->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Counter measures to Combat Covert e-attacks

e-risk analysis

London, UK, 15:30 GMT 26th October 1999 - On the eve of the mi2g software event on "How to manage e-risk?"™ organised in conjunction with Reuters and First Tuesday, it was revealed that most of the serious electronic attacks taking place against financial institutions, multi-nationals and major on-line businesses are highly covert and seldom become public knowledge.

Whilst the headlines are grabbed by publicity seeking hacker attacks on web sites, where graffiti is splashed across the screen or data is visibly lost, it is becoming clear that the piracy of intellectual property and internet based financial fraud is taking place in much more subtle ways and over a longer period of time. Each incident may cause the target organisation damage to the tune of £25 to £40 Million.

On 27th October, mi2g software will reveal to an audience of over 100 CEOs, CTOs, COOs and partners of financial institutions, multi-nationals, major on-line businesses and professional practices, that off-the-shelf technology solutions are no longer enough to combat sustained electronic attack from Hacker Activated Code (HAC).

"HAC modules may be embedded and lie undetected in the victim's computer network for several months before exporting sensitive information to the attacker's computer system anywhere on the planet", according to DK Matai, Founder of mi2g software.

Subtle e-attacks, which are normally not detected in time, are not discussed by the victim organisation for fear of share price collapse or copy cat attacks that exploit the same vulnerability. In over 55% instances, the organisation's employees or contractors exposed to sensitive network information have played a part in sustaining and developing the e-attack.

The e-risk management™ forum will discuss the integrated 4-way mi2g matrix to address covert electronic attack on large organisations:

1. Technology dimension including Bespoke Security Architecture™
2. Legal dimension including Downstream Liability™ and Data Protection
3. Human resource dimension including physical issues
4. E-risk insurance™ cover that protects the revenue stream and e-liabilities

Background:

1. mi2g software presented seminars on e-risk at Richards Butler on 4th August and Hammond Suddards on 8th September. A total of 220 CEOs, FDs and Partners from USA, Germany, Japan and Britain have attended the events which highlight the threat to e-commerce systems from Cyber Warfare. We presented an update on all major e-risk incidents and trends within the escalating threat to e-commerce businesses, financial institutions and multi-nationals. Future seminars on e-risk are planned for November 99.

2. Downstream Liability™ is the real possibility of litigation arising from customers and businesses that have bought a product or a service from a vendor in good faith and have surrendered personal and financial information about themselves for a declared purpose only.

3. The total cost of servicing Cyber Warfare incidents worldwide is likely to exceed £12.5 Billion in 1999 according to mi2g software. In the last ten months, there have been three major virus attacks and several full scale Cyber Attacks. Melissa in March, Chernobyl in April and the fatal ExploreZip in June cost corporations huge unplanned and unbudgeted resources. Variants of these three and other lethal viruses have been emerging at a steady rate to date.

4. mi2g software (www.mi2g.com) is a leading edge London based e-commerce enterprise specialising in e-risk management™ and bespoke security architecture™.

5. e-risk™, e-risk analysis™, e-risk management™, How to manage e-risk?™, Downstream Liability™, e-risk insurance™, Bespoke Security Architecture™ are trade marks of mi2g software™ (mi2g.com).

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy