For its new participation in the FIC, Trend Micro will present its Trend Micro One offer, which is the brand of the unified cybersecurity platform. It encompasses the entire Trend Micro offering: products, services, technologies, and third-party integrations. It optimizes the protection of cloud, terminals (endpoints), email, networks and IoT environments and offers an XDR function. For Nicolas Arpagian, Director Cybersecurity Strategy of Trend Micro Europe, this new platform allows companies to understand and control cybersecurity risks within their organization.
Global Security Mag: What will be your news at the International Cybersecurity Forum 2022?
Nicolas Arpagian: We want to present our offer to the market Trend Micro Onewhich is the brand of the unified cybersecurity platform that we offer to our customers.
This platform has the advantage of encompassing the entire Trend Micro offering: products, services, technologies and integrations with third parties. It thus reflects all of our solutions, their integration and interactions with each other, as well as the resulting advantages. With such a device integrated across the entire IT ecosystem, we promote relevant value creation for our customers.
Global Security Mag: What are the strong points of the solutions that you are going to present on this occasion?
Nicolas Arpagian: Trend Micro One is a unified cybersecurity platform. It optimizes the protection of the cloud, terminals (endpoints), email, networks and IoT environments. This solution offers an XDR function and consolidated visibility, allowing companies to understand and control cybersecurity risks within their organization.
Global Security Mag: Since the beginning of the year, have you noticed the rise of new cyber threats?
Nicolas Arpagian: We have seen a continuous intensification of attack campaigns which now target all connected instances, without any real distinction. In addition, our studies bring to light malicious practices that are structured: such as the hacking of cloud computing equipment for the purpose of mining cryptocurrencies or the deployment of offers to sell connection data to computer information systems. companies or communities that we have characterized under the term “access-as-a-service”. Likewise, we are seeing an increased use of bogus apps to break into users’ systems and gain access to the heart of their smartphones, for example. The troubled diplomatic period of recent months has seen the growth of activism by cyber-mercenaries who conduct their offensive actions in a geopolitical context.
Global Security Mag: How should technologies evolve to counter these threats?
Nicolas Arpagian: We rely on two strategic dimensions: on the one hand, continuous development of expert skills. This is particularly the case with the work of the Zero Day Initiative that we organize and which allows ethical hackers all over the world to document technical faults in equipment of all kinds throughout the year. During the 15th edition of PWN2OWN Vancouver 2022 in mid-May, it was entry points in Windows or Tesla 3 software that could be corrected. We encourage and promote this permanent innovation in the service of cybersecurity.
On the other hand, we are working on the development of increasingly effective detection tools that can adapt to the diversity of the technical environments of companies, which often bring together different generations of software, with evolving perimeters.
Global Security Mag: In your opinion, what place can humans have to reinforce the defense strategy to be deployed?
Nicolas Arpagian: People are at the heart of cybersecurity: whether it involves designing protection solutions and means of understanding malicious uses. Or users within companies who use the information systems and digital assets of economic players on a daily basis to offer new services, innovate and create value.
These two communities are not antagonistic: knowledge of cybersecurity must be disseminated so that the processes of one do not penalize the work of the other. And that the consumption of digital services by others does not weaken the entire organization.
Global Security Mag: There has been a shortage of talent for years, what actions can cybersecurity players put in place to attract new talent?
Nicolas Arpagian: Cybersecurity needs to be better known in the diversity of the missions it carries out: from upstream advice, to the selection of solutions, including their installation and operational management in cooperation with the business teams. Without forgetting crisis management and remediation. All of these activities require a plurality of talents and expertise that can interest very different profiles, from beginners to very experienced. Women obviously have their place here.
Global Security Mag: What message would you like to convey to CISOs?
Nicolas Arpagian: Listen to the market more than ever to understand the reality of available solutions that can meet your technical, financial and regulatory needs. Beware of technological mirages that promise on paper an innovative breakthrough because it is only modestly and partially verified on the ground. Plan your partnership choices over the long term to ensure that your service providers will respond over time. Cybersecurity cannot be conceived through constant change, which is often a vector of instability and weakening.