Build a resilient network: What I learned from 5 thought leaders

While you might have mastered enabling a remote-first workplace thanks to the COVID-19 pandemic, keeping the systems, data and applications within your network safe presents another set of challenges.
The ever-evolving threat landscape is seeing cybercriminals and scammers get savvier and more audacious by the minute, in turn, compelling organizations to implement proactive and error-proof network security strategies.
We recently floored our 2024 editorial summit Strategies for a Resilient Network, aimed at helping IT professionals design and manage an agile and secure network infrastructure.
Our speakers provided insights to help guide viewers toward achieving optimal network resiliency.
Kevin Tolly, founder of The Tolly Group, presented how hacker use of AI will impact ransomware attacks.
As traditional defense strategies can fall short in responding to ransomware attacks today, Tolly recommends that organizations explore collaborative architecture.
This architecture involves effort between network security elements and data storage subsystems to detect, block, and mitigate ransomware attacks in real time.
Amritha Arun Babu, a technical product management leader, who has worked for companies like Amazon and Wayfair, tailored her session to product managers.
Arun Babu focused on how PM leaders can empower stakeholders while collaborating cross-organizationally to deliver priority products that meet security needs.
She pointed out the differences between communicating with executives and developers, explaining that executives prefer high-level information to understand business value while developers look for technical details.
PMs should develop skills in communicating to both audiences effectively to avoid roadblocks during product development.
Review more tips from Arun Babu in the full presentation here.
Krishendu De, head of information security at CESC Limited, delved into how organizations can enhance network performance with SASE. De provided an overview of the benefits of SASE, the problems the technology aims to address, SASE use cases and key factors to consider when selecting a provider.
Go to the session for a complete look at SASE. Independent resilience consultant and writer Paul Kirvan guides viewers through integrating sustainability and green technology into a network infrastructure.
In this presentation, Kirvan also addresses environmental impact of network infrastructure, certifications useful when building a resilient network environment and encourages organizations to align network resilience efforts with their broader sustainability goals and initiatives.
Check out the full session for guidance on going green.
The theme of this presentation was that cloud security is everyone's responsibility and he reinforced this message by highlighting these seven cloud misconfiguration remediation strategies: implementing cloud governance, upskilling employees, leveraging cloud security posture management, developing policies and templates, automating security and configuration checks, monitoring, and auditing changes, and implementing technical security controls.
Access the full presentation here for additional insights and to view CSPM product demos.
Prior, Natasha served as the director of audience development at TechTarget.
Natasha also co-leads diversity, equity and inclusion initiatives across the organization.


This Cyber News was published on www.techtarget.com. Publication date: Thu, 09 May 2024 14:43:06 +0000


Cyber News related to Build a resilient network: What I learned from 5 thought leaders

Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
2 weeks ago Cybersecuritynews.com
Build a resilient network: What I learned from 5 thought leaders - While you might have mastered enabling a remote-first workplace thanks to the COVID-19 pandemic, keeping the systems, data and applications within your network safe presents another set of challenges. The ever-evolving threat landscape is seeing ...
1 year ago Techtarget.com
The Psychology of Social Engineering - What Security Leaders Should Know - Creating a security culture that addresses the psychological dimensions of social engineering requires a fundamental shift in how security leaders approach human vulnerability. When examining security incidents, leaders often focus on which technical ...
3 months ago Cybersecuritynews.com
Automating Incident Response - CISO's Efficiency Guide - For technical leaders, implementing effective incident response automation represents an opportunity to transform security operations, dramatically reduce mean time to resolution (MTTR), and enable teams to focus on high-value activities rather than ...
3 months ago Cybersecuritynews.com
Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
1 year ago Esecurityplanet.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
1 year ago Securityboulevard.com
Security takes a backseat as CTOs and CIOs lean towards AI in 2024 - 35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to Exclaimer. The survey results show that 2023's biggest challenges for IT ...
1 year ago Helpnetsecurity.com
Why Security Leaders Are Turning to AI for Threat Detection - With cyber attacks growing in complexity, AI offers the ability to analyze vast amounts of data, identify subtle patterns, and detect anomalies in real-time capabilities that traditional security approaches simply cannot match. Security leaders ...
3 months ago Cybersecuritynews.com
Why 78% of Security Leaders Are Rethinking Their Entire Cyber Strategy in 2025 - By building security strategies that acknowledge the realities of today’s threat landscape while aligning with business objectives, they’re positioning their organizations to thrive despite the challenging security environment of 2025. ...
3 months ago Cybersecuritynews.com
The Psychology of Social Engineering - What Security Leaders Should Know - Creating psychological resilience against social engineering demands that security leaders adopt a fundamentally different approach to human security aspects. Effective security leaders understand that building true organizational resilience requires ...
3 months ago Cybersecuritynews.com
Building a Resilient Cyber Defense - CISO Strategies Unveiled - By bridging technical and business domains, modern security leaders create defense systems that adapt to evolving threats and changing business priorities. By combining strategic vision with tactical execution, security leaders can create defense ...
3 months ago Cybersecuritynews.com
Failing Upwards - One of the phrases my early boss in pentesting taught me and adopted was failing upwards in a career. This leads to hard decisions between hanging up part of your subject matter expertise and focusing on managing and leading teams or do you continue ...
1 year ago Blog.zsec.uk
CVE-2016-2084 - F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 build 685-HF10, 11.5.1 before build 10.104.180, 11.5.2 before 11.5.4 build 0.1.256, 11.6.0 before build 6.204.442, and 12.0.0 before build 1.14.628; BIG-IP ...
9 years ago
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
1 year ago Helpnetsecurity.com
How Digital Forensics Supports Incident Response: Insights For Security Leaders - This article explores how digital forensics enhances incident response, the essential techniques involved, and practical strategies for security leaders to implement robust DFIR capabilities. Digital forensics focused on the collection, preservation, ...
3 months ago Cybersecuritynews.com
CVE-2021-47363 - In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a ...
1 year ago Tenable.com
How to Integrate Security into Agile Dev Teams - By demonstrating persistent attention to security culture, practices, and outcomes, leaders signal that security integration is not a temporary initiative but a fundamental and permanent aspect of how agile teams operate and deliver value to ...
3 months ago Cybersecuritynews.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
3 months ago Cybersecuritynews.com
CVE-2023-35947 - Gradle is a build tool with a focus on build automation and support for multi-language development. In affected versions when unpacking Tar archives, Gradle did not check that files could be written outside of the unpack location. This could lead to ...
1 year ago
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
1 year ago Cybersecuritynews.com
The Role of Threat Intelligence in Proactive Defense - Threat intelligence has emerged as a crucial component in this proactive defense strategy, empowering leaders to make informed decisions, allocate resources effectively, and foster a culture of cyber resilience. By prioritizing threat intelligence ...
3 months ago Cybersecuritynews.com
CVE-2017-7923 - A Password in Configuration File issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 ...
7 years ago
CVE-2017-7921 - An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build ...
7 years ago