Made with FlowPaper - Flipbook Maker
Udi Mokady, Founder, Chairman & CEO Enterprise Security Israel Edition Jan 2022 PRIVILEGED ACCESS. TAILORED FOR YOUQUARANTINE UNINSTALL One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialRANTINE KILL PROCESS PATCH INVESTIGATE ALL REMEDIATE One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialCopyright @ GRC Outlook 2022 As the pandemic is forcing a remote work culture, the attack surface for cybercriminals has also doubled. However, this fact is still not clearly understood by a large number of businesses. From phishing schemes to innovations in ransomware, the goal of each attacker is to find gaps in a company’s cyber security armor. Enterprises need a broader set of security tools and a more unified but still flexible security framework to protect the most critical information. While security experts strive to achieve the highest level of security, hackers are also not behind. From endpoint security solutions to AI-enabled authentication features taking the place of the modern security architecture. Still, businesses are becoming victims of cyber-attacks in one way or the other. Cybersecurity experts and firms conduct conferences, security meetups, and sessions to tackle this ever-increasing challenge. One such upcoming event is Cybertech TLV a 3-day event comprised of two main parts: a conference featuring top speakers from around the world, and an impressive, grand exhibition, which offers participants and visitors the chance to get acquainted and mingle with cyber leaders. With a vision to make our readers aware of the growing threat landscape and express our commitment to modern cybersecurity, we’ve created this special edition on Enterprise Security Solution Providers in Israel 2022. We hope this edition adds value to enhancing your security posture. We are Committed to Your Cybersecurity! Natasha Jacob Chief Editor EDITOR'S Letter Copyright @2022 GRC Outlook. All Rights Reserved. The content and images used in the publication should not be reproduced or transmitted in any form or by any means without the prior permission of Grc Outlook. Landon Noah Emily Ava Visualizers editor@grcoutlook.com Sophia Loren Joe TylerAnthony John Editorial staffs Sam Morris Sales sam@grcoutlook.com sales@grcoutlook.com Vishnu Santhosh Managing Editor Natasha Jacob Chief EditorGLOBAL TEL AVIV 2022 E: cyber@cybertechconference.com | W: www.cybertechconference.com | T: +972-74-7031211 18,000 Attendees 180 Speakers 200 Companies 90 Startups 160 Delegations The Cyber Industry’s most Prominent Event is Back Cybertech Global Tel Aviv Conference and Exhibition March 1-3, 2022COVER STORY Page No 08 Udi Mokady, Founder, Chairman & CEO PRIVILEGED ACCESS. TAILORED FOR YOUCONTENT PAGE Maximize Security Control Fights Against Phishing SAFEBREACH IRONSCALES Peter Bauer, CEO Eyal Benishti, Founder & CEO 30 26 Forensic Identity Intelligence AU10TIX Carey O’Connor Kolaja, CEO 16 Continuous End-To-End Cybersecurity Posture Management On-Premises, Cloud Services and Cloud Platforms CYBER OBSERVER Shimon Becker Co-Founder & CEO 20 18 3633 23 28 MANAGING SOFTWARE RISK IN THE DEVOPS ERA WHY POINT SOLUTIONS IN CLOUD SECURITY DO NOT EFFECTIVELY PROTECT AGAINST A DATA BREACH, BUT A HOLISTIC SECURITY POSTURE CAN WINNING WITH A STRONG CYBERSECURITY CULTURE CAN HARDWARE SECURITY MODULES (HSM) LOWER YOUR INSURANCE COSTS? LEVERAGING BEHAVIORAL DATA SCIENCE TO DETECT ADVANCED EMAIL THREATS Brad Beutlich, Vice President of Western and LATAM Sales at nCipher Security Dan Nickolaisen, Senior Sales Engineer, Abnormal Security Shafayet Imam, Founder/CEO, BrillianSe Group Glori Euwer, CISSP, IAM CISO TMF Health Quality Institute Cindy Blake, Senior Product Marketing Manager, Security Specialist, GitLabC ompromised passwords have been attributed to 3rd-party data breaches for years. Even today, credentials remain one of the most sought-after pieces of information for hackers, and it’s still proving to be effective in their attack efforts. Research reports states that more than 80% of security breaches are due to compromised privilege credentials. In a nutshell, privilege credentials open a lot of doors. When the keys to those doors are mismanaged, a hacker has the potential to access a huge set of information. Securing these doors is CyberArk Software, a company that offers solutions to address a wide range of use cases to secure privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between. With CyberArk, businesses can isolate and stop privilege attacks before they can do harm. Udi Mokady is the Founder, Chairman and CEO of CyberArk. Based on his strategic vision and deep cybersecurity experience, Mokady has established CyberArk as the global leader in Identity Security. As the established leader, CyberArk offers the most complete Identity Security Platform to secure all identities from end-to-end. According to the company, preventing malicious account or credential access starts with sound privileged access management to keep a business and its most valuable assets secure. The CyberArk advanced solution automatically discover, and onboard PRIVILEGED ACCESS. TAILORED FOR YOUCOVER STORY What makes the company stand out is a security-first approach with productivity-first performance Udi Mokady, Founder, Chairman & CEONext >