Made with FlowPaper - Flipbook Maker
Threat Management Edition Nov 2021 THE FUTURE OF THREAT OPTIV MXDR John Ayers, VP MXDR, OptivOperations teams need to automate all kinds of routine and emergency operations tasks to keep your software running. Most CI/CD tools end once the software is built or deployed, and ops teams are left to use different tools. Effort is duplicated, multiple systems have access to production, and there’s no source of truth. If we’re going to embrace DevOps and break down silos, the ideal solution should put all DevOps automation tasks in a single place. That’s what we’re doing with Octopus Deploy. Octopus Deploy is the first platform to bring deployment automation side by side with IT/runbook automation, bringing your operations team together in a single place. Automating your builds and deployments is great, but it’s not the end of automation. Creating happy deployments at more than 25,000 companies. Break down DevOps silos by centralizing on a single platform octopus.com Release managementDeployment automationOperations runbooksOperations teams need to automate all kinds of routine and emergency operations tasks to keep your software running. Most CI/CD tools end once the software is built or deployed, and ops teams are left to use different tools. Effort is duplicated, multiple systems have access to production, and there’s no source of truth. If we’re going to embrace DevOps and break down silos, the ideal solution should put all DevOps automation tasks in a single place. That’s what we’re doing with Octopus Deploy. Octopus Deploy is the first platform to bring deployment automation side by side with IT/runbook automation, bringing your operations team together in a single place. Automating your builds and deployments is great, but it’s not the end of automation. Creating happy deployments at more than 25,000 companies. Break down DevOps silos by centralizing on a single platform octopus.com Release managementDeployment automationOperations runbooksCopyright @2021 GRC Outlook. All Rights Reserved. The content and images used in the publication should not be reproduced or transmitted in any form or by any means without the prior permission of Grc Outlook. Landon Noah Emily Ava Visualizers editor@grcoutlook.com Sophia Loren Joe TylerAnthony John Editorial staffs Natasha Jacob Managing Editor Vishnu Santhosh Chief Editor Copyright @ GRC Outlook 2021 From phishing schemes to innovations in ransomware, the goal of each attacker is to find gaps in a company’s cyber security armor. However, this fact is still not clearly understood by a large number of businesses. As the pandemic is forcing a remote work culture, the attack surface for cybercriminals has also doubled. Cybercriminals are also adopting a wide array of attack techniques, from spear phishing to crypto-jacking and advanced ransomware. While traditional phishing schemes were designed to trap any user in a specific network, spear phishing targets specific individuals, typically those who have high-level access to sensitive data at an organization. At this point, leading cybersecurity providers are also working to help businesses align with the growing threat management trends and secure the operations from security threats. Modern technology uses AI and machine learning to validate and enhance data through analysis based on their knowledge of attack trends, cyber events, and the TTP of today’s attackers. This way, businesses can be well aware of the threat landscape and prepare for any new attacks. Through attack simulation and exposure analysis, cybersecurity teams can identify and proactively remediate attack vectors ahead of incidents. We’ve developed this special edition on threat management solution providers to make your security posture even more powerful. This edition includes some of the top innovators and valuable cybersecurity insights from the leading security experts and veterans. Are you Ready for the Modern Defensive Posture? Natasha Jacob Managing Editor Sam Morris Sales sam@grcoutlook.com sales@grcoutlook.com EDITOR'S LetterGLOBAL TEL AVIV 2022 E: cyber@cybertechconference.com | W: www.cybertechconference.com | T: +972-74-7031211 18,000 Attendees 180 Speakers 200 Companies 90 Startups 160 Delegations The Cyber Industry’s most Prominent Event is Back Cybertech Global Tel Aviv January 25-27, 2022 // In-Person Conference and ExhibitionCOVER STORY Page No 08 CONTENT PAGE 26 22 18 THE GROWING TRENDS IN HOME DELIVERY IS FUELING PACKAGE THEFT LEVERAGING BEHAVIORAL DATA SCIENCE TO DETECT ADVANCED EMAIL THREATS MODERN THREAT MANAGEMENT: CONNECTING HUMAN ASSESSMENT WITH SUPPORTING TECHNOLOGY Ben Stickle, Ph.D., Asso‑ ciate Professor, Criminal Justice Middle Tennessee State University Dan Nickolaisen, Senior Sales Engineer, Abnormal Security THE FUTURE OF THREAT OPTIV MXDR Joseph A. Hendry Jr., PSP, CLEE, Senior Director On‑site Services navigate360.comThe Company that Lives and Breaths Security Manage your Cyber Security with Ease Comprehensive Detection and Defense Last Line Defense for Cyberattacks For the Hybrid, Multi-Cloud World, Cyber Resilience INTERSEC WORLDWIDE FORESITEATTIVO NETWORKS INTRUSION TRUSTWAVE Jeff Tutton, President Matt Gyde, CEO Tushar Kothari, CEO Joe Head, CTO Eric Harmon, CEO 282016 33 36 42 39 34 30 THREAT MODELING AND THREAT EMULATION DRONE-BASED THREATS PROMPT SECURITY PROFESSIONALS TO PROTECT AIRSPACE AS MORE DRONES COME TO MARKET, SECURITY TEAMS MUST MITIGATE CYBERSECURITY RISKS THROUGH AIRSPACE AWARENESS RE-ASSESSING SECURITY RISK DURING THE RETURN TO WORK SUPPORTING EMPLOYEES’ EMOTIONAL TRAUMA IS PART OF THREAT MANAGEMENT Drew Neckar as Security Management Executive & Consultant at Security Advisors Consulting Group By Stacey A. Wright, CISSP, VP of Cyber Resiliency Services, Cybercrime Support Network Bryson Bort, Founder & CEO, SCYTHE Mary‑Lou Smulders, CMO at DedroneJohn Ayers, VP MXDR, OptivOPTIV MXDR THE FUTURE OF THREAT D espite its undeniable importance for most of companies' security initiatives, the current approach to governance, risk, and compliance (GRC) is still an essentially manual process. Although a necessity ensuing from the ever-evolving rules regarding privacy, environment, and cybercrime, traditional GRC approaches often miss the mark. It rings truer when risks increase, and the inability to mitigate them comes with terrible consequences. GRCare necessary functions within businesses, but companies’ structure these and employ them differently. For example, in some companies, the GRC works as three separate and decreed functions. While some companies feel “I am compliant,” they must be secure.Next >