SlideShare a Scribd company logo
1 of 18
Download to read offline
Based on an EventTechBrief.com
Article by Michelle Bruno
Getting Hacked is a Nasty Business.
Events are in for a Rude Awakening.
A conference was hacked. This time, hackers
managed to obtain personal details from attendees
of two conferences hosted by the Linux Australia
User Group. Michael Robinson, program director,
cyber forensics at Baltimore’s Stevenson University,
took a look at media reports of the incident to
describe what may have happened and provide
some advice on how event organizers can do a
better job of protecting their attendees from what
could be inevitable.
It happened again...
Beware the Innocent E-mail...
Organizers admit that hackers gained unauthorized
access to one of their servers, but Robinson says,
“It’s pretty unlikely that someone broke in from the
Internet and hit that server.”
 
A more plausible explanation is that an end user
connected to the network was duped into clicking
on a link from the Internet or an email. In doing so,
he inadvertently released malware that moved
laterally across the network to grant a hacker
access to the server that contained all of the
attendee data.
An end user is anyone on a computer connected to
the network including a conference planner,
registration assistant, systems administrator, or
accountant. “If their computers are compromised,
it’s not that difficult to get access to the registration
data,” Robinson explains. 
The vulnerability to which Linux Australia
succumbed was the fact that “it stored attendee
data from multiple conferences on one central
server, which means that when the server was
compromised, it affected all of the attendees from
all of its conferences for several years.”
Hackers are Paid Professionals...
Robinson surmises that the hackers of the Linux
Australia User Group knew what they were doing.
“The people who attend Linux Australia events are
[for example] systems administrators that work for
the Australian and New Zealand governments. They
have root-level access to sensitive information on
their computer systems and networks.” With
something as simple as an attendee email address,
hackers can launch phishing attacks on them in the
same way they likely attacked the conference.
Taking a Server Offline Won't 
Solve the Problem
The remedies for these types of attacks aren't clear-
cut. Linux Australia reportedly decommissioned the
infected server, strengthened security on the new
one and installed a number of monitoring tools. In
addition, “websites for the conferences will in the
future be archived six months after a conference
concludes and then kept on a separate server and
deleted from [the event management software],"
organizers say. That may not be enough according
to Robinson.
“Typically when a system gets infected, the help
desk will come along and take that one server
offline. However, if the hacker leapfrogged through
the network, taking a server offline doesn’t fix the
problem. The server is taken offline, but the bad guy
is still in the network. He can move laterally to the
new server and compromise that one as well,”
Robinson explains.
Attackers are onto
Conferences as Targets
What happened to the Linux Australia User Group is only the
tip of the iceberg in terms of how conferences can be harmed
by hackers, hacktivists or the disgruntled. Robinson lists a
number of "bad" hacks of which organizers should be aware:
Hackers with the right skills can download registrant information
from a self-service registration kiosk onto a USB drive.
Wireless jammers can interrupt on-site networks including
audio-visual equipment.
Attackers are onto
Conferences as Targets
Pineapple routers (costing about $150) can intercept data
transmissions from attendee devices.
An IMSI-catcher can intercept cell phone data and “spy” on
conference-goers.
Fake websites can be easily built to intercept registrant
information (including credit card numbers)
Social hacktivists can wreak havoc on an event with denials of
service attacks and other tactics.
There are some Simple Fixes...
Event organizers are not entirely defenseless. While
some organizers will work with cyber security
professionals to build in safeguards and monitoring
systems, there are simple precautions all event
hosts can take.
Robinson advises that organizers first communicate
to attendees the measures they have in place to
protect their information and advise them NOT to
use the same passwords for the conference that
they use for other work or their personal accounts.
There are other measures that organizers can take
such as instructing IT to isolate and encrypt the
registrant database and training end users to avoid
clicking on links of any kind unless they are
absolutely sure of the source. “End users are the
biggest threat to network security,” Robinson says.
Also, security contractors and staff can learn how to
spot and disarm jamming and routing devices on
site.
But Wait. There's More.
Besides the obvious consequences
—embarrassment, loss of attendee confidence, and
a potential drop in future attendance—the Linux
Australia User Group and others before them have
had to endure a “baptism by fire,” Robinson says.
“Imagine trying to meet your goals to ‘do more with
less’ and then all of a sudden you get hit with
something like this? Your reputation is damaged,
you incur more costs, and your attendees could sue
you. Your day is going to get a whole lot worse.”
Michael Robinson is
at mrobinson4614@stevenson.edu.
Read the full article
and subscribe to the
newsletter at
www.EventTechBrief.com
@EventTechBrief
Images used under a Creative Commons License via Flickr users:
Photosteve101; Al Ibrahim; James Lee; Hannaford; 
OTA Photos; & Living in Monrovia

