Thursday, 30 Apr 2026
Subscribe
logo logo
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
  • 🔥
  • data
  • revolutionizing
  • Stock
  • Investment
  • Future
  • Secures
  • Growth
  • Top
  • Funding
  • Power
  • Center
  • technology
Font ResizerAa
Silicon FlashSilicon Flash
Search
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Silicon Flash > Blog > Business > CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
Business

CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks

Published April 20, 2025 By Juwan Chacko
Share
4 Min Read
CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
SHARE

As cyber threats continue to evolve and become more sophisticated, adversaries are not only advancing their tactics but also collaborating with each other. Social engineering attacks, such as vishing, saw a significant increase of 442% between the first and second half of 2024, according to a report by CrowdStrike. This surge in social engineering attacks has led threat actors to shift away from traditional cyberattacks like deploying malware via malicious documents, opting instead to target help desks. CrowdStrike’s 2025 Global Threat Report reveals that a hacker can achieve lateral movement across a network in just 51 seconds.

Todd Felker, executive healthcare strategist at CrowdStrike, emphasizes that the rise in social engineering attacks highlights the exploitation of human psychology by adversaries. In a recent session at the CDW Executive SummIT in Chicago, Felker stated that organizations face more of an adversary problem than a vulnerability problem.

To combat these evolving threats, IT leaders must adopt a proactive and sophisticated defense strategy that focuses on data resilience, understanding adversary behavior, and leveraging artificial intelligence to counter social engineering tactics. Building a strong defense against cyber threats requires a deep understanding of the adversary landscape and implementing proactive measures to mitigate risks.

Shifting the security mindset from prevention to preparation is crucial in today’s threat landscape. Rex Washburn, data solutions architect at CDW, highlights the importance of cyber resiliency over the illusion of total prevention. With threat actors evolving rapidly, organizations must prioritize bouncing back from breaches and reducing downtime rather than solely focusing on preventing attacks.

Data resiliency plays a vital role in cyber resiliency, as it determines how quickly a team can recover lost data and respond to incidents. A multistep approach that includes immutable storage, continuous data validation, and an isolated recovery environment is key to achieving data resiliency. Building a modern cyber recovery environment, with features like immutable storage and regular data validation, can help organizations restore operations quickly after an attack.

See also  Building Collaboration Across CTOs, CIOs and Data Center Leaders for Greater Sustainability

Understanding the adversary landscape is essential for effective defense strategies. Security teams must be aware of the different types of threat actors, such as nation-state, e-crime, and hacktivists, and tailor their defenses accordingly. By implementing solutions that enhance identity and access management, secure cloud environments, and eliminate visibility gaps, organizations can strengthen their defenses against cyber threats.

Using AI to combat social engineering attacks is becoming increasingly important. Insurity CIO and CISO Jay Wilson suggests leveraging AI to simulate the tactics of cybercriminals and identify potential vulnerabilities in the system. Red-teaming exercises can help security teams understand the tactics of adversaries in social engineering attacks and improve their overall security posture.

In conclusion, staying ahead of cyber threats requires a proactive and adaptable approach to cybersecurity. By focusing on data resilience, understanding adversary behavior, and leveraging AI technologies, organizations can enhance their defense strategies and effectively combat evolving cyber threats. Stay informed and prepared to defend against the ever-evolving threat landscape.

TAGGED: Adversary, attacks, CDW, Executive, Intelligence, Leaders, Leverage, SummIT, Thwart
Share This Article
Facebook LinkedIn Email Copy Link Print
Previous Article Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat
Next Article LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
LinkedInFollow

Popular Posts

We just dropped the price for these Microsoft Surface SE Laptops under $200

As an affiliate, we may earn from qualifying purchases. Find out more › Not every…

April 20, 2025

Unlocking Performance: The Power of EkkoSoft Critical 9.0

Summary: EkkoSense has launched EkkoSoft Critical 9.0, a new release of its data center management…

May 24, 2025

Navigating the Future: Essential Insights for Investors in the YieldMax MSTR Option Income Strategy ETF

Summary: The YieldMax MSTR Option Income Strategy ETF offers an impressive dividend yield of 290%…

January 25, 2026

YearOne Secures Funding Partnership with Accenture Ventures

Summary: YearOne, a Boston-based company specializing in software development acceleration, has received an investment from…

August 2, 2025

Power Plays: The Ultimate Decider in AI Competition

In today's fast-paced world, Nabeel Mahmood asserts that the key to winning the AI race…

November 7, 2025

You Might Also Like

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search
Business

Revolutionizing Entertainment: OpenAI and Reliance Collaborate to Enhance JioHotstar with AI-Powered Search

Juwan Chacko
Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down
Business

Former Amazon Executive Takes the Helm at Remitly as CEO Matt Oppenheimer Steps Down

Juwan Chacko
Navigating the Pitfalls: A Guide for SMBs in Application Modernization
Business

Navigating the Pitfalls: A Guide for SMBs in Application Modernization

Juwan Chacko
Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration
Business

Concert Ticket Sales Now Available on Spotify Thanks to SeatGeek Collaboration

Juwan Chacko
logo logo
Facebook Linkedin Rss

About US

Silicon Flash: Stay informed with the latest Tech News, Innovations, Gadgets, AI, Data Center, and Industry trends from around the world—all in one place.

Top Categories
  • Technology
  • Business
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2025 – siliconflash.com – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?