Cybersecurity bootcamp – reflections after a day in the field
Reflections from a cybersecurity training week, with the purpose of picking out a team of young people to represent Sweden in the European championship in cyber defense.
In this article I want to share my thoughts and observations regarding the need to develop a future proof cyber defence. In today’s heightened threat landscape, it’s imperative that cybersecurity is viewed not as an IT function but rather as a corporate priority. This entails a cultural shift for many organisations and necessitates companies to invest in new tools and solutions to combat emerging threats and stay a step ahead of hackers.
Cyber criminals, or adversaries, are no longer limited to individual actors. They are highly developed and sophisticated organisations that leverage integrated tools and capabilities with artificial intelligence and machine learning. The scope of the threat is growing, and no organisation is immune. Small, mid-sized, and global enterprises, municipalities, and state and federal governments face the constant threat from adversaries of being victims of a targeted attack. Even today’s most sophisticated cyber-controls, no matter how effective, will soon be obsolete, unless very large investments are made to create smart and intelligent solutions for a future-proof cyber security and defence. But this is not enough. It requires an awareness, insights and understandings within companies and organisations. How can I as an individual develop and contribute my knowledge to protect a company's assets? We must bring cyber defence into everyday life, as part of products and offers. We must be able to maintain a consistent and controlled cyber sustainability regarding processes, people, and technology. And we must be flexible to counter cyberattacks based on changed methods among adversaries.
Management must answer key questions among their teams, such as: “Are we prepared for accelerated digitisation in the next three to five years?” and, more specifically, “Are we looking far enough forward to understand how today’s technology investments will have cybersecurity implications in the future?”
Every hacker and malware attacker, regardless of motivation, uses one of these exploit methods to gain initial access:
Machine learning (ML) in cyber security performs extremely well where we have lots of data either on the cloud or on the endpoint, working in combination with big data and analytics.
ML might prove very helpful in detecting issues of a higher complexity and do so faster and more accurately than the human analyst.
In the unfortunate case of an attack, an automated response is critical to minimise the impact, conduct forensics and to defend effectively.
From a defensive perspective we need to be able to respond in computer or machine time versus human time to stop some of the attacks. Defence against intelligent cyber weapons can only be achieved by intelligent software.
Machine learning is increasingly being introduced to fight adversaries. There is currently access to lots of information about suspect adversaries, including their purchase activities and profile, online browsing activities, social networks, and fake identification they submit to get their orders approved. The real challenge is how we can make sense of this unstructured data and then make good approve/decline decisions for thousands of merchants in real time.
Here are examples of candidates to adapt ML and AI to increase the level of automation:
This is very much about methodically and in a fact-based way constantly improving capabilities and characteristics in a modern cyber defence. The most basic prerequisite is a sound cyber hygiene. It should be simple in order to make sure that everyone feels involved in it and can take responsibility for it, and to ensure that it can be followed up on when it is applied in practice.
One of the most common ways cyber criminals get access to your data is through your employees. Adversaries send fraudulent emails impersonating someone in your organisation and will either ask for personal details or for access to certain files. Links often seem legitimate to an untrained eye and it’s easy to fall into the trap. Therefore, employee awareness is vital to build a sustainable culture about cyber security.
SEB works methodically and fact-based through analyses, modelling, insights, and know-how regarding the cyber threat landscape and the methods and goals of adversaries. That is used and translated into capabilities that underpin a modern and effective cyber defence. SEB validates and follows up on this through very extensive tests in accordance with ethical simulated cyber-attacks against critical processes and infrastructure.
Listen in to Ulf Larsson and other amazing speakers at “Let’s talk tech: Cyber security – the foundation for modern banking”- live on LinkedIn March 30 11:30 CEST!
Reflections from a cybersecurity training week, with the purpose of picking out a team of young people to represent Sweden in the European championship in cyber defense.
Welcome back to SEB Tech Blog! I hope you enjoy reading our tech blog articles. This time I will discuss non-financial risk. Those of you who read my blogs may remember that I have previously written about non-functional requirements and cyber hygiene.
This time I have chosen to briefly tell you about what the deep web and what the dark web are. I will not explicitly go into any detail or justify visiting the dark web. In conclusion, deep web is good, dark web is not good.
For questions regarding open vacancies or recruiting processes, feel free to send an email to