More Related Content

What's hot

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020Hiren Sadhwani
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks TrendsCharles Mok
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 

What's hot (20)

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020
 
News Bytes
News BytesNews Bytes
News Bytes
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Viewers also liked

GöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiGöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiyelbeyi
 
Bluemix introduction
Bluemix introductionBluemix introduction
Bluemix introductiongule mariam
 
El Jardin De La Mente Manual
El Jardin De La Mente ManualEl Jardin De La Mente Manual
El Jardin De La Mente Manualguest7adf3a3
 
LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案Hiroyuki Inoue
 
JISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE
 
Considerations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentConsiderations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentHelene Heller, PMP
 
JISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE
 
Soda Portfolio
Soda PortfolioSoda Portfolio
Soda Portfoliosodadesign
 
Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Mukesh Kumar, PhD, RAC
 
Evidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careEvidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careslwrel
 
Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Maximiliano Firtman
 
[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platformgule mariam
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcampJuraj Bednar
 
Power Presentation Time Management
Power Presentation Time ManagementPower Presentation Time Management
Power Presentation Time Managementpeglover
 
Internet of things
Internet of things  Internet of things
Internet of things gule mariam
 
Oracle数据库中的并行执行
Oracle数据库中的并行执行Oracle数据库中的并行执行
Oracle数据库中的并行执行shadowfalao
 

Viewers also liked (20)

GöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZleriiGöNüL Sultan MüBarek SöZlerii
GöNüL Sultan MüBarek SöZlerii
 
Bluemix introduction
Bluemix introductionBluemix introduction
Bluemix introduction
 
El Jardin De La Mente Manual
El Jardin De La Mente ManualEl Jardin De La Mente Manual
El Jardin De La Mente Manual
 
LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案LODのOLAP分析を可能にするETLフレームワークの提案
LODのOLAP分析を可能にするETLフレームワークの提案
 
JISC BCE - Dissemination
JISC BCE - DisseminationJISC BCE - Dissemination
JISC BCE - Dissemination
 
Alessandro Baglioni Fotografo
Alessandro Baglioni FotografoAlessandro Baglioni Fotografo
Alessandro Baglioni Fotografo
 
Considerations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT InvestmentConsiderations in Selecting and Protecting Your IT Investment
Considerations in Selecting and Protecting Your IT Investment
 
JISC BCE Programme Streams
JISC BCE Programme StreamsJISC BCE Programme Streams
JISC BCE Programme Streams
 
Tutorial
TutorialTutorial
Tutorial
 
The depue project
The depue projectThe depue project
The depue project
 
Soda Portfolio
Soda PortfolioSoda Portfolio
Soda Portfolio
 
Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009Webinar: Clinical Trial Registration Jan 2009
Webinar: Clinical Trial Registration Jan 2009
 
Evidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-careEvidence management-from-theory-to-practice-in-health-care
Evidence management-from-theory-to-practice-in-health-care
 
Episode v0.7
Episode v0.7Episode v0.7
Episode v0.7
 
Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5 Breaking the Mobile Web with HTML5
Breaking the Mobile Web with HTML5
 
[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform[Whitepaper] an overview of ibm mobile first platform
[Whitepaper] an overview of ibm mobile first platform
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcamp
 
Power Presentation Time Management
Power Presentation Time ManagementPower Presentation Time Management
Power Presentation Time Management
 
Internet of things
Internet of things  Internet of things
Internet of things
 
Oracle数据库中的并行执行
Oracle数据库中的并行执行Oracle数据库中的并行执行
Oracle数据库中的并行执行
 

Similar to Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.

Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRifDhy22
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)OllieShoresna
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...cybluseo
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxCompanySeceon
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service AttackStephanie Williams
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 

Similar to Getting Hacked is a Nasty Business. Events are in for a Rude Awakening. (20)

Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
185
185185
185
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
cyber crime
cyber crimecyber crime
cyber crime
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 

More from Michelle Bruno

Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Michelle Bruno
 
Say Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorSay Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorMichelle Bruno
 
Women and Work After The March
Women and Work After The MarchWomen and Work After The March
Women and Work After The MarchMichelle Bruno
 
All YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsAll YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsMichelle Bruno
 
Got Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesGot Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesMichelle Bruno
 
Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Michelle Bruno
 
What's Holding The Event Industry Back?
What's Holding The Event Industry Back?What's Holding The Event Industry Back?
What's Holding The Event Industry Back?Michelle Bruno
 
Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Michelle Bruno
 
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesThere’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesMichelle Bruno
 
The Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsThe Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsMichelle Bruno
 
The Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceThe Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceMichelle Bruno
 
The Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerThe Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerMichelle Bruno
 
The Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comThe Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comMichelle Bruno
 
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Michelle Bruno
 
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Michelle Bruno
 
ASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftMichelle Bruno
 
EventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetEventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetMichelle Bruno
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityMichelle Bruno
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionMichelle Bruno
 
Trade show techology trends
Trade show techology trendsTrade show techology trends
Trade show techology trendsMichelle Bruno
 

More from Michelle Bruno (20)

Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...Female Forward: How to Build Organizations and Careers that Advance Women in ...
Female Forward: How to Build Organizations and Careers that Advance Women in ...
 
Say Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services ContractorSay Hello To Your New Best Fiend, the General Services Contractor
Say Hello To Your New Best Fiend, the General Services Contractor
 
Women and Work After The March
Women and Work After The MarchWomen and Work After The March
Women and Work After The March
 
All YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology TrendsAll YOU Need to Know About Event Technology Trends
All YOU Need to Know About Event Technology Trends
 
Got Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With GamesGot Gamification? Meeting Event Goals With Games
Got Gamification? Meeting Event Goals With Games
 
Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?Why Can't All Of Our Data Silos Just Get Along?
Why Can't All Of Our Data Silos Just Get Along?
 
What's Holding The Event Industry Back?
What's Holding The Event Industry Back?What's Holding The Event Industry Back?
What's Holding The Event Industry Back?
 
Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?Is the Trade Show Industry Ready for Uberization?
Is the Trade Show Industry Ready for Uberization?
 
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome SelfiesThere’s More Value to Event Social Walls Than Projecting Awesome Selfies
There’s More Value to Event Social Walls Than Projecting Awesome Selfies
 
The Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing SolutionsThe Blessing and The Curse of Online Ticketing Solutions
The Blessing and The Curse of Online Ticketing Solutions
 
The Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open SourceThe Event Industry’s Evangelist of Open Source
The Event Industry’s Evangelist of Open Source
 
The Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerThe Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud Killer
 
The Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.comThe Technology of Tension | EventTechBrief.com
The Technology of Tension | EventTechBrief.com
 
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
Using Second Screen To Connect With Your Audience (and People Who Like to Wat...
 
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
Digital Marketplaces Could Solve a Huge Problem For Wholesale Buyers at Live ...
 
ASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & RiftASP Labs is Opening Eyes with Glass & Rift
ASP Labs is Opening Eyes with Glass & Rift
 
EventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two FeetEventTechBrief.com | The Power of Two Feet
EventTechBrief.com | The Power of Two Feet
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for Charity
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to Selection
 
Trade show techology trends
Trade show techology trendsTrade show techology trends
Trade show techology trends
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.

