The avalanche of opinions following CrowdStrike’s faulty content update for its’ Falcon sensor security software are vast, varied and robust. To help cut through the noise SC Media and the CyberRisk Collaborative partnered to poll top cybersecurity executives, CISOs and security teams to share insights and lessons learned.The following infographic is the result of a Rapid Action Meeting of the CyberRisk Collaborative convened to give forum members a platform to discuss the CrowdStrike incident. This infographic summarizes member sentiment and lessons learned:(Click here for PDF version of infographic below.)
A CyberRisk Alliance resource, the CyberRisk Collaborative is a vendor-neutral community of CISOs and cybersecurity executives that share best practices and strategies for business success. Polling for this infographic was conducted in the days preceding news of the faulty CrowdStrike update and Microsoft outage. SC Media, an independent cybersecurity news source, is also a CyberRisk Alliance resource.
Continued CrowdStrike and Microsoft outage coverage
For more CrowdStrike update and Microsoft outage coverage, see below.
Dr. Dustin Sachs is the Chief Technologist and Sr. Director of Programs at the CyberRisk Collaborative. He is a highly accomplished cybersecurity professional with a proven track record in risk management, compliance, incident response, and threat mitigation. He is CISSP-certified and holds a Doctor of Computer Science (DCS) degree in Cybersecurity and Information Assurance. Dr. Sachs has worked in various industries, including public utilities, food distribution, and oil and gas. He is a respected thought leader in the cybersecurity community.
China has been regarded by FBI Deputy Assistant Director Cynthia Kaiser to be the leading threat faced by U.S. critical infrastructure, with its state-backed threat operations leveraging artificial intelligence to facilitate increasingly efficient cyber intrusions, reports The Register.
Attacks involving a Windows-based surveillance malware have been launched against multiple senior members of the World Uyghur Congress as part of a new spear-phishing campaign discovered in early March, The Hacker News reports.