AmCham in cooperation with the Company Green Light held a business meeting with Natalya Kasperskaya
On March 29, 2016 the American Chamber of Commerce in the Kyrgyz Republic, in cooperation with the Green Light company based out of the American University of Central Asia (AUCA), held a videoconferenced business meeting dedicated to the contemporary threats to businesses and their prevention, with the participation of the Co-Founder of “Kaspersky Lab”, the President of the InfoWatch group of companies with over 20 years of experience in the eld of IT security, one of the most inuential women in Russia — Ms. Natalya Kasperskaya.
According to the analysis conducted by Natalya Kasperskaya for 2015, only 33% of information leaks occur as the result of external attacks. 67% of the leaks are due to internal attacks, i.e., the “subversive activity” of company employees. Therefore, it is important to pay special attention to the employees who have access to condential information. According to Natalya Kasperskaya, they are the ones who serve as the main channels for the leakage of condential information.
– Concurrently, 93% of the leaked information represents personal data (databases containing information on employees, customers, and certain groups of the population, etc.), which could later be monetized, sold to someone else. According to the statistics, hackers are much less interested in commercial and state secrets. While previously the leaked information was in the form of paper documents, it is now predominantly electronic information. Thus, the volume of information leak in the electronic form has increased from 23% to 43% since 2006, – said Natalya Kasperskaya during the videoconference.
Nearly 20 local companies attended the meeting, representing a range of sectors from construction to nancial, tourism, trade and production. All of them, in one way or another, have encountered technical attacks against them in the past; therefore, the guest lecturer was asked many questions. Natalya Kasperskaya explained in detail about the modern means of technical protection, the requirements for the technical means, the mechanisms to prevent the threats, and the means to protect the information.
– With the development of information technology, the technological capabilities of cyber-attacks are also developing. And in doing so, the security tools are always one step behind the development of the technology. First, a technical novelty is invented, and only then – a means to protect it. And, while the tools for automated monitoring for vulnerabilities and threats are already in existence, the tools for automated repelling of attacks are yet to be invented. Usually, there are several channels of information leakage. Attacks in social networks, which are becoming increasingly popular, cover a very wide audience. The methods of repelling the cyberattacks vary case-by-case. A machine is unable to foresee and repel everything. Therefore, the attacks are repelled “manually”, by people, – summarized Ms. Kasperskaya.
At the end of the event, it was decided to continue holding such meetings – both through videoconferencing and in real time (meetings and trainings on cyber security).