One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?
As organizations move...
With the ever-changing challenges around innovation and the ever-increasing changes and challenges on the cyber threat landscape, leaders face daily pressures to maintain visibility with business context and trust in their digital environments. Furthermore, the situation has become even more challenging in recent...
Implementing 'zero trust' and the adoption of SASE does not have to be exclusive of each other. Enterprises can fully integrate their solutions with the SASE model to help simplify security for remote access. It is essential to understand how SASE converges network capabilities and security functions by uniting 'zero...
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of...
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
Randy Trzeciak, director of the CERT Insider Threat Center at...
It's been one of the byproducts of 2020's accelerated digital transformation: IT teams are migrating greater numbers of critical applications to the public cloud to gain the obvious business benefits of scalability, availability and agility.
But what's not always so obvious: The cloud security strategies and tools...
NIST fellow Ron Ross has long been affiliated with risk management and frameworks in support of federal government mandates. Now he's shifting his focus to the future - specifically to what he describes as "the game-changing benefits of DevSecOps." In this session, Ross discusses:
DevOps vulnerabilities
The role...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
It's a given that current economic conditions will result in - at best - "conservative" cybersecurity budgets in 2021. And yet it's also fact that cybersecurity is one of the most important business/government functions, and security leaders are in unique positions to influence policy and spending. How can they best...
The Department of Homeland Security and FBI have their eyes and hands on election cybersecurity, but who's paying attention to securing the actual campaigns? This is the purview of the newly-chartered U.S. CyberDome. In this exclusive session, U.S. CyberDome Executive Director, Brigadier Gen. Francis X. Taylor (Ret.),...
The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:
How NIST approached remote deployment
Lessons...
This brief will cover the latest trends and developments of financially motivated ransomware attacks. We will discuss the latest intelligence observations pertaining to how threat actors deploy ransomware against various industry targets, as well as the latest developments in how the sophistication of ransomware...
Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks. Securing a remote workforce has never been more essential for today's organizations. Workers...
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as...
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers.
Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.