Arabian Reseller - May 2021

Page 38

GISEC 2021 //

ARABIAN RESELLER - MAY 2021

ATTACK VECTORS CAN COME FROM VIRTUALLY ANY ANGLE Morey Haber, the CTO and CISO at BeyondTrust, says that threat actors today are fully aware of the attack vectors that work best on remote workers How has the security threat landscape evolved over the past few months? The security landscape over the past few months has evolved from protecting against a breach to having the proper procedures, policies, and disclosures for when a breach occurs. The community has come to an understanding that even with the best tools and diligence, a breach can still occur. We have seen this

happen even with some of the most secure companies and governments throughout the world. Attack vectors can come from virtually any angle and it is not a matter of if they will occur, but rather when they will occur. The security threat landscape has come to the painful conclusion that a proper defense also includes all the steps necessary to triage a breach and notify the appropriate parties when an event occurs. This includes everything

38

from a well-rehearsed incident response plan through having attorneys on retainer for when it happens. It is a change of full defense from previous methodologies of strictly protection. What are the top 3 cybersecurity trends we should be looking out for? The top 3 cybersecurity trends all security professionals should be looking out for include: • Excessive Account Privileges


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.