Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
Loading content ...
Loading content ...
Loading content ...
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility
em360tech image
Whitepaper
Security

The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility

by Megan Leanda Berry
5 min

Automate compliance. Strengthen resilience.

Get the new EM360Tech report on cloud and hybrid compliance. Learn how to replace manual audits with continuous assurance, automate evidence collection, and govern controls with confidence in a volatile regulatory landscape.

  • Why manual compliance can’t keep up
  • How automation transforms assurance and reporting
  • Practical governance models for automated controls
  • Managing data sovereignty across jurisdictions
  • Strategies for adapting to regulatory change
Get The Report
  • Top 10
  • /
  • Security

Top 10 tips Cybersecurity Experts want you to know

EM360 Tech
EM360 Tech
13 December 2019
6 min
120
0
Link copied to clipboard!

Jurijs Rapoports - X Infotech

Jurjis Rapoports is the Senior Security Engineer of X Infotech. Rapoports notes that in many cases, the reason companies have their security compromised is because they have not prepared for enough real life threats. His suggestion is to turn to pen testers and red teamers in order to prepare for the methods that security breachers might use. He states:

"It’s like boxing. If you learn only how to defend yourself, in a real fight, you will lose because you will not know how to understand the nature of punches, what they can be like and from what degree a punch will knock you out."

Rebecca Wynn - Matrix Medical Network

Senior Director, Head of Information Security & DPO of Matrix Medical Network Rebecca Wynn notes that CIOs need to understand that cybersecurity experts are necessary to run their business. One of the big challenges that CISOs face is trying to balance keeping the company safe from cyber threats but also keeping a pleasant working environment. A lot of ads have data scrapers. This means that the role of protecting the company from threats becomes difficult when one does not want to infringe on an employee's freedom. Wynn notes that CISOs need to be both technically savvy and business minded so that they can recognise their own importance within their company.
 

"It's not a matter of if you ever have a data breach; it's actually when anymore. If the CISO can recover as quickly as possible... that's a win."

Mark Hellbusch - GB Protect

Senior Cybersecurity Consultant of GB Protect Mark Hellbusch states that GDPR is merely the first step in protecting your personal information globally. He notes that it is the responsibility of senior leadership to "drive and shape the data privacy program across all business units".

"To ensure that personal privacy programs extends to all business units requires senior leadership to become the driving force behind your organisation’s efforts."

Dmitri Alperovitch - CrowdStrike

CTO and co-founder of CrowdStrike Dmitri Alperovitch noted that many security breaches occur because adversaries tailor attacks specifically to their subject. Crowdstrike's methodology is to focus on the adversary activity in order to detect the development of a threat before it has the chance to attack. Alperovitch states,

"If you focus on what they're trying to do and start detecting that, you create a fundamentally different platform that can actually capture attacks regardless of who is orchestrating them."

Stu Hirst - PhotoBox

Head of Security Engineering at PhotoBox Stu Hirst has a variety of techniques that helps him to stay ahead of the curve in the realm of cybersecurity. He states that by using Twitter, Blogs on LinkedIn and Medium and Youtube, one can keep up to date with the latest in security news. He also recommends using online courses, attending conferences and observing the work of your competition.

"There are some fundamental security leaders across the globe. The main players. But there are also some great security people in all manner of industries. Seek them out on LinkedIn/Twitter etc."

Dan Cornell - Denim Group

CTO of the Denim Group Dan Cornell notes that software is utilised in near enough every industry in the world. As a result, coders control the pace of innovation and as a result, control the security of the systems that they are developing. He states that many coders do not understand the workings of security. Seeing as cybersecurity is often seen as specialised and non-essential, Cornell states that it needs to simplified for programmers to think about. They key is for programmers to start thinking "What shouldn't my program do?" in order to anticipate risks as they develop software.

"This may not alleviate all security issues but it will start to change the landscape and start to set the foundation for building more secure systems in the future".

Theresa Payton - Fortalice Solutions

President and CEO of Fortalice Solutions LLC, co-founder of Dark Cubed and the first ever CIO of The White House Theresa Payton begins by stating that every company's culture is different. She believes that the CIO and CISO of a company should be working hand-in-hand to make sure that "the best technology experience and the most secure environment is there for your employees as well as that customer data that you have fiduciary responsibility for". It is important for both parties to have a shared strategy to ensure optimum security.

"If you make it so secure that the employees can't do their job and take care of the customer, they will work around your security processes which means you will lose line of sight of that data, and you cannot protect data that you don't have line of sight of."

Shannon Lietz - DevSecOps

Founder of DevSecOps Shannon Lietz has an interesting tip, which is that software developers should learn about the importance of security alongside learning to develop. What this means is that security becomes an integral part of a business's process. By doing this, businesses will have to worry less about defending after the fact and will instead be more protected from the inside.

"We want to do things like build up a developer’s capabilities, have them understand what logs mean to them, be able to track and trace against attackers, and ultimately be able to make decisions about the logic that they have in their products so that they can make those products safer."

Alexandru Catalin Cosoi - Bitdefender

Chief Security Strategist of Bitdefender Alexandru Catalin Cosoi regularly talks about the dangers of all forms of technology and how something seemingly innocent might actually compromise your security. Take, for instance, a smartwatch. Cosoi states that "hackers could use poorly configured smart gadgets as backdoors into a corporate network. This is down to the fact that they are currently lacking the proper security mechanisms." Cosoi warns that companies should enforce guidelines and principles that limits the use of smart technologies.

"Wearable devices should be regarded as mobile devices, but with ultimate portability and the potential to affect businesses in a way no other gadgets ever have. For example, imagine employees walking around the office with Google Glasses on and attending meetings or reading important documents."

Chandra McMahon - Verizon

On the discussion of considering the best companies to work for within the realm of cybersecurity, SVP and CISO of Verizon Chandra McMahon offers her insights. She states that many companies claim that they "do security". What McMahon suggests is that aspiring security experts should ask "How much are you investing in your security programs? What has been your year over year growth in your security investments?". This advice provides security professionals with the right guidance to join a company that has the best infrastructure.

"None of you would want to work for a company that says 'We do cyber, we need someone to do cyber' and then you get there and you realise it's just words on a sheet of paper but there's no leadership at the company level."

EM360 Tech
EM360 Tech
EM360Tech is the only place where IT leaders and industry visionaries converge to discuss the latest tech trends, share insights, and shape the future of technology.
Did you find the article helpful?
Link copied to clipboard!

Comments ( 0 )

Sign in to post a comment

Subscribe to our Newsletter

Recommended Content
See All →
Read How Can MSPs Move From Defense to Full Cyber Resilience?
Podcast
30 min
How Can MSPs Move From Defense to Full Cyber Resilience?
In the recent episode of The Security Strategist Podcast, part three in the series with N-able Jim Waggoner, VP of Product Management at N-able, and Lewis Pope, CISSP and N-able Head Nerd, are joined by host Jonathan Care, the Lead Analyst at KuppingerCole.  In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber resilience.
Read What If We Could Fix Vulnerabilities Faster Than We Find Them?
Podcast
20 min
What If We Could Fix Vulnerabilities Faster Than We Find Them?
In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with John Amaral, Co-Founder and CTO of Root. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management.
Read How Enterprises Can Secure the Shift to Web3
Tech Article
17 min
How Enterprises Can Secure the Shift to Web3
A gradient graphic in EM360Tech colours displays the headline “Securing the Shift to Web3”. Behind the text are simple line-style icons of a globe, shield with a padlock, user profile, and blockchain cubes. The EM360Tech logo appears in the top left. A subtitle reads: “EM360Tech guides security leaders through the controls, risks and governance frameworks needed to secure enterprise Web3 adoption.”
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x.com
  • LinkedIn
  • YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to our Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2025

Enterprise Management 360