Sponsored by Keepnet Labs

Thank you Standard Chartered Bank

Thank you Standard Chartered Bank Dr Ozkaya

Thank you Standard Chartered Bank , next is Comodo Cybersecurity 

This week is my last week at Standard Chartered Bank ; while I am excited to join one of the worlds biggest Cybersecurity firms as CSO and Chief Cybersecurity Strategist , I am thankful for the tremendous experience SCB given me in the Financial sector .

Thank you Bill Winters , Sunil Kaushal for being a wonderful leaders, Rola Abu Manneh , Dr Boutros Klink , your support as CEO’s was always highly appreciated; Ferdie Pieterse one of the best managers I ever had , Our Group CISO Yuval Illuz and whole TDR team , my team but especially Ahmed, Hala and the rest of the team which I could not add to this post , Thank you Standard Chartered Bank.

I will be back in Australia with the family …

Regards

Dr Erdal Ozkaya

Standard Chartered Regional CISO Dr Erdal Ozkaya

Image :Standard Chartered Regional CISO Dr Erdal Ozkaya

Joining Comodo as CISO

I am really happy to announce that I will be a part of the Comodo family. I am really excited to work closely with our founder Melih Abdulhayoglu, a new CEO Ken Levine , and our new Chief Strategy Officer Dave Karp as well as the hero’s of Comodo,  Fatih OrhanMehmet Özer MetinAlan Knepfer and each team member of our Comodo family.

Customers need a better, more integrated and affordable means of preventing the onslaught of attacks!

Comodo Leadership - CISO


Image : Comodo  Leadership Team

THE STORY OF COMODO SECURITY SOLUTIONS (CSS), INC

In a world where preventing all cyberattacks is impossible, Comodo delivers an innovative cybersecurity platform that renders threats useless across the LAN, web and cloud.

The Comodo Dragon platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. It is highly effective at addressing the onslaught of ransomware. Based in Clifton, New Jersey, CSS has a 20-year history of protecting the most sensitive data for businesses and consumers globally. In 2018, CSS embarked on a journey to be the leader in endpoint security.

Today, CSS technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file to be handled accordingly by either software or human analysts. This shift from reactive to proactive makes CSS unique. It allows the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.

This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes a vital reality: while you cannot prevent 100% of malware – you can render malware useless.

Innovative Cybersecurity Solutions to Render Attacks Useless

The Problem

Some things in life are unavoidable, and malware is quickly becoming one of them. According to experts, emerging viruses, worms, Trojans, and other malicious “wares” generate approximately one million new specimens of hostile and intrusive software each day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t. No one can.

Businesses and people must accept that malware cannot be successfully blocked 100% of the time, nor can it be mitigated through mere defensiveness. Undetected threats are now a reality of digital age. And as such, the fight against this robust enemy will require a far more innovative and holistic approach to protection.

The Effect
Data surveys offer a glimpse into just how far down the attack cycle today’s malware has travelled, and the statistics are unsettling at best. As companies continue to zero in on the silver bullet of “protection” without considering the redundancy and impotence of their security layers, the result is a porous security posture with limited capabilities.

An attack cycle consists of four key stages:

Delivery of malware
Pre-execution
Runtime as malware attempts to execute
Post-damage remediation
While a great deal of this threat can be prevented in the first phase, the defense in depth ability to block malware execution in real time—and repair the damage—hovers around 85%. This number simply isn’t high enough to beat the greatest enemy to the world of computing.

The Comodo Cybersecurity Solution
As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive. Without unfettered access and the ability to execute its malicious program, it has no power to breach other systems. But malware does have the capability to penetrate initial security measures, which means it cannot be fully prevented or denied—instead, it must be mitigated through the acceptance of its ability to penetrate even the most well-guarded systems.

While Comodo Cybersecurity solutions offer comprehensive detection services, our real prowess comes from the ability to determine if unknown files entering the system are good or bad, with no sandbox lag time or delayed productivity.

Comodo Cybersecurity

My career update announcement in my blog :

Thank you Standard Chartered Bank   

https://www.erdalozkaya.com/thank-you-standard-chartered-bank/

Thank you Microsoft , here I come Standard Chartered

https://www.erdalozkaya.com/thank-you-microsoft-here-i-come-standard-chartered/

For more info : https://www.comodo.com/comodo-cybersecurity/

https://www.erdalozkaya.com/comodo-ciso/

Thank you Standard Chartered Bank

Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *