Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

12 Most Exciting Cybersecurity Technologies To Watch At Black Hat 2019

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 which cybersecurity technologies they're most excited to see come to fruition and how customers and solution providers will benefit.

Back 1 ... 10   11   12   13   Next
photo

Quantifying Risk In Business Terms

Most cybersecurity professionals still aren't talking about risk being built correctly because they're not considering the actual loss associated with certain events taking place, according to RSA CTO Dr. Zulfikar Ramzan. CISOs are often asked by their board of directors which assets are the most important to protect, but Ramzan said this can be a difficult question for them to answer because the CIOs own the data.

The problem has become even more complex, Ramzan said, as the notion of an asset changes to include more ephemeral objects such as a container that disappears after 17 seconds. Organizations should be leveraging automation to track critical assets, Ramzan said, with a focus on identifying any threats against critical assets that would be expected to result in a high-loss event.

The most successful CISOs tie security capabilities to business requirements or concepts such as exposure to loss, brand reputation and return on investment, according to Ramzan. Boards have been far more interested in breaches over the past half-decade, Ramzan said, as regulatory authorities began holding directors accountable for massive breaches rather than just the CIO.

 
 
Back 1 ... 10   11   12   13   Next

sponsored resources