3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Business Email Compromise (BEC)

Secure the Changing Risk Landscape from BEC, Other Threats

Canon EMEA's Quentyn Taylor on Avoiding Cyber Hygiene Oversights
Quentyn Taylor, director of information security - EMEA, Canon

As ransomware attacks continue to dominate news headlines, Quentyn Taylor, a Canon director of information security, cautions organizations not to forget about "some of the other threats, like business email compromise," which continue to cripple organizations through financial and reputational damage.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

"Focus on those basics," he says. "Even if you look at some of the really complicated attacks, what you see at their heart: You see a server that was exposed. You see an RDP server that shouldn't have been there. You see a forgotten VPN endpoint."

In a video interview with Information Security Media Group, Taylor also discusses:

  • How the move to large-scale remote working changed Canon;
  • Today's threat landscape and how organizations can strengthen their defenses;
  • How ransomware trends are changing cyber insurance.

Taylor is director of information security for Europe, the Middle East and Africa at Canon, an imaging equipment and information systems provider. Before joining Canon, he worked in a variety of industries, including for internet service providers and startup businesses.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.