Future%20of%20Offensive%20Attack%20Simulation%20Shifting%20Paradigms%20%20(2).png?profile=RESIZE_710x

 

As we delve deeper into the digital era, the landscape of cybersecurity continues to evolve at a rapid pace. From the rise of continuous validation to the imperative of secure data lifecycle management, organizations are facing unprecedented challenges and opportunities. In this blog, we explore some of the top predictions for cybersecurity in 2021 and highlight key imperatives for staying ahead of emerging threats.

 

 

Here is the verbatim discussion:

Things are there oh yeah and and and there's another dimension it's not only where the data is but if you start looking at it as a life cycle how does data get created yes is it created in a secure way is it classified and and marked so we know how sensitive it is you know how does it get distributed and how does it die and that's when when I sit and I talk with it folks or or organizations you know HR whatever you know allas all right how do you kill off data and they'll look at me like why would I delete data okay old and inaccurate data it becomes costic over time and now what happens if that inaccurate data also gets exposed that becomes really minutes yes let me ask you this what what are some of your top predictions for 2021 all right um you know first off I'm G to make a prediction about your industry how about this right because it is you know that that continuous um you know validation is important uh especially right now it's predominantly being used on infrastructures right uh to maintain uptime and and you know weed out vulnerabilities I predict within probably two and a half to three years that very very important how are the users and the administrators coming in to do their work right is it set up um I was dealing with um uh a product the other day and it didn't have multiactor or second Factor authentication options for administ there's lots of different things and you know it used to be build whatever you're going to build and then slap on some security at the end right that's the bolt-on security that model fails and it fails spectacularly it fails because it doesn't really protect against risks it isn't sustainable over time against emerging threats it costs a lot at the end of the day between 20 and 200 times versus you know putting security and developing it correctly in the process things are there oh yeah and and and there's another dimension it's not only where the data is but if you start looking at it as a life cycle how does data get created yes is it created in a secure way is it classified and and marked so we know how sensitive it is you know how does it get distributed and how does it die and that's when when I sit and I talk with it folks or or organizations you know HR whatever you know allas all right how do you kill off data and they'll look at me like why would I delete data okay old and inaccurate data it becomes costic over time and now what happens if that inaccurate data also gets exposed that becomes really minutes yes let me ask you this what what are some of your top predictions for 2021 all right um you know first off I'm G to make a prediction about your industry how about this right because it is you know that that continuous um you know validation is important uh especially right now it's predominantly being used on infrastructures right uh to maintain uptime and and you know weed out vulnerabilities I predict within probably two and a half to three years that very very important how are the users and the administrators coming in to do their work right is it set up um I was dealing with um uh a product the other day and it didn't have multiactor or second Factor authentication options for administ there's lots of different things and you know it used to be build whatever you're going to build and then slap on some security at the end right that's the bolt-on security that model fails and it fails spectacularly it fails because it doesn't really protect against risks it isn't sustainable over time against emerging threats it costs a lot at the end of the day between 20 and 200 times versus you know putting security and developing it correctly in the process.

 

Highlights :

Continuous Validation Takes Center Stage: The importance of continuous validation in maintaining infrastructure uptime and mitigating vulnerabilities cannot be overstated. Within the next two to three years, we predict a significant shift towards embedding validation processes into every stage of development and deployment. This proactive approach will enhance security resilience and reduce the risk of costly breaches.

The End of Bolt-On Security: The traditional approach of adding security as an afterthought, known as bolt-on security, is becoming obsolete. Organizations are realizing that this model fails to provide adequate protection against emerging threats and is not sustainable over time. Instead, there is a growing emphasis on integrating security into the development process from the outset. By prioritizing security throughout the development lifecycle, organizations can build more robust and secure systems.

Data Lifecycle Management Comes to the Forefront: Viewing data security as a lifecycle—from creation to distribution to disposal—is gaining traction as organizations recognize the importance of secure data practices. Inaccurate or outdated data poses a significant risk, especially if exposed. Therefore, organizations are increasingly focusing on secure data creation, classification, and proper disposal to minimize risks and ensure compliance with regulations.

Enhanced User Authentication: The importance of multi-factor authentication (MFA) and second-factor authentication options cannot be overstated. Organizations are realizing the critical role of authentication mechanisms in safeguarding sensitive data and infrastructure. The absence of robust authentication measures not only exposes organizations to security risks but also undermines user trust and confidence.

Collaborative Security Practices: Breaking down silos and fostering collaboration between security teams and other departments is essential for effective cybersecurity. By promoting a culture of awareness and accountability, organizations can enhance their security posture and mitigate potential vulnerabilities. Collaboration enables organizations to leverage collective expertise and resources to address complex security challenges.

 

As we navigate the complexities of the digital landscape, cybersecurity remains a top priority for organizations worldwide. By embracing continuous validation, integrating security into the development process, adopting secure data lifecycle management practices, enhancing user authentication measures, and fostering collaborative security practices, organizations can strengthen their defenses against evolving threats. The year 2021 presents both challenges and opportunities for cybersecurity professionals, and by staying vigilant and proactive, organizations can mitigate risks and ensure a secure digital future.

 

Speakers:

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to
the cloud.

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/


Matthew Rosenquist is a seasoned cybersecurity strategist and Chief Information Security Officer (CISO) with over three decades of experience. With a remarkable career at Intel Corporation spanning 24 years, he spearheaded key security initiatives, including establishing Intel's first Security Operations Center and leading cyber crisis response teams. As an influential figure in the industry, he currently serves as the CISO for Eclipz and advises numerous organizations worldwide on cybersecurity, emerging threats, privacy, and regulatory compliance. With a unique ability to bridge technical expertise with business acumen, Matthew is renowned for developing effective security strategies and enabling organizations to navigate complex cyber risks while optimizing security, privacy, and governance.

https://www.linkedin.com/in/matthewrosenquist
https://twitter.com/Matt_Rosenquist

 
 
 
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Best of the World Talks on The CISO's Journey: From Expert to Leader

  • Description:

    We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).

    The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…

  • Created by: Biswajit Banerjee
  • Tags: ciso