Making Sense of the Top 5 Latest Cybersecurity Trends
- LANGUAGE: English DATE: Thursday, September 27, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night.
What’s more important – protecting your systems from ransomware or securing your cloud infrastructure? Should you invest in CEO fraud protection or work harder to prepare for a media fallout after a data breach? Decisions, decisions… Alas, most companies still have pretty limited cybersecurity budgets and simply cannot afford to cover all their grounds sufficiently. Even worse, the dreaded skills gap in IT security is making qualified experts increasingly scarce.
In this webinar, KuppingerCole lead analysts John Tolbert and Alexei Balaganski will talk about the biggest cybersecurity buzzwords to help you separate fact from fiction and make informed decisions about investing in the latest technology trends:
- AI-assisted Incident Management
Machine learning is all the rage in cybersecurity now, but can it really replace a human expert in every case? The quality of every ML-based solution can only be as good as the data used for training and how can we validate that? And who will be responsible for decisions taken by an artificial intelligence?
- Zero Trust approach
Sure, the old “trust but verify” adage is nowadays more popular than ever, but how many CISOs understand the full extent of technological and organizational changes required to pull it off successfully?
- Insider Threat Intelligence
Every business user that has access to sensitive corporate data can, either inadvertently or with a malicious intent, cause substantial damage to your business by leaking confidential information – including your employees, contractors or business partners. Can a network-based UBA solution detect them efficiently or should we look beyond IT infrastructure for the right answers?
- Continuous Authentication
Passwords are dead, biometric methods are easily circumvented, account hijacking is rampant… By combining dynamic context-based authentication with real-time behavior biometrics, the continuous authentication paradigm turns authentication from a single event into a seamless ongoing process and thus promises to reduce the impact of a credential compromise. But does it really solve the problems mentioned above? And what are its privacy implications?
- Embedding a Cybersecurity Culture
Your employees are your company’s most valuable asset and also its greatest security risk. Since C-level executives have replaced system administrators as the most privileged users, hackers are switching to social engineering tactics to make their victims do their job for them. How to make everyone in your company follow the basic cyber hygiene principles? Can technology alone help?
These trends along with many other cybersecurity developments will be extensively covered at the upcoming Cybersecurity Leadership Summits. These summits represent the new thinking that really matters for a secure digital transformation of your enterprise.
We hope to see you in Berlin, Germany this November
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.