Managing Security in A repidly Changing Environment - Sebastiaan Gybels, CISO and CIO @ Coinflip

Managing Security in A repidly Changing Environment - Sebastiaan Gybels, CISO and CIO @ Coinflip

Managing Security in A repidly Changing Environment - Sebastiaan Gybels, CISO and CIO @ Coinflip

Sep 29, 2024

Episode Description

Sebastian Giebel, an accomplished senior IT and security executive, shares his journey into cybersecurity and the importance of both technical and soft skills in the field. He emphasizes the need to understand the business side of cybersecurity and the importance of communication and collaboration with other departments. Sebastian also discusses the challenges of keeping up with the rapidly changing cybersecurity landscape and the importance of continuous learning and experimentation. He highlights the value of networking and engaging with online communities to connect with other cybersecurity professionals. Sebastian shares insights into different approaches to cybersecurity based on the maturity and size of the organization. He also discusses the role of a CISO and the balance between technical implementation and managing the business side of cybersecurity. Sebastian shares his experiences with security incidents and the importance of building a security culture within the company. He discusses the impact of AI and blockchain on cybersecurity and the need for consolidation in the security market. Sebastian concludes by emphasizing the importance of diversity in the cybersecurity field and the mindset of continuous learning and adaptability.

Watch On YouTube

Episode Transcript

Episode Transcript

Episode Transcript

hi everyone and welcome to the handson cesa podcast my name is AD and today we're going to be talking to Sebastian

gibles Sebastian is an accomplished senior it and Security executive with extensive experience in global it

systems risk management and cyber security as ciso and CIO at coin flip he

oversees key it and security initiatives including vulnerability management and

international expansion efforts his career is marked by significant achievements such as the creation of

strategic security road maps successful launches of financial platforms and the implementation of comprehensive Security

Programs Sebastian has also held leadership positions at Northern Trust

next Capital group and the Federal Reserve Bank of Chicago he held several certifications and is well versed in

various technical skills and security tools Sebastian so excited to have you here today how are you doing

thank you doing great today amazing for sure so first things first

things first how did you even get into cyber security it's a long story but uh this

the short version of it is that thanks to my dad who had a fascination with technology um he introduced me at an

early age uh to uh computers and it was when I received uh commodor 64 at the

age of like 10 that uh I I started uh playing around with it I started

experimenting and uh um at the beginning it was like simplistic programs I would

write um it would help me with my school quizzing myself uh but then as time

progressed I also had a lot of good friends living around me who were interested in computers we started

building our own network we started putting our computers together and um so

it I had a Fascination from the start with uh with computers and um in college

I I was very lucky to get in into a group um of friends that were all

fascinated and pushed each other to do more and and and and to ex explore new

areas and uh so this was all before Google and Amazon um were like this big

that they are today um we had a project that in our last year of college where

that um we had to pick a subject a topic that we would automate and so we

everybody else in the time of like blogbuster and video stores were picking

something easy we actually decided with our group to automate the school system

um which would have like you could look up your your classes the books that you

could buy you could exchange information with other students it it had like a whole ecosystem that we uh we designed

and developed and this is where I started to go into cyber security um I

wrote my first manual on how to secure a web server and and how to run our

project in a secure manner that people could log in and uh would would be able

to order books look up their classes and things like that um and then so after

college I rolled into PWC I had some great mentors at PWC that

have helped me follow my passion with cyber security uh some people like that

uh Markell Luke Hendrick Philip Deno they all were a lot Tech very technical

uh but I also had uh some other people around me like Benjamin alen dim Henri and Kelly McMillan um people that I I

looked up to that inspired me and they help me with the the more softer side of

uh cyber security um so I I think and I personally believe in that uh you you

need not only to understand the the technical side but also the soft side to

be able to uh uh grow and and have a career path that I had so I've been very

lucky with mentors that I had aroundme amazing and what would you say are

the the key soft skills versus hard skills that you had to learn to really

understand the field to really get to where you are from the soft skills side it's um

