10 Most Influential Business Leaders in Cyber Security, 2022 April2022

Page 1

Innovaveness and Competence

the Security of

Paving the Way The Liberty in security

Victor www.insightssuccess.comVOL-04 | ISSUE-17 | 2022 Cheah Building Trust to Protect YOU from Cyberthreats Most Influential Business Leadersin CYBER Security 2 22
Strengthening
Businesses

Editor’s Desk

Cyberattacks: Just the Tip of the Iceberg

magineusingasocialmediasiteforfun.Youshare

Iyourprivatepictures,videos,andotherpersonalthings withyourfriendsandfamily.Youmaybelieveitissafe todosobecauseitissolelybetweenyouandyourpal. Spoileralert:you'rewrong!

Someonecouldbeaccessingyourprivatedata,possiblyon theothersideoftheworld,watchingthephotographsthat onlyyourfriendissupposedtosee,andyouhavenoidea. Spine-chilling,isn'tit?Ifyourdataisstoredanywhere online,eveninaprivatechatroom,itispronetobeabused bycybercriminals.

Thisremindsmeofthefamousdatabreachwiththesocial mediaplatformFacebook.In2019,Facebooksuffereda massivesecuritybreach,exposingthepersonalinformation ofover500millionmembers.Thedatabasewasrumoredto havebeenpubliclyavailableontheDarkWebfornearly twoweeks.

SuchoccurrenceshighlightthenecessityofCyberSecurity sinceoureverymoveisnowcapturedandstored someplace,makingitcriticaltoprotectoursensitivedata. Cybercriminalsarebecomingmoreandmoreinventivein thetypesofcyber-attackstheyperformagainstbusinesses eachyear.

BusinessesmustinvestinandfocusmoreontheirCyber Securityframeworks,asalackofattentiontoitcanbe harmfultoyourcompany'sassetsinvariousways. Economicandregulatoryexpensesaretwoofthem.Theft ofintellectualproperty,companyinformation,andthecost offixingdamagedsystemsareallfactorstoconsider.

Regardlessofsize,allbusinessesmustguaranteethattheir employeesareawareofcybersecurityhazardsandknow howtomitigatethem.Trainingregularlyandastructureto workwithshouldbepartofthistoreducethechancesof dataleaksorbreaches.

Thecyberattacksweareseeingtoday,inmyopinion, areonlythetipoftheiceberg,andtherewillbemore tocome.We,ashumans,havenoideahowsevere cybercrimescanbeorhowtheycanalterourdaily lives.Governments,businesses,educational institutions,non-profits,andotherorganizations requireaCyberSecurityframeworktoprotecttheir information.

Asthenumberofcyberattacksissurging,sodoesthe appealoftheCyberSecurityspecialty.Tocombat cybercriminals,theworldneedsmoreCyberSecurity technologiesandupdatedsolutions,asitishardto predicttheirnextmove.

Featuredonthecoverofthisedition, “10 Most Influential Business Leaders in Cyber Security, 2022,” isVictorCheah,theCEOofVigilantAsia, aleaderwhoisdeliveringworld-classCyber Securitysolutionstocombatthethreatsof cybercriminals.

Learnaboutthecontributionsofsuchpersonalitiesin theCyberSecurityworldbyexploringmoresimilar andexcitingstories.

Readoureditorialstaff'swritingsandtheCxO perspectivesofsomeoftheindustry'stopexecutives togaininsightintothefield.

Delvein!

SonaliDhiwar

Cover Story

Victor Cheah Building Trust to Protect YOU from Cyberthreats

ARTICLES

Innovativeness and Competence

Strengthening the Security of Businesses

Paving the Way The Liberty in security

08
Contents 30 36
18 Debra BakerA Profound Leader Ensuring the Security of Your Critical Resources 26 Greg TaylorBringing a Sustainable Approach to Data Privacy 22Elena Elkina A Trailblazer Focused on Securing Your Privacy and Data 32Kavya Pearlman A Cyber Guardian for Extended Reality 40 Lori SussmanA Fearless Veteran Educating Future Cybersecurity Experts Mathieu Gorge Nitesh Sinha Nir Ayalon 44 52 48 14Ari Jacoby Democratizing Cybersecurity A Passionate Leader in Data Security, Compliance, and Risk Management A Rising Phoenix Safeguarding YOU Digitally Safeguarding SEAS from Cyberthreats
sales@insightssuccess.com April, 2022 Editor-in-Chief Senior Sales Manager Business Development Manager Marketing Manager Technical Head Technical Specialist Digital Marketing Manager Research Analyst Database Management Technology Consultant Pooja M Bansal Managing Editor Jenny Fernandes Executive Editor Sonali Dhiwar Assistant Editors Visualizer David King Art & Design Director Associate Designer Kshitij S Peter Collins John Matthew Sales Executives David, Martin Business Development Executives Steve, Joe, SaurabhJacob Smile Aditya Marry D'Souza SME-SMO Executive Atul Dhoran Frank Adams Circulation Manager Robert Brown Stella Andrew David Stokes Sonia Raizada Copyright © 2022 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success. Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess We are also available on : Anish Miller Shyam Sonawane

FeaturedPerson

AriJacoby

FounderandCEO

DebraBaker DirectorofInformation Security

ElenaElkina Partner&Co-founder

GregTaylor CEO

KavyaPearlman

Founder&CEO

LoriSussman

AssistantProfessor

MathieuGorge

FounderandCEO

NirAyalon CEO

NiteshSinha

FounderandCEO

VictorCheah CEO

BriefCompanyName

Deduce deduce.com

Deduceisfocusedondemocratizingcybersecurity,riskand fraudtechnologies.

RedSealthroughitscloudsecuritysolutionandprofessional serviceshelpsgovernmentagenciesandGlobal2000 companies. RedSeal,Inc redseal.net

AleadaConsulting aleada.co

Sertainty sertainty.com

XRSafetyInitiative xrsi.org

Universityof SouthernMaine usm.maine.edu

VigiTrust vigitrust.com

Aleadaiswomenandminorityownedprivacyandinformation securityconsultingfirm.

SertaintyCorporationisaNashvillebasedtechnology company

XRSafetyInitiativeisaworldwidenot-for-profitcharitable organizationfocusedonpromotingprivacy,security,ethicsin XRdomain.

UniversityofSouthernMaineisapublicuniversitywith8,000 undergraduateandgraduatestudentstakingcoursesonlineand atcampusesinPortland,GorhamandLewiston-Auburn

VigiOneenableorganisationstoachieveandmaintain compliancewithlegal,industrialandsecuritystandardsand frameworks.

Cydomeprovidesaward-winningcybersecurityandprotection tothemaritimeindustry Cydome cydome.io

SacumenspecializesinworkingwithSecurityProduct Companies. Sacumen sacumen.com

VigilantAsia vigilantasia.com.my

VigilantAsiaisaManagedSecurityServiceProviderofferinga fullrangeofcybersecuritysolutionsandservices.

COVER STORY

Victor Cheah

Protect YOUR organization against the threats of today and tomorrow.

Building Trust to Protect YOU from Cyberthreats
10 Most Influential Business Leaders in Cyber Security, 2022

Aprofessionaljourneythatbeganin1992thatshone overthedecadesachievingseveralmilestones; servingeverybusinesswithoneessentialaspect: trust,VictorCheahhasmadehismarkonthebusiness world.TodayastheCEOofVigilantAsia,Victoriskeen ondeliveringworld-classsecurityservicestailoredto protectyourorganizationagainstthethreatsoftodayand tomorrow

InsightsSuccesscaughtupwithVictortofindthemost influentialbusinessleadersinthecybersecurityniche.We interviewedhimtoknowabouthisremarkablejourneythat hasnowcurvedtowardssecuringpeople'sfuturefromcyber threats.

