• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • Events
    • Student360
    • Secure360 Twin Cities
    • Secure360 Wisconsin
  • About
    • About UMSA
    • Get Involved
    • Past Events
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Sponsor Presentations
    • Start-up Corner
    • Secure360 Twin Cities Sponsors
  • For Speakers
  • Blog
  • Nav Social Menu

    • Facebook
    • Instagram
    • Linkedin
    • Twitter
    • Vimeo

Secure360

Vulnerability, Breach, and Patch: Break the Vicious Cycle

April 9, 2018 by Richard Ford

Once again, we’ve seen more large data breaches in recent days – Under Armour’s MyFitnessPal app and website lost data of its 150 million account holders, and Hudson’s Bay Company lost five million credit and debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor. These hacks highlight continued focus of cybercriminals to target organizations who hold large quantities of data that can be exploited over a period of time for monetary gains, causing significant concerns to consumers and challenging businesses who have ethical and legal requirement to protect customers data to rethink their current cybersecurity approach.

Sadly, this is the inevitable result of our continued focus on a threat-centric approach to cybersecurity – the walls and moats philosophy that is still common. Instead, we have to renew our focus on the object the attacker is so often trying to steal: our data. Only by augmenting threat-centric approaches with a more user- and data-centered view of the world can hard-pressed defenders keep up with a neverending onslaught of attacks. Deploying static defenses against a continually evolving attacker makes no sense; systems must be able to adapt in real time to different threats. This risk-adaptive protection centered on users and data is the only way defenders have an opportunity to break the vicious cycle of vulnerability, breach, and patch.

Forcepoint in our 2018 Security Predictions report highlighted the expected rise of attacks against data aggregators in the public and private sector. We can expect to see continuation of such attacks with increased frequency in 2018.

Learn more and meet the Forcpoint team at their booth at Secure360 Twin Cities in May!

Filed Under: Guest Posts, Cybersecurity

Richard Ford

About Richard Ford

Dr. Richard Ford is the chief scientist for Forcepoint, overseeing technical direction and innovation throughout the business. He brings over 25 years' experience in computer security, with knowledge in both offensive and defensive technology solutions. During his career, Ford has held positions with Virus Bulletin, IBM Research, Command Software Systems and NTT Verio. He has also worked in Academia, having held an endowed chair in Computer Security, and worked as Head of the Computer Sciences and Cybersecurity Department at the Florida Institute of Technology. He holds a Bachelor's, Master's and D.Phil in Physics from the University of Oxford.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Information Security
  • Guest Posts
  • Business Continuity Management
  • Risk Management
  • Disaster Recovery
  • Records Management
  • IT
  • Cloud and Application Security
  • News and Events
  • Just for Fun
  • Physical Security
  • Incident Response and Forensics
  • Data Security and Analytics
  • Mobile Security
  • Critical Infrastructure
  • Incident Response and Forensics
  • Cybersecurity
  • Professional Development

latest tweets

  1. Secure360 Conference
    Secure360 Conference: An interesting thought, "Good cybersecurity starts from home," from @Forbes. What do you think? https://t.co/iwA2BbjXlm
    about 2 hours ago

  2. UMSA
    UMSA: Looking for security and risk-related collaboration and education for your entire team? Look no further. The… https://t.co/Pll8INGrzk
    about 2 hours ago

  3. Secure360 Conference
    Secure360 Conference: @reach2ratan Thank you so much! Same to you.
    about 2 hours ago

Footer

Contact

For more information about speaking opportunities or general Secure360 information, contact Nicole Stephany

For marketing inquiries or sponsorship opportunities, contact Melissa Harrison.

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
Managed & Marketed by:
© 2018 Secure360. All rights reserved.