GO PHISH
out
course, to make sure it doesn’t get
to a
it
keep
you
as
long
as
But
of hand.
reasonable level, it’s good.
ed
human involvement or increase skill
s
task
on
s
focu
to
ity
personnel’s availabil
tion.
atten
and
time
their
requiring
free
Outside of work, I tend to split my
rtant
impo
t
mos
The
s.
part
e
thre
time into
as I
time
h
part is family. I spend as muc
l
trave
I
as
y
ciall
can with my family, espe
.
a lot for work
bies.
The second part is my relaxing hob
dive
a
scub
I
and
I enjoy photography
.
(and sometimes I combine the two)
osite
opp
the
are
s
thing
e
thes
of
Both
xed
of my hectic life. They are slow, rela
ts
nec
con
part
third
and stress-free. The
me.
in
to the geek
This means that we see increased
investment in anything that can
automate a process traditionally
carried out by human beings, with
emphasis on Machine Learning and
AI. At the same time, we are seeing
increased investment in different
of
types of training to grow the pool
y
toda
dors
Ven
ls.
ona
essi
prof
security
aged
must be prepared to provide man
/
services around their products and
such
e
scal
to
and
gies
or technolo
managed services teams (through
recruiting and training) .
gy-
I always have some sort of technolo
For
on.
g
goin
by
hob
oriented project or
a
ing
build
is
this
ths
mon
the past few
wanted
smart home. It started because I
I
gy.
nolo
tech
to learn more about IoT
be
ld
wou
g
doin
by
figured that learning
,
then
e
Sinc
it.
ut
abo
go
to
way
the best
g
ythin
it has evolved into converting ever
e
mor
ning
in my house, while lear
,
about how electricity, HVAC systems
etc
,
plumbing
actually work.
Are there any differences in the
way cybersecurity challenges
need to be tackled in the
different regions? (Middle East,
Africa, Europe, Americas)
Yes and no. Overall, the challenges
al
are the same. The concepts are glob
are
s
cker
atta
the
tly,
rtan
impo
e
and, mor
global. Thus,
If you could
go back and
change one
career decision
what would
it be?
Nothing. I have no
regrets about my
career decisions.
Sure, I have made
mistakes along
the way, but they
were all part
of the learning
process and I
wouldn’t change anything.
What do you currently identify as
the major areas of investment in
the cybersecurity industry?
I would say that the biggest area of
rity,
investment right now, in terms of secu
lified
is people. The shortage of qua
talent in this space is driving huge
ice
investments in any technology or serv
for
need
the
ce
redu
r
eithe
that can
72
the way
ly
to tackle the challenges is general
are
e
ther
,
that
said
similar. Having
cts,
nuances derived from various aspe
e
uag
lang
such as local regulation,
barriers, etc. For instance, we see
ue
that in smaller countries with a uniq
ller
sma
ly
language, there is a noticeab
d
number of phishing attacks compare
ad
spre
wide
e
mor
a
with
s
to countrie
language. I should also note that
in Europe, GDPR is having a huge
influence on, among other things,
cybersecurity solutions.
What changes to your job
role have you seen in the last
year and how do you see
these developing in the next
12 months?
new
I have been involved in building a
the
solutions management team within
up.
Gro
rity
Integ
Synopsys Soft ware
g our
The aim of this new team is to brin
ther
toge
ices
serv
and
ucts
prod
rent
diffe
tegic
stra
of
to address the needs
and
verticals, such as financial services
from
p
grou
this
ding
Buil
ive.
mot
auto
but
the ground up takes a lot of effort,
help
to
nity
ortu
opp
the
it also gives me
the
solve our customers’ problems in
g year,
best way possible. In the upcomin
show
to
and
grow
to
I expect this group
rgy
syne
the
how
rs
ome
cust
our strategic
can
ices
serv
and
ucts
prod
our
of
our
benefit them, while making sure that
s
team
R&D
and
ent
agem
product man
abilities
are focusing on adding more cap
d.
that customers truly nee
What advice would you
offer somebody aspiring
to obtain c-level position
in the security industry?
Grow beyond security
technology and think about
organisational risk. One of
the biggest challenges of
many security professionals
is sticking to the totality of
the technological aspects of
security – painting things in
black and white. The question is
not whether something can be
hacked (the answer is ALWAYS
‘yes’) but rather how easy it is to
be hacked, how likely it will be
hacked and how much damage
that hack may pose.
The most effective c-level security
professionals know to put the
tive
technological aspects in perspec
ly. This
ctive
obje
risks
the
hing
weig
while
table
the
at
allows them to have a seat
e.
mad
are
s
ision
when corporate dec
y that
man
of
out
risk
one
just
is
Security
these
a given firm will face. Thinking in
r
terms makes your input to the othe
u
.
able
valu
e
mor
far
executives
Issue 12
|
www.intelligentciso.com