The key pillars of CISO Success

By

For almost four decades, Interactive has been one of Australia's leading managed service providers, enabling businesses to thrive in an evolving and complex business landscape.

Amidst the escalating threat environment, Interactive has fortified its commitment to customer protection. Its strategic acquisition of Slipstream Cyber, saw an enhancement of Interactive's overall cybersecurity capabilities, providing customers with premium information security services.


According to Fred Thiele, group CISO at Interactive, “Slipstream Cyber is our specialty cyber security portfolio, it's our go to market service offering for all our cyber services here at Interactive

Thiele recently spoke at Cybercon about what he sees as the key pillars of success for most CISOs.

“The way that I really think about cyber security is to keep things as simple as possible. Cyber has a reputation for being highly complex. What I like to do is take it back to the basics such as basic hygiene,” he said.

“You've got to have good hygiene, not just once, not twice, but over a long period of time in order to stay cyber safe.”

The three pillars he focuses on are vulnerability management, understanding what you have in your environment, as well as identity and access management.

“Those are the three pillars that I like to focus on straight out of the gate before getting into a lot of other detail in a cyber program,” he adds.

Pranjali Karve is a cyber defence analyst at Slipstream Cyber and after a career in architecture and construction, she brings a different perspective to solving cybersecurity problems.

“Creativity is an important weapon in your arsenal against cyber criminals. For example, using provocation, when you throw in a statement which you know to be unfit for the purpose can nudge people's thinking beyond their vertical thinking patterns,” Karve explains.

In a world where new cyber threats emerge almost every day, Interactive is ensuring it can help clients detect threats, respond to attackers and ensure that the response minimises the risk of business disruption for clients. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Airwallex accelerates its pace of hiring for 2024

Airwallex accelerates its pace of hiring for 2024

The 2024 Australian IoT Awards - Deadline extended to 31 January 2024

The 2024 Australian IoT Awards - Deadline extended to 31 January 2024

The key pillars of CISO Success

The key pillars of CISO Success

Digital transformation and the rise of business logic attacks

Digital transformation and the rise of business logic attacks

Log In

  |  Forgot your password?