Magalie Vintousky, Westcon Group: Companies can maintain a strong level of security if they invest in tools and assess their security posture
April 2023 by Marc Jacob
During the FIC, Westcon Group will highlight the alliance it has just concluded with EfficientIP & Extreme Networks, companies that will be present on its stand. This alliance improves visibility and control, automates configurations and strengthens the security of your network, in particular by isolating an infected device following a DNS-related attack. Magalie Vintousky, Product Director of Westcon Group believes that coupled with investments in technology, cybersecurity analysts and continuously assessing the security posture, companies can maintain a solid level of security.
Global Security Mag: What will be your news at the International Cybersecurity Forum 2023?
Magalie Vintousky : We recently announced a technology alliance with EfficientIP & Extreme Networks, companies that will be present and accompanying us on our booth at the FIC, in addition to our partner Skybox. There is a real focus on visibility, automation and security.
Global Security Mag: What are the highlights of the solutions you will be presenting at the event?
Magalie Vintousky : This alliance improves visibility and control, automates configurations and strengthens the security of your network by isolating an infected device following a DNS attack. The DNS or Domain Name System, which will route traffic from the application to the user, is a very critical service; without the DNS users cannot access resources on the internal and external network, hence the importance of strengthening your security.
Global Security Mag: This year’s FIC will focus on Cloud Computing, what are the main cyber threats to the Cloud?
Magalie Vintousky : We can count three of them:
Misconfigurations: These errors in configuration and setup of the Cloud is one of the main causes of breach and data leakage in the Cloud. In fact, 95% of cloud breaches are due to human error.
Unauthorized access: Unlike an on-premises infrastructure for an enterprise, the deployment of cloud-based resources is outside the traditional security perimeter, so they are accessible from the Internet. Misconfigured security or compromised credentials can allow an attacker to gain direct access.
Lack of visibility: An organization’s cloud-hosted resources are located outside the corporate network and run on infrastructure they do not own. This lack of visibility can limit an organization’s ability to monitor its cloud resources.
Global Security Mag: What are the benefits of cloud computing?
Magalie Vintousky : We can talk about the so-called advantages of the cloud with the "4E" rule:
– Scalability: Allocated resources vary and are adapted to the needs of use on demand.
– Efficiency: Centralized administration, global view and enhanced security.
– Economy: With no need to invest in infrastructure that is not being used, a company only uses the resources it
only use the resources they need.
– Ecology: With the gains in performance, utilization and sharing of resources among several actors, the solution is green
Global Security Mag: How should technologies evolve to counter these threats?
Magalie Vintousky : Security needs to be an integral part of the design process, rather than something that is added as an afterthought. For example, technologies can have built-in AI engines, so the more a system is attacked, the more it learns and the more resilient it becomes.
The proposed solutions must be resilient to attacks with reliable and fast recovery plans.
Global Security Mag: In your opinion, what role can humans play in strengthening the defense strategy to be deployed?
Magalie Vintousky : User education and training on risks, threats and best practices are essential to strengthen a defense strategy. But also incident response planning, continuous monitoring of the infrastructure, and the development of a strategy to deal with the various potential impacts of the identified risks.
Global Security Mag: What message would you like to convey to CISOs?
Magalie Vintousky : Always be aware of emerging threats and foster a security culture by collaborating with other departments to share information. Coupled with investments in technology, cybersecurity analysts and by continuously assessing the security posture, companies can maintain a solid level of security.