Steve Tcherchian

Steve Tcherchian, CISSP, PCI-ISA, PCIP is the Chief Product Officer and Chief Information Security Officer for XYPRO Technology. Steve is on the ISSA CISO Advisory Board, the NonStop Under 40 executive board and part of the ANSI X9 Security Standards Committee. With over 20 years in the cybersecurity field, Steve is responsible for strategy and innovation of XYPRO’s security product line as well as overseeing XYPRO’s risk, compliance and security to ensure the best experience to customers in the Mission-Critical computing marketplace.

Steve is an engaging and dynamic speaker who regularly presents on cybersecurity topics at conferences around the world.

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn't been said before - that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 - is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today - credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2 factor authentication.
Read more

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn't been said before - that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 - is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today - credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2-factor authentication.
Read more

Strategies for Capturing and Creating Value from your Security Data

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last decade, computing power has advanced to the point where generating and storing massive amounts of data has become highly cost-efficient.
Read more

Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection

It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.
Read more

Risk Management in the Real World:
Today, Tomorrow and Beyond

[vc_row][vc_column][vc_empty_space][vc_column_text]

2018 was another troubling year in the cybersecurity world. We saw a repeat of last year’s data breaches on a larger scale. Google, Toyota, Facebook, Under Armour, LifeLock, Air Canada, Blue Cross and many, many more fell victim to some sort of compromise. Hardly a week went by where we weren’t reading about a new mega breach. Even the popular online video game, Fortnite, was hacked and children’s personal data was found for sale on the dark web.…

Read more

XYPRO and SailPoint Partner to Provide Identity Management for HPE NonStop

[vc_row][vc_column][vc_empty_space][vc_column_text]XYPRO is thrilled to announce our Identity+ Alliance partnership with SailPoint, a proven leader in enterprise Identity Management.

Working closely with our customers and SailPoint, we are also excited to announce the general availability release of XYPRO’s newest solution, NonStop Identity Connector for SailPoint (XIC).

 

 

Using XIC, HPE NonStop customers can now integrate their NonStop servers with their SailPoint IdentityIQ, enabling seamless participation within the enterprise.…

Read more

Ready Player None: Protecting What You Can’t See

[vc_row][vc_column][vc_empty_space][vc_column_text]There is quite a large disconnect in the way breaches are evolving versus how security solutions are keeping up to address them. Virtualization adds an entire new layer of complexity to the puzzle. As a security strategist, I’m constantly evaluating what is possible to help identify gaps and opportunities. The one thing I have learned over the course of my career:

The only thing constant in cyber security is that attackers’ methods will continue to evolve.  …

Read more