There’s a great scene in the 2012 Bond film Skyfall where M is trying to persuade a panel of cynical politicians of the need for her beloved ‘00’ Section: “I’m frightened because our enemies are no longer known to us. Our world is not more transparent now, it’s more opaque.”
She could quite easily be speaking about the daily challenges facing those of us in the cyber security industry. And for the under-fire CISO assailed from all sides – cybercrime gangs, hacktivists, internal employees, and even their own governments – it can often seem like a frankly impossible task.
That’s why events like the RSA Conference are such a great benefit. It offers an invaluable opportunity for CISOs to exchange war stories with their peers, but also gain access to a stellar line-up of industry experts – there to offer new strategies and insights into how we take the fight to those shadowy online enemies.
Biggest and best
For more than 20 years now, the RSA Conference has rightly established itself as the biggest and best security show on the planet. From the second the doors to the Moscone Center in San Francisco open on February 29, every waking moment will be filled with keynote presentations, technical demos, tutorials, seminars and much more.
I always get a huge buzz out of the show, and know this year will be no different. It’s a great opportunity to meet customers, listen to their challenges and ultimately feed that back into the virtuous cycle of improvement which has kept Trend Micro at the top of its game for more than 27 years now. But we’re also going to be there to share our expertise. I will be talking about how organizations can protect their systems against the rising challenge of zero-day vulnerabilities, and our VP of Cybersecurity Strategy Ed Cabrera, a former CISO of the U.S. Secret Service, will bring his considerable experience to bear on how to manage third-party supply chain risk.
The soft underbelly
M was right – the world is getting more opaque – especially in cyber security terms. If you’re the CISO of a large multi-national company, you’ll likely have a mind-bogglingly complex network of interconnected partners and suppliers to manage. From law firms to HR and payroll providers, POS vendors, PR agencies and cloud hosters – the list is endless. The problem is that this supply chain often represents the soft underbelly of your organization, and the black hats know it. Some of the most damaging breaches of recent years – from OPM to Target – have sprung from an initial cyber-attack against a less well-defended supply chain third party.
Fail to manage risk in the supply chain, and you’re leaving yourself wide open to this kind of island hopping attack. Ed will be discussing how.
As if that weren’t enough to keep you awake the market for zero-day vulnerabilities has grown exponentially over the past few years. With cybercriminals and darknet sites on the one side, government spooks on the other and ‘legitimate’ brokerage services and exploit developers in the middle, it’s never been more important to protect critical systems. In my presentation, I will discuss that virtual patching is the best way to shield vulnerable systems from the threat of zero days and buy you time until a proper patch is issued.
So if you’re one of the 30,000 attendees expected over the week of the show, be sure to swing by to the Trend Micro stand at Booth 1607 to learn more about the Trend Micro difference. And of course, catch our presentations for more invaluable advice on how to minimize infosecurity risk against a landscape of growing threats.
Full session details include:
End Island Hopping Hackers’ Vacation in Your Information Supply Chain
Ed Cabrera, Vice President, Cybersecurity Strategy, Trend Micro
Wednesday, March 2, 9:10 – 10:00 a.m. (Regular session) and 3:20 – 4:10 p.m. (Focus-On session)
Moscone North, Room 131
The Virtual Patching of Zero-Day Vulnerabilities
Raimund Genes, Chief Technology Officer, Trend Micro
Thursday, March 3, 10:20 a.m. – 11:10 a.m. Moscone North, Room 13
from Trend Micro Simply Security http://ift.tt/1phZRZL
via IFTTT
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.