WithSecure launches ‘outcome-based’ security at Sphere23 conference

We Keep you Connected

WithSecure launches ‘outcome-based’ security at Sphere23 conference

WithSecure launches ‘outcome-based’ security at Sphere23 conference
Your email has been sent
At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes.
The WithSecure Sphere conference in Helsinki, Finland, kicked off with a speech Wednesday by CEO Juhani Hintikka on the deck of the racing schooner, Galiana. As the boat’s team looked on, Hintikka drew comparisons between the collaborative imperatives of boat racing and WithSecure’s own concepts of outcome-focused and collaborative — or “co” — security.
Co-security was a central theme of the event, a poignant one given Finland’s proximity to Russia and Ukraine’s reliance on partners and IT volunteers in both public and private sectors during its conflict with Russia.
Jump to:
The event featured a virtual presentation by Victor Zhora, deputy chairman and chief digital transformation officer at the State Service of Special Communication and Information Protection of Ukraine, who spoke about how partnerships have played key roles in how it has addressed the protean challenges of cyber aggression from Russia, including DDoS and wiper attacks in early 2022, to recent phishing attacks on civilians.
SEE: Finland has also been targeted by Russian DDoS attacks.
The company also announced several new products at the event, including Cloud Security Posture Management available for customers using WithSecure Elements, a cloud-based security platform. The new WithSecure Elements module aligns with an outcome-focused approach to security, which Hintikka explained aims to integrate cybersecurity and defense postures with a company’s larger strategic goals.
“Historically, cybersecurity practice has been threat-based, responding to what has already happened,” he said, citing Forrester research showing that 64% of companies still take a traditional, reactive approach to security.
“The evolution of the business landscape through digitalization means IT needs to evolve,” he said. “What we would like to propose is the next step: what is it a company actually wants to achieve. How does a company connect cyber goals with business goals?”
Hintikka said that for a chief information security officer, the key questions are how to prioritize and what to invest in. He cited another Forrester statistic: 83% of companies are interested in outcome-focused security and that most want to partner with others to achieve that, versus securing basic vendor relationships.
“Cybersecurity can no longer be an add-on. You have to start designing processes for security, as is done in design for manufacturing,” Hintikka said. He told TechRepublic that the idea has merit because of the breadth of the threat landscape and the diversity of threats.
SEE: WithSecure discusses the importance of security aligned with business goals.
“We look at all of the products and services out there, so if you put yourself in the shoes of a CISO, how would you decide how to prioritize and how would you have that discussion with your company’s business leadership? Smart companies know that investing in cybersecurity posture is an existential question. You need to do it or you might be out of business,” he said. “Every company, in a way, is a software company today and is therefore vulnerable. So there are real questions as to where to put your money,” he added.
Laura Koetzle, who leads Forrester’s European research organization, explained that the outcome-focused approach encompasses co-security — cybersecurity as a collaborative endeavor transcending traditional vendor-customer relationships.
“The idea is you pursue security outcomes that businesses are trying to pursue. If you are, for example, trying to grow your customer base by 10%, you would ask how your security [posture]  will help achieve this goal,” Koetzle said.
“If you are an established business and have, over 15 years, built up a lot of security infrastructure, policies and procedures, what you almost never do is say what stuff should we stop doing?” she added.
She said an enterprise like WithSecure, rather than approaching customers solely as a solutions vendor for security vulnerabilities, will instead query a company’s strategic goals and organize security around achieving those goals. “It requires you to think differently,” she said.
The company described its new Cloud Security Posture Management module as complementary to its Elements’ endpoint protection, endpoint detection and response, as well as to its vulnerability management and collaboration protection modules. Its CSPM product is intended to manage risks related to vulnerabilities and misconfigurations in popular cloud-based infrastructure as a service platforms and provides support for Amazon Web Services and Microsoft Azure.
The company said that the new module includes:
Also See:
Using zero trust access to stay compliant & solve common MDM issues (TechRepublic)
Hiring kit: Cybersecurity engineer  (TechRepublic Premium)
Learn Python: Online training courses for beginning developers and coding experts
(TechRepublic Academy)
Cybersecurity and cyberwar: More must-read coverage  (TechRepublic on Flipboard)
 
Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game.
WithSecure launches ‘outcome-based’ security at Sphere23 conference
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Get up and running with ChatGPT with this comprehensive cheat sheet. Learn everything from how to sign up for free to enterprise use cases, and start using ChatGPT quickly and effectively.
Get the most out of your payroll budget with these free, open source payroll software options. We’ve evaluated the top eight options, giving you the information you need to make the right choice.
We highlight some of the best certifications for DevOps engineers. Learn more about DevOps certifications.
With so many project management software options to choose from, it can seem daunting to find the right one for your projects or company. We’ve narrowed them down to these ten.
This Microsoft PowerToys app simplifies the process of visualizing and modifying the contents of the standard Windows Registry file.
Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game.
PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, …
PURPOSE TechRepublic Premium presents 10 tips for the Firefox open-source browser. Even if you only follow some of these, you’ll find your browser experience to be much improved. From the article: 1. USE CAUTION WITH ADD-ONS AND THEMES This is one of the first tips I always offer. I’ve seen web browsers with so many …
PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems …
PURPOSE Whether due to budget cuts or performance, letting staff go is sometimes a necessity. There are many steps and considerations HR managers need to navigate when it comes to employment termination. Enlisting an employee termination checklist, like this one from TechRepublic Premium, can help supervisors, managers and HR put in place best practices and …

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE