Story image

Cylance launches virtual CISO

03 Jan 2019

Cylance has launched a virtual CISO service to give a helping hand to enterprises that need stronger security resources but may lack a real-life CISO.

The program, known as Cylance vCISO, is designed to provide organisations with critical technology and security resources that support next-generation security architectures.

Globally, the cybersecurity skills gap is pronounced – Australia has only 7% of the cybersecurity expertise it needs. Cylance says that the shortage of approximately 2300 cyber professions has cost Australian organisations up to $405 million in revenue.

By 2026, the gap is expected to reach 17,600, as Australia’s share of the cyber security market triples to $6 billion a year, the company claims. The global outlook is in a similar position. Cylance says that the skills gap has increased more than 50% in the last three years and is expected to grow by more than two million this year.

Cylance also claims the cost of cybercrime is projected to reach $6 trillion in 2021. 

Cylance says its security experts provide organisations the expertise to detect and prevent cyber attacks without compromising their ability to deliver on core business objectives.

Cylance Consulting senior vice president Corey White says, “Today’s cybersecurity landscape presents CISOs the challenge of trying to implement digital transformation and other important initiatives across their organisations without the adequate people or systems in place to support the complex environments they manage.”

“To meet those challenges, security leaders require access to expert knowledge on the fly that helps them identify, assess, and communicate security risks to their management teams and boards of directors, which in turn helps them better manage risk and keep the overall costs of security compliance under control.”

Cylance vCISO draws on a broad set of techniques including automation and artifact analysis to collect information and assess data. 

It also defines likely security scenarios to build risk profiles, recommend actions, and highlight internal strengths, allowing organisations to customise their approach to prevention-first security without having to customise all of the technology that supports their security environments.   Cylance says that vCISO helps organisations manage day-to-day security needs and meet common security standards, frameworks, and compliance regulations such as NIST, ISO/IEC, SANS CIS, and more. It does this by assigning experienced security professionals with discrete expertise in the areas customers most want to invest in. Personnel work from remote locations or at a customer’s physical address, depending on the needs and urgency of the project.

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.