Digital Transformation

Cyber Security: How to stay ahead in 2022

Cyber Security: How to stay ahead in 2022

We joined the last Twitter Chat on ‘Cyber Security: How to stay ahead in 2022’, the virtual conversation along with Kingston Cognate, hosted by Industry Expert Sally Eaves, on February 9th at 4pm GMT. Below are our thoughts and some other insights.

What is Kingston Cognate?

Kingston invites and works with a collection of experts on a variety of tech-related topics, from GDPR to AI, Cybersec and more. Combining a number of unique and informed viewpoints, Kingston Cognate shares advice and insights through blog posts, Twitter chats, social posts, interviews and face-to-face events. 

This is not a paid role and as such the experts don't ask for any direct financial benefits.

Kingston Cognate is just a mutual value exchange between Kingston and each industry expert.

The Questions

The Twitter chat consists of a series of questions that the moderator shares over the hour-long chat on Kingston's official Twitter channel. The Kingston Cognate involved can share their insights by replying to the question, which is shared in the form of a tweet. The Kingston Cognate are free to answer by text, images, videos, memes etc. For SEO reasons, it is advisable to add two hashtags #KingstonCognate and #KingstonIsWithYou to the answers to link the tweets to the ongoing chat.

Here are the questions we answered during the last Twitter chat:

  1. How, why, and where are cyber security threats changing?
  2. What threats are keeping CISO’s up at night?
  3. How can SMB’s better protect themselves? Where do we start!
  4. Zero Trust What does this really mean & how can it help?
  5. How does cyber security impact Cloud, IoT, 5G, and tech convergence?
  6. What role does Endpoint cyber security play?
  7. How can the world better collaborate to support cyber security?
Q1. How, why, and where are cyber security threats changing?

Q1.jpg

A1 Ransomware, Identity Theft, Social Engineering and critical infrastructure failures are cybercrimes suitable for the digital era as human behavior and interaction are increasingly influenced by technology. 

FLKrgw0WQAQvx9J

Moderator: Absolutely spot on @ingliguori its threat convergence at the fore with #ransomware number 1 ...

FLKtEYoXIAYNffD

Q2. What threats are keeping CISO’s up at night?

Q2

A2 As organizations grow, they are exposed to increased cyber risks, which makes them even more vulnerable. Cyber attacks and threats are very difficult for CISOs to predict. They should focus on Cyber Resilience to ensure a quick recovery. 

FLKt0b7XIA4eGQ5

Moderator: Malware is the second big threat facing small businesses. It encompasses a variety of cyber threats such as trojans and viruses.

Q3. How can SMB’s better protect themselves? Where do we start!

Q3

A3 The digital ecosystem of SMEs is a growing target of cyber attacks as they are often linked to organizations' networks and Supply Chains. To create an ecosystem that is more resilient, collaboration and partnerships are essential.

FLKv9MgXIAQDRQd

Q4. Zero Trust What does this really mean & how can it help?

Q4

A4 Zero Trust is the ideal Security Strategy against Ransomware. By adopting the Zero Trust model, organizations can experience the right mix between authentication and micro-segmentation that making the target much more challenging for attackers.

ZT

Q5. How does cyber security impact Cloud, IoT, 5G, and tech convergence?

Q5

A5 As Cloud, IoT, and 5G services are rapidly adopted by organizations to quickly scale up their remote access and collaboration capabilities, potential cyber risks and vulnerabilities arise proportionately. A holistic approach is necessary.

FLKyplRX0AQ TaM

Moderator: Very true! All of these areas under the 5G Landscape need to be carefully examined by businesses.

Q6. What role does Endpoint cyber security play?

Q6

A6 Investments in client threat protection are increasing as a result of new threats and the evolution of traditional methods. Companies must work to protect their endpoints by enhancing the integration with the other cybersecurity solutions.

Q7. How can the world better collaborate to support cyber security?

Q7

A7 We have the power to defeat cybercrime. We need a global response to address the challenges of cybersecurity. This will require an international effort from governments, businesses and users.

Moderator: We agree! Collaboration is key across all entities to combat cybercrime.

Conclusions

We hope you enjoyed reading. These are just a few insights we shared for the Twitter chat. We publish daily insights and observations on topics related to digital transformation, cyber security, artificial intelligence, data science and so on. If you love technology and want to stay constantly updated, consider following us on Linkedin and Twitter


Print   Email

Related Articles

About Digital Leaders Blog

Digital Leaders is a brand of Kenovy Srl. 

Kenovy Srl provides top-notch Digital Transformation and Innovation Management services on-demand to lead your ongoing and future digital projects.

    Gramsci St., 13 Crispano, Italy
    +39 3316170662
    info@glweb.eu
    www.glweb.eu
    www.kenovy.com
    www.ingliguori.com

 

Contact

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Follow Us to learn more! 

linkedin iconfinder_4102580_applications_media_social_twitter_icon_64px.png iconfinder_5365678_fb_facebook_facebook_logo_icon_64px.png iconfinder_5296765_camera_instagram_instagram_logo_icon_64px.png

 

     

Support our writers