Zoom Logo

Maintaining Cyber Resilience in a Rapidly Changing Environment - Shared screen with speaker view
Assaf Mischari
59:20
assaf@team8.vc
Halassy Zsolt
59:45
Thank you Assaf!
Peter Woehr
01:00:42
sorry, my Q too late for Assaf, but nevertheless, your opinion (or those of others presenting) about change of attack vectors the more the shift to cloud technology will be put in place?
Assaf Mischari
01:04:27
Great question. the cloud was already attractive even before Corona. But , in most cases (if you are not a bank with lots of $$$) the cloud had better security than your regular network. so ROI pushed attackers to attack more networks and less cloud . Now , as more are joining the cloud the ROI for attacker is higher and the cloud will be attack much more. Luckily , patching , blocking , detecting is much easier in the cloud . so the cat and mouse game will be more to the defense side.
Peter Woehr
01:06:50
I agree. Thx for your answer
Assaf Mischari
01:07:17
from attack vectors - I believe it will be more concentrated at stealing Admin credentials of cloud admins and the enterprise owned apps than attacking the infrastructure . AWS has better security than all of us :)
Peter Woehr
01:08:49
… and Azure and Google and Oracle and ...
Peter Woehr
01:22:52
Q: what is your opinion about the right balance of establishing / maintaining security capabilities company internally vs. externally (security service providers)?
Peter Woehr
01:24:33
toda
Megas G. EIT Health - Horizon2020 @EKTgr
01:25:50
well we are also using our accounts from home, are windows firewall and antivirus some how enough to shield us?
Yossi Shtain
01:25:50
Do you have an automated patch management multi-platform solution including 3rd applications?
Peter Woehr
01:28:50
what is your elaborated opinion of the real risk of cyberwarfare attackers (e.g. other nations / terrorism groups) to succeed in an attack shutting down critical infrastructure e.g. power grids and similar?
Peter Bencsik
01:29:09
Assaf, I see you've got a nice hardware/workshop space. I'd love to have a tour. I guess there is a reason for having as a security expert. Can you give a hint what are using it for?
Ion
01:31:24
Assaf, in case of randsom attack, are there ways to handle it?
Mar Martinez
01:31:44
Great replies Assaf! Thank you all for sharing your wisdom.
nadavzafrir
01:32:11
Thanks everyone
Peter Woehr
01:32:23
thanks for the excellent lecture - תודה רבה לך
Daniel Krivelevich, Sygnia
01:32:28
Daniel.K@sygnia.co
Adam Finkelstein
01:32:31
adam.f@sygnia.co
Adam Finkelstein
01:32:43
welcome to follow-up on any other questions
EgonM
01:32:43
Thank you. Regards from Slovenia.
Antonio Mattiello
01:32:44
bye
Toni
01:32:45
Thank you for this very interesting meeting
Fabiola Munguia
01:32:46
thanks
Antonio Mattiello
01:32:51
thank you from Italy
Adi Barel
01:33:08
Thank you!