Syteca 7.21 is live — Real-time data masking, agentless access & more
Every Interaction Secured
Every Action Visible
Real-time data masking, agentless access, modern design, and beyond.
Get inspired by how Syteca’s extensive capabilities can cover your use case.
Download “How to build Insider Threat Program in 10 Steps” white paper and enhance your insider risk management strategy through concrete actions.
Assist your customers in building secure and reliable IT infrastructures
Compared with the cybersecurity chaos that 2020 and 2021 summoned, 2022 initially seemed like a year of relative calm. But Q3 brought an absolute assault on both government and corporate servers across the globe. It represented a 70% increase in data breaches over Q2’s numbers according to a recent Surfshark report. The Gartner Cyber Judgment Survey found that over 40% of information risk decisions are made outside of IT’s umbrella. De facto, security lapses are the subject of collective responsibility, but CISOs are put under the highest pressure since they are the ones in charge of cybersecurity.
This paper reviews the harsh lessons of recent years, rising trends, and technologies that are expected to peak in the near future to help CISOs develop greater effectiveness while keeping a calm mind.
LinkedIn Profile
Gartner Profile
Jonathan Care is a recognised expert in the field of cybersecurity and fraud detection. A former top-rated Gartner analyst, Care was responsible for defining the fraud market and leading Gartner’s Insider Threat and Risk research. He regularly advises cybersecurity industry leaders on strategic growth and has worked with key figures in industry and government across the globe. He is a lead contributor to Dark Reading, an industry-defining publication.
Care has testified in court as an expert witness and forensic investigator and is a Fellow of the British Computer Society.
Share: