Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

Insight #1

A North Korean hacker, using a deep-faked identity, was hired by the U.S. cybersecurity firm KnowBe4. Shortly after receiving his workstation, the hacker used a virtual private network (VPN) and Raspberry Pi to download malware and make unauthorized changes, but the attempt was quickly detected and thwarted without impacting the firm's systems, as CEO and founder Stu Sjouwerman explained in a post. This is not the first and won't be the last time something like this happens. Know your threat vectors in all areas of your business.

Insight #2

Identifying rules and procedures for accessing an organization's IT resources is essential for security, especially with expanded IT infrastructures and remote work models. Key policies, according to CSO Online, include acceptable use policies to ensure proper use of IT assets, artificial intelligence (AI) use policies to manage risks with AI tools, data management policies to protect sensitive information, incident response policies to manage cybersecurity incidents and hybrid/remote access policies to secure remote work environments.

Insight #3

 Leidos Holdings Inc., a major IT service provider for the U.S. government, experienced a significant cybersecurity breach, leading to the leakage of internal documents. This incident, yet another involving a major IT service provider, has raised concerns about the security of sensitive government data managed by third-party contractors, as the leaked documents were found on a cybercrime forum and include various sensitive files.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.