FIRST in the News 2018

The Star — Malaysian newspaper The Star writes about the FIRST conference, data breach legislation, and quotes Gant Redmon of IBM Resilient and Datuk Dr Amirudin Abdul Wahab, CEO of Cybersecurity Malaysia.

Digital News Asia — An article about Martijn van der Heide of ThaiCERT, and his mission to secure a whole country through training, awareness, and developing support for critical infrastructure sectors via sectorial CERT teams. He presented his work at the 30th Annual FIRST Conference in Kuala Lumpur, Malaysia.

Digital News Asia – The article covers Ben Ridgway’s presentation at the 30th Annual FIRST Conference in Kuala Lumpur, discussing the importance of cooperation during a security incidents.

Digital News Asia — The 30th annual conference of The Forum of Incident Response and Security Teams (FIRST) began on June 26 in Malaysia, boasting a record-breaking 829 attendees from 79 countries, including 55 from Malaysia from both the private and public sector. The articles quotes our Chair, Thomas Schreck, Christopher Painter, keynote speaker and Commissioner, Global Commission on the Stability of Cyberspace and Datuk Dr Amirudin Abdul Wahab, CEO of Cybersecurity Malaysia.

Internet Health Report 2018 – As a computer systems expert, Margrete Raaum in Norway has seen her fair share of cybersecurity incidents. When asked to recall a memorable one, the Oslo-based Raaum remembers an attack about four years ago on a high-performance computer facility serving several European universities.

As a computer systems expert, Margrete Raaum in Norway has seen her fair share of cybersecurity incidents. When asked to recall a memorable one, the Oslo-based Raaum remembers an attack about four years ago on a high-performance computer facility serving several European universities.

The ever-accelerating flood of software vulnerabilities and innovative attack techniques leaves increasingly few organizations capable of defending themselves and safeguarding sensitive data in their care.

Information-sharing is a critical tool for network defenders because it allows them to avoid the missteps of their peers within the infosecurity community and to deploy proven defensive measures. Proactive information-sharing about attacks and defensive mitigations builds resilience across organizations participating within a given trust community, evolving herd immunity against attacks that others have seen within their own networks.