Intelligent CISO Issue 12 | Page 71

GO PHISH MAOR, T, DIRECTOR OF SOLUTIONS MANAGEMEN SYNOPSYS , WHO TELLS US ABOUT LIFE INSIDE WE GO PHISHING WITH OFER AND OUTSIDE THE OFFICE. What would you describe as your most memorable achievement in the cybersecurity industry? gy The Seeker product. The technolo that my team created when Seeker a part was a standalone company (now new ly plete com a was s) of Synopsy tified technology that automatically iden wn Kno . ions vulnerabilities in applicat rity secu ion licat app as interactive now testing (IAST), this technology is rity secu transforming how soft ware testing takes place in many firms. in as IAST fits into the DevOps toolcha r faste to organisations are switching us tinuo con and development cycles delivery of soft ware. What first made you think of a career in cybersecurity? anding I’ve always been drawn to underst be can they how and work s thing how was IT in jobs broken. One of my first an as a technical support engineer for This net. Inter the of days y earl the ISP in I would say that the biggest area of investment right now, in terms of security, is people. www.intelligentciso.com | Issue 12 exposed me to the amazing capabilities of the Internet, but also to how easy it is to abuse it and take advantage of it. I quickly became fascinated by this space, seeing what can be broken and how, but also how it can be fixed. er I’ve spent a large part of my care king brea ker, hac al working as an ethic ing arch rese and ems into syst new vulnerabilities, while helping nst organisations build protection agai still I’m , date this To such attacks. fascinated by the innovation and al creativity hackers (preferably ethic into king brea in rate ones) demonst systems and code. What style of management philosophy do you employ with your current position? . I I am generally a ‘hands-off’ manager do can that focus on recruiting people let the job they are tasked with and I goals ble ieva ach set to like I them do it. s tool the with team my ide prov to and For ls. goa e thos they need to achieve ur of the role I’m in today, I’m also in favo that tives initia ng drivi – ities activ ix matr ing the are cross-organisational and gett tive initia such each for right resources . ded as nee pervasive theme dictating the evolving approach organisations take to r cybersecurity is the push for faste idea This ent. lopm deve soft ware is completely changes the way soft ware shift digm para a ing built. It is also caus in how we secure those systems. h to To achieve this ever-faster approac ng seei are we ent, lopm software deve of two important trends. First is the use dly rapi is h whic open source software, new increasing. This introduces a whole , the ond Sec . tions nisa orga to risks set of lly ifica spec e move to the cloud and mor o micr as h (suc ures itect to new cloud arch how ging chan is etc.) s, erles serv , services we look at software delivery. of Outside of the soft ware space, one is y toda s area ing lleng cha t mos the nential endpoint protection. With the expo r othe and are omw grow th of rans ‘click- endpoint attacks, combined with e hug a g eager’ users, it is becomin nd defe to s tion nisa challenge for orga cks. atta t poin end tain and con What do you think is the current hot cybersecurity talking point? How do you deal with stress and unwind outside the office? e It’s hard to choose just one, as ther are so many different hot topics. In t the soft ware security space, the mos it. I don’t deal with stress. I embrace ful help very is ss stre of l leve d goo A of in keeping one focused. You need, 71