Monday, 16 Mar 2026
Subscribe
logo logo
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
  • 🔥
  • data
  • revolutionizing
  • Stock
  • Investment
  • Future
  • Secures
  • Growth
  • Top
  • Funding
  • Power
  • Center
  • technology
Font ResizerAa
Silicon FlashSilicon Flash
Search
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Silicon Flash > Blog > Business > CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
Business

CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks

Published April 20, 2025 By Juwan Chacko
Share
4 Min Read
CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
SHARE

As cyber threats continue to evolve and become more sophisticated, adversaries are not only advancing their tactics but also collaborating with each other. Social engineering attacks, such as vishing, saw a significant increase of 442% between the first and second half of 2024, according to a report by CrowdStrike. This surge in social engineering attacks has led threat actors to shift away from traditional cyberattacks like deploying malware via malicious documents, opting instead to target help desks. CrowdStrike’s 2025 Global Threat Report reveals that a hacker can achieve lateral movement across a network in just 51 seconds.

Todd Felker, executive healthcare strategist at CrowdStrike, emphasizes that the rise in social engineering attacks highlights the exploitation of human psychology by adversaries. In a recent session at the CDW Executive SummIT in Chicago, Felker stated that organizations face more of an adversary problem than a vulnerability problem.

To combat these evolving threats, IT leaders must adopt a proactive and sophisticated defense strategy that focuses on data resilience, understanding adversary behavior, and leveraging artificial intelligence to counter social engineering tactics. Building a strong defense against cyber threats requires a deep understanding of the adversary landscape and implementing proactive measures to mitigate risks.

Shifting the security mindset from prevention to preparation is crucial in today’s threat landscape. Rex Washburn, data solutions architect at CDW, highlights the importance of cyber resiliency over the illusion of total prevention. With threat actors evolving rapidly, organizations must prioritize bouncing back from breaches and reducing downtime rather than solely focusing on preventing attacks.

Data resiliency plays a vital role in cyber resiliency, as it determines how quickly a team can recover lost data and respond to incidents. A multistep approach that includes immutable storage, continuous data validation, and an isolated recovery environment is key to achieving data resiliency. Building a modern cyber recovery environment, with features like immutable storage and regular data validation, can help organizations restore operations quickly after an attack.

See also  The Epic Shift: Where Computer Science Students are Flocking to Instead

Understanding the adversary landscape is essential for effective defense strategies. Security teams must be aware of the different types of threat actors, such as nation-state, e-crime, and hacktivists, and tailor their defenses accordingly. By implementing solutions that enhance identity and access management, secure cloud environments, and eliminate visibility gaps, organizations can strengthen their defenses against cyber threats.

Using AI to combat social engineering attacks is becoming increasingly important. Insurity CIO and CISO Jay Wilson suggests leveraging AI to simulate the tactics of cybercriminals and identify potential vulnerabilities in the system. Red-teaming exercises can help security teams understand the tactics of adversaries in social engineering attacks and improve their overall security posture.

In conclusion, staying ahead of cyber threats requires a proactive and adaptable approach to cybersecurity. By focusing on data resilience, understanding adversary behavior, and leveraging AI technologies, organizations can enhance their defense strategies and effectively combat evolving cyber threats. Stay informed and prepared to defend against the ever-evolving threat landscape.

TAGGED: Adversary, attacks, CDW, Executive, Intelligence, Leaders, Leverage, SummIT, Thwart
Share This Article
Facebook LinkedIn Email Copy Link Print
Previous Article Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat
Next Article LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
LinkedInFollow

Popular Posts

Writer AI CEO Exposes Fortune 500 Leaders’ Tech Mismanagement

Summary: 1. May Habib, CEO of Writer AI, discussed how corporate AI failures are damaging…

October 23, 2025

Nokia and Tampnet Revolutionize Offshore Connectivity with 5G Expansion to the Gulf

Nokia and Tampnet have joined forces to bring 5G offshore connectivity to the Gulf of…

December 11, 2025

Crocs Craze Sweeping Global Markets: High Demand Overseas as North America Lags

Crocs (NASDAQ:CROX) reported a decline in overall sales, but surpassed expectations by a significant margin.…

February 12, 2026

The Incredible Growth of Investing $10,000 in Berkshire Hathaway Over 5 Years

Summary: 1. Berkshire Hathaway, under Warren Buffett's leadership, has been a highly successful long-term investment,…

September 19, 2025

Revolutionizing the Data Center Landscape: Insights from Uptime Institute’s 15th Annual Global Survey

The Uptime Institute recently published its 15th Annual Global Data Center Survey for 2025, offering…

August 4, 2025

You Might Also Like

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search
Business

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search

Juwan Chacko
Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down
Business

Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down

Juwan Chacko
Navigating the Pitfalls: A Guide for SMBs in Application Modernization
Business

Navigating the Pitfalls: A Guide for SMBs in Application Modernization

Juwan Chacko
Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration
Business

Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration

Juwan Chacko
logo logo
Facebook Linkedin Rss

About US

Silicon Flash: Stay informed with the latest Tech News, Innovations, Gadgets, AI, Data Center, and Industry trends from around the world—all in one place.

Top Categories
  • Technology
  • Business
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2025 – siliconflash.com – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?