issue 84 editor’ s note
ello and welcome to
H the latest edition of Intelligent CISO.
For this month’ s cover story, which can be found on page 51, we are delighted to feature Joe Pennisi, President of the Trusted Computing Group( TCG).
He tells us how TCG and its Trusted Platform Module( TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence when a device is remotely attacked or physically stolen – providing robust, hardware-based protection instead of being solely reliant on software security programs.
“ TPMs essentially offer enhanced security measures by signing and verifying data provided to your device to establish its identity,” he says.
“ It also provides hardened storage for software and platform keys to protect algorithms being used. In the event an attack is successful, unauthorised entities still won’ t be able to access the information stored within the TPM, giving users assurance that they do not need their systems constantly evaluated by security professionals.”
In this month’ s Editors Question, we ask three industry experts how businesses can balance scalability and security when managing large volumes of data in an increasingly complex regulatory landscape.
We hear from Iwona Rajca, Senior Solution Engineer EMEA at Protegrity; Andrew McMillan, Partner and corporate lawyer at RPC; and Jean-Philippe Avelange, Chief Information Officer, Expereo.
Please turn to page 27 to read their views on this fascinating topic.
This month’ s Go Phish features Dan Bridges, Technical Director – International, Cyware. When asked what major areas for investment should be in the cybersecurity industry he says:“ The first is collaboration. Helping your industry peers and business partners with information. We see the uptake of the ISAC Community more prevalently now, not just in a few headline industries and the US, the realisation of their value is spreading.
“ Collective defence is a huge trend that many organisations are focusing on. It’ s fascinating and really positive to see examples in very competitive industries being happy to share data with their competitors for the greater good. It seems unlikely, but they do, and it’ s increasingly common in all industries.”
To read the full article, please turn to page 67.
Don’ t forget you can read daily news updates on our website. I’ d like to wish you a good month ahead and please enjoy the read!
Mark Bowen Editorial Director
WWW. INTELLIGENTCISO. COM 5