Dubai - Arab Today
Microsoft Tuesday hosted the second edition of its CISO Executive Series, designed to support chief information security officers in their efforts against the ever-changing threat landscape.
The event, this year titled "A Hacker’s Guide to Security Strategy", was held at the Burj Al Arab, Dubai, and allowed security professionals to network with peers, as well as hear from a renowned cyber-security specialist on current and upcoming threats.
International headlines continue to feature the plight of high-profile victims, as private- and public-sector organisations fight their ongoing daily battles with cyber-criminals. Recent years have seen a marked rise in targeted and sophisticated attacks, as businesses try to figure out how to secure their digital estates.
"Most organisations know what cyber-attackers are likely to go after, once they have breached the corporate perimeter," said Cyril Voisin, Executive Security Advisor for France, Italy, the Middle East and Africa at Microsoft’s Enterprise Cybersecurity Group.
"That means that you know where to focus your efforts; and that is the beginning of a formal, coherent, in-house security strategy. Coupled with the power of the intelligent cloud and the perspective of seasoned White Hat experts like those heard here today, organisations should be in great shape to take the fight to the cyber-criminals."
Microsoft’s innovations such as Microsoft 365 and the Azure cloud are built from the ground up with industry-leading, AI-driven protection built into every layer. Data is encrypted at rest and in transit, and 24-hour event-remediation services are provided by a dedicated team of experts.
At the CISO Executive forum, Paula Januszkiewicz, CEO and Founder of CQURE Inc, and a world-renowned cyber-security expert, shared insights, and an outside-in perspective of securing a business.
"As the game intensifies, it’s time to level up, and venues such as Microsoft’s CISO Executive Series are the ideal way to do it," said Januszkiewicz. "Cyber troublemakers are devious and creative. We have to think like them, to anticipate their attack vectors and behaviours; only then can we secure that which matters most: our precious digital assets."