What is the Role and Impact of the CMO? What ought to be the goal of the CMO? An ever evolving role, how has it changed over time? What are the new challenges that CMOs of today are facing? Do CMOs need to be technologists to truly promote their companies? What does the role of the CMO look like depending on the stage of the company (early, mid-stage, public)? These are just some of the questions the speakers answered in this panel!
Attivo Networks®, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, a Finalist in the 2018 ‘ASTORS’ Awards, and a leader in deception for cyber security threat detection, includes new advanced capabilities that use machine learning to automatically generate and deploy the most authentic deception that covers an extensive set of attack vectors at scale.
Written by: Carolyn Crandall, CMO and Chief Deception Officer – In part 1 of my Black Hat recap, I published a post highlighting some of the key themes and noteworthy topics that drove conversations at Black Hat 2018. One development that was abundantly clear, was how far deception technology adoption has progressed during the past year.
Written by: Carolyn Crandall, CMO & Chief Deception Officer I always look forward to the Gartner Security and Risk Summit to hear their vision and insights into the future. Last year, I was not as inspired by the back to basics message, as it didn’t provide as much visibility into new innovation as I was seeking. This year was still a little light in the promotion of innovation, though I found usefulness in how they were trying to educate security professionals on what I will call “inspired thinking”.
Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective analysis of breaches, rather than threat hunting as augmented by relatively novel ideas like User Behavior Analytics (UBA).
Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time inside your environment. Let’s talk about deception for a moment before digging into how it can reduce attackers’ dwell time.