New Delhi/Mumbai, May 27, 2019: The Bad Guys are always ahead in breaching the security walls, but who is the ‘True Alpha’ in this war? The Economic Times CIO Roundtable – powered by HP, witnessed about 150+ CIOs followed by premiere of ‘The Wolf 3’ (
The Wolf-True Alpha), starring award-winning actor Christian Slater (The Wolf), Jonathan Banks (The Fixer), Betty Adewole, at PVR Director’s Cut at New Delhi, Mumbai and Bengaluru.
We often overlook certain organizational blind spots and miss out crucial end-point security areas. In Season 3 of The Wolf series, The Wolf sets out to teach us all another lesson about the dangers of unsecured endpoints.
The flick created in-house by HP Studios team, and directed by Lance Acord, shows the vulnerabilities of printers and how they can fall prey to any adverse attack.
This time instead of making an example out of another unsuspecting company (the first two films in the series involved a Wall Street Investment Bank and a Health Care Firm), this time The Wolf sets his sights on a villainous oligarch, Stefan Torvik.
The idea being that if someone as powerful as Torvik can be taken down, anyone can fall prey. When the story opens, we learn that cyber-security consultant Cecelia Grey has teamed up with her old pal The Fixer to try to bring down Torvik. Their plan involves infiltrating Torvik’s network using an unsecured large format printer at The Port of Europe. They also plan to embarrass him on stage as he gives his keynote address at The World Economic Forum in Switzerland.
In the ensuing chaos, Torvik and his henchmen tries to bring down Cecelia by hacking the IT network at London Airport, the largest and most high-profile client of Cecelia’s cyber-security consultancy.
However, Cecelia realizes that the HP printers she installed last month have a feature built into them that may include information to help them stop the attack. As a result, she can ward off the attack.
At the end, Cecelia also realizes that The Wolf is also trying to bring down Torvik, and The Wolf is a force for good. So, she draws on her past as a black hat hacker, infiltrates the Romanian prison and sets The Wolf free so he can continue to expose all the holes in the system and ultimately help make the cyber-world a safer place.
The movie elevates awareness of the security risks facing businesses and consumers. The Wolf highlights how corporate networks can be hacked and what companies must do to protect themselves. The CIOs praised the movie for its tantalizing script and the message it conveys.
“In today’s hyper connected mobile world, end point security is the weakest link today in enterprise data security. Data is the new currency for success in today’s competitive world. Every employee in the enterprise needs to understand that they play an important role in preserving and maintaining the security of their data. We need to invest time and effort in evangelising the importance of security to end users so that overall enterprise security can be strengthened,” said Sumit Puri, Chief Information Officer, Max Healthcare.
“It was an engrossing and entertaining presentation of a complex technical topic – Information Technology Security. The Wolf has all the elements of a good commercial movie, a story-line, climax and suspense, dramatic and gripping, while never losing the key message – Importance of Security in Printing, and the implications of printer security breach,” said Parwez Anwar, CISO, BCCL.
The movie at PVR was also followed by an interactive session by cyber security expert and famous ethical hacker Ankit Fadia and a security workshop presentation by HP security advisor– Kalpesh Jani.
Ankit explained that why security is a serious business today. He said software, websites or any kind of systems are man-made, they rely on human beings, but a lot of human beings make mistakes by keeping certain points unsecured in their systems. “The criminals are always focussed and finding loopholes in the software, in the systems so it’s a constant cat and mouse game.”
Kalpesh threw light on why it is important to ponder upon end-point security. The endpoint is the weakest link and about 71% of breaches start from the end-point. About 43% of companies ignore printers in their end-point security practices.
“No one notices that the printer is vulnerable, and it is the non-obvious target on your network. HP Inc’s approach to security takes the entire print and document infrastructure into account, beginning with locking down the device and extending into all aspects of device usage and content protection.”
HP Inc’s solutions gather logs from all your endpoint devices, including printers, correlate entries from across your business to find anomalies. They also provide real-time analysis and security alerts,” Kalpesh adds.
Manish Sharma, Chief Project Manager, 9818287188, [email protected]
Source: Economic Times