2021 Business Security Threats Briefing
How It and Security Leaders Can Use Threat Reports to Develop Their Security Protocols (English and Spanish)
How can your organization take action from threat reports?
Throughout the year, cybersecurity companies release threat reports, guides, and webinars. This intel can easily become overwhelming for teams to sift through to understand what applies to your organization and what does not. Recently, VerSprite released our annual Envisions Critical Threat Report for 2021. We included a section for each of the 6 cybersecurity threats that states what industries are most effected by each risk, so you can focus only on the risk mitigation recommendations necessary.
In this video, Envisions author, Balam Mendoza, and VerSprite CEO, Tony UcedaVélez, discuss the major topics within the Critical Threat Report and how security and IT teams should use threat reports when planning their security protocols for the year. This episode was recorded in English and Spanish for your convenience.
2021 IT & Security Threats to Businesses | English
Discussion Topics Include:
- What’s the major information security risks to companies still dealing with remote work restrictions?
- How can IT managers and security leaders do to defend the increased endpoint risks associated with BYOD (bring your own device) and office IoT devices?
- Should FinTechs and companies investing in altcoins be worried about the blockchain tech and ransomware attacks?
- What do we need to do to prepare for likely critical infrastructure attacks? (Referencing healthcare fields and companies with physical supply chains)
- How should IT and security leaders respond to security threat reports like this? Who should pay attention to the top 6 cybersecurity threats? What makes Envisions more actionable than other reports?
Risk-Based Organizational Threat Modeling
VerSprites approach to threat modeling provides a risk-based approach that is backed by evidence. VerSprite’s security experts correlate real threats to your attack surface of application components and identify risk by first understanding the context of what the software or application is intended to do for the business or its clients. We also conduct exploitation tests that support threat motives within the model to validate whether they are probabilistic. Correlating viability with sustained impact allows this methodology to resonate as a highly effective risk-focused threat modeling approach. Learn how we can tailor our threat modeling approach to fit your overall organization’s security needs.
PASTA Threat Modeling: The Process for Attack Simulation and Threat Analysis
VerSprite leverages our PASTA (Process for Attack Simulation and Threat Analysis) methodology to apply a risk-based approach to threat modeling. This methodology integrates business impact, inherent application risk, trust boundaries among application components, correlated threats, and attack patterns that exploit identified weaknesses from the threat modeling exercises.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /