search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
advertorial


cybersecurityeurope PAGE 48


MOVE AHEAD STAY ONE


In cyber security, just like chess, winning strategies call for skill, vigilance, and knowledge of your opponent. Martin Borrett from IBM Security explains why.


THERE’S A BATTLE RAGING OUT THERE. ON ONE SIDE ARE CYBER ATTACKERS, on the other are those who defend our privacy and personal accounts – as well as our businesses, economy and national security. Some call it a ‘war without bullets or bombs’. That’s not exactly right; I think it’s more fi tting to say that cyber security is a game. As cyber criminals, nation-state attackers, and


hacktivist groups have become more sophisticated, the security industry has grown up to defend our national security, as well as the vital interests of businesses and consumers. Gradually, the battle between attackers and defenders has become something akin to an arms race: new types of attacks lead to new defences to block them. Security innovations become outdated as soon as


attackers fi nd ways around them. Meanwhile, cyber attackers continue to rely on social engineering tricks that are hard to defend against. Yet for the Chief Information Security Offi cer – CISO – or whoever is in charge of information security in your organisation, cyber security is like a game of chess. There are many pieces to move, and your strategy needs to keep tabs on all of them.


COMPANY INFO IBM SECURITY


IBM Security tackles the world’s most challenging security problems. We continually look for new and better ways to protect the faces behind the data – your customers. Our strategy refl ects our belief that


today’s defences will not suffi ce tomorrow. It challenges us to approach our work, support our clients and lead the industry.


DETAILS | ibm.com/uk-en/security | securityintelligence.com /author/martin-borrett


You must adjust to your adversaries’ moves, move


aggressively against attackers and protect your ‘king’ at all costs. The cyber security game continues; but even as the stakes are rising, the rules are changing. It’s now more complicated than ever. And just as the cost of cyber crime is growing, businesses are faced with further issues: they spend enormous sums of money on cyber security products All of these products have to be installed, confi gured, learned, managed, patched and upgraded. What a nightmare – especially given the shortage of skilled workers to help manage them.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58