We had the opportunity to chat with Nenad Milanovic, CISO of Erste Digital, and discovered fascinating insights into their #CyberDefenseCenter. Nenad shed light on his personal path in #CyberSecurity, discussed strategies to outsmart evolving threats and shared some tips for enhancing security.
Thanks for your time and for sharing your expertise, Nenad!
My name is Nina Milanovich. I'm the Chief Information Security Officer of Esther Digital. Started in ESTA ESTA group like 7 years ago, started as a security analyst, doing the field work around work so to say. Quickly realized that there is more to it than just the investigation or looking into CM locks. Started more in the reporting part describing what services we are doing, trying to also sell it off to our stakeholders, try to bring security more in the spotlight. And two years ago was promoted to Chief Information Security Officer and I'll have the responsibility of the whole team. So what difference Center is basically a conglomerate of like 70 people at the moment. Considering services all centered that can be centrally done for the whole company. So they start to security management consulting when it comes to projects or initiatives, consulting also when it comes to regulations, which in the financial industry is like a lot of and data privacy management. These goals also over services for risk management. So translating our gaps, our findings that we have into risks that our business almost can understand going into security engineering. So really heavy, heavy technical work with our line of defense and. Other security related solutions over security operation center, Tier 1, Tier 2 security investigation, attack simulation and offensive security in our focus of ours as well as anti fraud and identity access management. So that's more like the the overall setup of our cyber defense center. So our whole strategy is to not rely too much on outsourcing but really have the knowledge about our technical infrastructure in house. So our whole security engineering tribe is responsible for the maintenance operations and further configuration of our line of defense. So everything regarding DDoS, intrusion prevention, firewall ruleset, antivirus configuration as well as the antifraud solutions are maintained in house, maintained and operated by colleagues in the Cyber Defense Center. And outsourced to some ground parts, some some basic infrastructure internets, but the rest of the configuration is with us in the team. That's a tough question which we which we also closely monitoring and closely thinking about. Well, there's one metric which is like downtime due to cyber attacks, which is like very generic. And if you only take this measure, then there would not be too much room for improvement. But this is actually a very, very interesting topic which we are currently investigating also on the scientific method. So one colleague team is evaluating how to design correct and precise security measures. Manassas thesis. That's why I'm quite curious what the outcome will be and I'm eager to share what I can share them afterwards. We are set up in tribes and squads, so we are all one big department, 70 people in in one team, but we then split ourselves up in tribes and squads. So those tribes are basically covering all the different security functions that we have to that we have to. Perform and those squats and then the delivery units for the specific services. Currently 8 tribes as I described before and each and every one of those has a trip lead, which is responsible for delivering the content and also thinking about how we can improve our services in that area. I would put it into two, two baskets. The first one is corporate security threats and the second one is then customer facing threats. If you look at the customer facing threats, I mean this has been the same for like I would say 10 years, which is phishing banking Trojans. Devices being infected and our customers are losing money because of that. So that that's a bit unchanged from a topic perspective. But the methods on how the fraudsters are working is quite enhanced at the moment are heavy lot of automation, automation heavy emphasis also on on the broad broadband attacks on customers. So this was already there a couple of years ago and this is basically unchanged from now. If you look at the corporate threats, it goes also in the direction of. Machine identity theft breaking. Also multi factor authentication protocols. Spying of course. So really digging out details and stealing intellectual property. What we've seen also in the last years bit rising, but now it's also not all for this availability attack. So Tito's attacks, we are quite prominent a couple of years ago. Now it's it's on the decline which I'm happy about, but. Let's see how it is in the future and what will be a threat for the future. I guess we'll be the whole topic of AI identity stealing and then trying to mimic either customers or internal employees. You've seen it now, which at GPT what AI is capable of, and I think that will be one of the biggest threats going forward. Staying ahead of the curve is I guess a bit of an impossible game, so you always have to be on the bleeding edge of information and the whole area to success is here being actively part of it. So if something like chat, GPD comes up, really actively looking into it, how can it be misused? How can we use it to our advantage? We have a dedicated team of detection enhancements who are regularly investigating what other threats out there, how can we measure ourselves for your resilient enough or do we have to invest into technology? So we have to set up processes. So it's like monitoring the situation, having also called partners that deliver insights, but then really engaging with these technologies, with these trends and measuring oneself. Years ago already we integrated it in our ASTA cybersecurity standard where we document all of our detection measures be automated or manual with the micro framework to see what kind of coverage we have. And I see the metro framework as a bit of a blessing and a curse. A blessing because it gives a lot of insight and curse because this insight can be gotten by anybody. So if you find some kind of attack path that is not mentioned in the metro framework, chances are that nobody has really looked into that. So it's like, yes, is it the. The standard for detection for security posture. But this can also be misused, so that's why I see a bit of my trace. Not enough. You really have to look beyond the standard as well. I guess to challenge oneself, be externally or internally, not only on a penetration test level, but really on an organizational level. Think about worst case scenarios, Document those. What are you doing? What can you do, what are your capabilities? Document your whole capabilities in defined framework. I mean the NIST framework, for example, gives a good standard here. The NIST CSF gives a good framework. You use something like Mitra to tick the boxes that you already are familiar with or or. Capable of try to not invent the wheel completely, tried to stick to to frameworks and guidelines. But the most important part is really actively. And convince also the other part of the organization outside of the security world, that security is a team effort and not just done by security experts, but by everybody.
Granting users permissions when they need them may not minimise risks as comprehensively as security leaders expect.
So what are the hidden risks of relying solely on just-in-time security? And why might it not be enough to protect against advanced threats?
In our next episode of #teissTalk with Thom Langford, we’ll see how a narrow just-in-time approach to security can undermine your ability to anticipate and prevent attacks.
Join us for actionable insights: https://lnkd.in/dXyyV3-v#cybersecurity#cyberdefense
Ready to make cybersecurity a walk in the prehistoric park? 🌿
Join forces with fellow businesses in the Dino Pack Community. Together, we can outsmart cyber threats and keep our businesses thriving. 🚀
Check out how at intrepitek.com/services
Share if you're ready to join the pack! 🦖
#Cybersecurity#DinoPack#SmallBusiness
Ever played Donkey Kong?
Just like Mario climbing past obstacles, Pentera navigates your defenses dynamically using real-world techniques.
This will help you uncover attack paths that attackers could use to get to your crown jewels.
Visit the link in the comments to learn more.
#CyberSecurity#NetworkSecurity#CloudSecurity#InfoSec
Attending cyberevolution 2024? Don't miss out on the session below by Inge van der Beijl, delving into the intricate relationship between mental well-being and the challenges faced in the realm of cybersecurity, with a specific focus on crisis situations.
#CRE2024#Cybersecurity#MentalHealth
Chief Information Security Officer
8moThanks for having me NVISO Security, it was a pleasure!