Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Lumeta Lends Expertise to New Report Calling for Revolutionary Approach to Cyber Security

September 2016 by Lumeta

2017 TAG Cyber Security Annual — Practical Handbook and Reference Guide for the Working Cyber Security Professional. Lumeta is part of an industry collective of 48 of the nation’s foremost cyber security vendors participating in the report, which was published by The Amoroso Group (TAG Cyber) following in-depth industry research and analysis.

“The Lumeta team is excited to have been part of this fine research effort,” explained Reggie Best, chief product and marketing officer of Lumeta. “The guidance offered here to cyber security teams regarding criticality of comprehensive and real-time visibility into the enterprise network infrastructure reaffirms Lumeta’s purpose and mission for the past decade.”

The report details a new urgency for how America’s commercial, financial and utility sectors respond to escalating and increasingly complex cyber attacks. It includes a comprehensive analysis of the cyber security industry with specific insights from C-level executives and thought leaders. Dr. Edward G. Amoroso, former chief security officer of AT&T and author of six books on cyber security, spearheaded writing and researching the report.

“The tools developed at Lumeta exemplify the types of protections that will be absolutely essential as the enterprise distributes and virtualizes,” explained Ed Amoroso.
The 2017 TAG Cyber Security Annual has been written for information security and technology professionals in all industries with a special focus on U.S. infrastructure companies, including energy, telecommunications, manufacturing, health care and utilities.

The report will be available at no cost to all users as a free download on Lumeta’s website [http://go.lumeta.com/TAGcyber] and TAG Cyber’s website.

The handbook is centered around a revolutionary new approach to cyber security that calls on tech leaders of the largest and most important American enterprises to explode existing infrastructure to disperse data across multiple platforms, offload sensitive information into secure cloud-based solutions and reload systems, policies and personnel to better position them to effectively defend against cyber attacks that are not only likely, but occurring at an increasing rate.

It includes three volumes:

• Volume 1: TAG Cyber Security Fifty Controls details the fifty primary control areas required for CISO teams to be effective in this new era of cybersecurity. These areas include traditional controls such as firewall platforms and two-factor authentication along with non-traditional controls such as security recruiting and security R&D. For each control area, an extensive list of supporting vendors is included to help jumpstart local source selection.

• Volume 2: Interviews with Distinguished Vendor Principals includes in-depth conversations with the thought leaders and distinguished vendor principals. It offers a brief digest of the expert guidance and cyber security insights offered by these industry authorities during the research stages of this report.

• Volume 3: TAG Cyber Security Vendor Listings serves as a reference guide to the cyber security industry. This comprehensive review includes nearly 1,400 vendors this year, with an additional 500 vendors to be incorporated into the 2018 report.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts