What kinds of attacks are unfolding? What are the most impactful ransomware groups? Which vulnerabilities are targeted? Which nation-states appear to be most active? What threat trends are we tracking in email and network security? We talk about their challenges, as Trellix recently documented in our Mind of the CISO thought leadership – e.g., too many different sources of information (35%), changing regulatory mandates and legal requirements (35%), growing attack surfaces (34%), a shortage of skilled staff (34%), and a lack of buy-in and use from other parts of the company (31%).Īlmost every one of these interactions, directly or implicitly, addresses the nature of the threat environment. We cover a wide range of topics – from global research, innovation, and intelligence to their SecOps teams’ latest cyber defense practices. I spend a great deal of time speaking with board members, CEOs, CISOs, CIOs, CTOs, and other leaders responsible for the cyber defense of nations, governmental agencies, and private sector organizations across industries. Understanding the Risks, Threats, and Vulnerabilities Attackers Are Targeting – and Actively Hunting Them
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |