Practice like you play and you’ll be prepared for anything.
While this is a great sentiment for sports, it also applies to IT security in a big way.
In this episode of B2B Tech Talk, Keri chats with IBM Security
Command- Chief of Operations Chris Wilkes
, about the biggest cybersecurity trends we’re seeing in 2020 and IT best practices.
The two also talk about:
- Why fileless malware has become the new norm for cybercriminals
- The impacts of a security breach on the organization and the individual
- How to instill good information security habits in young people
Find out more about IBM Security here
, play Cybersecurity Ops Terminal here
, and read the IBM X-Force Threat Intelligence Index 2020 here
Partners can find more information about IBM Security solutions by emailing email@example.com
"Cybersecurity isn't just a technology problem. It's a business problem." — Chris Wilkes
2020 has been a wild year so far and the IT security industry hasn’t been immune to the turbulence. Although no one could have predicted these national and global crises, we can at least learn from the patterns that brought us here.
So, let’s take a look at how cybersecurity has fared according to Chris and his team at IBM.
4 of the biggest cybersecurity trends of 2020
- Cybersecurity spending has gone up. Due to relatively new regulations like GDPR and CCPA, businesses and government agencies have been pushed to become more sophisticated when it comes to information security. The surge of remote workers has also driven up the spending trend.
- Greater need to fill the cybersecurity skills gap. Currently, there are over 3 million cybersecurity jobs that need to be filled—and fast. As cybercriminals continue to evolve and find vulnerabilities, organizations need to be on top of their game.
- Greater needs for automation and orchestration within organizations. Because of the lack of IT professionals, many security teams are feeling the pressure to do more with less. More sophisticated machine learning and automation can help to relieve this pressure while maintaining productivity.
- Cyberattacks are getting more complex. The scale of information flowing through cyberspace continues to expand. Therefore, the data trails that organizations and their members leave behind are larger than ever and at more risk to having vulnerabilities breached.
Cybersecurity: Train like you fight
With the growing amount of security risks, how can IT pros possibly defend themselves and the organizations they serve?
"A lot of companies are still not prepared for their organization's worst day when they have a major cyber event." — Chris Wilkes
Chris offers some simple but powerful advice: train like you fight.
Have a plan in place. Practice that plan. Teach it to your team and have them practice it. Because the question isn’t if
a cyberattack will occur. It’s when
Learn more about IBM Security and play Cybersecurity Ops Terminal here.
To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. You can also listen on our website.