Lessons in incident response from the Olympics, World Cup

<p>While the goal of every team is to keep possession, they often must hold the line, defend the goal and mount a comeback to win the game.</p>
<p>This is as true in cybersecurity as it is in sports.</p>
<p>Take high-profile events such as the Olympics or World Cup, for example. History has shown that these events, which draw billions of viewers, are ripe targets for the offense: cyberattackers.</p>
<p>Past events have been marred by <a href=”https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users”>phishing attacks</a>, malware-ridden apps, fake social media accounts and spoofed domains, as well as DDoS attacks, hacktivism, state-sponsored attacks and infrastructure disruptions. The opening ceremony of the PyeongChang 2018 Olympics, for example, was notably <a target=”_blank” href=”https://www.darkreading.com/cyberattacks-data-breaches/cyberattack-aimed-to-disrupt-opening-of-winter-olympics” rel=”noopener”>disrupted</a> by the Olympic Destroyer malware, which targeted Wi-Fi networks, ticketing systems and broadcasting infrastructure. The Milano Cortina 2026 Olympics were no exception. Italy confirmed it blocked a series of cyberattacks targeting its foreign ministry offices, Olympics websites and hotels in the Cortina d’Ampezzo area days before the games opened.</p>
<p>Yet history has also shown that defense wins championships — a defense built by training consistently, keeping strategies sharp and warming up before the big event. In cybersecurity, this means preparing for when, not if, a cyberattack will occur — i.e., having effective <a href=”https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important”>risk management</a> and <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> programs in place.</p>
<p>In this Reporters’ Notebook video, Tara Seals, managing editor of news at Dark Reading, David Jones, reporter at Cybersecurity Dive, and Sharon Shea, executive editor of TechTarget SearchSecurity, discussed the prevalence of cyberattacks on global events and how the challenges these events face are the same as those of everyday organizations.</p>
<p>Watch now for insights on Dark Reading’s and Cybersecurity Dive’s coverage of global event cybersecurity, as well as the risk management and incident response lessons CISOs from organizations of all shapes and sizes can learn from such attacks, from <a href=”https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan”>preparing an incident response plan</a> to <a href=”https://www.techtarget.com/searchsecurity/tip/Phases-of-the-third-party-risk-management-lifecycle”>managing third-party risks</a>.</p>
<p>And remember, as nine-time Olympic swimmer Mark Spitz said, “If you fail to prepare, you’re prepared to fail.”</p>
<p>For more coverage on cyberattacks on large events:</p>
<ul class=”default-list”>
<li><a target=”_blank” href=”https://www.darkreading.com/remote-workforce/winter-olympics-podium-cyberattackers” rel=”noopener”>Cyber threats loom over 2026 Winter Olympics</a></li>
<li><a target=”_blank” href=”https://www.darkreading.com/cybersecurity-operations/crowds-drones-world-cup-cyber-challenges” rel=”noopener”>2026 FIFA World Cup poses significant cyber challenges</a></li>
<li><a target=”_blank” href=”https://www.darkreading.com/cyberattacks-data-breaches/trial-ddos-attacks-on-french-sites-portend-greater-olympics-threats” rel=”noopener”>’Trial’ DDoS attacks on French sites portend greater Olympics threats</a></li>
<li><a target=”_blank” href=”https://www.darkreading.com/threat-intelligence/russia-cyber-operations-summer-olympics” rel=”noopener”>Russia aims cyber operations at Summer Olympics</a></li>
<li><a target=”_blank” href=”https://www.darkreading.com/vulnerabilities-threats/paris-olympics-cybersecurity-at-risk-via-attack-surface-gaps” rel=”noopener”>Paris Olympics cybersecurity at risk via attack surface gaps</a></li>
<li><a target=”_blank” href=”https://www.cybersecuritydive.com/news/cisa-secure-our-world-super-bowl/707119/” rel=”noopener”>CISA blitzes Super Bowl with cyber campaign as businesses fumble security</a></li>
</ul>
<p>For more on risk management and incident response best practices:</p>
<ul class=”default-list”>
<li><a href=”https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan”>How to build an incident response plan, with examples, template</a></li>
<li><a href=”https:/

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: