loader from loading.io

CISO’s Playbook for Leading Security During COVID-19

Futurum Tech Webcast

Release Date: 05/14/2020

Security Bonanza - Infrastructure Matters, Episode 38 show art Security Bonanza - Infrastructure Matters, Episode 38

Futurum Tech Webcast

In this episode of Infrastructure Matters, hosts Camberley Bates, Krista Macomber, and Steven Dickens discuss recent developments in IT infrastructure, with a focus on security, cloud computing, and data protection. They highlight the enduring impact of strategic partnerships and investments among major companies, underscoring the importance of cybersecurity and cloud solutions in today's IT landscape. They also discuss updates from the NAB Show in Las Vegas, discussions on the significance of sovereign clouds, and the potential ramifications of recent acquisitions in the tech space. Key...

info_outline
How Modern Marketing is Enabling Domino Data Lab to Unleash the Power of AI show art How Modern Marketing is Enabling Domino Data Lab to Unleash the Power of AI

Futurum Tech Webcast

On this episode of Marketing Art and Science, I am joined by Domino Data Lab CMO Thomas Been for a conversation on how Domino is enabling its customers to unleash the power of AI, how marketing is leveraging generative AI to facilitate the customer journey, and how its martech stack is influencing targeting, amplification, and engagement. Our discussion covers: How Domino Data Lab is enabling organizations to unleash the power of AI to transform leveraging marketing.  About Domino’s MarTech stack and AI integration: The CMO’s recommendations on AI (e.g., build the basics, learn...

info_outline
5G Factor: New Cloud, Edge & API Moves show art 5G Factor: New Cloud, Edge & API Moves

Futurum Tech Webcast

In this episode of The 5G Factor, our series that focuses on all things 5G, the IoT, and the 5G ecosystem as a whole, we look at the recent high impact telco cloud, multi-access edge computing (MEC), and APIs moves. The major cloud, edge, and API developments include the progress of Azure Private MEC in supporting manufacturer private 5G network implementations, VMware Telco Cloud Platform Release 4.0 using a horizontal infrastructure approach to ease VNF and CNF deployment and administration, VMware Telco Cloud Platform RAN assisting the optimization of disaggregated RAN functions and...

info_outline
Enterprising Insights, Episode 22 -  Zendesk and Avaya Analyst Day Recaps show art Enterprising Insights, Episode 22 - Zendesk and Avaya Analyst Day Recaps

Futurum Tech Webcast

In this episode of Enterprising Insights, The Futurum Group’s Enterprise Applications Research Director Keith Kirkpatrick discusses the news coming out of the Zendesk and Avaya Analyst Days, focusing on new product enhancements around AI, corporate strategy, and automation. He then closes out the show with the Rant or Rave segment, where he picks one item in the market, and either champions or criticizes it.  

info_outline
Chronosphere partnership with CrowdStrike and the recent acquisition of Calyptia | DevOps Dialogues: Insights & Innovations show art Chronosphere partnership with CrowdStrike and the recent acquisition of Calyptia | DevOps Dialogues: Insights & Innovations

Futurum Tech Webcast

On this episode of DevOps Dialogues: Insights & Innovations, I am joined by Chronosphere’s CEO, Martin Mao, for discussion of the partnership with CrowdStrike and the recent acquisition of Calyptia. Our discussion covers: Chronosphere recently unveiled “Logs powered by CrowdStrike,” a comprehensive log storage and visualization solution, and how embedding CrowdStrike Falcon LogScale within Chronosphere’s cloud-native observability platform helps clients Chronosphere’s recently acquisition of Calyptia, founded by the original creators of the Fluent Ecosystem What’s next...

info_outline
Enterprising Insights, Episode 21-  Google Cloud Next Recap and Industry News show art Enterprising Insights, Episode 21- Google Cloud Next Recap and Industry News

Futurum Tech Webcast

In this episode of Enterprising Insights, The Futurum Group’s Enterprise Applications Research Director Keith Kirkpatrick discusses the news coming out of Google Cloud Next, focusing on new product enhancements around AI, Workspace, and security. He also discusses other enterprise application vendors that made significant announcements this week, and then closes out the show with the Rant or Rave segment, where he picks one item in the market, and either champions or criticizes it.

info_outline
5G Factor: Making AI Open, Responsible, and Transparent show art 5G Factor: Making AI Open, Responsible, and Transparent

Futurum Tech Webcast

In this episode of The 5G Factor, our series that focuses on all things 5G, the IoT, and the 5G ecosystem as a whole, we review the major mobile ecosystem moves to make AI open, responsible, and transparent including Intel’s Enterprise AI proposition emphasizing open industry software for developer productivity, Qualcomm’s Responsible AI vision focus on privacy and security, and Nokia using Transparent AI across its audio portfolio development. Our analytical review spotlighted: Intel Enterprise AI Strategy Emphasizes Openness. At Intel Vision 2024 Intel sharpened its Enterprise AI...

