www.spiceworks.com
Open in
urlscan Pro
45.60.13.212
Public Scan
Submitted URL: https://mail.spiceworks.com/c/AQiv0hQQ-JQdGIr_3L8BILPNwAcRMTG4oGSYc45rYYvJS_ae293H1TPmmfbHUPSMqlIPHg?_externalContentRedirec...
Effective URL: https://www.spiceworks.com/it-security/identity-access-management/guest-article/how-to-prioritize-digital-trust/?utm_source...
Submission: On March 06 via api from TR — Scanned from DE
Effective URL: https://www.spiceworks.com/it-security/identity-access-management/guest-article/how-to-prioritize-digital-trust/?utm_source...
Submission: On March 06 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form role="form">
<i class="mag-glass"></i>
<input class="search-input" autocomplete="off" placeholder="Search Spiceworks" disabled="">
<i class="clean-icon" style="display:none"></i>
<div class="trending-topics"></div>
<div class="search-box-results"></div>
</form>
Text Content
Skip to Main Navigation Skip to Main Content Skip to Footer Home * News & Insights * News & Insights Home * Artificial Intelligence * Innovation * IT Careers & Skills * Cloud * Cyber Security * Future of Work * IT Research * All Categories * Community * Community Home * Cloud * Collaboration * Hardware * Networking * Programming * Security * Software * Storage * Vendors * Virtualization * Windows * All Categories * Events * IT Tools * Cloud Help Desk * Inventory Online * Contracts * Connectivity Dashboard * Pricing * All IT Tools * State of IT * Newsletters * Reviews Login Join Login Join -------------------------------------------------------------------------------- Identity & Access Management WHAT’S ON THE HORIZON FOR DIGITAL TRUST AND IDENTITY Learn how to prioritize digital trust to secure your organization’s future in a rapidly changing landscape. Dean Coclin Senior Director, Digital Trust Specialist , DigiCert March 5, 2024 -------------------------------------------------------------------------------- Dean Coclin, senior director & digital trust specialist of DigiCert, discusses how organizations can proactively manage challenges, prioritize digital trust, and stay resilient. Last year, one of the most memorable milestones was the mainstream breakthrough of artificial intelligence (AI) into mass awareness. Not long ago, AI discussions were mostly around technical capabilities like speech recognition, chatbots, search engines, and recommendation algorithms. But AI went mainstream as groundbreaking new applications like ChatGPT burst into the headlines. And fast. It’s not surprising that AI and other maturing technologies are having a big impact on cybersecurity strategies. We’ll explore how these and other trends are shaping the outlook for identity and digital trust—and how organizations can take steps to manage new challenges. AI TURNS THE TABLES, AND ORGANIZATIONS MUST PREPARE For security professionals, AI has long been a key enabler of defensive tools like intrusion detection systems (IDS) and intrusion prevention systems (IPS). However, as AI has become more widespread, it’s expected to be soon applied to attacks and defensive systems. For example, today’s AI technology can rapidly write, build, and render websites based on search queries. This dynamic capability is a powerful way to deliver an engaging, personalized experience for end users, but it can also be applied to malicious activities. For instance, a bad actor might use generative AI to set up a fake web page with misleading information that looks authentic, damaging the company’s reputation. Deepfakes are another area where AI excels, and applications are already widely available that can enable innovative new attacks on individuals and enterprises. In the near future, cybercriminals might use AI to harvest data from publicly available sources and put it to work for their schemes. Using tools that are in reach today, a bad actor could easily extract data from a resource like LinkedIn or sample a YouTube clip to impersonate a manager or an executive’s voice. Armed with this stolen identity, the attacker could easily reset passwords, issue false employee announcements, or create mischief that costs time and money to correct. See More: Is Your Corporate Data Safe from Insider Threats? TACKLING POST-QUANTUM COMPUTING THREATS Like AI, quantum computing technology is also introducing new threats for cybersecurity professionals. With its enhanced processing power and accelerated speed, current quantum technology is nearly capable of breaking traditional data encryption algorithms—and compromising public key infrastructure. According to a recent Ponemon Institute survey, “Preparing for a Quantum-Safe Future,” IT leaders are especially concerned over “harvest now, decrypt later” cyberattacks, which steal encrypted data today with plans to decrypt it. The survey also showed that most organizations have not established clear ownership, budget, and strategies to enable post-quantum cryptography (PQC). Fortunately, industry trends are in motion that will empower organizations to boost their investments and enforce PQC policies more proactively. The National Institute of Standards and Technology (NIST) plans to release new standards in mid-2024 to help organizations develop and document their approaches to quantum strategy. But the clock is ticking, and the time is now to prepare information security environments and processes for a post-quantum world. DIGITAL TRUST AND IDENTITY ARE FUNDAMENTAL As recent technology advances threaten to undermine cybersecurity strategies, establishing digital trust and identity is becoming even more essential. In the DigiCert State of Digital Trust reportOpens a new window , 99% of businesses surveyed indicated that losing customer trust can directly result in lost business. Industry and government organizations