Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019.
There was a time when the corporate security team was responsible for setting the policies for overall security within an organization including digital. Today, those responsibilities are likely to be separated between a Chief Security Officer (CSO) and a Chief Information Security Officer (CISO). This brings into play the views, opinions, needs and requirements of both the CSO and the CISO and the potential conflict that may ensue.
In the simplest terms, the “attack surface” is the sum total of resources exposed to exploit within your enterprise. Defending the attack surface was a lot less complicated when a defined corporate “perimeter” existed, neatly separating a company’s assets from the outside world. But, next-gen technologies (e.g., cloud computing and software-defined networking) have dissolved the perimeter, causing the attack surface to grow exponentially.
An IP camera is simply a computer with a lens on it. In the IoT age, cybersecurity is only as strong as the weakest link in the overall network ecosystem. As a result, cyber hardening is essential for anything connected to the network.
Every organization’s network infrastructure has allowed us to take advantage of smart solutions and other IoT devices to maximize the value of security solutions – not only from a physical security aspect but also from the perspective of operational optimization, which provides an organization with even more value and greater return on its investment. However, simply adding more devices to a network to generate more data and greater awareness isn’t helpful. Because the majority of these devices are network-based at their core, any organization must take caution to protect its network and the sensitive data it contains.
Whether it’s done to meet compliance requirements or just as a general best practice, most organizations are now testing their own networks for security weaknesses, and if they’re not, they should be. The many different types of tests can be confusing for the uninitiated; we will take a look at the common types with their strengths and weaknesses.
The Amphion Forum (www.amphionforum.com) is taking place 28 March in Munich, and will feature a wide variety of experts in securing the "Internet of Things", or any device that connects to the internet but is not a PC.
From building a Global Security Operations Center and more, learn how three enterprise security teams created and built GSOCs, and how they are using them to mitigate global risks. Learn more about why HR Professionals worry most about active shooters, how would you define security’s role, and more.