LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
What are the emerging cybersecurity threats that you see and how is photo addressing it from an innovative perspective like an AI to address these threats? Well, thank you for the opportunity to come and talk. I appreciate it enormously our wonderful partnership that we have together. So yeah, in terms of in terms of cyber security threat landscape, it's a constantly dynamic landscape, constantly emerging threats that are that are evolving as the threat actors try to innovate to gain access to our clients environments. So our role is to make sure that we stay abreast of those changes, make sure that we are. Continuing to innovate with the with the tools to then drive the detection, but also to educate our clients with our offensive security piece to challenge their environment using those latest techniques so that they can learn themselves how to then interpret the outcome of the existing tool stack to, to the benefit of this cyber security posture. So a lot of it is research, understanding the the, the, the threat actors, the evolving landscape and then really. Looking to utilise the very latest approach in order to give effective defensive posture, employing mathematics where possible. But also optimizing the output of the the detection strategy so that the analyst, the human element of the consumption is, is optimised and it's very easy to determine the signal in the noise. You, we are starting to see a lot of drive towards regulatory compliances and frameworks around that, especially in Saudi Arabia with Osama and NC compliances. So how do you see yourself as portra addressing this requirement in this need and what kind of investments are you looking into this direction? So there's a, you know, there's a lot happening in the Kingdom, right? There's not happening. So we're in the very final stages of creating our business entity in the in the Kingdom. That's a requirement of the government for American companies that want to do business here. So we're very excited about that. That's literally in the in the very final stages. Now to do that gives us a, a presence here in the Kingdom. Demonstrating our commitment, we continue to recruit in the Kingdom. In fact, at the at the Black Hair event here, I have a new starter working on offensive security who's joined us for for the event. And I also have a second new starter. He's a technical lead on that, on that tool set as well. So, so we continue to grow our team locally and make sure that we're that we're relevant. So that's one element of the regulatory framework. So the other one is actually the demands put on our client base, the ministries, the banks, the the telcos and so on to, to ensure that they are having a robust security posture. And they're testing that security posture in a way which enables them to support the weaknesses of the investments that they've made historically and where they have opportunity to improve so many of the new regulatory frameworks that are coming through from the monetary. Authority or from NCA and so on include elements of red teaming, advanced pen testing, use cases and of course we provide the tools for either consultancies or the defending organization to have their own red teams and and and and and fulfill upon their requirements and obligations under those regulatory frameworks. So I think we're very, very well positioned. I'd say the other element which Fortera is very committed to is in our portfolio of. Of both offensive and defensive tools having on premise options and here in the Kingdom there is a polarisation about about cloud and and the the deployment form factor for tools. So maintaining our commitment to on premise tools things like military grade e-mail gateways is it's it's demonstrating again our ongoing commitment to the Kingdom the regulatory frameworks and the value that customers need from their always. So we see a lot of emphasis and. Interest going towards the collaborative workspace in terms of different vendors trying to work together to address the cyber security requirements of the tasters in the region. So how does Portra see itself engaged in this activity in terms of your ecosystem around different vendors and what have been your initiatives to address that? It's a good question. So Fortress strategy as as you know has been to acquire a number of companies to build a portfolio of. Rules to to really if you like almost pre integrate some of the tools into a deliverable which allows easy adoption for our clients. But the reality is that no customer is ever going to be wall to wall Fortier only because we don't cover every element of cyber security. So you know, they will have, they will have firewalls, they will have a seam, they will have, you know, various other elements. So it's very important as a vendor in this ecosystem. To make sure that our, our tools are open, that we expose APIs that are tools generate outputs in industry standard formats and that they are, they are consumable by other tools for holistic solution for a client. And so we, we, we maintain our commitment to that and each of our tools individually have to compete in their own market space and do so very effectively. But they work very nicely together with other portrait tools but with other third party tools as well. I see that photo has been regularly participating in the black. Conferences based in Saudi Arabia so black at 2024 what are your expectations and what do you see something that would definitely look forward to in the region for you. Yeah, it's an incredibly exciting show It's what I particularly like about this event in this region is the government endorsement and the encouragement by the government to have government related entities and regulated entities come and learn come and come and plan your strategy for the following year so for us it's. Very, very important event to attend. We, you know, we've made a big investment in terms of our own stand as, as as well as with our partners. And I feel that the, the, the great advantage of being here is that you get so many senior and high level decision making participants from from across a very broad spectrum of industries and, and that gives us the opportunity to expose all of our innovations to a very wide audience. And actually we're delighted because we've been invited to speak in, in one of the keynote tracks and we have one of our offensive security specialists coming to talk about some of the innovations that we've done in the way in which we deliver tools for red teams to to ethically attack and capture flags within our our client base and some of the strategies that we've we've employed there. Hot topic for that for this particular audience in this region. And so, yeah, we're very excited. Be here very excited to participate and make that level of investment in the region. Thanks Darren so much for sharing your thoughts and comments anytime.