Unveilhisthreedecadesclimbuptheladder!

OncomingStrides

Victordabbledinseveralindustriesgoingthroughvarious challengestofoundEfficientE-Solutions,whichinitially wasamailinsertionbusiness.However,whenthe opportunitystruckduringtheAsianfinancialcrisis,the companytappedintodocumentmanagement.Afterthe financialcrisis,theregulatorsinMalaysiastartedtoallow financialinstitutionstooutsourcetheirnon-coreactivities, non-decision-makingactivities,managingsensitive documents(printing),whichgaveVictoraleadingstart.He states, "The sensitivity part about it is that the data confidentiality becomes paramount in all things. So, the bank has to trust you, right, for them to pass on - while it's a non-decision-making, but I think it was a critical enough mission within their system that they needed to make sure that the partner they choose."

Victor'spathtosuccessspannedoverthenext20years, expandingonecustomeratatimeuntil2016,whenhe decidedtosellthebusinessthatgrew,covering80%ofthe marketshareinthefinancialservicessectorinMalaysia.

TheNextChapter

Victorbelievesthatsuccesscomestothepeoplecommitted tothecause.Thisvaluewascarriedwithhisteam, supportingVictorinhiscybersecuritydrivewithVigilant Asia.Hemaintainstheconsistencyandintegritywith everythingthatVigilantAsiaoffers,resemblingitsslogan "Name you can trust," becomingoneofthecriticalsuccess factorsforitssuccess.VigilantAsiaiscommittedtoits

client24/7/365,operatingatthehighestlevelkeepingits teamontheirtoenailstodeliverstreamlinedsolutions.

Victor'sfarsightedvisionofadigitalworldanditspotential problemandsolutionbirthedVigilantAsia.Whenthe pandemichittheworld,itacceleratedthedemiseof paperless,givingrisetoremoteworkcultureandseveral securitythreats.VigilantAsiacouldhavetappedintoan arrayofstuff.However,thetechnologychangesrapidly; thus,withhisteam,decidedtheirnextsteptopreventthese threatswithinnovativesolutionsthatidentifiedand resonatedwiththecompany'sDNAoftrust.

Victornotes, "We're not here for the overnight success; we're here for the long haul." Hewantstobuildastrong practice,simultaneouslymakinganameforVigilantAsia. Hefoundthat95%ofthemarkettalkingaboutdigital transformationlackedonecrucialingredient;theydidnot understandsecurityenough.Heintendstobea cybersecuritypartnerinsidealargeorganization.Theyoffer visibilitycomparedtosubstantialvendors,service providers,ortheMDRspace,havingexpensivesetups lackingvisibilitytowardsmicro-enterprisesrequiring resilience.Victoraimstoachievethisgoal,ensuringto educatethespaceenoughtomoveforwardtocreating servicepackagesthatarebestatareasonableprice.

MakingtheMark

Despitebeingarelativelyyoungcompanyinthespaceof cybersecurityascomparedtootherpeersintheniche, VigilantAsiahasimprinteditsnameandvolumeby buildingthestackaroundbestpractices,reachingoutto globalcertificationbodieslikeCREST,goingbeyondthe standardrequirementsoftraditionalcybersecurity practitioners.Sinceitsinception,theVigilantAsiateam realizedthatmuchbiggerbrandedCIOsresearchpeople's reports.So,itstartedengagingwithGartner,receiving feedbackfromtheanalystsfollowingtheglobalguidelines, focusingonthedealscreatingmorevitalbranding.

VigilantAsiahasassociatedwithMicrosoftinMalaysiaas managedpartners,constantlyimprovingtodeliverunique solutionsfocusedonsecuritystack.,increasingits capabilitytogetessentialdealswithMicrosoft. Additionally,VigilantAsiaispartneringwithlarge organizations andhasonboardedtwotelcosinMalaysiato pushitsmobile-securitysolution.

We are an award-winning Managed Security Service Provider and the only CREST accredited and exter nally validated SOC in Malaysia.

lot of these partners, they have their relationship with their customers, in which we may need time to build. I think working through partners is always going to be important your net can be cast a lot wider."

PlanningAhead

VigilantAsiaistheonlycompanyinMalaysiathatprovides mobilethreatdefensesupport,coveringthewholespectrum ofthedigitaljourney,movingfromblueteamingtored teamingsolutionsasaservice.Itstrivestobeatopservice

providerworldwide,aspiringtobeonthe upwardtrajectorykeepingupwiththelatest trendsandexpandingitsbrick-and-mortar asahomegrowncybersecuritycompany thatwillreachoutbeyondtheshores.

FocusedApproach

Victoradvisesaspiring entrepreneurstostayfocused ontheobjective.Hesays, "It's not only in cybersecurity but also across any other industry. People try to be focusing on too many things. But every time we do that, we need to remember to pull ourselves back to the center. It's always easier to see things from the center than to be too left or right. It's always good from the center."

Victorcontinues, "You get a better overall view of where you are today And staying focused is one of those key aspects of success for any business. It's evident in the space in the West, as far as cybersecurity companies are concerned, all the recent big guys who have gone listing, they have stayed focused on one area. Obviously, no one cybersecurity company in the world can tell you they have solutions for every problem."

"That's where we come in and say, No, you don't need to have the product, you can buy the services, and someone like us will be able to put it together and provide you with the whole nine yards," concludesVictor.

Ari Jacoby Founder & CEO

Ari Jacoby

DemocratizingCybersecurity

nourendeavortofind “Most Influential Business

ILeaders in Cyber Security, 2022”, wecrossedour pathswithAriJacoby,theFounderandCEOof Deduce WegotintoconversationwithAritolearn moreabouthowheandhisteamatDeduceare protectingbusinessesandtheirconsumersfromidentity fraudthreatswhilesimultaneouslycreatingmoresecure, frictionlessexperiences.

Below are the highlights of the interview:

HowdoATOattackswork?

Accounttakeover(ATO)attackstakeplacewhenfraudsters gainaccesstoavictim'saccountandleveragethataccessin ordertostealfunds,information,rewards/perks,make purchases,orleverageapplicationfunctionalityforother formsofintendedgain.

Itisanunfortunateconditionthataplethoraofstatic identitydatahasalreadybeenbreachedduetomassive historicalattacks,andtheavailabilityofsuchdataonthe darkwebcontinuestoflourish.Thisstaticidentitydata extendsbeyondcredentials,oftenlinkingstaticcredentials withdigitalfingerprints.

Thesereadilyavailableattributesenableanadversaryto extendtechniquesbeyondcredentialvalidationattacks, leveragingfracturepointssuchasaccountrecovery processesoraccesstoanindividual’semailaccountto successfullycompletetheirattacks. Asmorecompletedataattributesaboutanindividual becomeavailableandlinkedovertime,thisresultsin decreasedcomplexityandcostrequiredtosuccessfully executeATOandmakesthisformoffraudmoreattractive tobadactors.

Moderntechniquesbyattackersunderminetheintended goalsoffriction.Ifidentityandauthenticationcontrols predominantlyrelyonstaticdatatopreventATO,an organizationisatalonger-termdisadvantage.

HowdoestheDeducesolutionaddressthisATOrisk?

DeducehascreatedtheDeduceIdentityNetwork,a consortiumofover150,000+participatingwebsitesand appswiththeobjectiveofsourcingthemaximumamount ofreal-timeactivitydataforagivenuserastheytraverse theinternet.Itsintentistospecificallyrivalthevisibility andscaleonlypreviouslyseenatinternetgiantsandto commercializeanofferingforriskteams.

