Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, Cloud Computing, News, Erdal in the news
  • Intelligent security is key to fight sophisticated threats

Intelligent security is key to fight sophisticated threats

Cybersecurity Bootcamp Erdal Ozkaya
Erdal2021-10-02T03:03:05-04:00

Intelligent security is key to fight sophisticated threats

By : Adelle Geronim tahawultech.com/
Image CISO UAE

Intelligent security is increasingly becoming vital as GCC CISOs continue to battle against increasingly sophisticated threats, according to experts.

Erdal Ozkaya, Cybersecurity Architect at Microsoft, said, “An alarming number of regional organisations are still using outdated strategies and authentication models, even as international headlines continue to illustrate the intensity of the ongoing battles against bad actors.”

Ozkaya made these remarks during Microsoft’s most recent CISO Executive Series, where industry experts and Chief Information Security Officers gathered to share and discuss current trends in cybersecurity.

As part of the discussion, Microsoft highlighted the results of its latest Security Intelligence Report, which analysed threat intelligence gathered from a global customer base across 100+ countries and millions of computers revealed three important trends in 2017.

The survey delved on the impact of Botnets, and how they continue to affect millions of computers globally, infecting them with old and new forms of malware. The second most notable trend was low-cost attack methods being used by Hackers for potentially higher returns. Third and still trending were Ransomware, which is still does not seem to be slowing down.

The study revealed that 10.2 percent of computers experienced malware of some kind, compared with a worldwide average of about 7.8 percent. Another research conducted by among chief information security officers in the gulf region in 2017, which revealed that 60 percent of regional organisations still use usernames and passwords to authenticate users to corporate networks.

It also showed that only 30 percent use two-factor authentication (2FA) – the combination of username-password with SMS or some other form of mobile notification. About 5 percent said they used facial recognition.

Ozkaya highlighted that intelligent cloud is armed with weapons that help thwart the ever-growing number attacks. “Microsoft will continue to strengthen those capabilities on behalf of our customers, as we progress with forums like The CISO Executive Series, where security professionals can hear from seasoned White Hat experts and likeminded CISOs.”

Along with Microsoft’s security experts, other industry leaders also addressed attendees at the event. Megha Kumar, Research Director at IDC, presented “The Evolving Security Landscape”, and Sheikh Shadab, Associate Director, Head of Cyber Security, KPMG, gave a talk on “Boardroom Engagement and Oversight in Cyber Security”.

“There are malicious parties out there that seemingly never sleeps; so CISOs need to take a 24-7, 360-degree view of cybersecurity,” said Megha. “The challenge has always been to find a workable middle ground between the rigidity of IT policy and the flexibility needed to be an agile, digital business.”

Meanwhile, Mohammed Arif, Regional Director, Modern Workplace and Security, Microsoft Gulf, urged CISOs to create more holistic cyber strategies.

“You need to consider that you will be breached. And then you need to consider what happens next. What do you do? Who do you call? How do you get back on your feet? Never forget that business continuity is as important as the protection of intellectual property.”

The Microsoft Gulf CISO survey also revealed that 24 percent of CISOs said their users had clicked on links within emails and discovered they led to websites of unknown origin.

Only 21 percent reported having a data-classification solution in place, with almost half (47 percent) saying they were still in the process of acquisition and 32 percent saying they had yet to make progress.

“From the boardroom to employees – everyone needs to be vigilant and trained in best practices,” said Sheikh Shadab. “Appropriate technology tools must be complemented by policies that are sensibly and consistently enforced. Only then can organisations hope to adequately protect customers.

Erdal Ozkaya in the news

https://www.erdalozkaya.com/category/about-erdal-ozkaya/media/

By : Adelle Geronim tahawultech.com/

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Be aware: Social Engineering

Be aware Social Engineering – 2007

Be aware Social Engineering Great night with great people who were interested to learn about Social Engineering. Lots of Demos, lots of... read more
Experts covered Cybersecurity end to end Erdal

Experts covered Cybersecurity end to end : 1

Experts covered Cybersecurity end to end The First Global Cybersecurity Research Center Conference was held in Istanbul, Turkey this year, and... read more
Digital Transformation Summit Dr Ozkaya

Importance of Cybersecurity during Digital Transformation : Free Vide0 Training

Importance of Cybersecurity during Digital Transformation Here is my session from the Digital Transformation Summit : Enjoy https://youtu.be/T8S2jv_GNbk Watch it in  You Tube : https://youtu.be/T8S2jv_GNbk More... read more
aeCERT award Erdal Ozkaya

aeCERT award , which makes me Super PR0UD

aeCERT award  Toady is a very special day , I moved to Dubai exactly one year ago today. (2014) And today I... read more

Train your Threat Hunting Skills

Train your Threat Hunting Skills One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a... read more
Superhero CISO Award by Enterprise IT World Erdal Ozkaya

Superhero CISO Award by Enterprise IT World 2020

Superhero CISO Award to Dr Erdal Ozkaya by Enterprise IT World I am proud to announce that I have won the... read more

Malware Incident Response – Awesome Training for Free

Malware Incident Response Learn about malware incident response, including identifying, locating, and removing malware. https://youtu.be/D2zavVqMwwo (more…) read more

Microsoft Offers CISO’s free Intelligent Security

Microsoft Offers CISO's Microsoft recently hosted the third edition of its popular CISO Executive Series in Oman, where industry experts and... read more
Recommended web sites for IT Security Pros

14 Recommended web sites for IT Security Pros

14 Recommended web sites for IT Security Pros As a Trusted Security Advisor at Microsoft, I used to receive if not... read more
CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.