  • 1. Based on an EventTechBrief.com Article by Michelle Bruno Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
  • 2. A conference was hacked. This time, hackers managed to obtain personal details from attendees of two conferences hosted by the Linux Australia User Group. Michael Robinson, program director, cyber forensics at Baltimore’s Stevenson University, took a look at media reports of the incident to describe what may have happened and provide some advice on how event organizers can do a better job of protecting their attendees from what could be inevitable. It happened again...
  • 4. Organizers admit that hackers gained unauthorized access to one of their servers, but Robinson says, “It’s pretty unlikely that someone broke in from the Internet and hit that server.”   A more plausible explanation is that an end user connected to the network was duped into clicking on a link from the Internet or an email. In doing so, he inadvertently released malware that moved laterally across the network to grant a hacker access to the server that contained all of the attendee data.
  • 5. An end user is anyone on a computer connected to the network including a conference planner, registration assistant, systems administrator, or accountant. “If their computers are compromised, it’s not that difficult to get access to the registration data,” Robinson explains.  The vulnerability to which Linux Australia succumbed was the fact that “it stored attendee data from multiple conferences on one central server, which means that when the server was compromised, it affected all of the attendees from all of its conferences for several years.”
  • 6. Hackers are Paid Professionals...
  • 7. Robinson surmises that the hackers of the Linux Australia User Group knew what they were doing. “The people who attend Linux Australia events are [for example] systems administrators that work for the Australian and New Zealand governments. They have root-level access to sensitive information on their computer systems and networks.” With something as simple as an attendee email address, hackers can launch phishing attacks on them in the same way they likely attacked the conference.
  • 8. Taking a Server Offline Won't  Solve the Problem
  • 9. The remedies for these types of attacks aren't clear- cut. Linux Australia reportedly decommissioned the infected server, strengthened security on the new one and installed a number of monitoring tools. In addition, “websites for the conferences will in the future be archived six months after a conference concludes and then kept on a separate server and deleted from [the event management software]," organizers say. That may not be enough according to Robinson.
  • 10. “Typically when a system gets infected, the help desk will come along and take that one server offline. However, if the hacker leapfrogged through the network, taking a server offline doesn’t fix the problem. The server is taken offline, but the bad guy is still in the network. He can move laterally to the new server and compromise that one as well,” Robinson explains.
  • 11. Attackers are onto Conferences as Targets What happened to the Linux Australia User Group is only the tip of the iceberg in terms of how conferences can be harmed by hackers, hacktivists or the disgruntled. Robinson lists a number of "bad" hacks of which organizers should be aware: Hackers with the right skills can download registrant information from a self-service registration kiosk onto a USB drive. Wireless jammers can interrupt on-site networks including audio-visual equipment.
  • 12. Attackers are onto Conferences as Targets Pineapple routers (costing about $150) can intercept data transmissions from attendee devices. An IMSI-catcher can intercept cell phone data and “spy” on conference-goers. Fake websites can be easily built to intercept registrant information (including credit card numbers) Social hacktivists can wreak havoc on an event with denials of service attacks and other tactics.
  • 13. There are some Simple Fixes...
  • 14. Event organizers are not entirely defenseless. While some organizers will work with cyber security professionals to build in safeguards and monitoring systems, there are simple precautions all event hosts can take. Robinson advises that organizers first communicate to attendees the measures they have in place to protect their information and advise them NOT to use the same passwords for the conference that they use for other work or their personal accounts.
  • 15. There are other measures that organizers can take such as instructing IT to isolate and encrypt the registrant database and training end users to avoid clicking on links of any kind unless they are absolutely sure of the source. “End users are the biggest threat to network security,” Robinson says. Also, security contractors and staff can learn how to spot and disarm jamming and routing devices on site.
  • 17. Besides the obvious consequences —embarrassment, loss of attendee confidence, and a potential drop in future attendance—the Linux Australia User Group and others before them have had to endure a “baptism by fire,” Robinson says. “Imagine trying to meet your goals to ‘do more with less’ and then all of a sudden you get hit with something like this? Your reputation is damaged, you incur more costs, and your attendees could sue you. Your day is going to get a whole lot worse.” Michael Robinson is at mrobinson4614@stevenson.edu.
  • 18. Read the full article and subscribe to the newsletter at www.EventTechBrief.com @EventTechBrief Images used under a Creative Commons License via Flickr users: Photosteve101; Al Ibrahim; James Lee; Hannaford;  OTA Photos; & Living in Monrovia