“We build developerfriendly tools that empower businesses to do their part to keep their users and communities safe.”
10 Most Influential Business Leaders in Cyber Security, 2022 |April 2022www.insightssuccess.com 15

Withover450Muniqueidentityprofilesandcollectively generatinginexcessof1.4Bdailyinteractions,Deducesees themajorityoftheU.S.populationtransactinreal-time, severaltimesaweek—basedonfourprincipalthreat vectors:device,network,geography,andactivity.

BuiltontopoftheDeduceIdentityNetwork,Deduceoffers twosolutionstocombatATOfraud:

1. Identity Insights — Risk&Trustsignaldatatoempower riskteamswithadev-opsfriendlyapproachtomanaging identity/authenticationrisk.

Thedataincludestelemetryfromreal-timeactivity informationpackagedintorisksignals(ImpossibleTravel, DeviceDowngrade,UnfamiliarDevice,PreviouslyUnseen

Email,etc.),trustsignals(FamiliarNetwork,Familiar Device,FamiliarCity,FamiliarActivity,etc.),orscoresfor simpleingestionintoariskengine.

TheDeduceIdentityInsightssolutionisintendedtobeused asahighfidelityapproachtoidentifyingsuspiciousactivity whiledecreasingunnecessaryfriction.

DeployedasanAPI,Insightsisconsumableinanyrisk engine,CIAM,orapplicationstack.Deduceistypically consumedatregistration,authentication,checkout,andrisk momentssuchaschangeofprimarycontact(email,phone).

2. Customer Alerts — DeducesendsanAlert—typicallya first-partybrandedemail,asynchronously,onbehalfofthe Deducecustomer—totheirend-usersonsuspiciouslogins toenableaproactivestanceagainstATO.Customersare promptedtoconfirmordenytheactivity Anegative selectionwillcauseallactivesessionstobeterminatedand proactivelyenableausertoresettheircredentials.

Howdoesyourteamkeeptrackofaggregatehistorical datatosupportyoursolution?

Deduce’ssystemisdesignedtocorrelateevent-level telemetrydata,augmentativedatasources,andfirst-party feedbackdata,tocreatehundredsofdatafeaturesonadatadrivenplatform.Wederivetheseinsightsbydeployingcode directlytousertouchpointsacrossthewebwhile aggregatinginformationinasecure,encrypted,and privacy-compliantenvironment.

Historicalfeaturesusedinourmodelprovidepredictive analyticsonuserbehaviorbasedonaccesspatterns— devicesusersleverage,geographiestheysigninfrom, networkstheyfrequent,securitypreferences(privacyconsciousindividualstypicallyleveragingVPN,for instance),andactivityacrosstheweb.Thisvisibility facilitatesdynamic,real-timeresponsestohumanbehavior whilestoppingfraudstersandbadactorsintheirtracks. Forinstance:

Ø Ifauserisseensuccessfullyauthenticatingatdozens ofwebsitesfromanewcityinthelastday,itcanbe inferredthattheuseristraveling.Deduce’ssystem referenceagainstsuccessfulATO(fromitsfirst-party Alertsandfromnetworkbehavior)beforeproviding thisinsighttotheenterprise.

| April 2022 www.insightssuccess.com16

Ø IfagivenIPthathasbeenshown(and confirmedbythird-partysources)tobea benignresidentialIPnodesuddenlysees aspikeinhigh-authenticationfailure ratepairedwithmanynewattempted usernames,itcanbeinferredthatthere ismaliciousactivity(typicallyindicative ofcompromisednode).

Deducerecognizesthatriskdatais continuouslyevolvingandmaintainsarich solutionthatprovidesusermetadata,trust andrisksignals,andscoring,providing never-seen-beforedataandexplainabilityto security/fraudforensicsteams.

Poweringalonglistofusecases,Deduce’scustomersuse thistechnologytosolveanarrayofcybersecurityproblems, suchas:verifyingthattheuserbehindthescreenisreally whotheyclaimtobe,optimizinguserexperiencesby removingauthenticationfriction,orstoppingfraudstersat authentication.

Tellusmoreabouthowintelligenceisusedtopower yourprocessingalgorithms?

Deduce’sgreateststrengthistheabilitytocorrelatedevice, networkandgeographicalinformationagainstaparticular accounttobuildpredictivetelemetryabouttheexpected behaviorofanindividual.Usingacombinationof statistical,unsupervised,andsupervisedmachinelearning models,thisallowsustounderstandthespecific characteristicsofspecificactorsandimpostersover hundredsofdatafeaturesinthedigitalworld.

Forexample:

Ø Statisticaldatafeaturesestablishbaselinebehaviors acrossthedimensionsofactivity,network,geography, anddevice,inthecontextofindividualactivity This createsabasicunderstandingofaparticularuser’s behavior

Ø Unsupervisedmachinelearningmodelsobserveuser activityinreal-time,continuouslydeterminingtrust andriskfactorstofacilitateimmediatecybersecurity responsestoquicklyevolvingthreats.

Ø Supervisedmachinelearningmodelsaugment Deduce’sunderstandingofparticularfraudprofiles, blendingfraudfeedbackdatawithobservancesacross thenetwork,tosurfacespecificthreatactors.

Usingafullyhorizontallyandverticallyscalable deploymentmodel,Deduceisabletoprocessbillionsof transactionsdailywhilemaintainingblazing-fastresponse timesacrossitscloudinfrastructure.

Doyouhaveanypredictionsaboutemergingcyber threatstobusinessinfrastructure?

Identityfrauddoubledfrom2019to2020,withthenumber ofdatabreachesreachinganall-timehighin2021–and thosenumbersarejustgoingtogetworsein2022asmore peoplebrowse,transact,andshareinformationonlinethan everbefore.

Asfraudstershavebecomeincreasinglysophisticatedand strategic,outdatedapproachesandimplementations requiringmonthsofplanningandimplementationnolonger work–increasingly,themosteffectiveanti-fraudtoolsare thosethatsupportagiledeploymentinhoursandthatcanbe adaptedquicklytoaddresstheconstantlychangingthreat landscape.

Itisimperativethatweallbandtogethertoforma collectivedefenseagainstonlineadversaries,andleverage systemsdesignedwithknowledge-shareinmindtodefeat attackersastheyevolve.Deducebelievesthatreal-time, dynamicallynetworkeddata,withthelargestpossible activityconsortium,willprovidemorerobust,longer-lived defensesagainstbadactors.

|April 2022www.insightssuccess.com 17

Debra Baker

Technical Program Manager

Inc.

Sr.
RedSeal,
| April 2022 www.insightssuccess.com18

10 Most Influential Business Leaders in Cyber Security, 2022

Debra Baker

A Profound Leader Ensuring the Security of Your Critical Resources

Thewebofcybersecurityhasbecomewidespread globally,butitstillhasitsflaws,makingit vulnerabletonumerousthreats.However, cybersecurityprofessionalsareconsistentlyuppingthe gameandinnovatingnewwaystoeliminatethesethreats whilealsoprovidingtransparencyacrosstheservices.One suchprofessionalwe,atInsightsSuccess,cameacrossis DebraBaker,Sr.TechnicalProgramManagerat RedSeal.

