Organisations need cyber defence technology that is quicker and smarter than what criminals have access to, asserts Ramy AlDamati, Founder of TrustyCrypto and CTO at GloryThink Group.
EC: Please summarise your latest portfolio of cybersecurity products and solutions.
In GloryThink we offer a wide range of next-generation cybersecurity consulting services to help our enterprise customers grow confidently and build cyber resilience from the inside out. We act as their cyber security business advisor in their digital transformation journey, and help them identify vulnerabilities in business before cybercriminals do, detect threats that evade their defences before they have an impact, implement appropriate defences to protect against threats, act quickly and have a plan when they experience a breach. Finally, recover their business operations faster and apply learnings from the mistakes.
With the adoption of digital platforms, expansion of attack surfaces, transformation of organizations, what are the limitations of the current generation of cybersecurity products solutions?
The best defence is a combination of the right technology and the right people. This means both defence grade technologies and highly specialised cybersecurity experts and services. You need technology that is quicker and smarter than the criminals have access to. It needs to utilise automation, robotics and AI. You also need the people who know how to proactively hunt for threats and keep ahead of new criminal behaviour. Alongside this it also must be decentralised.
What are the current stress areas and pain points of CISOs, while using their installed base of cybersecurity products and solutions?
The key pain points are:
- Increasing Volume and Complexity of Threats
- Lack of Security Resources
- Threat Prioritisation
- Cloud security concerns and solutions
What are the innovations that have been implemented or are being planned in the next generation of cybersecurity products and solutions?
The important innovations include:
- Improved automation in cyber security
- Use of AI and deep learning for attacking and defending breaches
- Development of 5G
- Hardware authentication
- Cloud technology
How will the next generation of cybersecurity products and solutions prove to be beneficial and reduce the pain points for CISOs?
Defence in depth requires big data technologies, to compare current system data to known benign and malicious behaviours. It also requires the use of sophisticated AI to assess what processes should be allowed to continue, and what needs isolating for further examination. When dynamic blocks are imposed, all hardware and systems that might have been infected need to be isolated as well. Policies need to be updated in real time to prevent further spread and fully eradicate the threat.
What will be the skill sets required by IT and cybersecurity professionals to manage the next generation of cybersecurity products and solutions?
We need hands-on training for people currently working in IT. We also need to update our formal educational process and encourage more diversity among candidates. Besides, we need to accelerate our adoption of automation and machine learning. And everyone must have at least one or more of these skills:
- Security tools expertise
- Security analysis
- Automation or devops
- Data science and data analytics
- Scripting
- Soft skills