CISA chief calls for continuous global collaborations to combat cyberthreats

by | Jul 22, 2022 | Technology

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!

In a post-pandemic world, the security landscape has become incredibly complex. We’re now more digitally connected than ever in both our private and professional lives. More technologies are popping onto the scene and enterprises are accelerating digital transformation to meet the demands of an increasingly sophisticated business ecosystem. An example of this acceleration is seen in a McKinsey survey that found that artificial intelligence (AI) technologies could deliver up to $1 trillion of additional value each year in the finance and banking industry.

While trends like digital transformation and hybrid work come with their benefits, they are a double-edged sword, according to Eric Goldstein, assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA).

In an interview with VentureBeat at CyberWeek 2022 in Tel Aviv, Goldstein clarified that the rise of mobile computing, especially among enterprise users, presents a security threat that security professionals need to put at the forefront. According to Goldstein, IT leaders must answer critical questions like: How do we secure our mobile endpoints and drive down attack surfaces for our adversaries, even as we transition to digital?

A clear recommendation is to put security top of mind through the entire security cycle, said Goldstein, who added that organizations, including small and medium businesses (SMBs), must consider moving applications and workloads into a cloud environment. Moving processes to the cloud will help to protect endpoints, he noted. But the war against adversaries cannot be fought alone, with Goldstein reinforcing the need for international collaborations.

“Partnership as the foundational construct of our work is something that you will see reflected throughout today’s conversation,” he said.

Cybersecurity threat actors aren’t constrained by borders

With the knowledge that cybersecurity threat actors are not constrained by borders or geographical …

Article Attribution | Read More at Article Source

Share This