Network Firewalls, Network Access Control , Network Performance Monitoring & Diagnostics , Next-Generation Technologies & Secure Development

Network Security Strategies for 2019

Trend Micro's Greg Young on the Impact of Threats to OT, IoT
Network Security Strategies for 2019
Greg Young, Trend Micro

OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.

Of all the concerns listed above, Young says his biggest one is about change.

"Threats are going to continue to migrate, and as the threat landscape looks toward shortening the space between the attack and being paid, we're going to see changes there," Young says.

But it's not just a change to the threat landscape, he stresses. It's also a technological evolution.

In an interview about network security, Young discusses:

  • Emerging threats and their impacts on networks;
  • How the technological evolutions influences security;
  • What's needed to improve network security.

As VP of cybersecurity at Trend Micro, Young's focus is on enterprise class security. He is keen on sharing the reality of security in larger organizations, and how business can be done securely in those environments. As a Research Vice President with Gartner for 13 years he advised thousands of companies and governments on how to better secure themselves, evaluated and advised hundreds of security vendors, and has seen those same technologies successfully used, abused, put on a shelf, or pushed into a deep hole and never to be spoken of again.

At Gartner he led research for network security, threat trends, data center security, cloud netsec and microsegmentation. He authored more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits. He headed several large security consulting practices, was CISO for the Department of Communications, and was Chief Security Architect for a security product company.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.