Adapting to Evolving Cyberthreats from MTC Tech Transformation Conference

The 6th Maryland Tech Council Technology Transformation Conference panel on “Moving into the Future of Cybersecurity: Adapting to Evolving Threats” provided practical guidance for protecting the enterprise. Some key points include:
Protect the Unprotected
Manage the increasing scope of the threat landscape. Any networked device (e.g., IoT sensors, TVs, media players, surveillance cameras, refrigerators, etc.) becomes a potential site from which a bad actor may land and launch their attacks. These devices should not only be segmented away from sensitive parts of the business, but they should be routinely monitored for evidence of compromise.
Simplify, Simplify, Simplify
The simpler your cyber user experience (tools, training, processes, etc.), the more likely your people are to use it. Complicated, friction-filled experiences encourage users to seek out unsafe workarounds. Go back to the basics by rotating strong passwords, implementing multifactor authentication (MFA), keeping software up to date, backing up critical data, and training employees.
Anticipate Human Failure
People are people. And people make mistakes...routinely. Regularly train your people to avoid phishing attacks, test their compliance, and prepare for failure. Training is especially effective when you coach your users in the moments they make their mistakes.
Protect Your Data
AI is an outstanding opportunity...to lose your rights to your data and intellectual property. When "data is the new oil," it must be protected. Be aware of state regulations regarding data privacy. If a customer exercises their personally identifiable information (PII) "right to be forgotten," your compliance (or lack thereof) will be evident during the next data breach.
Protect Your People from Boredom
Cyber talent is so hard to find and keep. Maximize their value by focusing them on hard problems. Use AI to process the endless waves of tier 1 alerts to identify the real problems. This will elevate your cyber defense posture and increase your cyber employee satisfaction.
Build/Buy What You Can
Begin by defining what's normal for your organization and then pay attention to unexpected deviations. If you can't afford a complete solution, prioritize your spending on what you can afford. Each step matters. Also consider engaging with managed cybersecurity service providers (MSSPs).
As cyber threats continue to evolve, your defenses should too. As insider threats escalate and SaaS/AI utilization expands, managing access control policies on firewalls alone are not sufficient. Consider integrating Secure Access Service Edge (SASE) and Managed Detection and Response (MDR) to increase protection for your business.