Business Continuity Management / Disaster Recovery , Cybercrime , Cybercrime as-a-service
What Should Security Leaders Be Preparing for Now?Troy Leach and John Kindervag Discuss Risk, Ransomware
For the remainder of 2022, security leaders should not ignore current geopolitical tensions, which are going to infiltrate into private sectors, says Troy Leach, security executive in residence at the Cloud Security Alliance. Both the war in Ukraine and conflicts in Asia are "going to be very disruptive, and there are going to be very innovative ways of developing malware because of this," he says.
See Also: Webinar | How the SASE Architecture Enables Remote Work
Therefore, John Kindervag says, "Don't think about cybersecurity and IT as a cost center anymore. Cybersecurity is an enabler of your business. It's as important as any other part of it. Quit being cheap on it." Kindervag is senior vice president of cybersecurity strategy at ON2IT Cybersecurity and the creator of Zero Trust.
In a video interview with Information Security Media Group as part of RSA Conference 2022, Leach and Kindervag discuss:
- Trends in 2022 and beyond;
- How ransomware has affected cyber insurance;
- How a Zero Trust strategy can prevent a ransomware attack.
Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. He sits on several advisory boards as an expert in information security and financial payments. Leach has also founded a consulting practice that advises on the opportunities to leverage blockchain technology, zero trust methodology and various cloud services to create safe and trusted environments. Previously, he helped establish and lead the PCI Security Standards Council.
Kindervag is senior vice president of cybersecurity strategy and an ON2IT Group Fellow at ON2IT Cybersecurity. Previously, he was field CTO at Palo Alto Networks. Earlier, while working at Forrester Research, where he was a vice president and principal analyst on the security and risk team, he created the Zero Trust model. He also previously served as a security consultant, penetration tester and security architect.