Tech on the technical side it's it's always easy to understand how that technology works it's it's kind of like

binary ones and zeros it works or it doesn't work um you can stop something

or you let something through in your security solution um but from the

sofware side it's understanding what matters for the business how much risk is is associated uh with uh allowing

more flexibility uh what is the cost associated with what you're implementing

and not only the cost of like the technology solution but also the cost of um the delay that somebody might have

logging into a system there is also a missed opportunity uh for the business

and understanding all these components um it's not always easy um

and I think it's really important to have like conversations and links with

with your business partners uh the Departments the other departments in the company and um and and have those open

conversations to understand like what matters to them and how can you find

find a blend a balance between uh full security which you can never achieve and

security that works for a company interesting how do you keep up

with like everything that's happening and security the field is changing so fast like every other day you have some

either a new technology or some breach or like something is happening that you need to be aware of like how do you do

that while staying so in tune with both both the business andactually keeping the company secure um I I think it's um it's it's a

couple of things that actually help me um one is I I like to read a lot about

new technology new uh Innovations and uh but at the same time

I also like to experiment and and I have that from like the early age like setting up a new network of finding ways

to to solve a problem um I don't often stick with just a theoretical I also

like to experiment set up my own um Network at home or set up um a new

install a new technology at home and or in or in a lab and and play around

experiment that's how I learn but also with the teams that I have um we have

some really excellent people on my team uh um would like to experiment and also

discover new Solutions uh they often bring up new Solutions or um new ways of

addressing a problem to me and by sitting next to them or listening to

them I it's almost like a puzzle um nobody has all the answers by but by

putting like puzzle pieces together you often see like what the big picture is and what the final uh solution to the

puzz list um and then uh going to

conferences um going to uh attending webinars um meet meetups there are so

many uh different opportunities to talk to others in the field uh and and

hearing about uh what goes on in their world they're often struggling with the same problems that you have and and just

listening um and taking in information helps you also understand and avoid

tunnel vision for me it's also avoiding tunnel vision uh by just sitting in the

office and uh working with the team that we have uh sometimes you get uh that

that one track mind uh and it's beneficial to just meet up uh with other

people in the same field struggling with the same problems amazing what would you tell

cisos that feel like maybe they don't have enough peers they can really talk

to about the subject or ask questions to because what I've noticed is that some

cesos sometimes feel like they they would want to be more part of that conversation but

maybe they live in an area that is less you know not a big Hub or something like

that like what would you recommend um I believe that there are

multiple ways to uh even if you're not living in a big Hub um the the area I'm

I'm not living in Chicago in the center of Chicago um it takes me about like an

hour on a good day get to get into the the city um but like I live further away

um and so even even like around the town where I live there are meetup groups

there are opportunities to to meet other people um Discord is also an area or a

solution that you can use to get in touch with cyber security people um

there is a big online community that um you can just the the the barrier to get

into is low um and you can ask anything um I belong also I'm part of a Google uh

group uh that the cesos in the Chicago land area started and and it's meant to

uh exchange information exchange questions but also help each other um

and and it's not filtered it's it's it's not moderated um and uh whether you're now

like a first year ciso or you're like uh your 20 years into it um everybody is

very helpful and and open uh so I would I would encourage uh to reach out and

and explore the online uh communities that are out there

great did you see um different ways security was approached within the years

and different roles you've had in the security

field if there are different approaches um I do think that there are different

approaches and it often is linked to the stage that a company is in or uh how

mature a company is uh often they describe cesos also as like three types

of cesos um you have you have the ceso that comes in uh with a young company a new

company that uh needs um some guidance to start a program uh there is not a lot

of funding there is uh uh so you need to be Hands-On you need to be in the trenches and help and work with the

business and it it's often just you running by yourself or one or two two

additional people that you work with it's it's very time consuming it

can be stressful and uh um as but as the company grows uh your program also grows

with it um you have the cesos that come in after a data breach and um so I I

almost call them the um the the Warriors that go in to save the day um because

the the is a fire burning and somebody needs to come in needs to understand what what the the problem is needs to be

able to do a root cause analysis and needs to be able to address um that that

problem of the day uh that caused the the disaster or the the breach and then

as fast as possible uh plug the holes to forensics and um put the put the company

or the program back on the rails it's a very different profile it's uh uh also

demands like a different skill set and then you have the C that come into like

typically the more the bigger organizations or the more mature organizations where that there is a uh

controls understanding there is a they're often also regulated and uh um

the there is already an established team um and it becomes more about metrics um

how to measure your program um and how to evolve with the business uh through

time um and and that means also taking technology that is in place um when new

products are being launched with the company uh how to migrate and and incorporate not only Legacy but also

newer technology and um it's it's a very different uh uh tool set or of like

technical skills and soft skills that would demand um I've been primarily uh

in the I I've been primarily if you look at my career in the handson the the

growth of uh smaller organizations helping fintech uh

building a team and bringing in people um people process and technology and uh

making uh sure that companies are very successful as they grow uh um but I've

also uh overseen a supervisory work with the Federal Reserve with organizations

that are bigger um as as I was part of Northern Trust we we also um as part of

internal not in the cisu RO but uh we measured how successful or where that

the pain points and gaps were with the cyber security program and then we would report out to to to the three lines of

