The Underrated Threat: Why Hackers Thrive at Events and CISOs Should Amp Up Their Guard
Hackers love events.
Why aren’t more CISOs paying attention?
For any organization, the rise of digital platforms, remote working, and cloud-based services has increased the complexity of managing cybersecurity risks.
However, there is one area that is often overlooked by Chief Information Security Officers (CISOs) – live events.
Conferences, trade shows, product launches, and shareholder meetings gather people, devices, and sensitive information in one place, which makes them particularly attractive targets for cyber criminals.
In fact, high-profile events have been on the radar of hackers for years.
In 2018, for instance, the finish line cameras at the Boston Marathon were subjected to a cyber attack, which fortunately was intercepted before it could do any harm.
In 2015, the French TV5Monde was victim to a severe cyber attack, believed to be retribution for France’s support for the Iraqi military action.
It disabled the network’s broadcasting equipment during a live debate on ISIS.
The unique challenges of event cybersecurity
The primary challenge with these events is that they bring together digital and physical systems, creating an environment for technical vulnerabilities and human error.
Take a typical conference, for example.
There could be live polling apps that hold attendee data, Wi-Fi networks for thousands of attendees, and video screens broadcasting from remote locations.
The scope for a potential cyber attack is vast.
On a physical level, events often involve branded USB drives, passes with embedded RFID chips, and technology-packed exhibitor stands.
These elements can also be hacked or abused.
Criminals could install malware on a branded USB drive or clone an RFID pass for access to restricted areas.
Practical advice for CISOs
While it might seem overwhelming, CISOs can establish best practices to minimize these risks.
Here are few key considerations:
Conduct a risk assessment: It is crucial to conduct risk assessments prior to the event.
These assessments should encompass digital systems, physical systems, personnel, equipment, processes, and supply chains involved.
Apply security hygiene standards: Promote cybersecurity awareness among attendees.
Do not offer free USBs and avoid using RFID passes if possible.
If they must be used, ensure there are strict access controls.
Collaborate with event organizers: Collaboration and communication with event organizers, production teams, IT staff, and others are key ingredients to ensure a comprehensive and effective plan is in place.
Have a response plan: Finally, have an incident response plan in place so that any security incidents can be quickly identified, isolated, and addressed.
It’s not just about avoiding an incident, but being able to navigate through one effectively.
In conclusion, cybersecurity is never to be ignored or put on the back-burner, especially in critical situations such as at live events.
The temporary nature of these events or conferences doesn’t reduce the risk, it rather enhances it.
It is high time CISOs started considering event-specific cybersecurity measures in their overarching security strategy.