GO PHISH
Are there any differences in the
way cybersecurity challenges
need to be tackled in the
different regions? Middle East,
Africa, Europe, Americas.)
Basic security measures are
your
universal. Awareness, visibility of
t
poin
end
d
goo
ng
havi
ent,
environm
n
protection (and using the protectio
such
ties
abili
ss
features) , tighter acce
ring
as multi-factor authentication, ensu
hed
your assets are appropriately patc
ng
for vulnerabilities and having a stro
y
ever
s
thing
are
se
The
.
security team
ss
rdle
rega
g
doin
be
ld
shou
y
pan
com
of where they are located.
away
well. Cyberthreats don’t simply go
lines
head
the
hit
n’t
have
they
ause
bec
is still
recently. For instance, EternalBlue
n
dow
took
it
gh
thou
relevant and even
tion
junc
con
in
em
syst
re
thca
heal
the UK
s
tion
with WannaCry, some organisa
are still not patched against the
g able
vulnerabilities that lead to this bein
ork.
netw
the
rate
infilt
to
How do you deal with stress and
unwind outside the office?
zing
Is this where I say something ama
h
muc
ty
pret
I
and list all my hobbies?
ard
dieh
a
am
(I
es
gam
have two. Video
console player) and my vegetable
h take
garden (that I setup to pretty muc
e
mor
play
can
I
care of itself so that
to
nate
fortu
very
am
I
es).
video gam
a son
have a partner who plays also and
habit
this
ting
star
who is responsible for
.
by!)
(I mean hob
What do you currently identify as
the major areas of investment in
the cybersecurity industry?
One major area of investment in
cybersecurity, as with many other
icial
industries across the world, is Artif
still
are
ses
ines
Bus
Intelligence (AI).
ing
tackling the challenge of respond
to cyberattacks in a timely manner.
old
Attacks are often weeks or months
y
man
as
ed
over
disc
are
they
by the time
a few
e
stor
only
s
tion
solu
t
poin
rity
secu
days’ or weeks’ worth of data.
72
es
This is where investment in AI com
al,
ition
into play, as replacing trad
more
legacy antivirus technology with a
s
bine
com
that
h
roac
app
d
cate
sophisti
ural
avio
Artificial Intelligence and beh
ly
analytics is key in the pursuit of time
.
onse
incident resp
great
Sticking to the ‘1–10–60’ rule is
sion
intru
an
ct
Dete
:
best practice
in under a minute (with AI and
tion
automation) , perform a full investiga
icate
erad
and
tes
in under 10 minu
ent in
the adversar y from the environm
ly
ctive
under an hour in order to effe
s.
reat
erth
cyb
d
combat sophisticate
This investment will feed into the
increased collaboration between
technology and human capabilities,
together these will form the ultimate
cybersecurity unit. It must not be
out
forgotten that one is not whole with
r.
the othe
As security is
everybody’s
business, we need
everyone on board.
What changes to your job
role have you seen in the
last year and how do you see
these developing in the next
12 months?
My role hasn’t really changed, it’s
and
still about stopping the bad guys
ntial
pote
from
rs
ome
cust
our
stopping
job
my
day
to
day
rse,
cou
Of
s.
che
brea
the
s
doe
as
g,
role is always changin
ck
nature of cybersecurity. As new atta
shift
I
es,
selv
them
ent
pres
ods
meth
g
my role to accommodate the changin
es
niqu
tech
ics,
tact
of
s
landscape in term
I
,
year
ing
com
the
In
res.
edu
and proc
shift
anticipate that I will likely have to
ating
mitig
rd
towa
n
a lot of my attentio
as it is
threats across mobile endpoints,
g to
goin
are
likely that risks in this space
will
and
ths
mon
ing
proliferate in the com
n.
ntio
atte
of
demand a lot
What advice would you
offer somebody aspiring to
obtain C-level position in the
security industry?
make
My advice would be twofold; firstly,
it
as
gy
nolo
tech
your
know
sure you
will make your life much simpler, but
ngst
also – ensure you’re respected amo
you
s,
skill
soft
your
et
forg
’t
peers. Don
s to
need to be able to present your idea
your
ulate
artic
firm,
employees across the
tain
main
and
ng
writi
in
s
idea
thoughts and
ult
diffic
in
pany
com
the
ss
acro
ale
mor
s the
times and when teaching colleague
rity
secu
As
s.
time
at
s,
way
errors of their
need
we
,
ness
busi
y’s
ybod
is ever
everyone on board. u
Issue 18
|
www.intelligentciso.com