to budget level and operations and objectives.

Key important accelerated components:

  1. Multi-Factor authentication for all It services.
  2. Integrated SOC with SIEM, EDR, and Vulnerability Management
  3. Threat Intelligence (elimination of impersonation)
  4. DMARC was implemented in 30 days and WHO impersonation dropped by 70%.

Planned components to be implemented:

  1. Email advance threat protection
  2. Global Cloud Proxy
  3. Application vulnerability scanning integrated with DevOps
  4. Vulnerability Management including patch management
  5. Deception technology
  6. Zero Trust strategy: no perimeter, no safe place inside of any organization. (WHO deployed this strategy to combat cyber attacks during the pandemic)

Covid-19 lessons learned:

  1. Work to change the user mindset is that IT ensures 100% security
  2. Monthly phishing exercises make users understand faster and better cyberattacks
  3. Communicate often, but not too much. Communication overload is common during cyber attacks.
  4. Concentrate on “What’s in it for me?”
  5. Collaborate and share information with external organizations.

Skip to toolbar