PlayingaSignificantRole

Inherrole,DebrahelpsherclientsuseandadoptRedSeal productsandservicestoimprovetheircybersecurity posturebyprovidingcybervisibility,compliance,andrisk management.Inaddition,shealsomanagesproduct-related governancesuchasFIPS140andCommonCriteriaby coordinatingwiththird-partyvendorsandengineering.She alsoisresponsibleformanagingtheSOC2andFedRAMP certificationsforRedSeal'sCloudSecurityPosture Management(CSPM)productStratus.RedSealStratus enablesorganizationstounderstandandsecuretheircloud andhybridcloudenvironments.

OneofDebra'srolesistomanagelarge-scaleenterprisewideRedSealdeploymentsprovidinginfrastructure visibility,awareness,andsecurityofhybridnetworks, includingon-premises,cloud,andhybridcloud.Sheisalso

thecreatorandleadsaCyberProtectionTeamatRedSeal thatreviewsthelatestthreatsandvulnerabilitiesandwrites threatsolutionbriefsguidinghowtouseRedSealtodefend fromthelatestthreats.

TacklingtheProblems

OneofthebiggestchallengesDebrafacesisgettingcrossdepartmentcollaborationatcustomersites,whereshehasto workwithcustomerteamsonintegratingRedSealintothe customer'sbusinessprocesses.Shestatesthattotrulyhave asuccessfulRiskManagementprogram,thenetworking (on-premisesandcloud),security,vulnerability management,andcomplianceteamsmustworktogether Oneneedstohavecollaborationbetweentechnicalteams andleadershiptobecyberresilient.

ImpactfulInfluence

Debrasays, "Leaders need to be prepared to hear the good and the bad. Having a manager that says you can be yourself, with both the positive ideas you have and the complaints you have, is empowering. Giving this freedom of thought and inclusivity leads to innovation. Now you feel confident in sharing ideas that you may not have in a stifling environment." Thatsaid,shementionsthatleaders namedRameshKazaatRedSeal,AshitVoraatCisco,and KristinaRogersatEntrusthavealwayssupported, challenged,andallowedhertoexpressherideas.

Those who run the world, Run RedSeal

“ “

Besides,thebookseriesPrimalLeadershipbyDaniel GolemanhasopenedDebra'seyestotheextenta manager–whethergoodorbad–canhaveonaperson's careerandevenhomelife.Inheropinion,thisbookisa handbookforwhatmakesamanagergoodandbad.Primal Leadershipmakesitclearthat"Leaderswhospreadbad moodsaresimplybadforbusiness—andthosewhopass alonggoodmoodshelpdriveabusiness'ssuccess.”

AccordingtoDebra,thebookFindYourWhybySimon Sinekbringstogetherworkandpassionsrelatingtoone's

|April 2022www.insightssuccess.com 19

job.Her"WHY"isthateveryonedeservestohaveprivacy whileonline.Knowingthatsheworksincybersecurityand helpscompaniessecuretheirnetworksanddatathrough goodcyberhygiene,segmentation,andstrongencryption keepsDebrapassionateaboutherjob.

Debrasays, "It's great to work in a field where I am helping businesses secure their networks. Through the Crypto Done Right non-profit I founded in collaboration with Cisco and Johns Hopkins, I provide cryptographic guidance in easyto-understand language of what encryption algorithms and ciphers are recommended for non-cryptographers.”

Sheadds, "Never let a bad manager bring you down. Learning how not to let detractors negatively affect you is paramount as you navigate your career. There is always something better just around the corner. Take those situations and learn from them and move on."

ImpactofPositiveWorkCulture

Debraistotallyinforapositiveworkenvironment.Inher opinion,everyonehastobeauthenticbutwithapositive slant.Sheisaglass-half-fullkindofapersonwhotriesto seethepositiveineverysituationevenwhenshegets boggeddown.Sheensuresthateachpersonhasachanceto expressthemselveswithoutretaliationandinarespectful way

Debrathinksthatemployeesshouldbeabletoopenly expresstheirideasevenwhentheygoagainstthestatus quo.Thereshouldnotbeafearofretaliation.It'sthe"yes" culturethatleadstoconformityandstopsinnovationand newideas.Managementhastobeopentohearingthegood andthebadandnottakingitpersonally,butinsteadtaking thatinformationandlearningfromit.

OfferingtotheCommunity

WhenDebrawasaskedtoco-foundtheLeagueofWomen inCybersecurity,shejumpedatthechancetotrainwomen inCybersecurity.Itwasgreatforherbeingabletogive backandtrainotherwomenfromwhatshehaslearnedin cybersecurity.OnewomanwhowasinspiredbyDebra,got herMaster’sinCybersecurityandgotajobatAWS.It makesDebrahappywhensomeoneshehelpedalongthe wayissosuccessful.LeagueofWomenalsohelpedwomen navigatehowtomoveintothecybersecurityfield.

AtRedSeal,theCEO,BryanBarney,isallaboutpromoting equalrightsforallandrespectingpeopleofdifferent backgrounds.Oneofhisfirstinitiativeswastosetupa DiversityandInclusionCounciltoensureeveryoneat RedSealisheardnomatterwhatposition,gender,race,or sexualorientation.

| April 2022 www.insightssuccess.com20

WhatComesNext?

Debra'svisionforRedSealistopushforwardthecompany tobecomecloud-centric.RedSealStratusisaCloud SecurityPostureManagementSaaSplatformlaunchedin August2021.Manycompaniesaremovingtheirdata centerstothecloud.Inaddition,RedSeal'sadvanced cybersecurityanalysiscapabilitiesandnamerecognitionis knowninthecommercialspaceaswellasitisinthe Federalspace.RedSealisthebest-keptsecretsecuring well-knowncompanies,aswellasmilitaryandfederal agencies.

DebrarecentlycreatedaCommonCriteriaforDevelopers LearningPathforInfosecInstitute.Ifyouareresponsible foranupcomingCommonCriteriaEvaluation,area developerhavingtomakesoftwareupdatestoensureyour productisCommonCriteriacompliant,orareanew employeeatanevaluationlab,thenthislearningpathisfor you.

SheisalsowritingabooktitledaCISO’sGuidetoCyber Resilience.It’sahandbookforaCISOtoknowwhatsteps totaketosecuretheircompany’snetworkandtorecover fromanattack.

BequeathingAspiringEntrepreneurs

Debrabelievesthateverywoman-ownedbusinesscan applyforgovernmentcontractssincewomenareminorities. Shesays, "There are great women-based networking opportunities at the Grace Hopper Conference, which is the largest women's conference in the world. Every company that you can think of is represented there.”

"For women moving into information technology, Cybersecurity, and programming, Grace Hopper is a great place to find a job. Also, the Women in Cybersecurity annual conference is not only a great place to find women to hire, but also network and advance in the cybersecurity field," concludesDebra.

|April 2022www.insightssuccess.com 21
www.insightssuccess.com

10 Most Influential Business Leaders in Cyber Security,

A Trailblazer Focused on Securing Your Privacy and Data

|April 2022www.insightssuccess.com 23
2022

Aleada'sworkassessesclientcompliancerequirements,and ithelpsthemaligntheircompliancestrategywithbusiness goals.There'salotofplanninginvolvedtobuildsolid personalizedprivacyprogramandasignificantamountof trainingthatkeepsitengagedwithclients.Elenatruly understandsaclient'sbusinessandcanadaptcompany programstomeettheirchangingneedsfast.

InfluencingExpertise

Elenastatesthatcomplianceiscomplicated.New regulationsseemtopopuplikemushrooms. Mismanagementcouldresultinfines,ruinedreputations, andworse.Anotherobstacle:Compliancerequirementscan getinthewayofbusinessprogress.Also,whatworksfor oneclientwon'tworkforanotherclient.

