Cette page est disponible uniquement en anglais

Update
21.10.2024
Experts project that the global cost of cybercrime will reach USD 10.5 trillion annually by 2025, up from USD 3 trillion in 2015. This exponential rise highlights the growing sophistication and frequency of cyber-attacks. In Cybersecurity Awareness Month, we asked our Chief Information Security Officer (CISO) Dennis Langhorst to share his latest insights on navigating the complexities of information security.

“At NautaDutilh, we prioritise the confidentiality, security, and integrity of information, for our clients as well as in our own operations”, says Dennis Langhorst. “Our team strives to learn and improve every day. We do this in all areas, from technical measures to organisational strategies. Information security is never complete; what is secure today may be a significant risk tomorrow. Together with my team, we aim to implement the best proactive and responsive measures as possible to address the latest risks.”

What are Dennis’ latest insights on protecting sensitive data and mitigating risks?

  • #1. Prepare for AI, deepfakes and quantum computing risks

    Artificial Intelligence (AI) presents several formidable challenges to information security. One of the most significant threats is deepfake technology, which leverages AI to produce highly realistic yet entirely fabricated videos and images. These deepfakes can be used to manipulate public opinion, perpetrate fraud, or breach personal and corporate security by impersonating individuals or spreading disinformation.

    Moreover, AI can be harnessed by cybercriminals to automate and enhance traditional attack methods. For instance, AI-driven algorithms can execute phishing attacks and exploit vulnerabilities in software systems efficiently. This automation increases the scale and speed at which malicious activities can be conducted, making it harder for security teams to detect and respond to threats in real-time. To mitigate these risks, organisations must invest in advanced detection tools as well as continuous training and awareness programs to educate all colleagues on recognising potential threats and establishing robust verification protocols.

    Quantum computing promises to revolutionise calculations by leveraging fundamental physics to solve complex problems rapidly. While it could greatly improve encryption, making data more secure, it also threatens current encryption methods by easily breaking them. Organisations must prepare now by creating quantum-resistant encryption strategies.

  • #2. Never underestimate the importance of a good system administrator

    A skilled system administrator is the backbone of any organisation. They are important for managing, maintaining, and securing your IT infrastructure. A proficient system administrator can foresee potential vulnerabilities, implement necessary updates and system hardening, and respond swiftly to security incidents. Investing in continuous (security) training and development for your system administrators is vital. Keeping them abreast of the latest security trends and technologies ensures that they are well-equipped to protect your organisation from emerging threats. Additionally, fostering a culture of collaboration between system administrators and other departments can enhance overall security awareness within the organisation.

  • #3. Enhance security and user experience by going passwordless

    Password fatigue, poor password hygiene, and sophisticated hacking techniques have rendered traditional password-based systems vulnerable. The solution? Embracing passwordless methods, such as biometric verification, hardware tokens, and single sign-on (SSO) solutions. These methods not only improve security, but also enhance user experience by simplifying the login process. Transitioning to passwordless authentication requires careful planning and implementation, but the long-term benefits far outweigh the initial efforts.

    Dennis concludes that staying ahead in information security requires a proactive multifaceted approach. Do you have any questions about cybersecurity or would you like to discuss your organisation’s risk management practices? Our Benelux Information & Communication Technology team gladly offers cutting-edge legal advice.

Do you have any questions about cybersecurity, or would you like to discuss your organisation’s risk management practices? Our Technology team is happy to offer cutting-edge legal advice.

Related articles

Notification de cookies

Cette fonctionnalité utilise des cookies tiers. Modifiez votre cookie préférences pour visualiser ce contenu ou afficher plus d'informations.
Ces cookies assurent le bon fonctionnement du site. Ces cookies ne peuvent pas être désactivés.
Ces cookies peuvent être placés par des tiers, tels que YouTube ou Vimeo.
En désactivant certaines catégories, les fonctionnalités associées au sein du site risquent de ne plus fonctionner correctement. Vous pouvez modifier vos préférences ultérieurement. Voir plus d'informations.