Breach Notification , Incident & Breach Response , Security Operations
Effective Security Programs: Keeping Pace With ThreatsAshwin Ram of Check Point Says Security Programs Need Agility, Flexibility
An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point.
A strategy must prioritize the delivery of security capabilities based on the threats that will cause an organization the most harm but also be flexible, he says.
"It's incredibly important that the cyber strategy adopts an agile delivery methodology," Ram says. "The cyberthreat landscape changes so quickly that if you are not evaluating your strategy, your transformation project may actually be outdated by the time you're delivering it."
Data breaches are also costing organizations more. Automation, including in the cloud, is critical for identifying and containing breaches and reducing costs, he says.
In an interview with Information Security Media Group as part of the CyberEdBoard's ongoing Profiles in Leadership series, Ram discusses:
- The current trends and attack vectors in the data breach landscape;
- How to structure an effective security control program and strategy;
- What organizations can do to increase their cyber resilience.
Ram is a cybersecurity evangelist at Check Point Software Technologies. He helps business leaders make smarter, more insightful cybersecurity decisions by ensuring that cybersecurity strategies are designed to achieve cyber resilience. He focuses on both pre- and post-infection security controls across corporate networks, cloud, endpoints, mobile and IoT. Ram has delivered technical trainings and cybersecurity boot camps and assisted with designing and remediating cybersecurity solutions across many organizations within APAC.