Elenaaddsthateveryclienthasasetofstrengthsand weaknessesandtheonlyrealwaytocreateasoliddata privacyprogramistodoadeepdiveintotheirbusiness. Whoaretheircustomers?Whatsortofsystemsarethey using?Wherearethethreatscomingfrom?Cantheirneeds

Privacy and security at the speed of business.

“ “

| April 2022 www.insightssuccess.com24

beaddressedwithnewtechnology,newpersonnel,new procedures,oracombinationofallthree?

Aleada'sbiggestimpactcomesfromwhatsomemightthink isthesmallestofthings–itlistenstoitsclient'sconcerns.It auditstheirsystems,processes,andteamsbeforebuildinga customprivacyandinformationsecurityprogramthat's perfectfortheirbusiness.

Elenaisconvinceditisthecompany'spersonalapproach andherteam'sexperiencethatwinsnewbusiness.Its reputationisoutstandingandgetsnewbusinessfromclient referrals.Elenasays, "You cannot help a client build a strong privacy and security team without showing them you have one too, and Aleada does.”

SecuringClient'sDataThroughTechnology

ElenastatesthatAleadahelpsitsclientswithitscore servicesbybuildingprivacyandinformationsecurityinto theirproducts,services,overallcomplianceprogram,and companyculture.Ithasbeenfocusingoncreatingglobal privacyanddataprotectionprograms,includingdeveloping andimplementingregulatoryframeworks,risk/gap assessments,maturitymodels,long-termroadmaps,and dataprotectionpolicies;designingandemployingdeidentificationandPrivacybyDesigndatahandling processes.Italsoworkswithdevelopmentandbusiness teamstobuildcloud,web,andmobileconsumerand businessproductsacrosstheglobe.

Elenanoticedthatwhenfacedwiththeneedtosetup somethingcomplexquicklyorfaceliabilityrisk,itis commonforcompaniestoturntolawfirmstopickupthe slack.Areasonablereactionoftenresultsina patterned/checklist-drivenapproachindealingwithrisk managementinsteadofbuildingandimplementingits privacyandinformationsecurityprogram;legaland complianceshouldcomehandinhand.Asaresult,a growingpremiumisplacedonprivacyandinformation securityoperationalandstrategicexpertise.Thisiswhat Aleadadoes.

Ithasbecomeanecessaryassetforanycompany,nomatter theindustrysector,itsmaturity,ortargetmarket, specificallyfordisruptivetechnologiesinthefuture.Elena expressesthatAleadamustfocusontheintersectionof technology,datastewardship,andcompliance,asaprivacy andinformationsecurityfirmtostayaheadoftheindustry andsupportbusinessgrowth.

TheLongRun

AslongasElenaseesherselfonabeachintheMaldives enjoyingherwaterfronthomeinherfuture,shewantsto createfundamentalchangesbybringingmorediversityto theever-growingprivacyandinformationsecurityindustry asalonggoal.

ElenahopestogrowAleadatohelpanincreasingnumber ofclientswithoutlosingthenotionthatlisteningismore importantthanspeaking.Thecompany'spersonalized approachtodevelopingcustomprivacyandinformation securityprogramsforitscustomerscreatesthemostvalue foritsclientsandcompany,whichgivesElenajoyin everythingshedoes.

ValuableGuidance

Elenaadvisesbuddingwomenentrepreneurstospeakup, partnerup,andknowtheirvalue.Shesays, "Demand value be placed on the job at hand and not your gender. Be bold and ethical. Show competence and leadership. And this isn't just about the privacy and security sector; it's about life," concludesElena.

|April 2022www.insightssuccess.com 25

Leaders in

Security,

Greg Taylor:

Bringing a Sustainable Approach to Data Privacy

AquotebyStephaneNappo, "It takes 20 years to build a reputation and few minutes of cyber incident to ruin it," accuratelyemphasizesthe significanceofdatasecurityinthetechnologicalera.

Anorganizationcannotdefenditselfagainstdatabreach operationswithoutacybersecurityprogram,makingitan easytargetforcybercriminals. Thesecriminals’strategies arebecomingmoreadvancedthantraditionalcyber defenses,sobusinessleaderscannolongerrelyonlyon out-of-the-boxcybersecuritysolutionslikeantivirus softwareandfirewalls.

UnderstandingtheimportanceofdataprivacydroveGreg TaylortostartSertaintyCorporation,acompanythatbuilds privacyintelligencedirectlyintodatatomakedataprivacy guaranteed,demonstrable,andmanaged.

SertaintyCorporationoffersadvancedtechnologythat embedsadatafilewiththenecessarysafeguardsand managementmodulestodefendagainstunwantedaccess.

AManwithaMission Earlyinhisentrepreneurialcareer,GregfoundedTaylor Associates,aprofessionalsearchandrecruitingcompany thatrevolutionizeddataprocessing.Thiscompanyinspired himtostartDatamanServices,adataprocessingsystems analysis,softwaredevelopment,andconsultingservices organizationgearedtowardstheveryearlystagesof

10 Most Influential Business
Cyber
2022 | April 2022 www.insightssuccess.com26

Greg Taylor

CEO Sertainty Corporation |April 2022www.insightssuccess.com 27

cybersecurityanddataprotectionthroughpropersoftware developmentandimplementationoftheappropriate standardsandprocedurescompany-wide.

UponfoundingSertaintyOneCorporation,thepivotof SertaintyCorporation,hebroughttogetherthefounding teamthatnowensuresexceptionaldevelopmentand commercializationofself-governingdata.

Earlyon,Gregandhisteamwereconfrontedwithdoubt abouttheirabilitytodeliverontheirpromises.Herememberscommentslike, "Technology is not that far advanced." Thechallengethenbecametoconvincetheseorganizations toconducttheproperduediligenceandinvestthetimeand resourcestoseethatSertaintytechnologycouldtruly protecttheirinformationbybuildingprivacyintelligence directlyintothedata.Whilethisskepticismledto resourcingconstraintsandchallengesatSertaintyfora period,theyovercamethesehurdlesbypatentingtheir

customizablesolutionintheUS,Japan,andKoreaand buildingvaluablepartnershipsthatfurthervalidatedtheir approach.

Havingdealtwithincredulityanddoubt,Gregnowadvises youngentrepreneurstohavefaithinthemselves.After workingininvestmentbankingforover14years,Greghas observedthateveryoneunderestimatesthevalueof financial,family,andcommunitysupport.Tobea successfulentrepreneur,youmustbewillingtotakerisks.

Gregshares, "You must have a special kind of grit to survive, much less succeed. You will get told no 300 times, but it takes one yes to begin down a path that could change your life."

GuidingPrinciples,ShapingWorkCulture

Everybusinesshasitsownsetofvaluesthatinfluencehow itoperates.ThemissionatSertaintyrevolvesaroundthe Zero-TrustPrinciple;nevertrustandalwaysverify This principlemeansnodeviceoruserwilleverbetrusted,anda verificationprocessisalwaysrequired.

Asdeep-techcyber-innovators,theSertaintyteam’smission istoofferbreakthroughself-protecting-datatechnology.Its cutting-edgeDevSecOpsteamscandeployaproactiveand self-mitigatingdata-centricstrategythatassuresthesafety andsustainabilityoftheconvergingOTandIT environments.

AtSertainty,theypackageanddistributetheirmainproduct inaSoftwareDevelopmentKit(SDK).TheirSDKincludes alltheApplicationProgrammingInterfaces(APIs)needed tobuildasecureSelf-ProtectedDatafile.

Inshort,thisSDKwillhelpcustomersbuildhighlysecure applicationsforprotectingdata.

LeavingaMarkintheInformationSecurityNiche

WithSertainty,clientsandpartnerscancreateacompetitive differentiatorwithcustomersandregulatorswhowantmore thandataprivacypromises.Establishingandretaining customertrustandtakingasustainableapproachtodata privacyregulationsareoftheutmostimportancefor businessesworldwide.

| April 2022 www.insightssuccess.com28

VerifiedbyindustryleaderVeracode,Sertaintyhas discoveredandpatentedawaytoembeditsprogramming languageandexecutablecodesothat"onesandzeros”are indistinguishablebythebesthackers.

Whentested,theSertaintypatentedDataPrivacyPlatform receivedthehighestscorepossible:VL5,100%inStatic ApplicationSecurityTesting(SAST)andManual PenetrationTesting(MPT).

DevelopingVersatileSolutions

Technologyiscriticaltothegrowthofpracticallyevery industry,progressivelyplayingamoresignificantpartin oursociety,fromcybersecuritytoagricultureandfarming.

Sertaintyrecentlyreceivedpatentsforitsintelligentcipher transferobject(ICTO)inJapan,Korea,andtheUnited States.OneofitsdataprivacyplatformpartnersisTexas StateUniversity'sCIEDARprogram.Theprogram developssmartcitiesintegratedwithsolarfarms, autonomousvehicles,andsmarthomes.Whileprogressing towardhumanadvancement,Sertaintyensurestheirdata andprocessesaresafewithself-governingdataonthe backend.

AChangefortheBetter

Technologyisever-changing,andonemustkeepupwithit tostayrelevantinthetechindustry.Manybusinessesin dataassurancearen'tbeholdentoanindustry-standard insteadoffocusingonmarketingtogainnewcustomers. Thereneedstobeabetter-structuredstandardofoperation fordataassurance.Whenthereisabreach,thesebusinesses facenorepercussionsandgivenoclearroadmaptoclients onhowtoensurethatadatabreachwon'thappenagain.

Sertaintybelievesthebestwaytoprotectvaluabledataisto haveitsplatformstestedandgradedbyindustryexpertslike VeracodeandkeepitsB2Bclientsuptodateonthelatestin dataadvancementsandpractices.Educatingyourclients enablesthemtomakeinformeddecisionsregardingtheir valuabledata.

Gregadds, "When they know your business has been judged according to an industry-standard, it increases their confidence in your ability. It's time for businesses to stop keeping their clients in the dark and work together to shine

a light on how they can make better, actionable decisions around data protection."

GoingAboveandBeyond

AtSertainty,whentheylookintothefuture,theyare lookingsixmonthstothreeyearsfromnow.Inthe cybersecurityworld,threeyearsisalongtime.The companyisworkingtowardsapublicofferingand evaluatingfuturepartnershipswithrenownedWallStreet firmsthatcouldrepresentSertaintyinaprospectiveM&A transaction.

Also,Gregpredicts, "Over the next 18 to 24 months, we will have tremendous pressure on us to sell the company. I say this because of the increased interest we have already seen in Sertainty, and I believe that will only grow. We are getting traction in these areas, and the company is becoming more valuable."

Concerningitsinternalgrowth,thecompanywillcontinue toadvancethecapabilitiesofself-governingandselfprotectingdata.Manyorganizationsarelookingtoadopt theZero-Trustmodeltosolvedatasecurityneeds. However,theyforgetthatitisn'tacookie-cuttersecurity model.Instead,it'samethodologythatneedstoevolve consistently Theabilitytoaccommodatethosefast adaptationsmakesSertaintystandoutintheZero-Trust cybersecurityindustry

ToBuddingEntrepreneurs–GetaFoothold

"The advice I would give to any entrepreneur is this; if you've got a vision and you believe that you are called to that vision — and I do mean called, something that's burning inside of you and you cannot say no — and you're willing to risk everything you've got, then go for it!"

Finally,Gregalsoaddsthatoneshouldneverburnabridge asyouneverknowwhenthatrelationshipwillcomeback andbebeneficialtoyouandyourcompany.Theteamis critical.Youcanhavethebesttechnologyontheplanetand millionsofdollarsinvestedinit,butifyoudonothavea 100%committedteamthatsharesyourvisionandpassion, youwillfail.

|April 2022www.insightssuccess.com 29

Innovativeness and Competence

Strengthening the Security of Businesses

hatsetsgreatleadersdifferentfromtherestis

Wtheirsheerabilitytothriveevenamidstgreat challenges.Theyarenotafraidofchallenges.In fact,theyliketobepartofsolutionstothechallenges. Greatleadersaredifferentfromordinarypeople.Theydon’t thinklikeordinarypeople.Theyhaveout-of-the-box thinking.Theythinkinnovativelyandplanstrategicallyto executetheirideasandworkpassionatelytodeliver gloriousbusinessresults.Theyfigureouttheproblems,and theiraimistodeliverthebestsolutionsandensuretheir clients'problemsareresolved.

Greatleadersbecomegreatbecauseoftheirgreatattitude. Theirexceptionalattitudehelpsthembeascleverasthey canfordeliveringsolutionsthatareofhighqualityandare moreappreciatedbytheclients.Thatmakesthemthemost eminentleadersintheindustry.Theyearncredibilityinthe industrybytheirexceptionalabilitytodeliversolutionsto thechallengesinamoreprofoundwaythatmeetsthe expectationsoftheirclientsintheindustry.Theyleadwith thegloriousreputationtheyhaveearned,andtheytrytheir levelbestorbeyondthattosustaintheirreputation.

Thecybersecurityindustryhaswitnessedsuchcontributions fromvariousingeniousminds.Andamongthoseleaders, womenleadersareplayingthemostprofoundroleby deliveringthebestsolutionstothebusinessesandthe clientsforensuringthesafetyandutmostprotectionoftheir data.Theystrengthentheprivacyandsecurityofthemost valuabledataoftheirbusinessesandclients.Theymake surethattheirsolutionsplayanimportantroleinpreserving thesafetyofdata.

Dataisthenewbuzzwordtoday.Thedataused appropriatelyfordeliveringstreamlinedandorganized solutionsisbeneficialtotheclientsandbusinesses.But ensuringtheprotectionofthisvaluableassetcalleddatais challengingformanybusinesses.Theeminentwomen leadersinsecuritymakeapointtodeliverthe

technologicallyadvancedsolutionsthatplayanessential roleinensuringthebusinesses'cybersecurity.Theydon’t makeanyexcusesinleavinganyroomforthetheftor exploitationofthevaluabledataofthebusinesses.They don’tleaveanychanceforhackers,stealers,and cybercriminalstoaccessthedatabydeliveringhighly evolvedsecuritysolutionstotheimportantinformationof theorganizations.