info_outline
Chatting Google Cloud Next, Security Field Day, and Mainframe Advancements - Infrastructure Matters, Episode 37 show art Chatting Google Cloud Next, Security Field Day, and Mainframe Advancements - Infrastructure Matters, Episode 37

Futurum Tech Webcast

In this episode of Infrastructure Matters, hosts Steven Dickens and Krista Macomber cover event highlights from Google Cloud Next, The Mainframe Summit and Security Field Day.  The discussion covers: Highlights from Google Cloud Next including  Google's AI stack and how Google is accelerating execution to capitalize on the market opportunity. Krista covered Tech Field Day’s  Security Field Day where presenting were Aryaka Networks, Zerto (now part of HPE), Palo Alto Networks, and Index Engines,  Security Field Focus on data security, resilience from ransomware, and...

info_outline
Maintain Device Trust with Dell - Futurum Tech Webcast show art Maintain Device Trust with Dell - Futurum Tech Webcast

Futurum Tech Webcast

On this episode of the Futurum Tech Webcast – Interview Series, host Daniel Newman welcomes Dell Technologies’ John Boyle, Director, Platform Strategy, and Amy Price, Senior Manager, Portfolio Evangelist to discuss Dell’s recent study and research report, done in partnership with The Futurum Group, on-device trust and hardware-assisted security. Their discussion covers: How security approaches and priorities have shifted since pre-pandemic times What is driving a deepened focus on hardware security Differentiations in Dell’s approach to security from other PC manufacturers today...

info_outline
Impacts of AI & GenAI to DevOps | DevOps Dialogues: Insights & Innovations show art Impacts of AI & GenAI to DevOps | DevOps Dialogues: Insights & Innovations

Futurum Tech Webcast

On this episode of DevOps Dialogues: Insights & Innovations, I am joined by The Futurum Group’s Stephen Foskett and Keith Townsend, for a conversation on the impact of AI and Generative AI on DevOps, application modernization, and innovative development methodologies. The discussion covers: How the integration of AI, including Generative AI (GenAI), has impacted the efficiency and effectiveness of DevOps practices within modern software development lifecycles Specific examples where AI technologies have enhanced or optimized DevOps processes such as continuous integration, continuous...

info_outline
 
More Episodes

On this special edition of the Futurum Tech Podcast - Interview Series, host Daniel Newman welcomes Mark Hughes, Senior Vice President of Security at DXC Technology to discuss the CISO’s playbook for leading security during COVID-19.

 

The Current Cybersecurity Landscape

 

Cybersecurity challenges and threats are not getting any better or easier to manage. CISOs confront new threats, new threat actors, and new strains of malware and ransomware constantly. We used to be concerned with confidentiality attacks where information was being stolen, but now there is an increasing escalation in targeted attacks like ransomware.

 

To deal with these threats, most companies are spending just enough money to have the framework to stop the most critical attacks. But many companies aren’t overspending on security to be safe. There are trade-offs between the risk-based decisions, but there are two things that are definitely true in the cybersecurity landscape right now.

 

  1. A lot of risks come from malicious intent, but not all so organizations need to be prepared on all fronts.
  2. Threats and risks appear very quickly. Many organizations can be secure one day and under attack the next.

 

CISOs are in a balancing act. They need to mitigate risks as quickly as possible while making sure that the organization is as secure as it can be with a limited budget. It can definitely be tricky.

 

New Challenges with Remote Work

 

Almost overnight, CISOs faced a whole host of new challenges as entire companies moved to remote work as a result of the pandemic. Until now, many companies had a few groups working remotely or were prepared for people to work from their own devices while traveling. They only had a small scale set up to manage little pockets of people, but now companies and CISOs have to do this with the whole organization. The job of a CISO got extremely complicated in the matter of a few days. Every CISO was now asked if the company had the scale and infrastructure to handle this new situation. And if they didn’t have the scale, CISOs needed to come up with a solution — and fast.

 

The second question many CISOs faced was can the security tools operate effectively in the new network environments we are now operating in. Are there particular groups that pose the highest level or risk that need access to critical tools? How do you layer security in a work from home environment so you can manage risk proportionately without hindering productivity?

 

Managing Security Risks

 

Companies have SaaS solutions, open source solutions, open stack, public clouds, private clouds, and a host of other initiatives and programs in use to help employees be productive. But each new program or solution adds a layer of complexity to security. And as much as a CISO might want to, putting stringent security protocols in place isn’t always the answer.

 

It’s a balance between four things: people, process, physical control, and technical control. CISOs need to educate people on the role they play in security. They need to help people understand the process of security. Then there needs to be physical and technical security controls in place that are manageable.

 

If you try to skew your strategy to only one bucket, like the technical aspect, users will figure out workarounds. But if you make sure that people know that security is the thing that needs to be done everywhere, by everyone, at all times, you’ll find more success. Education, however trite it may sound, is key. 

 

If you do this well and do it consistently, you can massively improve your risk posture making a big difference very quickly.

 

If you’d like to learn more about managing your security risk and ways DXC Technology can help, check out their website. Be sure to listen to the full episode below and while you’re at it, make sure to hit subscribe.