One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2024708
Date de publication 2020-11-09 12:00:00 (vue: 2020-11-09 13:07:37)
Titre SecTor 2020, Canada\'s Biggest Cybersecurity Event: Day Two
Texte This blog was written by an independent guest blogger. Even though SecTor had to be entirely online this year due to our unusual international circumstances, there have been plenty of excellent talks from many experienced cybersecurity professionals. The talks took place over the course of two days, October 21st and 22nd. Last time I covered the talks I attended on day one. Interestingly enough, the talks all had to do with threat detection and analysis. Maybe that’s just what I’m fixated on these days. The talks I attended on the second day all covered matters businesses must be aware of these days and well into the future. On day two, I learned a lot about how to talk to non-technical executives about security, the unique challenges of cloud security, and the legal implications of cyber threats. Enjoy! How to Talk to the Board About Cybersecurity The first talk I attended on the second day was presented by Jeff Costlow, a CISO with nearly 25 years of industry experience. This is the description of the talk from SecTor’s web app: “With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cyberthreats. Now, it’s looking like they could be here to stay for a while. On top of that, bad actors have wasted no time trying to exploit new vulnerabilities. In the past several weeks, we’ve seen ransomware attacks affect several major organizations. These attacks come on the tail of a surge of attacks across the board brought on during the pandemic, as hackers scanned and took advantage of new workloads, and vulnerable VPN connections and misconfigurations left the gates to the network open. When attacks like these make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? Drawing from nearly 25 years of experience in the security industry, Jeff Costlow, CISO at ExtraHop, will share his top strategies for CISOs to lead board-level conversations about risk management amidst the stark new realities of IT.” When risk enters an organization through devices that the IT department cannot control, securing a network becomes very difficult. Any devices and applications that connect to the network that administrators can’t administrate are considered to be “shadow IT.” This is often a consequence of bring-your-own-device habits, but not always. Jeff Costlow slide Costlow discussed the implications of shadow IT: “All you have to do is Google or use the search engine of your choice. Search ‘shadow IT horror stories,’ and you will find a ton of these. There is the laptop that runs underneath someone's desk. It turns out it's a business critical piece of software that everyone's using, and it's just running on a laptop under a desk somewhere. There are also plenty of stories. These are some of my favorites the ones about somebody just wanted to get their job done. And so they started forwarding all their business email to their Google account or their Yahoo account or something like that. Or maybe a personal Dropbox use. One of my favorites is unapproved chat clients. Or an even worse, operating those chat rooms. This is sometimes called ChatOps. We're inside a chat r
Envoyé Oui
Condensat “all “one “preceding “security “shadow “time “what “with ‘shadow 2020 2021 21st 22nd about accelerated accessible accommodate according account across activity actors actually additionally administrate administrators adoption advantage affect agencies agency agility all allowed already also although always amendments amidst among analysis any app app: applications approach are are also area areas around assessments attack attacks attend attended automate avi aware azure bad basically because becomes been before being beliefs better biggest blog blogger board bodrov both breach breaches breaching bring brought building business businesses but california call called can can't can’t canada canadian cannot cases ccpa certainly chain challenges changed changes charge chat chatops check choice circumstances ciso cisos cisos: civil classification clients cloud come command companies companies: company comply component computing concept connect connections consequence consider considerations considered contact continue control controlled controls conversations core cost costlow could couldn’t countries country course covered covering covid create creating critical customer cyber cybersecurity cyberthreats data date day days decision decisions deeper delegated deliveries delivering department description design desk detection determine development device devices devops difficult discussed discussion doesn't doing don't done down drawing dropbox due during effort efforts email embarking enable enabling enacted ends engine enjoy enjoyed enough enterprise enters entirely especially even event: everyone's everything example examples excellent excited executives experience experienced experiences exploit explore extrahop facing fall farther faster favorites final finally find first fixated focused force form forward forwarding found four from future gates gathered gdpr get global goals going google government great greater greatest greatly guest guidance habits hackers had happen happening has have haven't headlines heightened here highlight his home horror how however i’m identify impact implementation implementing implications importance importantly include including increased independent individual individuals industries industry information infrastructure ingress innovation inside instance interestingly international introduces inventory it's it’s it: its itself jeff job just key know landscape laptop large last lawsuits lawyer lead learned left legal less let let's level leverage leveraging life like like  litigation litigator look looking looks lose lot major make makes making management many matters maybe mean means members methods misconfigurations modifying more most move much must nearly need needed network networking networks new next non not now number numerous objections occur occurred occurs october office offline often once one ones online onto open operate operates operating operation operational operations order organization organizational organizations other others out outbreak outside over overall own owned pandemic panicked party past path payments people personal piece pipeda place plane platform plenty point power practices presented privacy private process processes products professional professionals program protect providers public purposes put putting question quickly rank ransomware read real realities really recent reduction regarding regular regulations rembaum remote removes requires respect responsible review revolutionary right risk risks robot robots room rooms run running runs sad saw scale scanned search second sector sector’s secure secured securing security see seen selection sense servers service services session set several severity shadow shaping share shift should significant since sizes software some somebody someone's something sometimes somewhere sorts sought space specializes stack stanislav stark start started starts statutes stay stop stories strategies strategy st
Tags Ransomware Vulnerability Threat Guideline
Stories Yahoo
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: