GET TO KNOW
that area helps the team to achieving great
results with limited resources.
What do you think is the current hot
technology talking point?
To address the consistent dynamic business
requirements, hybrid cloud, micro services
and API have great potential. In
addition to that robotics, automation,
predictive analysis and Blockchain
will provide great benefits on
different areas of the business. As
these new technologies have great
potential, adoption of these innovative
technologies will largely depend on the
risk appetite and security maturity of
the organisation.
How do you deal with stress and
unwind outside the office?
I follow the ‘stop and think before reacting’
rule which helps me to take a rational
and analytical decision instead of an
emotional one. Also assigning priority
and time management is key to reducing
unnecessary stress in working time. I keep
reading good books and visit new places as
I love nature, so spending some time with
it refills all the required energy and helps
me to focus again. Some quality time spent
with family and friends always helps to
unwind the stress.
If you could go back and change one
career decision what would it be?
Every decision is based on circumstances
and information available at that time and
“
ADOPTION
OF THESE
INNOVATIVE
TECHNOLOGIES
WILL LARGELY
DEPEND ON THE
RISK APPETITE.
80
INTELLIGENTCIO
I always learn from that. Even if I
have the opportunity to change
my career decision, I still like
to proceed on the same path
because I am passionate about
my work. The only thing I will
do is obtain the soft skills with
What changes to your job role have
you seen in the last year and how do
you see these developing in the next
12 months?
my technical skills at a very early stage as
security is not only about technology it’s
about the people who are using it.
What do you currently identify as
the major areas of investment in
your industry?
Micro services and API will be a major
area of investment due to the capability
of highly improving productivity by faster
service delivery to address the business
requirements. In addition to that adoption
of cloud and compliance management is
another area of major investment due to
different dimensions of risk posed by these
new innovative technologies. As new and
targeted threats are consistently increasing,
Artificial Intelligence and predictive
analysis-based security technologies will be
one major area of investment to counter
the threat.
What are the region specific
challenges when implementing new
technologies in the Middle East?
As adoption of new technologies increase,
this multiplies the present security threat
due to lack of expertise on these new
technology areas. As Zero Day vulnerabilities
and targeted attacks are consistently
rising, compliance authorities also increase
the necessary protection benchmark to
protect from these advanced attacks. Data/
cybersecurity controls and adequately
securing these technologies is the main
challenge for adoption of new technologies.
As higher management is more technology
demanding, at the same time they are more
aware about the potential cybersecurity
risks and support to reduce the potential
issues raised because of the adoption
of technology. These changes require
extensive soft skills including a better way
to communicate so you can talk to the
business in their language and explain the
risk management more efficiently.
It’s also necessary to build trust between
stakeholders and embedded security into the
overall digital strategy of the organisation.
What advice would you offer
somebody aspiring to obtain a
C-level position in your industry?
Keep the basics right and first reduce the
attack surface. Your previous experience
of the security domain is not sufficient as
each organisation has unique business and
cultural challenges.
You can help to secure the business only
with an understanding of the business and
this will help you to align the security with
business in the most efficient way and boost
the trust with stakeholders.
Adopt the framework and consistently
measure the maturity, plan for new
initiatives to increase the maturity; Keep this
process as businesscentric.
It’s a myth that security risk can be reduced by
just purchasing security products. The key is for
this to enforce the proper process, procedure
and secure configuration baseline. n
www.intelligentcio.com