Help AG brought together cybersecurity experts at its signature event – Security Spotlight Forum, which plays an ongoing role in raising awareness about the latest cybersecurity trends. At the first Security Spotlight Forum for 2021, the experts shed light on the different methods and technologies organizations can utilize to secure their endpoints and networks as the perimeter becomes blurrier. Two overarching themes emerged during the forum: the importance of making Zero Trust and Secure Access Service Edge (SASE) integral to the organization’s cybersecurity strategy and upgrading visibility into networks and endpoints with advanced threat intelligence powered by artificial intelligence and machine learning.
Nicolai Solling, Chief Technology Officer at Help AG, said at the forum that the prevalence of distributed workforces means that an organization’s perimeter infrastructure must cover not only the headquarters but also branch offices, remote users, mobile devices, services and apps in the cloud, and any other assets that exist beyond the traditional data center. The castle-and-moat approach is no longer sufficient, and organizations need to embrace Zero Trust and security at the edge to stay protected.
Zero Trust Network Access (ZTNA) augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate securely. Moath Alrawashdeh, Systems Engineer at Fortinet Middle East, elaborated on the importance of deploying security-driven networking by dropping legacy wide area network (WAN) infrastructure for self-healing SD-WAN, explaining that secure SD-WAN provides flexible security, improved user experience, and simplified WAN operations.
Secure Access Service Edge (SASE) is another piece of the cybersecurity puzzle in this perimeter-less era. SASE is an emerging framework for the convergence of networking and network security services within a global cloud-based platform. Its benefits include, but are not limited to, zero trust network access, data and threat protection, better performance with reduced complexity, cost efficiency, and improved flexibility.
Visibility is also key to securing an organization’s many endpoints and networks, according to Roland Daccache, Sales Engineering Manager – MEA at CrowdStrike. He explained that because cyberattacks have become much more sophisticated, modern solutions need to combine threat intelligence and telemetry to prevent them from recurring. To drill down on the activities of malicious actors, you need to cross-check the meta-data from your network against high-fidelity intelligence feeds and capabilities to recognize unusual behavior.
According to Rabih Itani, Country Manager, UAE at Vectra, artificial intelligence can be used to drastically improve visibility and prevent threats from turning into breaches. AI-driven network detection and response (NDR) can increase the visibility of actual threats by 197%, reduce alerts by 85%, and reduce mean time to remediation (MTTR) from 60 days to only 4 hours, making it a crucial component.
Jamie Collier, Cyber Threat Intelligence Consultant at FireEye Mandiant, emphasized on the importance of leveraging intelligence-led security across a security function as it can significantly enhance decision-making around areas such as cyber risk, threat hunting, and vulnerability management. He also explained how an intelligence-driven cyber risk assessment can make a prominent difference by focusing detection and response efforts and prioritizing resources for “real” versus “perceived” threats, thereby ensuring efficacy and optimizing security.
Anderson Pereira, Channel Solutions Engineer EMEA at Keysight Technologies, calls for optimizing the organization’s network for an increasingly mobile workforce through the implementation of an active performance monitoring strategy that helps minimize downtime, troubleshoot outages faster, and improve security.
The takeaway of the event was – It is not too late for organisations to start adopting new approaches to cybersecurity that would make them well-equipped with the proper security tools and defenses to tackle all the challenges accompanying the new normal. The perimeter-less era is here to stay, and businesses should become proactive in securing their greatest assets – users and data.
Discussion about this post