GO PHISH
MAOR,
T,
DIRECTOR OF SOLUTIONS MANAGEMEN
SYNOPSYS , WHO TELLS US ABOUT LIFE INSIDE
WE GO PHISHING WITH OFER
AND OUTSIDE THE OFFICE.
What would you describe as your
most memorable achievement in
the cybersecurity industry?
gy
The Seeker product. The technolo
that my team created when Seeker
a part
was a standalone company (now
new
ly
plete
com
a
was
s)
of Synopsy
tified
technology that automatically iden
wn
Kno
.
ions
vulnerabilities in applicat
rity
secu
ion
licat
app
as interactive
now
testing (IAST), this technology is
rity
secu
transforming how soft ware
testing takes place in many firms.
in as
IAST fits into the DevOps toolcha
r
faste
to
organisations are switching
us
tinuo
con
and
development cycles
delivery of soft ware.
What first made you think of a
career in cybersecurity?
anding
I’ve always been drawn to underst
be
can
they
how
and
work
s
thing
how
was
IT
in
jobs
broken. One of my first
an
as a technical support engineer for
This
net.
Inter
the
of
days
y
earl
the
ISP in
I would say that
the biggest area
of investment right
now, in terms of
security, is people.
www.intelligentciso.com
|
Issue 12
exposed me to the amazing
capabilities of the Internet,
but also to how easy it
is to abuse it and take
advantage of it. I quickly
became fascinated by this
space, seeing what can be
broken and how, but also
how it can be fixed.
er
I’ve spent a large part of my care
king
brea
ker,
hac
al
working as an ethic
ing
arch
rese
and
ems
into syst
new vulnerabilities, while helping
nst
organisations build protection agai
still
I’m
,
date
this
To
such attacks.
fascinated by the innovation and
al
creativity hackers (preferably ethic
into
king
brea
in
rate
ones) demonst
systems and code.
What style of management
philosophy do you employ with
your current position?
. I
I am generally a ‘hands-off’ manager
do
can
that
focus on recruiting people
let
the job they are tasked with and I
goals
ble
ieva
ach
set
to
like
I
them do it.
s
tool
the
with
team
my
ide
prov
to
and
For
ls.
goa
e
thos
they need to achieve
ur of
the role I’m in today, I’m also in favo
that
tives
initia
ng
drivi
–
ities
activ
ix
matr
ing the
are cross-organisational and gett
tive
initia
such
each
for
right resources
.
ded
as nee
pervasive
theme dictating the evolving
approach organisations take to
r
cybersecurity is the push for faste
idea
This
ent.
lopm
deve
soft ware
is
completely changes the way soft ware
shift
digm
para
a
ing
built. It is also caus
in how we secure those systems.
h to
To achieve this ever-faster approac
ng
seei
are
we
ent,
lopm
software deve
of
two important trends. First is the use
dly
rapi
is
h
whic
open source software,
new
increasing. This introduces a whole
, the
ond
Sec
.
tions
nisa
orga
to
risks
set of
lly
ifica
spec
e
move to the cloud and mor
o
micr
as
h
(suc
ures
itect
to new cloud arch
how
ging
chan
is
etc.)
s,
erles
serv
,
services
we look at software delivery.
of
Outside of the soft ware space, one
is
y
toda
s
area
ing
lleng
cha
t
mos
the
nential
endpoint protection. With the expo
r
othe
and
are
omw
grow th of rans
‘click-
endpoint attacks, combined with
e
hug
a
g
eager’ users, it is becomin
nd
defe
to
s
tion
nisa
challenge for orga
cks.
atta
t
poin
end
tain
and con
What do you think is the current
hot cybersecurity talking point? How do you deal with stress and
unwind outside the office?
e
It’s hard to choose just one, as ther
are so many different hot topics. In
t
the soft ware security space, the mos it.
I don’t deal with stress. I embrace
ful
help
very
is
ss
stre
of
l
leve
d
goo
A
of
in keeping one focused. You need,
71