AI-Based Attacks , Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime

Key Security Challenges and Tooling Approaches for APAC in 2024

Research Results Executive Analysis with Fabio Fratucello, Field CTO, International, CrowdStrike

In Q4 2023, CrowdStrike partnered with Information Security Media Group and surveyed more than 350 senior cybersecurity professionals worldwide to gain insights into industry trends and concerns around security tooling in 2024 and offers an opportunity for practitioners to benchmark their organisation against best practice in the field.

The survey report highlights the industry’s leading cybersecurity tooling challenges, including the increasing threat posed by the introduction of generative AI, which is cited by 32% of respondents. On the priority list, however, this new threat ranks behind the need to strengthen cloud security, cited by 48%, and the ongoing leading concern: the critical importance of identity and access security, cited by 52%.

In this executive analysis fireside chat with Fabio Fratucello, Field CTO, International, CrowdStrike, the specific survey results regarding the APAC region are highlighted, including what organisations perceive to be the Key Security Challenges and Tooling Approaches for 2024.

To access the global survey results report, click here.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.