Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Contrast Security Executives to Help Defend Cyberspace as Active Participants of a Leading Tech Group the Company Co-Founded

Contrast Security (Contrast), the code security platform built for developers and trusted by security, announced its continued commitment to protecting customers, and the global application economy, by expanding its executive leadership within the Cybersecurity Tech Accord, a global coalition of more than 150 signatories committed to advancing trust and security in cyberspace.

Contrast’s Senior Vice President of Cyber Strategy Tom Kellermann, Chief Information Security Officer David Lindner and Senior Vice President of Corporate Development and Strategic Alliances Ben Goodman will partner with global technology companies within the Accord on initiatives that improve the security, stability and resilience of cyberspace and further create dialogue, discovery and decisive action. As a founding member, and signatory of the Accord, Contrast executives Kellermann, Lindner and Goodman will provide their unique expertise and guidance that will enable enterprises to defend against malicious threats.

Recommended AI: “Bitcoin Has No Intrinsic Value”. Then What Gives Bitcoin Value?

“Geopolitical tension in cyberspace continues to ramp up, along with increasing systemic cyberattacks against Western critical infrastructure. That is why it is critical for experts – from some of the largest corporations in the world – to come together to develop strategies of collective defense against cybercriminal activity. We must ensure organizations are equipped to protect their customers’ communities,” said Tom Kellermann, Senior Vice President of Cyber Strategy at Contrast Security. “My colleagues and I are honored to join the Cybersecurity Tech Accord to advance this cause. We look forward to providing our knowledge and resources.”

Contrast has delivered initial contributions to the Accord’s Zero Trust and CISO blog series. Kellermann provided a piece titled, “The Devil is in your Code: Zero trust in response to inevitable threats,” which explains how cyber criminals use island-hopping techniques to gain access to software code as a part of Zero Trust series. Lindner also authored a piece on the government’s moves to mandate transparency in an effort to stop cyberattacks titled, “Time to let the sun shine on your security’s dirty laundry: transparency is going to be regulated sooner than you think.”

Related Posts
1 of 40,860

Recommended AI: Top 10 Countries and Cities by Number of CCTV Cameras

“We’re excited to have Kellermann, Lindner and Goodman represent Contrast. Their influence in the industry is unmatched. We’re looking forward to their invaluable support as we work together to enhance the security of the software that we all rely on and improve cyber resiliency. The continued success and growth of our initiative relies on cooperation with responsible and engaged corporations like Contrast Security, who believe in our mission,” said Edoardo Ravaioli, Secretariat at the Cybersecurity Tech Accord.

Through a shared commitment, and collective action, signatories within the Accord aim to:

  • Provide their customers, users and the developer ecosystem with information and tools that enable them to understand current and future threats and better protect themselves.
  • Protect their customers and users everywhere by designing, developing and delivering products and services that prioritize security, privacy, integrity and reliability, and in turn reduce the likelihood, frequency, exploitability and severity of vulnerabilities.
  • Work with each other and likeminded groups to enhance cybersecurity best practices, such as improving technical collaboration, coordinated vulnerability disclosure and threat sharing, as well as ensuring flexible responses for the wider global technology ecosystem.
  • Oppose efforts to attack citizens and enterprises by protecting against exploitation of technology products and services during their development, design, distribution and use.

Recommended AI: How is Artificial Intelligence (AI) Changing the Future of Architecture?

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.