worldwide are moving fast to strengthen identity verification and trust. For example, in the EU (European Union), a new legislation called eIDAS emphasizes trust services more strongly. One example is a Qualified Website Authentication Certificate (QWAC). A QWAC makes it possible to authenticate a website and link it to the entity to which the certificate is issued. It enables secure internet connections by encrypting data and authenticating the owner of the website and the domain name. The new EU law will require browsers to display the information in these certificates prominently. The legislation will strengthen trust and identity while empowering consumers and the organizations they interact with. Governments, financial institutions, and online retailers will understand the value of displaying their identities and will be able to advise their customers to trust only websites that display QWACs. As more organizations emphasize digital trust, we’ll also see the increased adoption of zero-trust architectures. Based on the concept of “never trust, always verify,” these architectures will replace the traditional Virtual Private Networks(VPNs) and infrastructures built around implicit trust for users. Organizations can provide identity services, ensure integrity, and encrypt data and application interactions via certificate-mediated authentication. INSTILLING TRUST FROM THE TOP DOWN Like any major strategic initiative, these new approaches to cybersecurity, digital trust, and identity will require direction from the highest levels of an organization. We’re starting to see more enterprise organizations establish Digital Trust Officer (DTO) and Chief Trust Officer (CTrO) positions. These leaders are responsible for ensuring that an organization’s partners and customers can trust the organization’s digital assets. A DTO focuses on keeping an organization’s digital presence secure and reliable, with trust built into every digital interaction. Working closely with the Chief Technology Officer (CTO) and Chief Information Security Officer (CISO), they safeguard the organization and its reputation from cyber threats and legal and compliance risks. What makes a DTO different from a CISO or CTO? A Trust Officer considers the bigger picture beyond security and cyber concerns. They ensure trust is embedded throughout the organization, including its technology, processes, and individual best practices. A DTO also ensures the digital strategy aligns with the organization’s trust values. They must understand the nuances of security and the technical aspects of mitigating the associated risk. Rapid technological advances are changing how organizations think about cybersecurity and digital trust. But with a proactive approach, informed leaders, and the right strategies, there’s still time for organizations to tackle complex new challenges. How can your organization navigate AI and quantum threats? Let us know on FacebookOpens a new window , XOpens a new window , and LinkedInOpens a new window . We’d love to hear from you! Image Source: Shutterstock MORE ON DIGITAL THREATS * Toxic Trust: Navigating Cyber Threats on Familiar Websites * Guard Your Business: Preventing Accidental Insider Threats * Is Quantum Computing a Threat To Current Encryption Methods? * How to Tackle Cybersecurity Threats with a Risk-Based Approach Cybersecurity IT Security SHARE THIS ARTICLE: Dean Coclin Senior Director, Digital Trust Specialist , DigiCert opens a new window opens a new window opens a new window opens a new window Dean Coclin has more than 30 years of experience in cybersecurity, software and telecommunications. As Senior Director of Business Development at DigiCert, he is responsible for driving the companys strategic alliances with IoT partners in the consumer security market, and with other technology partners. Coclin is also the previous chair of the CA/Browser forum. He holds a BSEE from George Washington University and an MBA from Babson College. Coclin is currently pursuing a Masters Degree in Cybersecurity Policy and Compliance. Do you still have questions? Head over to the Spiceworks Community to find answers. Take me to Community Popular Articles Google Accounts Compromised by Hackers Without the Need for Passwords Passwords: The End Is Coming Experts Talk: Predicting the Cybersecurity Landscape in 2024 RECOMMENDED READS Artificial Intelligence ELON MUSK KICKS OFF BATTLE OF THE TECHNOCRATS, SAM ALTMAN RESPONDS Artificial Intelligence HOW AI PARTNERSHIPS CAN EMPOWER TRADITIONAL BANKS? Networking DECODING MWC BARCELONA 2024: A YEAR OF CONNECTIVITY AND TRANSFORMATION Innovation MEET YOUR NEW INTERN: THE RISE OF AI-POWERED DIGITAL WORKERS Artificial Intelligence MLOPS TOOLS COMPARED: MLFLOW VS. CLEARML—WHICH ONE IS RIGHT FOR YOU? Artificial Intelligence WHY PRIORITIZING HUMAN ELEMENT IS CRUCIAL FOR SMART MANUFACTURING spiceworks * About * Contact * Support * Advertise * Press / Media * Careers * Spiceworld * Blog * About Editorial * Follow on Facebook Follow on Linkedin * Sitemap * Privacy Policy * Terms of Use * Cookie Policy * Guidelines * Accessibility Statement * Do Not Sell my Personal Information * © Copyright 2006 - 2024 Spiceworks Inc. Go to mobile version WE CARE ABOUT YOUR PRIVACY If you consent, we and our 803 partners can store and access personal information on your device to provide a more personalised browsing experience. This is accomplished through processing personal data collected from browsing data stored in cookies. You can provide/withdraw consent and object to processing based on a legitimate interest at any time by clicking on the ‘Manage Preferences’ button.Our Privacy Policy WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development. List of Partners (vendors) Reject All I Accept Show Purposes