Eric Leblond, CTO of Stamus Networks: It’s time to promote defenders

Eric Leblond, CTO of Stamus Networks: It’s time to promote defenders

On the occasion of FIC 2022, Stamus Networks will feature the latest iteration of Stamus Security Platform which is a network threat detection system. Thanks to its innovations, which are partly based on technologies of the artificial intelligence type, it makes it possible to reduce investigation times. For Eric Leblond, CTO of Stamus Networks, one of the key principles at Stamus Networks remains the promotion of defenders.


Global Security Mag: What will be your news at the International Cybersecurity Forum 2022?

Eric Leblond: We are going to present for the first time publicly the latest iteration of Stamus Security Platform which is a network threat detection system. By combining feedback from our customers and the results of research from our R&D, we have improved the threat detection capabilities of the solution while reducing the time required for investigation.

Global Security Mag: What are the strong points of the solutions that you are going to present on this occasion?

Eric Leblond: The latest version of Stamus Security Platform implements new detection methods using artificial intelligence type technologies. The main defect of these technologies is to provide opaque results for the user. We have therefore developed these functionalities with a strong internal constraint: the results must be quickly analyzable and verifiable by our customers. This is essential in a field where the talent shortage is significant.

In this same perspective, our solution offers multiple reading grids to adapt to the heterogeneity of the level of the teams. A novice analyst will find documented and presented information clearly and succinctly about the threats present on the network and an experienced analyst will be able to carry out much more in-depth research. The product of this research is also injected by the experienced analyst into the section dedicated to novice analysts to allow them to contribute to the investigations and thus help them scale up.

Global Security Mag: Since the beginning of the year, have you noticed the rise of new cyber threats?

Eric Leblond: Not really, the big trend of ransomware is still there and the professionalism of the actors behind the cyber-threats remains in constant progression. Unfortunately, the same goes for their resilience. We can for example cite the return of Emotet which had however been dismantled last year during a large-scale operation carried out by the police of several countries.

Global Security Mag: How should technologies evolve to counter these threats?

Eric Leblond: In this era of ransomware, it is obvious that the detection of compromises must intervene before they cause the paralysis of the information system. It is therefore a race against the clock that must be done constantly and with teams that are often understaffed. This induces unbearable stress on security teams leading to burnout or career change. Management has its part to play by defining appropriate processes to hold the situation in the long term. But it must be helped by defense technologies which have to evolve in order, on the one hand, to provide ever more automation in detection and response. All while managing the flow of information in such a way as to limit the stress on the security teams.

Global Security Mag: In your opinion, what place can humans have to reinforce the defense strategy to be deployed?

Eric Leblond: I see two aspects to this question. On the one hand, humans are the most common entry point during compromises. Indeed, phishing by email remains the most used technique and it relies on the ability to deceive humans. Training and raising awareness of cybersecurity for all of the organization’s teams is therefore one of the main keys.

On the other hand, humans will remain the best orchestrator of the defense of information systems for a long time to come. His arbitration skills when pressing the red button to trigger a response that can cut equipment or more are unsurpassable. The modeling of an attack and an automated response is always fallible because factors outside the technique cannot be integrated but will be known and evaluated by humans. It is therefore necessary to place humans at the center of detection and response while taking into account their capabilities and limitations. The human capacity to process information is weak and technological solutions must strive to offer processed, synthesized and prepared data for human understanding. This will reduce the stress induced and facilitate the action of security actors.

Global Security Mag: There has been a shortage of talent for years, what actions can cybersecurity players take to attract new talent?

Eric Leblond: One of the key principles at Stamus Networks is the promotion of defenders. The cybersecurity industry and the media elevate the attacker, the hacker to a modern-day hero, a human David against the technological Goliath. This is reassuring: humans would always be able to stand up to threatening and dominating technology. When in fact, in the days of Malware as a Service, it is only a clash of technologies, a new version of the projectile against the armour. And here bad intentions are often on the side of the projectile.

At the house of Stamus Networks, we think it’s time to promote the image of the defender. His work is noble, complex and should have recognition at this height. By changing this, we will make careers in cyber defense much more attractive.

Global Security Mag: What message would you like to convey to CISOs?

Eric Leblond: I’ll start with thank you and good luck. We know how difficult this job can be and we do everything to help CISOs and their teams by offering solutions designed to reduce detection time while reducing the pressure on their shoulders.

- sales contact: or Steve Patton VP of Sales EMEA


We wish to say thanks to the author of this write-up for this incredible web content

Eric Leblond, CTO of Stamus Networks: It’s time to promote defenders

Discover our social media profiles as well as the other related pages