Sergej Epp
The rapid change in the cybersecurity threat landscape drives innovation in security operations centers. This blog gives you an insider perspective on what drives smart innovation and how it can be your competitive advantage. Sergej currently serves as the Chief Security Officer, Central Europe for Palo Alto Networks. He develops cybersecurity strategy and oversees cybersecurity operations and threat intelligence across the region. Sergej is a regular speaker at conferences and teaches cybersecurity to graduates. You can find him on LinkedIn.
Articles
SecOps Needs More Democratization, Not Less SOC
An increasing complexity of technologies, as well as an increasing number of failures and attacks followed by an increasing dependency on business goals is changing the way we run Security Operations Centers. I previously discussed the concept of a Fusion Center as an...
Five Best Practices to do Supply Chain Security Right
Supply chain attacks aren’t new. In fact, The National Institute of Standards and Technology (NIST) published their initial report on supply chain risk back in 2015. One of the most well-known supply chain attacks happened shortly after in 2017. NotPetya corrupted...
Cyber Ops Must Evolve Towards Fusion Centres. Here is Why.
Since the advent of space exploration in the 1960s, every child understands that the success of the space mission is dependent not only on the astronauts, but also on the engineers in the mission operation center. All complex missions or operations are high risk and...
Interviews and Panels
Want to Beat COVID-19? Consult a CISO
To paraphrase the military mastermind Sun Tzu, you must know your enemy before you can defeat him. Infectious disease experts around the world look to do the same with the coronavirus. To contain a viral outbreak, scientists must identify the virus’ origin and track its spread. Once located, scientists study the virus’ behavior and develop a containment plan. CISOs work the same way. At the first sign of malware or another virus, CISOs analyze metadata and user behavior to locate the malicious file or code. Security teams learn how the virus got in and how it spread. All impacted systems, applications, and endpoints must be quarantined. To beat an enemy, you must know how the enemy operates, regardless of whether the fight takes place in the natural world, a corporate network, or on the battlefield.