Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Staying Ahead of Nation-State Cyberattacks

Ran Shahor of HolistiCyber Describes Must-Have Defenses
Ran Shahor, CEO, HolistiCyber

As nation-state attackers increasingly aim to steal intellectual property, businesses must ensure they have the best possible defenses in place, says Ran Shahor, CEO of HolistiCyber.

See Also: How to Stop a Potential Ransomware Attack Before it Happens

In a video interview at Information Security Media Group's recent Cybersecurity Summit in London, Shahor discusses:

  • Why nation-state attacks - especially in the private sector - are a growing concern;
  • Top cybersecurity defenses for blocking nation-state attacks;
  • Essential risk-prioritization strategies.

Shahor is the CEO of HolistiCyber. He's a retired Israeli Defense Forces brigadier general, having started his career in the elite IDF special forces unit "Sayeret Matkal," which he also commanded, and later founding the IDF intelligence branch's cybersecurity program. After 27 years of military service, Shahor began working in the private sector. Prior to co-founding HolistiCyber, he founded and served as co-CEO of Focal Energy as well as a managing partner of Star Ventures, a $1 billion global venture capital group.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.