NTT\u2019s approach to protecting the event<\/a> involved ongoing threat intelligence monitoring and analysis. <\/p>\n\n\n\n\u201cYou have to remember that the infrastructure at the Olympics is fundamentally different to what you\u2019d have in an office building,\u201d Dirk says. <\/p>\n\n\n\n
\u201cOne example is the sailing\u2026 NTT and a number of our partners actually installed, quite literally, a 55 metre long floating 12K TV out in the water, so people could be standing on the sideline or watching via streamed video and see the sailing that was happening on that very large, very high quality TV. <\/p>\n\n\n\n
\u201cAll of the feeds were coming from the boats themselves, as well as a fleet of drones that were flying above the sailing event, so you\u2019ve got all of these different things happening, which just creates a whole range of [surfaces] that bad guys can attack. <\/p>\n\n\n\n
\u201cSo on the one hand, they might go for a phishing attack. They might get somebody to click a link. But on the other hand, when they look at, say, trying to take those drones out of the air, there could be a whole other way of doing that. It might be a denial-of-service attack, it might be a range of other types of attack at that point.<\/p>\n\n\n\n
\u201cWhat you need to do is really look at what the risks are in the environment, but you also need to establish visibility of the environment. It doesn\u2019t take a rocket scientist to work out that the Olympics are a temporary event, so there\u2019s a whole lot of new IT that turns up literally on the back of trucks to get set up for the Olympics, and then it goes away afterwards.<\/p>\n\n\n\n
\u201cA big part of it was making sure that all of that had telemetry on it, so it could be tracked in security operation centres\u2026 making sure that you can see everything that happens is really important. Understanding the risk is really important. That\u2019s why NTT, over the years, has invested heavily in making sure we know what\u2019s happening in \u2018Bad Guy Land\u2019, and making sure that we can see the threats out there and we can help our customers to protect against those. <\/p>\n\n\n\n
\u201cUltimately, that threat intelligence stood us in good stead for the Olympics, to make sure that we could see the attacks and categorise those attacks quickly.\u201d<\/p>\n\n\n\n
NTT also employed an expert team of over 200 cybersecurity specialists as part of its complete security solutions package. <\/p>\n\n\n\n
\u201c[It took] a combination of smart technology and smart people,\u201d Dirk says. \u201cNTT had 200 people working on this at any one time\u2026 but even with that many people, you were never going to be able to see everything. I mean, 200 people, 450 million attacks, it just doesn\u2019t add up.<\/p>\n\n\n\n
\u201cThe important thing here is that you\u2019ll never have enough people in this game. It\u2019s an asymmetric threat \u2013 as a bad guy, you can launch attacks willy-nilly, and you only have to have one get through to be completely successful. On the defence, you need to be sitting there all day, every day, defending against each and every one, and if a single one gets through, you\u2019re in all sorts of trouble.<\/p>\n\n\n\n
\u201cSo you\u2019ve got to have the right algorithms in place, and you have to have all of the data coming back so you can analyse it accordingly, and then it\u2019s the people plus the technology that make the difference.\u201d<\/p>\n\n\n\n
Et tu, 2032? <\/h3>\n\n\n\n
Dirk says that by the time the Olympics return to Australia in 2032, the cybersecurity landscape could look drastically different. <\/p>\n\n\n\n
\u201cWe\u2019re still 11 years away from Brisbane 2032,\u201d he says. \u201cI mean, take yourself back 11 years and think about what was different. iPhones and Android phones were only a couple of years old back then. That\u2019s how far in the future this is. I think technology and cyberattacks are already changing so quickly that it\u2019s impossible to say, \u2018Here\u2019s what we should expect in that period of time\u2019.<\/p>\n\n\n\n
\u201cI do think the threat isn\u2019t going away. It\u2019s going to be something<\/em>. There\u2019s going to be some degree of people who are trying to profit, people who are trying to disrupt, and perhaps people who are just trying to have fun by attacking the next Olympics. <\/p>\n\n\n\n\u201cWhat I think we, in the industry, need to do is make sure that we\u2019re working with all of the stakeholders to give the best possible consumer experience and the best possible spectator experience in the safest possible way with whatever technology happens to be available at the time.\u201d<\/p>\n\n\n\n
Hear more from Dirk on <\/strong>this week\u2019s episode of the \u2018Jamie Versus The Hack\u2019 podcast<\/strong><\/a>.<\/strong><\/p>\n\n\n\nEach episode, Cryptoloc Founder and Chairman Jamie Wilson takes our clueless Hack through the terrifying aspects of what happens when business\u2019 cyber and data security is breached, often with devastating consequences. Through case studies, expert guests and more, Jamie will build our Hack into a cybersecurity guru. <\/strong>Listen here<\/strong><\/a> or subscribe on Spotify or Apple Podcasts. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"In the latest episode of the \u2018Jamie Versus The Hack\u2019 podcast, we break down how the Tokyo Olympics were protected from an unprecedented onslaught of cyber attacks. The Tokyo Olympics were a triumph of digital logistics. For the first time, no spectators sat in the stands as the world\u2019s best athletes competed \u2013 instead, the […]<\/p>\n","protected":false},"author":3,"featured_media":1095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/888"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=888"}],"version-history":[{"count":2,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/888\/revisions"}],"predecessor-version":[{"id":1136,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/888\/revisions\/1136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1095"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}