Defense the operational side the risk management side and internal audit of uh

how well uh security was uh managed at the

organization and what does your day-to-day look like nowadays um that's a good question um in

my current role I I have a dual Ro so I have the ciso and the CIO and so um it makes my my day always

interesting because uh it's not just looking at it from the security lens

it's also looking at it from the implementation and the business s um as

new products are being implemented what is the right technology to implement and how to help the

business and additionally like how do you ensure that security uh is not an

afterthought um that means that um my day often starts early um I I I get up

at 6 um on my I get I hop on my train around 7 and I'm in the office around

7:45 uh but uh during that time frame I catch up by reading news uh on the train

um I get in touch with some some people that are on the East Coast um and I

start um reading through like what are the priorities of the day of the week

and I start planning out um the rest of my day uh for me like the start of the

day is making sure that I have a plan uh to make everything as smooth as possible

now with security you cannot plan out or you cannot predict uh what's going to happen um but that's also what makes it

exciting uh there are always two or three curve balls uh things that at hwk

Tech comes up come up that we all have to deal with um but uh i' like to plan

out and have a little bit couple of Pockets throughout the day that um I can use for um focus time learning catching

up but also walking around the office uh catching up with everybody else in the

office and and seeing what's going on in their side of theworld amazing so you have these two separate like a

hats that kind of work together as CIO and ciso what are the differences of

like what you do under this hat and under this hat and yeah let's start with

that so A CIO um and this is a role that I got

after being like with the company for about five months um I inherited the

traditional it site with um making sure that the laptops making sure that

endpoint Computing like the office access to office Office 365 or Google or

all the applications um are are working um and and so that if somebody has an

issue that they can go to a Service Des and that they're being helped as quickly as possible it's more about keeping

things running and making sure that if there is a problem um with access with

up time Etc that we have an answer as soon as possible but it's also helping

with implementation of new Solutions the the Cil s um there is some

overlap because like if when we are giving access when we providing access

we want to make sure that it's happening in a secure manner that we have multiactor authentication enabled that

we have um the the right permissions assigned to the person um and so that's

where that it and and Security will work together to understand like who has what

access um and if something happens if there is a problem with a system uh or

somebody cannot log into an application or the application is no longer

available um it's down there might be a security reason

for that as well so with that information sharing communication is really key and uh that's where that the

two uh get closer to each other and work together

amazing as the ciso I'm sure you you have to make a lot of decisions about

what can be done and what can't be done do you ever have a bad cop feeling like

telling people they can't do something um I I would be lying if I

would say like I never have the feeling like that I want to be the bad cop um

but I I wouldn't call it being a bad cop it's uh um it there are moments that feel like

frustration or like a moment that we know what the right answer is or that

the the item that would help protect the company best and um we we try to find a

balance by providing training and explaining why we do certain things with

security um but we have a wide variety of people coming into the company some

people have worked um at at let's say a different type of company um let's say a

pharmaceutical company or they've worked at u a non-financial company we're in

the financial space and and we regulate it so there are certain expectations uh of security being in

place or you have people come just coming from college and this might be their first job so um it's it's really

understanding when something happens let's say somebody plugs in a USB drive

and they copy over some some documents it's often with good intentions um

people do something because they want to make something happen they want to uh finish a report or a document that they

have to deliver to their supervisor and um often it's it's really

key to take a step back look at the information that's available and and

talk to the person or talk to the supervisor gather context what is

happening and and um it's by having that understanding that there is often no

need to be a bad cup um I the moments that we have to be a bad cup is when

something really is happening that was malicious and and luckily those are

Rarities those those items don't happen have you ever been in a company where

there was a serious security incident and if so what how did you deal with

like the chaos um i' I've been in a couple of

companies and and I think that every company nowadays um should ask the

question like if you hadn't had a security incident uh it's more a

question uh are you ready for it because it's typically just a question about like when is it

