Critical Infrastructure Security , Incident & Breach Response , Intrusion Prevention Systems (IPS)

Are You APT-Ready? The Role of Breach and Attack Simulation

Cymulate's Tim Ager Discusses Security Control Validation in the Age of Advanced Attacks
Tim Ager, vice president of sales, EMEA, Cymulate

With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated validation of controls, says Cymulate's Tim Ager.

"By the year 2021, analysts are predicting that cybercrime will be worth about $6 trillion worldwide," he says. "So it's an arms race that I would argue that organizations are losing right now, and I think there are many reasons for that."

In a video interview at the recent Infosecurity Europe conference, Ager discusses:

  • The state of data breaches and cyberattacks, including advanced persistent threats;
  • The rise of breach and attack simulation tools, and why Gartner is tracking them;
  • Handling advanced attacks in today's resource-constrained environment.

Ager is vice president of sales for Cymulate in Europe, the Middle East and Africa. Ager has held senior management roles at a number of cybersecurity companies for over 16 years. Most recently, he ran the sales team at Osirium.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.