Why Emerging Tech Holds the Key to a More Secure Future

How do you build and operate a security architecture that enables business agility while effectively managing risk? Given the increasing sophistication of attacks, CISOs need a flexible and dynamic architecture that provides security across increasingly complex environments and a changing threat landscape.

In the latest episode of the ongoing Protect To Enable® webinar series, Malcolm Harkins, Chief Security and Trust Officer at Cylance, is joined by Mark Weatherford, Senior Vice President and Chief Cybersecurity Strategist at vArmour, to discuss Why Emerging Technologies Hold the Key To a More Secure Future.

Malcolm and Mark will focus on how current trends in security controls and automation are driving the demand for a new security architecture that adapts in real time to manage new user models, devices, and capabilities with reduced risk, cost, and friction. 

During the webinar, Malcom and Mark will also discuss: 

The 9 Box of Controls, Business Trends, and Emerging Requirements

  • Security Controls: Automation, Risk and Friction
  • IT Consumerization
  • New Business Needs
  • Cloud Computing Access
  • The Changing Threat Landscape
  • Privacy and Regulatory Requirements

The New Security Architecture

  • Trust Calculations
  • Security Zones
  • Balanced Controls
  • New Perimeters for Users, Data, and the Internet of Things (IoT)

Sign up here to register for the online webinar, which will take place on Wednesday, September 6, at 11:00 AM PDT / 2:00 PM EDT.

About Malcolm Harkins

As the global CISO at Cylance, Harkins is responsible for all aspects of information risk and security, security and privacy policy, and for peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks. Previously, he was vice president and chief security and privacy officer at Intel Corp. In that role, Harkins was responsible for managing the risk, controls, privacy, security and (Read more...)

This is a Security Bloggers Network syndicated blog post authored by The Cylance Team. Read the original post at: Cylance Blog