{"id":3628,"date":"2025-06-17T14:27:49","date_gmt":"2025-06-17T13:27:49","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=3628"},"modified":"2025-06-17T14:27:49","modified_gmt":"2025-06-17T13:27:49","slug":"the-underrated-threat-why-hackers-thrive-at-events-and-cisos-should-amp-up-their-guard","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/the-underrated-threat-why-hackers-thrive-at-events-and-cisos-should-amp-up-their-guard\/","title":{"rendered":"The Underrated Threat: Why Hackers Thrive at Events and CISOs Should Amp Up Their Guard"},"content":{"rendered":"<p><h1>Hackers love events.<\/p>\n<p>Why aren\u2019t more CISOs paying attention?<\/h1>\n<p>For any organization, the rise of digital platforms, remote working, and cloud-based services has increased the complexity of managing cybersecurity risks.<\/p>\n<p>However, there is one area that is often overlooked by Chief Information Security Officers (CISOs) &#8211; live events.<\/p>\n<p>Conferences, trade shows, product launches, and shareholder meetings gather people, devices, and sensitive information in one place, which makes them particularly attractive targets for cyber criminals.<\/p>\n<p>In fact, high-profile events have been on the radar of hackers for years.<\/p>\n<p>In 2018, for instance, the finish line cameras at the Boston Marathon were subjected to a cyber attack, which fortunately was intercepted before it could do any harm.<\/p>\n<p>In 2015, the French TV5Monde was victim to a severe cyber attack, believed to be retribution for France\u2019s support for the Iraqi military action.<\/p>\n<p>It disabled the network&#8217;s broadcasting equipment during a live debate on ISIS.<\/p>\n<h2>The unique challenges of event cybersecurity<\/h2>\n<p>The primary challenge with these events is that they bring together digital and physical systems, creating an environment for technical vulnerabilities and human error.<\/p>\n<p>Take a typical conference, for example.<\/p>\n<p>There could be live polling apps that hold attendee data, Wi-Fi networks for thousands of attendees, and video screens broadcasting from remote locations.<\/p>\n<p>The scope for a potential cyber attack is vast.<\/p>\n<p>On a physical level, events often involve branded USB drives, passes with embedded RFID chips, and technology-packed exhibitor stands.<\/p>\n<p>These elements can also be hacked or abused.<\/p>\n<p>Criminals could install malware on a branded USB drive or clone an RFID pass for access to restricted areas.<\/p>\n<h2>Practical advice for CISOs<\/h2>\n<p>While it might seem overwhelming, CISOs can establish best practices to minimize these risks.<\/p>\n<p>Here are few key considerations:<\/p>\n<p><strong>Conduct a risk assessment<\/strong>: It is crucial to conduct risk assessments prior to the event.<\/p>\n<p>These assessments should encompass digital systems, physical systems, personnel, equipment, processes, and supply chains involved.<\/p>\n<p><strong>Apply security hygiene standards<\/strong>: Promote cybersecurity awareness among attendees.<\/p>\n<p>Do not offer free USBs and avoid using RFID passes if possible.<\/p>\n<p>If they must be used, ensure there are strict access controls.<\/p>\n<p><strong>Collaborate with event organizers<\/strong>: Collaboration and communication with event organizers, production teams, IT staff, and others are key ingredients to ensure a comprehensive and effective plan is in place.<\/p>\n<p><strong>Have a response plan<\/strong>: Finally, have an incident response plan in place so that any security incidents can be quickly identified, isolated, and addressed.<\/p>\n<p>It\u2019s not just about avoiding an incident, but being able to navigate through one effectively.<\/p>\n<p>In conclusion, cybersecurity is never to be ignored or put on the back-burner, especially in critical situations such as at live events.<\/p>\n<p>The temporary nature of these events or conferences doesn&#8217;t reduce the risk, it rather enhances it.<\/p>\n<p>It is high time CISOs started considering event-specific cybersecurity measures in their overarching security strategy.<\/p>\n<h3>Follow-Up Reading<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.wired.com\/2015\/10\/hackers-remotely-kill-jeep-highway\/\" rel=\"nofollow\">Hackers Remotely Kill a Jeep on the Highway<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-hacks-the-worst-data-breaches-of-2020\/\" rel=\"nofollow\">Biggest hackers, worst data breaches of 2020<\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/10\/19\/massive-highly-relevant-reddit-agora-hackathon-announcement\/\" rel=\"nofollow\">Major hackathon announcement by Reddit&#8217;s &#8216;Agora&#8217;<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Hackers love events. Why aren\u2019t more CISOs paying attention? For any organization, the rise of<\/p>\n","protected":false},"author":1,"featured_media":3629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-3628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=3628"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3628\/revisions"}],"predecessor-version":[{"id":3632,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3628\/revisions\/3632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/3629"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=3628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=3628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=3628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}