Page 7 - ANNIVERSARY EDITION JULY 2022
P. 7

A   g r o w t h   d r i v e r ,   s k i l l e d   your organization, and spending  The vendor also need to identify

     c o m m u n i c a t o r ,   a n d      time  understanding  how  the  and quantify the risks as well as
     revolutionary  IT  professional,       enemy  attacks  can  help  you  mitigation plans and document
     Dr. Mukesh Mehta has 25+ years         build up your defenses and keep  the  business  decision  for
     o f   e x p e r i e n c e   d r i v i n g   your  organization  safe.  This  is  a l t e r n a t e   c o n t r o l s   o r   r i s k
     technology  projects,  concepts        why it is important to decode and  acceptance. This mitigation plan

     & policies. He is best known for       understand  the  fast-changing  and  business  decision  can  be
     his  revolutionary  projects  and      threat landscape.                      signed  off  by  an  authorized
     experiments  in  HCI.  Here,  he                                              individual  who  can  accept
                                            Increasing CISOs/CIOs
     takes a closer look at the need                                               responsibility and accountability
                                            Vigilance around Cybersecurity
     for  proactively  safeguarding                                                on behalf of the vendor.
     o r g a n i z a t i o n s   a n d   h o w   Cybersecurity  vendors  are
                                            expected to help CIOs & CISOs in       Market Predictions
     cybersecurity  vendors  can
                                            protecting  the  confidentiality,       According  to  recent  threat
     assist  C-level  executives  in
     creating  the  ideal  security         integrity,  and  availability  of      reports,  three  of  the  biggest
     roadmaps  for  their  respective       organizations' data and systems,       threats businesses can expect to
     organizations.                         regardless  of  how  the  data  is     see this year include malware on
                                            created,  distributed,  or  stored.    mobile devices, ransomware as
     Creating a Solid Security              They must suggest that security        well  as  attacks  on  the  internet
     Foundation
                                            c o n t r o l s   c a n   b e   t a i l o r e d   infrastructure,  and  60%  of
     Nowadays,  the  attacks  are                                                  organizations  will  embrace  zero
                                            accordingly  so  that  cost-
     massive  and  significantly             effective  measures  can  be           trust  as  a  starting  point  for

     different  than  in  the  past,  when   applied commensurate with the         security by 2025.
     organizational cybersecurity was       risk  and  sensitivity  of  the  data
     similar  to  defending  a  building.                                          Apart  from  this,  the  malware
                                            and  system,  following  all  legal    industry continues to churn out a
     Hence,  it's  time  to  proactively    obligations.

     protect your organization.                                                    wide array of malicious software,
                                            Vendors  must  offer  a  Cyber         particularly  cryptojacking  and
     It can seem like a daunting task       Security  architecture  that           ransomware  programs,  which
     since  it  involves  managing  an      provides  a  framework  for  the       increased  by  75%  and  42%,

     ever  expanding  attack  surface       application of standard security       respectively.  These  programs
     that  entities  constantly  keep       c o n t r o l s .   V e n d o r s   m u s t   make it easier for threat actors to
     monitoring.  But  leveraging  the      document  relevant  data  flows         increase attacks and turn a quick

     information  already  out  there,      (e.g.,  ports,  protocols,  and        profit.  In  the  wake  of  the  above
     creating  a  solid  foundation  of     services)  through  network            developments,  the  cost  of
     monitoring and execution in -          diagrams  and/or  Data  Flow           cybercrime damage is expected

                                            Diagrams (DFDs).                       to  touch  $9  trillion  annually  by
                                                                                   2024.




         Years
         & Counting                                                                                                 July 2022
   2   3   4   5   6   7   8   9   10   11   12