GO PHISH
es
maddening because most business
.
inals
rcrim
cybe
for
ks
duc
g
are sittin
That is what I think the hot topic of
conversation should be.
What do you currently identify as
the major areas of investment in
the cybersecurity industry?
r
The major areas of investment diffe
tive.
pec
pers
and
s
ritie
prio
on
depending
it
ple,
exam
for
ts,
italis
cap
ure
vent
For
is all about Artificial Intelligence (AI)
e all
because it is exciting and will solv
).
mist
opti
the
s
(say
lems
prob
that enables you to
penetrate networks.
Broadly speaking,
the technologies that
are deployed around
the industrialised
world are pretty
much the same,
which means that
attackers can be
anywhere in the
world attacking you
wherever you are in
the world.
r in
While technology is a major facto
for
e
rout
st
faste
the
,
urity
cybersec
an attacker is to take advantage of
weaknesses in other human beings.
are
Around 80% of successful attacks
kly,
fran
,
and
ils
ema
hing
phis
by
n
drive
ils
ema
iving
rece
unless you stop people
gy
nolo
tech
icate
and texts, or erad
attacks.
altogether, we will never stop the
hing
The best investment therefore is teac
e
gsid
alon
s
sign
ing
warn
ut
people abo
allow
multi-layered defences. You must
ve
you’
well
ever
for the fact that how
on
educated people, someone will click
so
it’s
ause
bec
ldn’t
shou
they
s
thing
to
well disguised. That is why you have
with
d
gne
desi
are
that
have networks
resilience in mind.
Are there any differences in the
way cybersecurity challenges
need to be tackled in the
different regions? (Middle East,
Africa, Europe, Americas.)
In our experience, not really. The
tion
differences are more about prolifera
nce,
insta
for
a,
Afric
and type of devices.
e
quit
g,
akin
spe
dly
broa
,
doesn’t have
and
ktop
des
of
n
ortio
prop
e
sam
the
tern
laptop end points as we do in Wes
d
hea
per
er
high
far
Europe, but a
means
incidence of mobile devices. This
sure
expo
e
that you don’t have the sam
,
nce
insta
for
,
to crime targeting
Microsoft desktop environments.
al
You have bigger issues around soci
nt
insta
of
king
hijac
,
engineering
s of
messaging channels and those kind
ling
dea
re
you’
things. Other than that,
much more with languages and with
a way
how to match the social styles in
72
What changes
to your job
role have you seen
in the last year and how do you
see these developing in the next
12 months?
I was the major shareholder of a
d on
privately-owned company that liste
a
ted
crea
We
.
year
last
ch
Mar
AIM in
ion-
group of companies with an acquisit
job
my
ns
mea
h
whic
,
driven grow th plan
of
utive
exec
f
chie
the
be
to
d
role change
nic
orga
s
a listed company with ambitiou
That
and acquisitive grow th objectives.
ce
rnan
gove
of
l
leve
means that the
and collaboration and transparency
is
that we need to have in the business
it
t
wha
than
y
toda
rent
significantly diffe
.
ago
ths
mon
18
or
was 12
is
In 12 months, when the business
which
to
nt
exte
the
,
now
is
it
bigger than
rk
ewo
I delegate to others and the fram
will
s
rate
ope
ness
within which the busi
will
have changed again because we
job
my
so
n,
agai
size
in
bled
dou
have
nary
utio
evol
e
role is going through hug
.
year
change, year-on-
What advice would you
offer somebody aspiring to
obtain c-level position in the
security industry?
It depends on which side of the
t
fence you want to be on. If you wan
to be in operations, it’s going to be
the
different than if you want to be on
is
stion
que
the
if
So,
.
side
cybersecurity
ebody
som
or
CISO
a
g
bein
ut
abo
e
mor
with that kind of role, you need to
ce and
combine both technical experien
ge.
wled
kno
s
busines
I’ve thought for some
really
years that if you’re going to be a
bine
com
good CISO, you should
of
computer engineering or some form
at
tion
lifica
qua
of
type
king
hac
al
ethic
you
universit y with an MBA, because
ness
busi
a
how
need to understand
.
works and how security fits into that
to are
Most of the people you’re talking
kly
fran
and
s
ines
bus
a
run
people who
g
ketin
mar
with
ed
cern
con
are
they
campaigns, top line revenue and
grow th expansion.
You need to be able to take all that
critical stuf f and present it in a way
and
that enables businesses to underst
ut
why they need to do something abo
to
how
and
erst
cybersecurity and und
to do.
help them evaluate what they have
How do you deal with stress and
unwind outside the office?
to
Frankly, I can’t remember. I have
sn’t
doe
that
ere
ewh
som
ay
holid
go on
e
forc
to
rage
have mobile phone cove
two,
or
k
wee
a
r
Afte
me to disconnect.
rs
you sleep for longer, your head clea
work
into
k
and you’re able to jump bac
only
again. Unfortunately, weekends are
p
slee
on
up
h
catc
to
time
a
stop gaps;
of
work
k’s
wee
next
the
for
are
prep
and
.
ness
busi
a
grappling with building
I’m not sure that my staf f like me
switching off for a long periods of
time because it gives me an
new
opportunity to think about lots of
of
ideas and they receive a barrage
u
rn.
emails on my retu
Issue 14
|
www.intelligentciso.com