Managing the Risks of the Future Internet of Things
ByKayne
Gartner estimates that 63% of all IAM products will be thrown out in the next two years as the ‘requirements have changed’ since the date of original purchase. The challenge for new and existing IAM programs is to establish and maintain a strong justification for the program’s continued existence. One retail client recognized this potential risk to their IAM program and took a novel approach to clearly illustrating the benefits of an IAM program.
In this session, you’ll learn:
– how cyber criminals hack into smart devices, bank accounts, and cloud services
– two easy ways you can protect your family’s accounts
Kayne McGladrey (@kaynemcgladrey), Security Architect at Ascent Solutions, agrees: “Microsoft 365, for example, allows for automatic classification and labeling of unstructured data, but also permits users to provide a justification when the automation gets it wrong.
“Combined with automated data loss prevention, this can allow a business to easily enforce and report on policies for sharing non-public data both inside and outside of their organization,” he says.
“While there’s no real regulation for cloud providers in the U.S., IEEE Senior Member Kayne McGladrey noted that the European Union does have rules on the books under the Digital Operational Resilience Act (DORA), which directly regulates cloud providers serving financial entities in the EU and their ICT providers.”
Cyber Security is still primarily seen as an ‘IT issue’ and this often means that security often gets “bolted on” rather than embedded in a company’s ecosystem. In this panel discussion, discover why everyone within the business is responsible for Cyber Security and how to educate the enterprise on safeguarding customer data.
Until we change how we talk and think about cybersecurity, I fear it’s like the Alcoholics Anonymous definition of insanity: doing the same thing and expecting a different result.