Celebrating a New Chapter: MAD Security Partners with 360 Advanced
🔗 https://hubs.la/Q02R1_t00
We are proud to announce that MAD Security has joined the 360 Advanced Compliance Alliance Program!
This partnership is an exciting milestone in our journey to provide unparalleled cybersecurity and compliance services to businesses in critical sectors.
Advantages of this partnership:
1. Aligning with industry leaders to enhance security and compliance offerings
2. Continuing to support clients with tailored solutions to meet CMMC and DFARS requirements
3. Delivering innovative protection against cyber threats in an ever-evolving digital landscape
Read the press release TODAY and see how you can partner with MAD Security to safeguard your critical infrastructure!
#MADSecurity#360Advanced#ComplianceAlliance#Cybersecurity#Partnership
It was a great panel discussion, and I'd like to summarize the key insights and share them here for everyone, as they may be helpful:
1- Cyber Resilience: "The Ultimate Hyper Power" True power is in resilience, ensuring the ability to recover swiftly from attacks. This includes disaster recovery and business continuity, vital in today’s high-stakes cyber landscape.
2- The Power of Visibility: Comprehensive visibility across networks, endpoints, and cloud environments allows security teams to detect anomalies and act before a breach occurs. Full visibility is fundamental to effective security operations.
3- Threat Intelligence at Scale: Hyper power lies in the ability to leverage real-time, global threat intelligence. Moving from reactive to predictive defense is key to staying ahead of rapidly evolving threats.
4- Robust Cybersecurity Strategy: A well-structured strategy aligns security initiatives with business goals, ensuring a proactive rather than reactive approach. It is the foundation for sustainable, long-term security.
5- AI and Automation: AI and machine learning are revolutionizing threat detection and response, enabling faster reactions and minimizing human error. However, as attackers adopt these technologies too, striking a balance between automation and human oversight is crucial.
6- Zero Trust Architecture: Zero Trust is becoming essential, minimizing risks by continuously verifying every user and device, whether inside or outside the network.
7- Compliance with National Regulations: Adherence to national regulations (NCA, SAMA, IA, NDMO,...) and frameworks strengthens cybersecurity by enforcing standards and ensuring a baseline of security measures. This is a powerful enabler of effective cyber defense.
Many thanks to my fellow panelists on stage: Alexander Tushkanov, Ruby Khaira, Alaa Khalid and Mohammed Al Tamimi.
Are you at Infosecurity Europe? Make sure you don't miss...
- The chance to put our product specialists' knowledge to the test
- Discovering all you need to know about DMARC and its impact on cybersecurity with Sendmarc
- The widest security stack on the planet from Heimdal®
Head to stand D140 today to discover more about Brigantia and how we're redefining cybersecurity distribution through our value-added approach to partnership.
#Infosec2024#Infosec#Brigantia#InfosecurityEurope#Cybersecurity#CyberEvent#Heimdal#Sendmarc
🌟 Chairperson Alert: Meet Agnidipta Sarkar! 🌟In the ever-evolving world of cybersecurity, Agnidipta knows that it’s not just about building walls—it’s about creating a fortress of resilience! 🏰💪
As the Chairperson for #CISO6 and a CxO Advisor at ColorTokens Inc., he’s on a mission to empower organizations with #ZeroTrust strategies that turn vulnerabilities into strengths. With over 30 years of experience in #Cybersecurity, he’s seen the landscape change and knows what it takes to stay ahead of the game.
Join Agnidipta at the #CISO6 Cyber Security Summit & Awards on December 13, 2024, at Vivanta by Taj, Whitefield, Bengaluru, where he’ll share his insights on building robust cyber defenses that can withstand any storm. 🌪️✨
👉 What’s your top strategy for staying breach-ready?
#CISO6#DigitalResilience#Cybersecurity#ColorTokens#TechLeadership
(Cont’d): Shields were presented to top-ranking telecom entities and key stakeholders for their roles in enhancing Pakistan’s Global Cybersecurity Index (GCI) ranking. Cybersecurity annual report 2024 was also launched on the occasion detailing PTA’s initiatives. The report and the details of rankings will be available on the PTA website.
Cyber security awards celebrate the telecom industry’s dedication to strengthening security frameworks, showcasing advancements toward a more resilient telecom infrastructure.
#CybersecurityAwards2024#PTA#DigitalPakistan#Cybersecurity#PakistanTelecom#ITandTelecom#CyberSafety#DigitalStability#CyberResilience
Did you know that the cybersecurity market in Oceania is projected to grow by 7.39% annually, reaching a market volume of US$6.60 billion by 2029?
As a proud sponsor of the Australian Cyber Conference 2024, we're excited to be part of this dynamic growth. Join us in Melbourne from November 26-28 to explore the latest in cybersecurity trends and innovations.
Visit our booth to learn how our #HumanRiskManagement solutions can help your organization stay ahead of evolving threats. See you there!
#CyberCon2024#RightHand#CyberSecurity#HRMAustralian Information Security Association (AISA)
Great Discussion! Bulwark Technologies LLC & Fortra