Intelligent CISO Issue 12 | Page 72

GO PHISH out course, to make sure it doesn’t get to a it keep you as long as But of hand. reasonable level, it’s good. ed human involvement or increase skill s task on s focu to ity personnel’s availabil tion. atten and time their requiring free Outside of work, I tend to split my rtant impo t mos The s. part e thre time into as I time h part is family. I spend as muc l trave I as y ciall can with my family, espe . a lot for work bies. The second part is my relaxing hob dive a scub I and I enjoy photography . (and sometimes I combine the two) osite opp the are s thing e thes of Both xed of my hectic life. They are slow, rela ts nec con part third and stress-free. The me. in to the geek This means that we see increased investment in anything that can automate a process traditionally carried out by human beings, with emphasis on Machine Learning and AI. At the same time, we are seeing increased investment in different of types of training to grow the pool y toda dors Ven ls. ona essi prof security aged must be prepared to provide man / services around their products and such e scal to and gies or technolo managed services teams (through recruiting and training) . gy- I always have some sort of technolo For on. g goin by hob oriented project or a ing build is this ths mon the past few wanted smart home. It started because I I gy. nolo tech to learn more about IoT be ld wou g doin by figured that learning , then e Sinc it. ut abo go to way the best g ythin it has evolved into converting ever e mor ning in my house, while lear , about how electricity, HVAC systems etc , plumbing actually work. Are there any differences in the way cybersecurity challenges need to be tackled in the different regions? (Middle East, Africa, Europe, Americas) Yes and no. Overall, the challenges al are the same. The concepts are glob are s cker atta the tly, rtan impo e and, mor global. Thus, If you could go back and change one career decision what would it be? Nothing. I have no regrets about my career decisions. Sure, I have made mistakes along the way, but they were all part of the learning process and I wouldn’t change anything. What do you currently identify as the major areas of investment in the cybersecurity industry? I would say that the biggest area of rity, investment right now, in terms of secu lified is people. The shortage of qua talent in this space is driving huge ice investments in any technology or serv for need the ce redu r eithe that can 72 the way ly to tackle the challenges is general are e ther , that said similar. Having cts, nuances derived from various aspe e uag lang such as local regulation, barriers, etc. For instance, we see ue that in smaller countries with a uniq ller sma ly language, there is a noticeab d number of phishing attacks compare ad spre wide e mor a with s to countrie language. I should also note that in Europe, GDPR is having a huge influence on, among other things, cybersecurity solutions. What changes to your job role have you seen in the last year and how do you see these developing in the next 12 months? new I have been involved in building a the solutions management team within up. Gro rity Integ Synopsys Soft ware g our The aim of this new team is to brin ther toge ices serv and ucts prod rent diffe tegic stra of to address the needs and verticals, such as financial services from p grou this ding Buil ive. mot auto but the ground up takes a lot of effort, help to nity ortu opp the it also gives me the solve our customers’ problems in g year, best way possible. In the upcomin show to and grow to I expect this group rgy syne the how rs ome cust our strategic can ices serv and ucts prod our of our benefit them, while making sure that s team R&D and ent agem product man abilities are focusing on adding more cap d. that customers truly nee What advice would you offer somebody aspiring to obtain c-level position in the security industry? Grow beyond security technology and think about organisational risk. One of the biggest challenges of many security professionals is sticking to the totality of the technological aspects of security – painting things in black and white. The question is not whether something can be hacked (the answer is ALWAYS ‘yes’) but rather how easy it is to be hacked, how likely it will be hacked and how much damage that hack may pose. The most effective c-level security professionals know to put the tive technological aspects in perspec ly. This ctive obje risks the hing weig while table the at allows them to have a seat e. mad are s ision when corporate dec y that man of out risk one just is Security these a given firm will face. Thinking in r terms makes your input to the othe u . able valu e mor far executives Issue 12 | www.intelligentciso.com