We joined the last Twitter Chat on ‘Cyber Security: How to stay ahead in 2022’, the virtual conversation along with Kingston Cognate, hosted by Industry Expert Sally Eaves, on February 9th at 4pm GMT. Below are our thoughts and some other insights.
What is Kingston Cognate?
Kingston invites and works with a collection of experts on a variety of tech-related topics, from GDPR to AI, Cybersec and more. Combining a number of unique and informed viewpoints, Kingston Cognate shares advice and insights through blog posts, Twitter chats, social posts, interviews and face-to-face events.
This is not a paid role and as such the experts don’t ask for any direct financial benefits.
Kingston Cognate is just a mutual value exchange between Kingston and each industry expert.
The Questions
The Twitter chat consists of a series of questions that the moderator shares over the hour-long chat on Kingston’s official Twitter channel. The Kingston Cognate involved can share their insights by replying to the question, which is shared in the form of a tweet. The Kingston Cognate are free to answer by text, images, videos, memes etc. For SEO reasons, it is advisable to add two hashtags #KingstonCognate and #KingstonIsWithYou to the answers to link the tweets to the ongoing chat.
Here are the questions we answered during the last Twitter chat:
- How, why, and where are cyber security threats changing?
- What threats are keeping CISO’s up at night?
- How can SMB’s better protect themselves? Where do we start!
- Zero Trust What does this really mean & how can it help?
- How does cyber security impact Cloud, IoT, 5G, and tech convergence?
- What role does Endpoint cyber security play?
- How can the world better collaborate to support cyber security?
Q1. How, why, and where are cyber security threats changing?
A1 Ransomware, Identity Theft, Social Engineering and critical infrastructure failures are cybercrimes suitable for the digital era as human behavior and interaction are increasingly influenced by technology.
Moderator: Absolutely spot on @ingliguori its threat convergence at the fore with #ransomware number 1 …
Q2. What threats are keeping CISO’s up at night?
A2 As organizations grow, they are exposed to increased cyber risks, which makes them even more vulnerable. Cyber attacks and threats are very difficult for CISOs to predict. They should focus on Cyber Resilience to ensure a quick recovery.
Moderator: Malware is the second big threat facing small businesses. It encompasses a variety of cyber threats such as trojans and viruses.
Q3. How can SMB’s better protect themselves? Where do we start!
A3 The digital ecosystem of SMEs is a growing target of cyber attacks as they are often linked to organizations’ networks and Supply Chains. To create an ecosystem that is more resilient, collaboration and partnerships are essential.
Q4. Zero Trust What does this really mean & how can it help?
A4 Zero Trust is the ideal Security Strategy against Ransomware. By adopting the Zero Trust model, organizations can experience the right mix between authentication and micro-segmentation that making the target much more challenging for attackers.
Q5. How does cyber security impact Cloud, IoT, 5G, and tech convergence?
A5 As Cloud, IoT, and 5G services are rapidly adopted by organizations to quickly scale up their remote access and collaboration capabilities, potential cyber risks and vulnerabilities arise proportionately. A holistic approach is necessary.
Moderator: Very true! All of these areas under the 5G Landscape need to be carefully examined by businesses.
Q6. What role does Endpoint cyber security play?
A6 Investments in client threat protection are increasing as a result of new threats and the evolution of traditional methods. Companies must work to protect their endpoints by enhancing the integration with the other cybersecurity solutions.
Q7. How can the world better collaborate to support cyber security?
A7 We have the power to defeat cybercrime. We need a global response to address the challenges of cybersecurity. This will require an international effort from governments, businesses and users.
Moderator: We agree! Collaboration is key across all entities to combat cybercrime.
Conclusions
We hope you enjoyed reading. These are just a few insights we shared for the Twitter chat. We publish daily insights and observations on topics related to digital transformation, cyber security, artificial intelligence, data science and so on. If you love technology and want to stay constantly updated, consider following us on Linkedin and Twitter