Innovativenessisthemostintrinsicqualityofeminent womenleadersinsecurity.Innovativenessisliterallyin theirgenes,andtheynurturethatinnovativenessmuchby constantlybeingcreativeandthinkingbeyondnormal thinking.Theyknowthattosustaintheircompetencyinthe market,thereisnootheroptionforthemotherthanbeing innovativeanddeliveringsomethingofvalueand credibilitytotheindustry.Theirapproachisclear,andthey comeupwithinnovativeideasandimplementthemto improvethequalityofthesolutionstotheeverincreasing challengesinthesecurityindustry.Competenceand presenceofmindarethehallmarksofeminentwomen leadersinsecurity Theyarecompetenttodeliver innovativesolutionstoaddresssecuritychallengesinthe industry

Eminentleaders'competitiveapproachhelpsthemavail edgeoverothersindeliveringthemostaccurateandtimely solutionstotheexistingproblems.Moreover,thepresence ofmindisessentialtobesuccessfulinanyfieldorany industry Theeminentleaderspossessthisqualityof presenceofmindinabundance,andthisqualityhelpsthem comeupwiththemostpragmaticsolutionstothe unforeseenchallengesevenatthespurofthemoment.This isoneofthebestqualitiesofeminentleadersinthesecurity industry.Theyadoptbestpracticestostrengthenthe securityofthebusinesses.Innovativeness,Competence, andPresenceofmindarevitalattributesthathelpwomen leadersinsecuritytobemoreeminentintheindustry

| April 2022 www.insightssuccess.com30
|April 2022www.insightssuccess.com 31

10 Most Influential Business Leaders in Cyber Security, 2022

|April 2022www.insightssuccess.com 33
. www.insightssuccess.com
|April 2022www.insightssuccess.com 35

Paving the Way

www.insightssuccess.com

The Liberty in Security

oday,therearehugeopportunitiesinthe

Tcybersecurityindustrybutamassiveshortageof cybersecurityprofessionals.Anddiversityinthe workforcecanfillthisspace.

Theproblemreallyisnottheindustrybeingoccupiedby morenumberofmen;nothavingenoughwomenisthereal problem.

Ifwelookatthefigures,indeed,thenumberofwomenhas grownfromthepastyears,buttherearestillmany opportunitiestobeseizedincybersecuritycareers.

Womenhavealwaysprovedtheirmettleinalmostevery industry.Theyhavedisplayedwhattheycanbringtothe table.Beitbuildingground-breakingsolutionsorguiding buddingwomentomakeacareerintheindustry,women havecontributedineverypossiblewaytothedevelopment oftheindustry.

TheRealDeal

Buildingacareerinafieldlikecybersecurityneedsnotjust knowledgebutexperience,andtheconstantfocusto improvehelpsbusinesswomengothedistance.Adaptingto newtechnologiesisgood,butitalsomeansyouaremore pronetocyber-attacks.Today’sbusinesswomenrealizethe impactoftechnologyandunderstandtheextentofrisksthat technologybringsalong.Theyevaluaterisksandprovide solutionsaccordinglyinatimelyandcost-effectivemanner

Beyondthat,thejourneyisfullofchallenges,like–promotingethics,diversity,andintegrityintheorganization

andofcoursetokeeptheclientsandthecompanyaway fromanycompliance.Theyunderstandthatitisnotaneasy task,astheyhavetobereadywiththeoptionsforanysuch challenges.

Youcannotjustraiseyourvoicewhenthingsgowild;only bettercommunicationandunderstandingofthesituation willgetthejobdone.Thisiswhatwomenleaders exemplify.Sharingknowledge,attendingseminars, interactingwithindustryexpertsclearstheirunderstanding ofthecomplexandchallengingfieldslikecybersecurity

ThePerfectFit

Womenincybersecurityhavechangedthedogmaofthe industry,beitcybersecurity,IT,healthcare,oranyother fieldforthatmatter.Theirproactiveleadershipandbuilding secureapplicationskeepthemstayaheadoftheemerging competitivemarket.

Thekeytotheirsuccessisthepromotionofinclusivityand diversityintheirteam,makingthecybersecurityfieldmaledominated-free.Yes,itwillbearealitysoon;therewillbe nolongeraneedfortheterm‘male-dominated’ifonly everyoneisgivenequalopportunitytolead,ofcourse.

TheEndThought

Businesswomenhaveremainedtrueintheirmission,helped otherwomenentrepreneurs,gatheredandsharedeverything theyhave.Ultimately,thequalitywhichstandsoutinthem isnevergivingup;theyalwaysthinkofalternativesfor everyproblem.

Buildingaglobalworkforceofwomennotjustin cybersecuritybutineveryindustryshouldbeourgoalasa society.Thatistheonlywaywecanshapethefutureof womenintheindustries,includingcybersecurity

|April 2022www.insightssuccess.com 37
Lori Sussman
Assistant
Professor
University of Southern Maine | April 2022 www.insightssuccess.com40

10 Most Influential Business Leaders in Cyber Security, 2022

Lori Sussman

A Fearless Veteran Educating Future Cybersecurity Experts

Cybersecurityisoneofthemostcriticalissuesthat severalorganizationsdealwithtodayonaglobal scale.Withtheever-growingexpansionof digitalizationofdata,itbecomeschallengingtoprotect essentialinformation.Numerousinstancesofdatabreaches, ransomwareattacksarebecomingdangerousthreatsand headingfurtherintothefuture,anditwillbecomemore criticaltobuildsecurecyberspace.However,leadersin Cybersecurityareconsistentlyimprovingexisting technologies,anditisnecessarytoeducatetheupcoming generationtoutilizetheiruniquetakeonCybersecurity

LoriSussman,AssistantProfessorintheDepartmentof TechnologyatCybersecurityattheUniversityofSouthern Maine,isonesuchleaderwhousesheryearsofexpertise toeducateandtrainfuturecybersecurityexperts.Loriisa veteranwhodedicatedovertwodecadesoflifetotheUS Army.Shenowhelpsorganizationsbuildtheleadership, technology,andsecuritycapabilityneededforthis increasinglyglobalandconnectedfuture.

In2015,LoriwasnamedoneoftheCRN2015Womenof theChannelPower50SolutionProviderbyTheChannel Company'sCRNMagazineforherexemplaryrecordof successacceleratingherclients'needsthroughtechnology solutions.

AUniqueJourney

Inanon-traditionalpathtoacademia,Lori'scareerstartedat WestPointaspartofthefourthclasstoallowwomeninto itsranks.Evenwhendealingwithsomeanimosityabout

womenbeingpartoftheCorpsofCadets,shelearnedto "cooperateandgraduate."Sheproudlygraduatedasa secondlieutenantintheSignalCorps,theInformation TechnologybranchwithintheUSArmy

Loriservedover24yearsofUSArmyservicewith distinctionandretiredattherankofColonel.Itwasher honorandgoodfortunetoassumevariousleadership positionsculminatinginbrigadecommand.Shebenefitted greatlyfromthementorshipandthesponsorshipof enlightenedseniorofficersandofficials.

Duringherservice,Loripursuedandcompletedfour master'sdegrees,whichprovedtobeanessentialfactoras shemovedfromthepublictotheprivatesectorafterher retirement.Sheexploredlargecorporations,small businessesandalsoventuredintoentrepreneurship.Asa result,shegottoworkforelitehightechnologycompanies suchasCisco,HewlettPackard,andalocalSouthCarolina Fortune5000company.Lorimanagedhighlycomplex, diverse,andactiveorganizationsengagedindeveloping, acquiring,integrating,deploying,andsustainingstate-ofthe-artbusiness,technology,andsecuritysystemsfor clientsintheseroles.

Lorifelthercallingwhenshereadabouttheneedtomove fromsuccesstosignificanceinthebook"HalfTime."So sheenrolledintheUniversityofNewEngland(UNE) doctoralprogramintransformativeeducationalleadership.

In2018,theUniversityofSouthernMainehiredLorias part-timefaculty,andshebecamefull-timefacultyin2019.

|April 2022www.insightssuccess.com 41

Inthreeshortyears,shehelpedcreateanewprogramfora Master'sinCybersecurity,startedacommunityservice CybersecurityAmbassadorprogram,andstartedUSM's CyberDefenseteamcalledtheHuskyHackers.Loristates thatithasbeenanexceptionalexperiencewatchingstudents thriveandgrow.

