Intelligent CISO Issue 46 | Page 69

decrypting myths
they exist within another organisation , right ? The answer is , you must , meaning that technology vendors who don ’ t rise to the occasion and implement the same standards as their enterprise customers will lose business , big time .
Stephan Jou , CTO Security Analytics , Interset , CyberRes ( a Micro Focus Line of Business ) to look at consumed APIs . Adopting a Zero Trust mindset will support this . It allows enterprises to maintain control over access to the network and all its instances , including applications and APIs , and restrict them if necessary .
Rory Duncan , Security Go To Market Leader UK , NTT
Last year , as we began to recover from the pandemic , demonstrating effective cyber-resilience has become more crucial than ever . This will continue to be a priority for organisations as we move further into 2022 , as the shift towards permanent hybrid working models for many enterprises will put continued pressure on their ability to detect threats . It ’ s essential that businesses leaders prioritise security , especially as the trusted perimeter expands to encompass remote users .
As businesses consider their 2022 hybrid workplace strategies , they need to revisit and re-evaluate security from the ground up and assess where they may have unwittingly created gaps in their security armour .
Pritesh Parekh , VP of Engineering and Chief Trust and Security Officer , Delphix
Pritesh Parekh , VP of Engineering and Chief Trust and Security Officer , Delphix
With intense scrutiny on how businesses prepare for and respond to breaches , it ’ s clear that security and compliance concerns will be the key determinant for any interactions with third parties – whether customers , partners , or vendors . Following the pandemic , digital guides every third party interaction – potentially exposing data as soon as it moves outside of the business ’ digital walls . Endpoints have become beyond critical when it comes to securing data , but you can ’ t always control your endpoints if
All indications are that AI technologies will be increasingly prevalent in cybersecurity . However , the types of AI that will be adopted in 2022 will be focused on specific , battle-tested techniques such as statistical learning , anomaly detection and ( in a more limited capacity ) NLP . Certain areas of AI research , such as large language models ( like GPT-3 ), will not be heavily adopted in 2022 for cybersecurity . This is because there is not yet a good use case match within cybersecurity for those technologies and also because the computationally expensive and nontransparent nature of these approaches do not lend themselves well to the SOC needs at present .
Helena Nimmo , CIO , Endava
2022 will be a year of acceptance and experimentation . Companies are more comfortable with the idea of pilots and small-scale deployments . Innovation and failure are two sides of the same coin , so expect a number of trials and errors as companies find the model that fits them , but ultimately a far more innovative and differentiated market . We have been Zooming into meetings for nearly two years now . We have a generation of confident digital employees who feel able to challenge traditional structures and are less willing to accept a working model that does not meet their needs .
Innovation , acceleration and adaption will be the driving forces behind how businesses operate and deliver over the coming year . u www . intelligentciso . com
69