Eric Lebland, CTO of Stamus Network: It’s time to promote defenders
At FIC 2022, Stamus Networks will present the latest iteration of the Stamus Security Platform, a network threat detection system. Thanks to its innovations, which are partly based on artificial intelligence technology, it makes it possible to reduce the time of investigation. For Eric Lebland, CTO of the Stamus Network, one of the key principles of the Stamus Network is the promotion of defenders.
Global Security Mag: What will be your news at the International Cyber Security Forum 2022?
Eric Lebland: We are going to present the latest iteration to the public for the first time. Stamus Security Platform Which is a network threat detection system. By combining feedback from our customers and research results from our R&D, we’ve improved the threat detection capability by reducing the time required for investigation.
Global Security Mag: What are the strengths of the solutions you are going to present at this event?
Eric Lebland: The latest version The Stamus security platform implements new detection methods using artificial intelligence technology. The main drawback of this technology is that it provides opaque results to the user. So we built these functionalities with a strong internal limitation: the results must be quickly analyzed and verified by our customers. This is essential in cases where the talent deficit is significant.
In this same context, our solution offers multiple reading grids to adapt to the differences in the level of teams. A novice analyst will find clearly and concisely documented and presented information about the threats present in the network and an experienced analyst will be able to do much more in-depth research. The product of this study is injected into the section dedicated to new analysts by experienced analysts so that they are able to contribute to the investigation and thus help to increase their scale.
Global Security Mag: Since the beginning of the year, have you noticed the emergence of new cyber threats?
Eric Lebland: Not really, its a big trend ransomware There is still, and the professionalism of the actors behind the cyber-threat is constantly evolving. Unfortunately, the same goes for their resilience. We can mention, for example, the return of Emotet, which was broken into last year during a large-scale operation by police in several countries.
Global Security Mag: How should technologies be developed to deal with these threats?
Eric Lebland: In this age ransomware, It is clear that the identification of the compromise must be intervened before the information system can be paralyzed. So it’s a race against the clock that must continue and with teams that often have less staff. This puts unbearable pressure on the security forces which leads to burnout or career change. Management has a role to play in defining appropriate processes to sustain the situation in the long run. But it must be aided by defense technology that, on the one hand, needs to evolve to provide more automation in detection and response. When managing the flow of information in such a way as to limit the pressure on the security team.
Global Security Mag: Where do you think people can strengthen their defenses to deploy?
Eric Lebland: I see two sides to this question. On the one hand, people are the most common entry point when it comes to compromise. In fact, phishing via email has become one of the most widely used tactics, and it depends on its ability to deceive people. So training and raising awareness about cyber security is one of the key for all groups in the organization.
On the other hand, people will be the best orchestrators of information system defense for a long time to come. Its ability to arbitrate to trigger a response by pressing a red button that can cut tools or more is unmatched. Attack modeling and an automated response are always wrong because external factors cannot be combined but will be known and evaluated by humans. Therefore, it is necessary to put it at the center of identification and response, taking into account human capabilities and limitations. Human capacity for data processing is weak and technological solutions need to try to offer processed, synthesized and ready data for human understanding. This will reduce stress and facilitate the actions of security actors.
Global Security Mag: There has been a shortage of talent year after year, what steps can cyber security players take to attract new talent?
Eric Lebland: One of the key principles of the Stamus Network is the promotion of defenders. The cyber security industry and media attacker, the hacker, is promoted as a modern day hero, a human David against the technological Goliath. This is reassuring: people will always be able to stand up against threats and the dominance of technology. When in fact, as a service in the days of malware, it’s just a clash of technologies, a new version of the launch against Armor. And bad intentions here are often in favor of projection.
In its house Stamus Network, We think it’s time to improve the image of the defender. His work is magnificent, complex and should be recognized at this height. By changing this, we will make our career in cyber defense more attractive.
Global Security Mag: What message would you like to send to CISO?
Eric LeBlanc: I’ll start with thank you and best wishes. We know how difficult this task can be and we do everything we can to help CISO and their team by offering solutions designed to reduce detection time by reducing the pressure on their shoulders.
Sales Contact: firstname.lastname@example.org or Steve Patton VP of Sales EMEA email@example.com