search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
continue to struggle with today. The book clearly identifi es these challenges and off ers tangible steps for dealing with them. Some of the topics covered


that I would include are: ●


● ● ● So, what can you do to stay ahead in this always-


evolving cyber security game? In fact, nothing you do in isolation will solve the problem – or allow you to ‘win’ the game. In 2014, IBM Security worked with business partner Sogeti to create an e-book that helps organisations navigate these challenges. Called ‘Staying Ahead in the Cyber Security Game’. this practical guide aims to provide CISOs, security professionals and IT executives with an insightful view of key considerations for refi ning cyber security strategies. A lot has changed, of course, since the e-book was published – including the increasing importance of application and cloud security, the emergence of new regulations such as the General Data Protection Regulation (GDPR), advances in cyber crime like crypto-ransomware, and the promise of artifi cial intelligence (AI) in analysing


threats and giving


security operations centres (SOCs) an edge. ‘The cutting edge of innovation’ has, of course,


moved on over the last four years; and yet there is also a lot that hasn’t changed, and there’s still plenty of solid, strategic advice in this book – I think it captures roughly 90% of the biggest cyber security challenges businesses faced a few years ago and


● ● ●


Alignment between security and IT operations in creating a plan for incident response.


Security by design in the software development process.


Shadow IT and how businesses accommodate cloud-based applications to enable workers.


Making security work for users so they don’t need to work around it.


Thinking like an attacker and fi nding your own weaknesses before the bad guys do.


How to recover from a breach – because it is a matter of when, not if.


Learning how to avoid making the same mistakes over and over again.


Adjust to your opponents’ moves, move aggressively against attacks, and protect your ‘king’ at all costs.


I’ve seen the move from theory and speculation


to reality on several of these topics. Response and preparation have become key steps to manage cyber security incidents, but we’re in an era where practice and simulation are necessary. I have found it fascinating to take clients to our X-Force Command Cyber Range and work with them to help prepare. Critical, transformative technologies are being designed and built right now that will have a lasting impact – and are reaching maturity as the security focus has never been more signifi cant. Martin Borrett is IBM Distinguished Engineer and CTO IBM Security Europe.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58