Monday, December 4, 2017

Do we cooperate?

It's been 48 years since man put his foot on the moon, but for all those passionate about the galaxy and the space stations there is something that has not changed: the lack of collaboration between countries makes evolution slower than could be. Recently, a piece of news was published that will surprise many: Russia and the US will sign an agreement with the aim of building a space station on the Moon. This installation aims to be the port of departure for manned missions to Mars. Will cooperation have come to the space race?


In the cybersecurity landscape new approaches are emerging to deal with the diversification and complexity of the attacks. In an interview granted by Surendra Singh, Director of Forcepoint in India, at BW Businessworld we know his point of view on the security framework 'People Centric' or what is the same, the security framework focused on people. According to him: "People, processes and technology are the 3 main ingredients that shape the company, the factor of people has been left out of the list of main elements and this can compromise the organization." We are not clear about where the space race will end but what we do know is that in the framework of cybersecurity, cooperation begins to be necessary and the different actors within this plot are realizing this.

For anyone who reads the term 'People Centric' for the first time, it will make sense to know its meaning through one of the national directors of a leading company in this technology: "In any cyber security organization there are 3 main ingredients that shape the company: the people, the process and the technology. However, cyber security has been an area in which suppliers and customers realize that the focus of these types of companies is only to promote technology and the process. The fact of leaving aside the factor of people causes many accounts to be compromised and can also affect organizations to lose important and confidential data. " According to Surendra Singh, the solution is based on training: "I think we should be able to identify any security risk in terms of human behavior and thus be able to prevent any user from seeing their system compromised by cybercriminals."

It´s interesting to know first-hand how a company with a leading technology like Forcepoint was established in the field of security: "We come from a great company called Websense, so we are a known player in the market but with a new brand and a new positioning in the cybersecurity industry. When it comes to defining the work done in Forcepoint, there have been two most popular discussion points. Digital transformation and cybersecurity are the fields in which we have provided our contributions. Both are related to each other because as the world goes digital, cybercriminals gain more opportunities for infringement through personal data and the economy. "

Although Surendra Singh's vision of the sector in the future is not very positive, it is precisely this thinking that drives the success of companies such as Forcepoint: "According to Gartner, the whole world would be losing 2 trillion dollars in 2019 in cybersecurity simply because of the digital transformation. The workforce to give countermeasures to fight criminals and avoid cyber threats is very low. "Precisely, the outsourcing of security departments by companies is what favors companies that offer their services to protect data and perform the analysis and management of the companies' security systems.

Forcepoint defends a system based on the analysis of behaviors as a security measure. Despite being an issue that we have previously discussed in CIGTR, type of strategies are not widespread and remain a novelty in the sector. This is Surendra Singh's answer when asked how she thinks the evolution of the company will be: "Honestly, it is difficult to see how the future would develop because after having worked in the security sector for 20 years, I have seen many new innovations every year. The 'good' continue to develop new technologies to combat the existing risk and the 'bad' are also investing in the power of man and technology. This is a war that will continue for a long time. What can really make a difference is not just technology, but how the governments of several countries are willing to work together. "

When it comes to computer crimes, criminals use the Internet to use false identities and attack random countries. Governments, in such cases, due to extradition treaties, do not share any information to identify the source of the attacks and, therefore, cybersecurity encounters limitations. Once again, this time on the part of one of the national executives of a leading company, the cooperation goes to coalition and is that in the cybersecurity landscape, the union is strength, and if it still does not, it will.

0 comments:

Post a Comment