Dez Blanchfield27
Q1: What differentiates a good from a bad cybersecurity program? @ATTCyber #RSAC #SecurityTechTalk https://www.crowdchat.net/s/05sjw
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
A bad program is one that doesn't happen....#CyberSecurity @alcgroup
Dez Blanchfield
the most effective Security programmes are usually those which have full top down enterprise wide endorsement rather than be silo'ed per department / business unit @ATTCyber #RSAC #SecurityTechTalk #ATTInfluencer
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
Yes Dez....you need support of your leadership ...
Dez Blanchfield
@MusicComposer1 - yes indeed.. what examples have you seen that work best in today's challenging fast paced world?
Evan Kirstel
A1 good programs remember that humans are often the weakest link; a simple human error can result in an astronomical problem! #attinfluencer
Kate Brew
A good Cybersecurity program includes the right personnel, processes and technology. A bad one is missing one or more of these :)
✨Sarah Groves✨
A good #cybersecurity program prevents, detects and responds to #Cyber threats giving you the peace of mind so you can focus on the rest of your business! A bad one is one without a set plan. @ATTBusiness @ATTCyber #RSAC #SecurityTechTalk #ATTemployee
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
It's best to focus your efforts and start with the most common types of risks....data breach is No.1 @alcgroup #CyberSecurity
Bob E. Hayes
I see how this works now.... I think a good security program is one that learns over time (ala #machinelearning) regarding the threats.
Javvad Malik v2.0
One that aligns to the actual business objectives and goals. There are many good ways to run a cybersecurity program, but not all of them will be right for your org, your threat model, and your assets. #SecurityTechTalk
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
And phising is a huge attack vector...so carry out regular simulations....once a month...#CyberSecurity @alcgroup
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
@sstoesser Yes Sarah...you need a plan.
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
Another important aspect of security is being ready to respond to incidents. You're going to have a data breach so make sure you practice your response...#CyberSecurity @alcgroup
✨Sarah Groves✨
@bobehayes Definitely agree #AI is the future of #cybersecurity @ATTBusiness @ATTCyber #RSAC #SecurityTechTalk #ATTemployee
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
@evankirstel They are Evan...so training your people and reenforcing the learning is key #CyberSecurity @alcgroup
Kevin L. Jackson - (ISC)2 CCSP, Swansea, UK
.@bobehayes, I understand that #ArtificialIntelligence is top of mind, but how does #MachineLearning play into that? #ATTInfluencer #ATTCyber #RSAC
Javvad Malik v2.0
@MusicComposer1 Definitely agree with this. Many boards are getting wise to the fact that a breach may happen, most don't like surprises, or not having a response plan.
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
@bobehayes Yes...attackers are using AI, so we must use the AI techniques in software to detect attacks. Static firewalls are less effective...we need AI threat management...as in @Office365...#CyberSecurity @alcgroup
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
@J4vv4D You have to accept that you're going to have a data breach....so just like an emergency response first responder...learn your #CyberSecurity first aid.....@alcgroup
Paul Colmer #DevOps 🎸☁️🛰️🚀🇦🇺
@Kevin_Jackson Machine Learning is just another practice subset of AI focused mathematical algorithms...Deep Learning is another practice where we mimic how the brain works with neural networks...both are key to #CyberSecurity protections...@alcgroup
Bob E. Hayes
@Kevin_Jackson - #MachineLearning is a subset of AI... look at the security problems (in the form of data - the criteria) to identify the causes of those problems (the predictors). If you know what predicts security problems, you're better able to manage them.
Dez Blanchfield
@bobehayes - such a great point, how should we start this conversation - board room level or team / group level? @ATTCyber #RSAC #SecurityTechTalk #ATTInfluencer
Javvad Malik v2.0
@bobehayes Great point. Do you think many companies have the relevant data in a ML-friendly form? I guess I'm wondering if many are ready especially when so much is run on spreadsheets and held together by bubblegum. #securitytechtalk @Attcyber #RSAC
Bob E. Hayes
@J4vv4D Good question. I doubt their data are ML ready... but deep insights take time and energy. This is a good reason why management/executives need to budget for security.