­
Continuous Security Validation: Reducing Your Organization's Attack Surface By Brad La Porte and Bikash Barai - All Articles - CISO Platform

Continuous%20Security%20Validation%20Reducing%20Your%20Organizations%20Attack%20Surface.png?profile=RESIZE_710x

In this segment, we explore key areas critical to enhancing cybersecurity, focusing on multi-factor authentication and security training. By addressing vulnerabilities and promoting awareness, organizations can significantly strengthen their security posture and mitigate potential risks effectively.

 

 

Here is the verbatim discussion:

Identify the areas that are the most critical to you and I'll I'll pick an example here um multiactor authentication so um anyone that you on the front page of the newspaper you'll see uh organizations that or you'll see that criminals are are having these data breaches and they're stealing uh all these records these records end up being username and password and um and what's end up happening is uh with access of service is criminals are able to just you know their main entry point is credential stuffing and they can use automated tools that just go after an organization and then they just keep trying different combinations uh until they find an access to someone and then they get in they move laterally and get to an administrator so an organization can reduce their attack surface significantly just by having multiactor authentication um and it adds that extra layer of uh security in their environment and then there's other areas that are there but um you know that's the the biggest area um the other area is uh security training overall just making people aware it's a mindset it's a it's a culture and and identifying if I see a fishing email I need to report it and having a process around that and then and then building it over time um so maybe uh doing a simulated fishing exercise that turns into a uh ransing.

 

 Highlights:

 

Multi-Factor Authentication (MFA): Experts highlight the importance of implementing multi-factor authentication as a crucial defense measure against credential stuffing attacks. By requiring additional verification beyond usernames and passwords, organizations can reduce their attack surface and enhance security against unauthorized access.

Security Training and Awareness: The discussion emphasizes the significance of security training in cultivating a security-conscious culture within organizations. Educating employees about phishing threats and promoting a mindset of vigilance can significantly reduce the likelihood of successful cyber attacks. Implementing processes for reporting suspicious emails and conducting simulated phishing exercises can further reinforce security awareness and readiness.

 

Prioritizing multi-factor authentication and security training are essential steps in bolstering cybersecurity defenses. By implementing MFA to strengthen access controls and fostering a culture of security awareness, organizations can mitigate the risk of data breaches and unauthorized access. This segment underscores the importance of proactive measures in safeguarding digital assets and maintaining a resilient security posture in today's evolving threat landscape.

 
 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 
 
 
 

 

 

 

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee