Tom Kellermann, Chief Cybersecurity Officer, Carbon Black, Talks About Cybersecurity Threats, Best Practices & Solutions
In The Boardroom On SecuritySolutionsWatch.com
NEW YORK, NEW YORK, UNITED STATES, April 4, 2018 /EINPresswire.com/ -- ***************************************************************************************************************
SecuritySolutionsWatch.com: Thank you for joining us today, Tom. It’s an honor to speak with a former commissioner on the Commission on Cyber Security for the 44th President of the United States and the Chief Cybersecurity Officer of Carbon Black.
Tom Kellermann: I began my career on the World Bank Treasury security team and over the last 22 years I have become on authority on elite hacker modus operandi and correspondent cyber security architectures. I have authored two books and I serve as a global fellow at the Wilson Center.
SecuritySolutionsWatch.com: We understand that you will be speaking at the upcoming Cyber Investing Summit (https://cyberinvestingsummit.com) May 15, 2018 in New York City. Can we have a preview of the topics you’ll be discussing?
Tom Kellermann: I will be discussing the evolving cyber threat landscape and the correspondent cyber insurgency.
SecuritySolutionsWatch.com: We’re all familiar with the headlines about Equifax, Uber and Orbitz and more recently the ransomware attack on the city of Atlanta (https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html) plus reports of tainted data in blockchain transactions (https://www.washingtonpost.com/news/the-switch/wp/2018/03/22/people-are-using-bitcoins-system-to-share-child-pornography/?utm_term=.f06ae4edf641). What is your perspective, please, regarding best practices that should be followed by the public and private sector in this environment?
Tom Kellermann: Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ deception grids.
SecuritySolutionsWatch.com: May we have a brief overview of Carbon Black solutions? Any “wins”, success stories or honorable mentions you’d like to share?
Tom Kellermann: Carbon Black pioneered application security and endpoint detection and response technologies. Our culture of ingenuity continues with our Predictive Security Cloud. The PSC is ground breaking as it transforms endpoint security through predictive analytics allowing the defender to thwart unknown and custom cyber-attacks.
SecuritySolutionsWatch.com: In wrapping here today, may we ask you…what does your crystal ball reveal regarding cybersecurity headlines in the coming year?
Tom Kellermann: 1. geopolitical tension will manifest with cyber-attacks. 2. Cybercriminals will shift from burglary to home invasion becoming more destructive. 3. Fileless malware employing PowerShell scripts 4. Watering Hole Attacks that employ destructive payloads 5. Island Hopping via cloud
For the complete interview with Tom Kellermann, Chief Cybersecurity Officer, Carbon Black, please click here:
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_CarbonBlack_Kellermann.html
***************************************************************************************************************
About SecuritySolutionsWatch.com
www.SecuritySolutionsWatch.com features thought leadership interviews about IT, IoT and security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about solutions from leading global brands such as: 3M, AMAG Technology - A G4S Company, ASSA ABLOY, Cisco Security, Dell EMC, HP Cybersecurity, Fujitsu, Gemalto, HID Global, IBM, ImageWare, Intel, SAP, Siemens Security, Stanley Security, SONY Security, Unisys, and Yahoo, just to name a few.
What's YOUR authentication, cybersecurity, physical security, mobility, or "smart" solution?
What's YOUR Blockchain or FinTech solution?
We invite you to please join us "In The Boardroom" at www.SecuritySolutionsWatch.com.
For a quick tour to see exactly how your brand will be featured, please contact Ali Eng on our publishing team via
email: ALE@SecuritySolutionsWatch.com, or phone: 1+914.690.9351 .
For more details, please click here: http://www.securitysolutionswatch.com/Main/Jan2018.pdf
And for our Media Kit, please click here: http://www.securitysolutionswatch.com/MediaKit.html
****************************************************************************************************************
It's FREE...our monthly newsletter with thought leadership content from leading security experts.
Please click here: http://securitysolutionswatch.com/newsletters/newsletter_2018_03.html
And please visit us on Twitter here: https://twitter.com/SecStockWatch
****************************************************************************************************************
THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.SecuritySolutionsWatch.com/Main/Terms_of_Use.html
****************************************************************************************************************
Martin Eli, Publisher
SecuritySolutionsWatch.com
1+914.690.9351
email us here
Carbon Black Video - Tilting the Advantage Back to the Defenders
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