going to happen um and in the the especially with AI now we've seen like

an increase of attacks happening um we've seen the complexity Rise um but

I've I've been exposed to or been involved with plenty of security events

um the uh the one that I will bring up is uh where that I was secondhand

involved um and and so we um asas in we with the Federal Reserve we also supervised a lot ofInstitutions and in and in institutions financial

institutions uh you can also have small companies where that there might be one or two it people you have big

organizations now the pro problem with security incidents is that malicious c s

often don't pay attention to whether you're like a company with only one it individual or if you have

20000 um and they often find the lowest

the pth with the lowest resistance and in this case um they found a system that

was unpatched um and what they found an easy one way into the

network um and and this is how that a lot of uh incidents happen um to me it

comes down to uh really security hygiene foundational aspects that we all have to

tackle um with this vulnerability management having regular scans on all

of your Sy well first of all understanding what assets do you have

how what are you doing to understand what what the risks are to that uh asset

and then thirdly uh understanding like if something goes wrong can you detect

it can you identify the incident of that it's happening a lot of organizations still

don't have that detection uh to be able to respond in a timely manner and uh in

this case it it actually translated to um cards uh being copied um account

takeover and um it it translate into millions of dollars of loss for the

organization um so um and it it was only one one system that was unpatched um so

it it can be like one item in your security program that fails um but it it

can have a casting effect wowum that's crazy how do you sort of build theculture after that in the company to be more security

minded yeah that that's a really good question because I I think it's uh it

may start with security um identifying um information or tools that

can help with building uh security awareness or security culture but at the end of the day everybody plays a role

and uh it it starts with somebody joining an organization uh coming from college coming from a

different company and um introducing during that first stouch

during the onboarding that typically HR uh organizes bringing uh some initial

thoughts about like what matters to the company from a security perspective but

also getting to know each other at that point when you have that first touch Point creating a link with with the

individual with the group of people that join uh is a way of like extending a

hand and and like offering them to um also provide feedback to you and I think

it's important because like true time um my team has been has been wonderful i' I

have a great team of it professionals and security people but we also get a lot of information back from the

business from from individuals working for those business teams about about

what matters to them and and that's why the first touch Point matters the ongoing touch points also matter um I I

make uh I make a case to uh have regular meetings touch points with all the leaders that we have to understand what

are the projects that they have going on um what if there is anything from

security that they have concerns about and how can we have like that ongoing

flow of information um and with that uh we we introduceseveral other items we we have introduced um security awareness

training that we do on an annual basis it's typically online brief like 15 to

30 minutes online with a brief quiz at the end to see if everybody understood

the material um second is like fishing campaigns which we do on like a monthly

basis uh again to see if everybody can spot uh the fishing emails and for us

it's it's one of the biggest risks uh to the crypto industry fishing uh we get a

lot of fishing emails but also fishing through SMS text messaging um and what we've also lately

seen a lot of like uh video uh deep fakes where that um um leaders or uh

other people that um have a level of trust or embody certain level of trust

are being used to to target employees or customers um and it's all about like

making our internal people aware of this um and then last but not least we we

also have introduced the it demo day um and with the it demo day is like every

other Friday we spend an hour no present no deck no slide deck but we make it

like show and tell Interactive that we talk about technology that we talk about

security and um our upcoming one is about vender management um which is a

collaboration between legal uh procurement and cyber security to talk

about the process but also why we certain things we want to have certain things reviewed from a cyber security

perspective and how everybody can help so if somebody is looking for a new

solution are there certain questions that they can already ask themselves um

when they look at the application the online application or um and then they

can come to us and provide already information to us uh but we see it as like a collaborative effort and

everybody is in the boat rowing together

amazing what do you think that is something that people outside of security don't necessarily understand

and that you look at um that's that's not a good questionum it's I I think it's um often a challenge where

that um there are expectations in the business or um others outside security

um and I'm I'm taking this also from my personal uh experience where that there

is an expectation that we want to run as fast as we can and we want to introduce

new products as fast as we can um and

there is like a risk associated with that um if we if we don't have like ask

specific questions about um who gets access to the system

what level of access does the person get where is the data being stored how is

the data being protected um do we have like a backup

mechanism there are key questions that help us understand the risk of a new

project or risk of a new application and um often it's it's uh

taken as well we know that so and so already uses this application as a

company so it must be okay to also use this

application um that might be the case if like large organizations already use the

