A demanda e os riscos cibernéticos têm aumentado em uma proporção muito alta, em razão das recentes transformações enfrentadas pelo mundo inteiro. Em consequência disso, a criação de profissionais na área não são proporcionais a estes números.
No Brasil possuímos diversos cenários dentro da cibersegurança, sendo um deles a dificuldade técnica em gerenciar riscos e saber traduzi-los para o Board. Às vezes o timing é muito importante e a empresa necessita começar a gerenciar seus riscos, diz CISO Glauco Sampaio.
Nozomi Networks' Nycholas Szucko compartilha sobre a busca pela educação em Cyber Security para OT e como a transformação digital trouxe um desafio enorme para a indústria. De acordo com Nycholas, não conseguimos proteger o que não conseguimos enxergar.
Para gerenciar os riscos é fundamental levar em consideração olhar um ecossistema maior. Cosan Group CISO Fernando Madureira também oferece dicas para grandes empresas sobre como iniciar o processo de gerenciamento de riscos da cadeia de suprimentos.
O mercado de OT está crescendo cada vez mais. Com isso, faltam profissionais capacitados com as técnicas para exercer tal função. Portanto, as empresas precisam buscar uma forma de atrair e capacitar funcionários para preencher esse espaço.
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
For the seventh year in a row, business email compromise produced the largest losses of any type of cybercrime, according to Steve Dougherty of the U.S. Secret Service. He says organizations need to build and maintain relationships with law enforcement agencies before an attack happens.
The UK Cyber Security Council is responsible for running the cybersecurity industry’s Cyber Certified Professional scheme. The council seeks to set the standard for chartered cybersecurity professionals and align with qualifications and certifications in the sector, says council CEO Simon Hepburn.
Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.
Building out a threat intelligence program is no easy feat for even the largest and most resource-rich organizations, and the challenges are only amplified for smaller companies that have limited budget or personnel, according to AJ Nash, ZeroFox's vice president of threat intelligence.
"I'm concerned that at some point the Russians are going to launch cyber retaliatory attacks against the United States at election infrastructure and the transportation, financial and energy sectors," says Elvis Chan, supervisory special agent at the San Francisco Division of the FBI.
The emergence of remote working, the cloud, and digital transformation initiatives are prompting companies to look toward replacing traditional on-premises firewalls, say Perimeter 81 co-founder and CEO Amit Bareket and CMO Gily Netzer. They discuss the future of securing hybrid work environments.
Chris Borales, senior product marketing manager for ThreatINSIGHT and security solutions at Gigamon, and Tony Morbin of Information Security Media Group discuss the findings of a recent survey of cybersecurity professionals about emerging security trends in 2022, conducted for Gigamon by ISMG.
How does a conglomerate implement PAM across multiple companies? What are some of the challenges, and how can you overcome them? Gonz Gonzales, the CISO at JG Summit Holdings, one of the largest conglomerates in the Philippines, shares his journey of PAM implementation across companies.
Unlocking the data generated by ransomware attacks is helping organizations better understand the risks, adopt defensive technologies and prepare for future attacks, says Wade Baker, partner at Cyentia Institute. He discusses new data on how quickly organizations are remediating vulnerabilities.