Thursday, 30 Apr 2026
Subscribe
logo logo
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
  • 🔥
  • data
  • revolutionizing
  • Stock
  • Investment
  • Future
  • Secures
  • Growth
  • Top
  • Funding
  • Power
  • Center
  • technology
Font ResizerAa
Silicon FlashSilicon Flash
Search
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Silicon Flash > Blog > Business > CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
Business

CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks

Published April 20, 2025 By Juwan Chacko
Share
4 Min Read
CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
SHARE

As cyber threats continue to evolve and become more sophisticated, adversaries are not only advancing their tactics but also collaborating with each other. Social engineering attacks, such as vishing, saw a significant increase of 442% between the first and second half of 2024, according to a report by CrowdStrike. This surge in social engineering attacks has led threat actors to shift away from traditional cyberattacks like deploying malware via malicious documents, opting instead to target help desks. CrowdStrike’s 2025 Global Threat Report reveals that a hacker can achieve lateral movement across a network in just 51 seconds.

Todd Felker, executive healthcare strategist at CrowdStrike, emphasizes that the rise in social engineering attacks highlights the exploitation of human psychology by adversaries. In a recent session at the CDW Executive SummIT in Chicago, Felker stated that organizations face more of an adversary problem than a vulnerability problem.

To combat these evolving threats, IT leaders must adopt a proactive and sophisticated defense strategy that focuses on data resilience, understanding adversary behavior, and leveraging artificial intelligence to counter social engineering tactics. Building a strong defense against cyber threats requires a deep understanding of the adversary landscape and implementing proactive measures to mitigate risks.

Shifting the security mindset from prevention to preparation is crucial in today’s threat landscape. Rex Washburn, data solutions architect at CDW, highlights the importance of cyber resiliency over the illusion of total prevention. With threat actors evolving rapidly, organizations must prioritize bouncing back from breaches and reducing downtime rather than solely focusing on preventing attacks.

Data resiliency plays a vital role in cyber resiliency, as it determines how quickly a team can recover lost data and respond to incidents. A multistep approach that includes immutable storage, continuous data validation, and an isolated recovery environment is key to achieving data resiliency. Building a modern cyber recovery environment, with features like immutable storage and regular data validation, can help organizations restore operations quickly after an attack.

See also  JPMorgan Refuses to Cover Legal Costs for Frank Founder Charlie Javice

Understanding the adversary landscape is essential for effective defense strategies. Security teams must be aware of the different types of threat actors, such as nation-state, e-crime, and hacktivists, and tailor their defenses accordingly. By implementing solutions that enhance identity and access management, secure cloud environments, and eliminate visibility gaps, organizations can strengthen their defenses against cyber threats.

Using AI to combat social engineering attacks is becoming increasingly important. Insurity CIO and CISO Jay Wilson suggests leveraging AI to simulate the tactics of cybercriminals and identify potential vulnerabilities in the system. Red-teaming exercises can help security teams understand the tactics of adversaries in social engineering attacks and improve their overall security posture.

In conclusion, staying ahead of cyber threats requires a proactive and adaptable approach to cybersecurity. By focusing on data resilience, understanding adversary behavior, and leveraging AI technologies, organizations can enhance their defense strategies and effectively combat evolving cyber threats. Stay informed and prepared to defend against the ever-evolving threat landscape.

TAGGED: Adversary, attacks, CDW, Executive, Intelligence, Leaders, Leverage, SummIT, Thwart
Share This Article
Facebook LinkedIn Email Copy Link Print
Previous Article Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat
Next Article LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
LinkedInFollow

Popular Posts

Understanding the Distinction Between Agentic AI and AI Agents

As decision-makers contemplate investing in AI, the comparison between agentic AI and AI agents becomes…

May 7, 2025

Blue Origin’s Space Adventure: Jeff Bezos’ Wedding Celebration Takes a Backseat

Blue Origin, the space venture founded by Jeff Bezos, successfully launched six more travelers into…

June 30, 2025

Blueprint Finance Secures $9.5 Million in Additional Funding

Blueprint Finance Secures $9.5M in Funding for DeFi Infrastructure Development Blueprint Finance, a New York…

June 23, 2025

Anthropic’s $30B Investment: Commitment to Sustainable Energy for Data Centers

Summary: 1. Anthropic, a chatbot maker, raised $30 billion in funding, doubling its valuation to…

February 13, 2026

Top Artificial Intelligence Stocks to Watch for the Next 5 Years

Summary: 1. The AI revolution is still a huge opportunity with a long runway for…

November 12, 2025

You Might Also Like

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search
Business

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search

Juwan Chacko
Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down
Business

Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down

Juwan Chacko
Navigating the Pitfalls: A Guide for SMBs in Application Modernization
Business

Navigating the Pitfalls: A Guide for SMBs in Application Modernization

Juwan Chacko
Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration
Business

Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration

Juwan Chacko
logo logo
Facebook Linkedin Rss

About US

Silicon Flash: Stay informed with the latest Tech News, Innovations, Gadgets, AI, Data Center, and Industry trends from around the world—all in one place.

Top Categories
  • Technology
  • Business
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2025 – siliconflash.com – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?