the application can be used as a reference but often we still need to configure um security mechanisms like

for example getting logs into our monitoring system um and understanding

how do we do that with the new Solution that's being brought in is is something

that um we often have to spend some time on and um I think that that's often

overlooked that there is a process Beyond just buying a new solution or

size application uh there are some ancillary things that also need to be done to ensure that we have the

visibility and we can respond to security issues okay

interesting what would you say is your biggest issue happening right now like

in terms of uh challenges in the cyber security world uh I think it's it's that balance

between um having a small team and

um limited limited budget um and trying to go as fast as possible uh so each day

it's it's finding a balance of like what is the highest priority um for the team for me as an

individual but also for the company and um keeping the business going as fast as

they want to run while protecting the organization uh and that often involves

um having those conversations to understand the context of the changes

that we're going through and how can we find the cheapest solution possible to

to make uh us still uh maintain the same security

posture would you say working at a like essentially a fintech company

different than working in something that has data that is may be less

sensitive absolutely um and for me data has alwaysbeen um the main item uh for me

security is always around data and uh data and the business processes one you

can impact a company um if a business process is

impacted and a business process can be if I'm not able to log in and purchase a

soccer ball for my son uh because the website is not available um and and it's because there

was a denial of service attack on that web website that impacts the business uh

it's not necessarily data that's impacted in this case or sensitive data

um but it's the availability of the service and so understanding like how long can the company in this case be uh

without a website that you can do online transactions or online purchases is is

also key besides uh data sensitivity now in the world in the financial world that

we are in um we have to deal with a lot of sensitive information pertaining to

customers if you want to become a customer you have to go through several steps to uh establish your identity that

we know that who that we're dealing with is truly for example Sebastian and where that this person

lives where that date of birth uh we collect a series of information that

will compliance people collect and verify to ensure that we have a low risk

of like um um identity Taft or um

account takeovers or uh M uh money laundering happening um but at the once

they're in the system we have legitimate people doing transactions with us and

that data the social security numbers Etc need to be protected um we have

Regulators that look at what we do and how that we protect that information and

we have um obligations to uh respond and Report anything that goes wrong with

that sensitive information to uh our Regulators so yes it's um in a regulated

environment the expectations are a lot higher and uh there there is a little

bit of stress that goes with one with thatinteresting what do you think is like

the how do I phrase this how much of your focus goes on actual security

implementation team like the security team versus handling the business side so

management so understanding how things work together like how would you say that

works um I think it's 40% team um oriented uh

making sure that the teams um have the support that they need and then 60% is

the the business side um it might be depending on the week it might be a

little bit different um but I I'll like I said I have I have some excellentteams with it with devops with with my Security Group

and uh each one has a manager that has had plenty of experience and um

typically it ends up us discussing what are the priorities of the week uh and

that's uh it started all with like understanding the business side uh so on

the business side I have meetings with uh discussing our road map um discussing

the priorities for the next quarter two quarters out and then um I take that

information back I look at well how does that translate to what we need to do and

I have weekly uh meetings with my manager group where that we go through

uh well U we have these priorities coming up these are the deadlines and um

are we working on it are there any blockers are there any is there anything that we need to talk through and then we

talk through it as a group um if if needed we pull and other staff members

but often the managers just go to to their teams and they execute and they

deliver the work that needs to be done and we stay within our

timelines perfect is there any decision you remember making that obviously you

thought was right at the time but ended up harming the it's linked to uh the

question that you had earlier about uh what is what makes it what makes the the

position so difficult um as at the fintech organization a smaller

organization we we tend to work with less resources and we want to go fast uh

so to support a quick deployment of a new business solution uh I supported the

idea of adopting a new technology which was a lot cheaper um unfortunately uh

staff and Engineers did not have the necessary uh experience and we leaned a lot on the

vendor providing our support um but as we progressed and we implemented the

solution we ran into some issues uh that we could not uh

resolve um and so we we we tried to work through it and uh but it ended up um

that we had to replace the solution with a with a different solution um this time

