Cybersecurity remains one of the key factors in sustaining businesses not only in critical sectors, as evidenced by the multi-sector increase in cyber threats globally in recent years.
Once again, Sofistic has sponsored the International Cybersecurity and Fraud Prevention Congress. On this occasion it has been from the hand of Exabeam, the incident detection and investigation system, which collects and correlates events from different sources, analyzing them together to succeed where traditional approaches to detection, investigation and response fall short.
The congress took place in Panama from March 23 to 25 and was attended by members of the Panamanian and Colombian teams. In Sofistic’s two exhibition spaces, one of them with Atlantis SOC, we were able to meet with attendees, suppliers, customers, friends and colleagues from the region.
Photo: Presentation “Onboarding & CIAM, a competitive advantage” – 25/03/2022
Why has Customer Identity and Access Management (CIAM) become a key factor?
Sofistic was able to attend not only as a sponsor, but also as speakers: this time with the presentation “Onboarding & CIAM, a competitive advantage”, where our colleagues Juan David Diaz, Senior Cybersecurity Consultant and Luis Esparza, Project Manager, showed how identity management can become an advantage that differentiates from the competence.
The presentation reviewed one by one the keys to this technology, especially for the financial banking sector, as well as the advantages of electronic signatures for both the company and the customer.
How does CIAM protect customer information?
Encrypts data in a way that makes it very difficult or impossible to use
Alerts administrators to suspicious activity.
Makes manipulation of logs obvious, making it difficult to cover tracks when attempting to breach the data
Limits the number of logs an administrator can download so that they cannot act quickly, giving them more time to detect suspicious activity
Cyberthreats are part of day-to-day business in the international aviation sector. These are organizations that, due to their criticality, are a major attraction for cyber-attacks worldwide.
Every company must contemplate the situation that its cybersecurity will be vulnerable at some point, and avoid improvisation when this happens, preparing a response plan both at the technical level and in the communication of the attack.