GISEC 2021 //
ARABIAN RESELLER - MAY 2021
ATTACK VECTORS CAN COME FROM VIRTUALLY ANY ANGLE Morey Haber, the CTO and CISO at BeyondTrust, says that threat actors today are fully aware of the attack vectors that work best on remote workers How has the security threat landscape evolved over the past few months? The security landscape over the past few months has evolved from protecting against a breach to having the proper procedures, policies, and disclosures for when a breach occurs. The community has come to an understanding that even with the best tools and diligence, a breach can still occur. We have seen this
happen even with some of the most secure companies and governments throughout the world. Attack vectors can come from virtually any angle and it is not a matter of if they will occur, but rather when they will occur. The security threat landscape has come to the painful conclusion that a proper defense also includes all the steps necessary to triage a breach and notify the appropriate parties when an event occurs. This includes everything
38
from a well-rehearsed incident response plan through having attorneys on retainer for when it happens. It is a change of full defense from previous methodologies of strictly protection. What are the top 3 cybersecurity trends we should be looking out for? The top 3 cybersecurity trends all security professionals should be looking out for include: • Excessive Account Privileges