we did spend more time um and we did a side by side comparison of

the different solutions that were out there and not just the price uh the

price was a big component but also at the technical aspects and whether people

could support it or not um I think that that's really

critical uh from a due diligence perspective whether you're adopting a security solution it solution or a

business solution that uh there is time taken to evaluate key requirements for

the business from the technology side um because like it often takes more effort

to rip something out and replace it with something else interesting do you think there is a

certain area that like cesos have a blind spot and they don't really pay attention to it and you think they

should uh blind spot um I often I often still see like with uh

with some of my colleagues still spending more time on the technical side and um I think it's thanks to like one

of my mentors that I had throughout my career Lawson Kelly he showed me a couple of tricks to get more buyin from

the business um by by crowdsourcing a solution um and so we at the time we

were looking at we needed a security monitoring solution but at the time it

was pretty expensive and we had to convince finance that it was it was the

right solution to implement and um similar to that we had we had a similar

situation over here where that we were looking at all the Technology Solutions

that we have and and finance wanted to uh get a better understanding where do

we spend the money who is using or applications and and often with security

we have so many tools that give us visibility of like who does what and

when but it's like bringing that information together that you can also

use it to your benefit for finance for example we um we had a casby solution a

cloud monitoring solution that saw like for example in the marketing department

we have like we had like 15 people uh they had licenses for certain

applications and then our security solution saw over the last 90 days what the usage was for those applications we

could Dr we actually were able to drastically reduce the license cost

because we had applications where access was given but certain people were never

using it so um I think it's like finding those moments and it's again like

working with the business working with the different departments often it's not

only um stopping some a bad guy from coming into the company but also like

sharing the information that we have with security with other departments to help them in their

world amazingand do you think that doing cyber security in a company ishow do I word this people who are going to cybersecurity do you see it as people of a certain type or is it more manydifferent people doing different

things can you explain that one a little bit Yeah like the people who end up

doing security roles um either see or people who are you know getting

started Midway is it people who tend to be quite similar like a similar crowd or

is it very diverse and people with different interests I'm a big supporter

of diversity and um and the reason being that for me it's a mindset it's it's not

necessarily always uh because you're technical being technical helps but it's

a mindset and um I worked with an

extremely smart guy um in the past long time ago he had a PhD in nuclear physics

um but and he is he's still working at one of the biggest Financial organizations in the world in cyber

security um he he had a mindset of like you can do anything and and that's a

mantra that um I I follow is like as long as you have the mindset you can

achieve and do anything um I also um the one person that still

impressed me Sandy she uh um was working at a pat hospital and I hired her as a

security analyst um she had no cyber security or technical background but uh because her

fiance was a penetration tester she saw uh what was happening at home she

started experimenting and started um with with hack the box and

she was trying to explore uh a bit herself she had a really interest and

she really wanted to get into cyber security um and it was through what she

mentioned on her resume that stood out um not that she was at a pat hospital

but the contradiction between like what she was doing and that where that she was wanted to go that people my interest

and um I I took a chance on her and it was probably one of the best decisions I

ever made uh so I personally think diversity helps us um because again to

an earlier point that I had uh we we all otherwise end up with tunnel vision and

uh Technical Solutions are not always the answer uh often you need a broader

context to solve a problem perfect what do you think changed about

cyber security in the past few years versus what do you think it's going to

look like in the next few years um I think that there were three changes

that have helped but also impacted cyber security in my view one the pace the

pace of changes has dramatically increased uh with the introduction of AI machine learning uh um and that helps us

but it also helps the malicious actors so it helps us to um with AI to address

like the mundane the the trivial things that we we have to deal with in a

day-to-day uh collecting information uh putting pieces together um and and

writing reports um it's it's tedious it's time consuming but with AI it will

help us and will help us then also focus on more complex items um un unfortunately it will also

be an adversary uh adversary that we all have to deal with um the other the

second part is the remote work when we had to deal with Co um a lot of

companies were stuck in Legacy uh they had to deal with Legacy vpns they had to

deal with people working from the office it really transformed the workforce and

how that we looked at cyber security uh instead of like the mo around the castle

uh we went from um in and protecting the office or the data center it really

became like around what is now important to what a user is doing um

with the device or the asset that they have and the access that they have to the app

applications um so endpoint security uh more action driven uh security become

became a lot more uh important and then the third uh elementI think the availability of solutions uh I I I typically attend like big

