Running Away From Zombies and Better Protecting Infrastructures
Cybersecurity in a Hyperconnected World: By Kayne McGladrey, IEEE Member, and Stephen Cass, IEEE Spectrum Senior Editor
Similar Posts
The COVID-19 Pandemic Has Become a Catalyst for Cyberattacks
An ‘acceptable trade-off’ if bankruptcy is the only other option
Kayne McGladrey (@kaynemcgladrey), Cybersecurity Strategist at Ascent Solutions, said delaying or cancelling security projects is “an acceptable trade-off” only if bankruptcy is the alternative.
“Due to the pandemic, this is the choice that some organizations face today,” he continued. “Other organizations should first prioritize their security projects to mitigate those risks with the highest potential impact to the business. Organizations should then have a difficult conversation about residual risks with their cyber insurance providers, and plan to implement monitoring of those risks not transferred to insurance or mitigated through implementation of technical controls.”
SEC Cyber Risk Disclosures: What Companies Need to Know
In this video interview with Information Security Media Group at the Cybersecurity Implications of AI Summit, McGladrey also discussed:
Why companies should use tools and software to collect and automatically gather evidence of compliance;
The consequences of false cyber risk disclosures;
The impact that SEC requirements have on private companies and supply chains.
Why everyone should consider a career in cybersecurity
Cybersecurity roles support the public good, and help individuals, families and companies stay safe online. People working in cybersecurity are part of supportive teams with great colleagues. Teachers and parents were also cited as inspirational figures for getting involved in technology.
How CISOs Follow The Money
Kayne posits, “If you want to see what your new product features are going to be in the next 12 to 18 months, see where the VCs are spending their dollars. If we’ve seen something consistently in the past, in the past 10 years we’ve seen $30 billion of investment inside of cyber security.”
McGladrey is a gadfly for cyber security leaders to forecast budgets based on the newest in new technology. Whether the CISO in question is a bleeding edge, leading edge, fast follower or back-with-the-pack type executive is up to them. Any which way you slice it, you should be able to see where you are spending money in the future based on where venture capitalists are putting their money now.
Extracting value from data: How the cloud can help
“Where cloud analytics shine is in detecting a repeated series of risky actions by an individual user account [that signal] a business email compromise followed by a ransomware attack,” he said. “Cloud analytics allow organizations to detect and prevent these and other attacks not only at scale but also faster than traditional investigative techniques.”
The SMB Mission: Data Security Without Compromising User Productivity
“Tying data security to user identities is the easiest, lowest-effort way to modernize security for small to medium businesses,” says Kayne McGladrey (@kaynemcgladrey), cybersecurity strategist at Ascent Solutions (@meetascent). “Establishing data security based on user identity means that data remains secure regardless of storage location or medium.”