Verizon at RSA 2018: Shining the spotlight on dynamic security strategies

By: Bryan Sartin, Executive Director Security Professional Services

Full Transparency

Our editorial transparency tool uses blockchain technology to permanently log all changes made to official releases after publication. However, this post is not an official release and therefore not tracked. Visit our learn more for more information.

More of our content is being permanently logged via blockchain technology starting [10.23.2020].

Learn more
change ahead

RSA 2018 starts next week – the security industry’s annual opportunity to share insightful news and views. However, in the world outside the conference hall, it’s important to remember that security needs more than an annual acknowledgement - last year’s security strategies are no longer sufficient for this year’s cyber threats. There have been numerous reports about high profile security breaches over the past 12 months, and countless new cyber threats emerging to exploit weaknesses in networks and digital applications. Cybercrime hasn’t stood still and cybercriminals are ready and waiting to take what they can from those who have.

Security strategies need to be proactive, flexible and dynamic in nature - not static. They need to be streamlined, able to respond to new threat developments and adapt with the aid of intelligent solutions. So why is the security discussion still based on what happened last week, last month, or last year?

At RSA 2018 (Moscone North Hall, booth #4121) Verizon is calling for change within the security industry, asking businesses and governments to reassess how they approach their security strategies. Our belief is that everyone involved in security needs to work together, and change the game, if we are to successfully challenge cybercrime and win.

Keeping up with the threat landscape has always been a challenge for organizations large and small. Security threats change all the time, making it difficult for them to understand what’s most important for their industry or their geography. That is why it is important to have access to data and market intelligence that can inform companies of ‘the next big thing’ to attack them.

Verizon’s Data Breach Investigations Report (DBIR) providing insight into cybercrime.

Throughout our Data Breach Investigations series (DBIR) we have sought to provide businesses and Governments with valuable insight and analysis into what is really going on in cybercrime. This year’s report is no exception and shows that ransomware attacks are the most common type of malware, found in 39 percent of malware-related data breaches – double that of last year’s DBIR. What’s more, our analysis shows that attacks are now moving into business critical systems, which encrypt file servers or databases, inflicting more damage and commanding bigger ransom requests.

We’re also seeing a shift in how social attacks, such as pretexting and phishing, are used. Human Resource (HR) departments are particularly being targeted in a bid to extract employee wage and tax data, so criminals can commit tax fraud and divert tax rebates.

The one thing that’s certain when it comes to security, a dynamic and proactive security strategy is the best option if you want to seriously protect yourself against risk.

Verizon Risk Report transforms security decision making

The one thing that’s certain when it comes to security, a dynamic and proactive security strategy is the best option if you want to seriously protect yourself against risk. That’s why we launched a new service, the Verizon Risk Report, just a few weeks ago – a security assessment framework which offers businesses and Governments unmatched cyber-threat information. This uses threat intelligence sourced daily from multiple outlets, to allow customers to make data-driven security decisions based on today’s threats, and adaptively, and efficiently, address gaps in their security posture.

These are just initial steps towards helping businesses develop streamlined security strategies based on actionable data insights and intelligent security solutions. The ability to continue to evolve security according to today’s threat landscape will be absolutely critical for the future. The security landscape will continue to evolve – and we all need to work together if we’re going to be able to keep one step ahead of the cybercriminal.

Visit Verizon at RSA 2018

Come and visit Verizon at RSA 2018, Moscone North Hall, booth #4121. Copies of the Verizon 2018 Data Breach Investigations Report will be available; experience the value of the Verizon Risk Report and discuss Verizon’s comprehensive range of intelligent security solutions and services with us. Verizon can help you really target your security where it will be most effective. Every year, we emphasize how important it is to get security basics right. This year, we can go beyond that, and help you make intelligent decisions on how to target your security to ensure you are protecting your assets as effectively as possible.

Download the Verizon 2018 Data Breach Investigations Report

Learn more about the Verizon Risk Report


About Bryan Sartin

Bryan keeps pace with the leading and bleeding edges of innovation in the security market, while maintaining the highest quality of service in delivery operations. He manages the proactive and reactive span of Verizon’s consulting capabilities, including Governance, Threat & Vulnerability Management, Regulatory Compliance, Identity & Access Management, and Data Loss Prevention practices. Bryan also oversees all cyber investigations and intelligence functions, encompassing the externally facing arm of Verizon’s security apparatus.

Related Articles

Ransomware still a top cybersecurity threat, warns  Verizon 2018 Data Breach Investigations Report
The 11th edition of the Verizon DBIR gives in-depth information and analysis on what’s really going on in cybercrime, helping organizations to make intelligent security decisions.
Verizon Risk Report
The Verizon Risk Report enables businesses focus their security spend where it will have most impact.