conferences like blackhead and Defcon and uh what you see is like there are so

many so many new uh vendors and solutions that come to the market

and um with pressure on budgets I do think um and it's also echoing something

that I hear with other cesu peers is that the point Solutions are not always

helpful um because like you have to then go to three four five six fendors to

have your security program addressed and if you have to go six times to finance

for approval that each time time that you have to purchase something the sixth

time they might not say yes to that request uh it's easier if you have like

one vendor or two vendors that you can go for a request um so I do think that

that will lead to some consolidation in the security Market with some some mergers Etc um similar to what I've been

doing is like we we are also consolidating tool sets where we can and to get like the most out of the tools

that we have um so yeah those are the challenges that

but also opportunities that I've seen amazing and how do you think it's

going to like go from here if we look at AI if we look at the different things

that are coming up I I think like to to my previous

point I think that AI but also and this is me being in the crypto uh atmosphere

the uh audience environment uh I do think that Ai and blockchain will be two

elements of technology that will greatly help address security um and I've said said this

before like um with AI we can help make things that are trivial that take are

very time consuming like writing a a report and so on uh there are better uses of time that we have um the um with

blockchain and and the concept behind it that you have a decentralized oversight

of transactions that are happening if we can get to a decentralized overview of

security that is being validated by the network it will also help us um validate

identities validate uh if actions are allowed and

my my view is that uh over time time security firms should embrace blockchain

and build it into their Solutions so that we have like an integrated um

validation of what what is actually allowed to happen in each of our environments okay so my next question is

what gets you excited about cyber security ver says what keeps you up in excited every day is a new day in uh

or a new bright day in paradise um because I see it as like you never know

what's going to happen um it's it's always evolving changing um there's new

technology there are new Solutions out there um new opportunities to learn when

I started college um and the first day in college uh the teacher said welcome

to um a lifetime of learning um and it was be what you've entered the field of

it and not will be the the same uh tomorrow so you will have to learn

continuously learn and that has always got me excited gotten me excited um

because like there's always a surprise or there is always and I like good surprises and there's always a surprise

or like something to um what keeps me up at night um

surprises um or like not knowing um not knowing if something is happening in

your environment and that's why for me transparent transparency of what's happening in the environment um at any

point is is really important to me uh so potentially not knowing that a malicious

actor is in your environment um and discovering it too late after that the

damage has been done um is is something that sometimes keeps me up now how to

deal with that is I make it a case to reevaluate of controls on a regular

basis uh ask questions verify what's in place and and um never get complacent uh

make sure that you challenge yourself and the people around you and and make sure that the people around you are also

challenging themselves uh because again to the first point we are learning

something new every day perfect okay so one final question

and before that thank you so much this has been super interesting and like I can really tell that you've thought

about all these like different things and it comes from a perspective of

someone who's seen a lot of cyber security um so it's really cool to hear

um my last question would be what would be your most unusual advice to someone

who's either getting into cyber security or looking to advance within what would you say well and that's why I liked one

of your previous questions um certifications are a marketing tool to

me and I know that I have a good amount of certifications um but it's not always a

demonstration of your skill set um for me it's like a way to show on your

resume that you you have you were able to learn you you passed an exam and um

if you have a list of certific ation that it's a way to differentiate uh yourself from other

candidates what I will say is like there are other ways to differentiate yourself as well on your resume but also

throughout your career um again like if if you uh want to have that step up or

look for a couple of entry level certifications on your resume uh but more importantly focus on other items

that make you stick out uh for example um start doing heck the Box get an

achievement there volunteer or teach a stem at a stem program summer program

for kids uh a program that you develop yourself and that you can talk passionately about during your

interviews um coaching even like coaching a basketball team nothing related to cyber security um shows that

you're a team player that you you can not just individually solve something

but you like working with a team um I I think that all those examples show that

you um are driven that you're passionate about something and again linking it to

like the having the mindsets um I think with the right mindset you can achieve

anything perfect thank you very much was a pleasure thank you for having

me

Ensure SOC2, HIPAA and GDPR compliance across all your SaaS tools

Built in Tel Aviv, Israel

Ensure SOC2, HIPAA and GDPR compliance across all your SaaS tools

Built in Tel Aviv, Israel

Ensure SOC2, HIPAA and GDPR compliance across all your SaaS tools

Built in Tel Aviv, Israel