Source |
AlienVault Blog |
Identifiant |
1467074 |
Date de publication |
2019-11-14 14:00:00 (vue: 2019-11-14 15:07:17) |
Titre |
Cybersecurity: top of mind Q and A |
Texte |
I really enjoy Shira Rubinoff's videos, and captured one of them in case you prefer reading to watching videos. Please find snippets of this commentary in the AT&T Cybersecurity video series with Shira Rubinoff interviewing me recently.
Episode #6 - @attcyber Video Series
With @twaskelis AVP @attcyber
Discuscussing:Issues we are facing in #CyberSecurity today
Full video��https://t.co/1GxIQVAeJ0#ai #attinfluencer #Security@sstoesser @BinduSundaresan @BJWebb4 @saritasayso @MoKatibeh @eisaiah_e @ChuckDBrooks pic.twitter.com/VuJfAsoSYH
— Shira Rubinoff (@Shirastweet) October 24, 2019
Q1: How will CISO’s investments change in 2019? What areas of cybersecurity do they see receiving more funding?
Many large and mid-size businesses are recognizing security requires more than just a technology investment. Service organizations bring technology, expertise, and resources to the table in a way that may be a more cost-effective alternative to trying to manage all this internally
Lack of resources as a major challenge along with keeping up with advancements in cybersecurity technology by utilizing outside service providers rather than hire, retain, and manage staff
For the CISO, this translates to set a big picture of priorities such as maintaining customer trust and keeping the organizations name out of the headlines. In order to accomplish these priorities, there are essential areas where security executives will spend their time, and money in 2019
Develop a culture of security: The culture must go together with policies and best practices. Every single person within the organization has some responsibility for security
Security and Risk Management: Governance and resource requirements, security frameworks, data protection, training and awareness, insider threats, third-party security practices as outsourcing increases
Cloud Services: Cloud strategy, proper selection of services and deployment models. Scalable and |
Envoyé |
Oui |
Condensat |
#attinfluencer #cybersecurity #security@sstoesser “trust 000 2019 250 @attcyber @bindusundaresan @bjwebb4 @chuckdbrooks @eisaiah @mokatibeh @saritasayso @shirastweet @twaskelis ability about acceptance accommodating accomplish across activity adopting advancements all alone along alternative appetite applications appreciate approach archaic are areas asking asset assets assumptions at&t attack attempted avp aware awareness based because become becoming beginning being best better between big biggest both bridge bring budget building business businesses but can can’t cannot capabilities captured case center challenge change ciso ciso’s cisos clients close cloud clouds co/1gxiqvaej0#ai com/vujfasosyh combination comes commensurate commentary companies compliance computing concept concern concerns conducts considered continually controls cost culture customer cyber cybersecurity cybersecurity: data days decision defense demarcation dependent deploy deployment detect detection develop devices didn’t digital discuscussing:issues down driven during easier effective effectiveness elastic enabled enjoy enough entities environment environments episode essential essentially even every everyone evolution executives expect expertise exponentially exposed faced facing fact fear feel find first forward frameworks full fully functions funding gain gap generates get getting give goal going governance grace grasp great greatly hacked hackers happens hardware has have having headlines heard hire hit hours how hub human idea impacted implementations impossible improve increases increasingly information initially insider intelligence internal internally internet interviewing investment investments invests iot issue issues it’s item its job just keep keeping lack large latest led less lessened leverage like live logs longer looking maintaining major making manage management: managing many market maturing may mechanisms members mentality mid mind mobile models money monitor more move multiple must name need network never new not now october often one open operations order organization organizational organizations out outside outsourcing over parallel party people per perimeter perimeter: perimeters person perspective pic picture platforms: play please point policies possesses possible practices predictive prefer premises prevent priorities private problem progress proper protection provided providers public q1: q2: q3: q4: range rather reading real really receiving recently recognizing report requirements requires resource resources respond responsibility result results retain review right risk role rubinoff rubinoff's safe saving scalable scales secure secured security security: see seeing selection series service services services: set shifted shira should shouldn’t single size skilled slow small smaller snippets soc solutions some sometimes sophisticated spend spending spread staff standalone strategy such sure table tactics task team teams technologies technology than thanks them then there’s these third those threat threats tide tiers time today today’s together top traffic training transaction transactions translates trust trust/always trusted trying twitter ultimately unauthorized understand understanding unified us” users utilizing vendor verify video video��https://t videos virtual visibility watching way ways what when where which whose will within work you’re your zero zone |
Tags |
Threat
|
Stories |
|
Notes |
|
Move |
|