TheMissionandVisionofUSM

TheUniversityofSouthernMaine(USM)isaunique institutionwithamissiontoprovidestudentswithahighquality,accessible,affordableeducation.Ithas comprehensiveundergraduate,graduate,andprofessional programsdesignedtoeducatefutureleadersintheliberal artsandsciences,engineeringandtechnology,healthand socialservices,education,business,law,andpublicservice.

Thefacultyiscommittedtofosteringaspiritofcritical inquiryandcivicparticipation.Bothstudentsandfaculty enjoyacultureofacademicfreedominanenvironmentthat advocatesdiversityinallaspectsofcampuslifeand academicwork.USMsupportssustainabledevelopment,

Preparing students today for the world of tomorrow.

“ “

environmentalstewardship,andcommunityinvolvement, thusprovidingresourcesforthestate,thenation,andthe world.

LeveragingTechnologytoTeach

ConsistentwiththeUSMmissiontobeacenterfor discovery,scholarship,andcreativity,Loriemphasizes projects,writing,problem-solving,activestudentlearning, applicationoftheorytopractice,andmeasurableoutcomebasedlearningwhenteachingtechnologyorcybersecurity courses.Sheevaluatesstudentsusingcriticalthinking papers,writtencasestudies,classpresentations,small groupwork,andappliedprojectsintheuniversityand community.

Loriutilizesengagedlearningtechniquestoensurethatall ofherstudentscanbringtheorytopracticebyapplying theirknowledge,skills,andabilitiesincontextsbeyondthe traditionalclassroomandprovidingapplication opportunitiesinthecommunity,thelaboratory,andother venues.Thisengagedlearningchallengesstudentsbecause

| April 2022 www.insightssuccess.com42

itrequiressustainedandfocusedapplication,reflection,and collaboration.Inaddition,sheusesreal-worldexamplesto focusontechnologyandcybersecurityactivitiesto understandtheissuesbetter

Puttingherstudentsfirst,Loricreatesprogramsthat graduatestudentswithskills,knowledge,andcapabilities fortheworkforce.Shestrivestoimmersestudentsinthe technologybutwithenoughcreativespacetoevolve,learn, andgrow.

Whenmeetingwithastudent,Loriexaminestheirvalues, personality,culture,likes/dislikes,strengths/challenges, skills,attitudes,andbeliefs.

Theseattributesinformhowonecancollaboratively navigatetheiracademiccareertolandthattechnologyjob forwhichtheyaspire.Shespendsagreatdealoftime makingsurethatherstudentsachievetheobjectivesoftheir collegeexperience.Theyshouldhaveapurposefortheir presentandlifelonglearning.

Finally,Loriwantstohelpherstudentstoappreciatethe largerviewofthemselves,theiruniversity,andtheir community.Studentsmustseeaconnectionbetweentheir experiencesatUSMandtherealworld.

HeadingIntotheFuture

Lorifocusesoncreatingprogramsthatincreasediversityin thetechnologyandcybersecurityworkforce.Sherecently foundedtheUSMCybersecurityAwareness,Research,and EducationSupport(CARES)Center,intendingtotake advantageofbeinginthestate'sfastest-growingregion.

USMisamulti-campusuniversitywithnearly20,000 students,makingitoneofthelargestinstitutionsinthe UniversitySystemofMaine.TheCARESCenter'sgoals aretocreatevariouseducationalpathwaysthatprovide accesstounderrepresentedpopulations.

Theuniversityisstartingtoshapeprogramsthatinclude opportunitiesrelatedtoexperientiallearning,internships, scholarships,curriculumandworkshopdevelopment, outreachprograms,andappliedresearch.Ithasacollective goalofincreasingthecybertalentandworkforcecapacity tomeetMaine'sandprivateindustrycyberneeds.

ANotetoYoungerOnes

Inheradvicetoemergingwomenleadersinthesecurity space,Lorisays, "Be fearless. Believe in your intuition, and don't take no for an answer."

|April 2022www.insightssuccess.com 43

Mathieu Gorge:

A Passionate Leader in Data Security, Compliance, and Risk Management

Oeverinthedigitalworld.Beingcomplacentin protectingonlineinformationcanbeasignificant threat,andcybercriminalsexploitthat.Addressingthe evolvingthreatstothedatawithevolvingandinnovative solutionsbecomesthemostcriticalneedofallbusinesses.

nlinedataprotectionhasbecomemorecriticalthan

internationalsecurityandcomplianceconferencessuchas RSA,ENISA&ISACA.

"No one in compliance can afford to stay still," believingin thisstatement,MathieuGorgethinksthatinnovationmust ensurethatsecuritysolutionsaddresscurrentthreats, vulnerabilities,andregulations&standards.Asthe FounderandCEOofVigiTrust,Mathieuutilizeshis knowledgeandexperiencetoresolvethecybersecurity industryissuesinnovatively.Apartfromthat,Mathieuhas alsowrittenabookentitledTheCyberElephantinthe BoardroompublishedbyForbeBooks(November2020), aimedatBoardmembers,C-Suites,andcriticaldecisionmakersfacingcyberaccountabilitychallenges.

EstablishingAuthorityinCybersecurity

Mathieustudiedlanguages,marketing,andlawbutnever oncelearnedITorcompliance.However,hewaslucky enoughtoworkforcompanieswhereleaderswere passionateaboutsecurity;hecaughtthebugandfoundhis passionindatasecurity,asubsetofthesecuritymarket, growingtoriskmanagementandcompliance.

Mathieu'sareasofexpertiseincludePCIDSS,GDPR, CCPA,HIPAA,VRM,andISO27001.Hehasbeen involvedinpaymentsecurityformorethan20yearsand hasworkedwithmanysecurityworkinggroupsand associationsintheUSandEU.Thankstohisinternational workhand,buildingonthesuccessofVigiTrust's5Pillars ofSecurityFramework™,heisaregularspeakerat

MathieuwasthePresidentoftheFrenchIrishChamberof CommerceinDublinfrom2017-to2019-Heremainedon theExecutivecouncilandaschairoftheICTworking group.HehasalsoservedastheChairmanofInfoSecurity IrelandandwasanOfficialReviewerforANSI(US).Heis thefounderofthePCIDSSEuropeanRoadshow,running since2011.

Mathieuisanestablishedauthorityandspeakeron Cybersecurity,RiskManagement&Compliancewithmore than20yearsofinternationalexperience.Heisalsothe ChairmanoftheVigiTrustGlobalAdvisoryBoard,an internationalsecurityandcompliancethinktank.In2021, hewasawardedtherankofKnightoftheNationalOrderof MeritbytheFrenchGovernment(Chevalierdel'Ordre NationalduMérite)

The Security is a Journey, not a destination

Mathieu Gorge, Founder and CEO (VigiTrust)

| April 2022 www.insightssuccess.com44

10 Most Influential Business Leaders in Cyber Security, 2022

Mathieu Gorge Founder and CEO (VigiTrust)

Mathieudevelopedapassionforadomainhedidnotstudy, cybersecurity,learningtechnicalskillsrapidlysurrounded bytherightpeoplewhosharedtheirknowledgewithhim. Havingnosalesormanagementtraining,helearnedto build,growandmaintainacompany,itsteam,finances,and operations.Withoutanymanagementtraining,itwasan uphillbattle;however,hesurroundedhimselfwith competentpeoplewhohadmoreexperiencethanhim,and theyhaveguidedhimthroughouttheprocess.

BeingattheForefront

VigiTrustisaward-winningIntegratedRiskmanagement (IRM)solutionprovider(PCI,GDPR,CCPA,HIPAA, VRM)foundedin2003.ItisbasedinDublin,Ireland,and hassupportofficesinNewYorkandParis.Itispresentin

120countries.VigiOne,VigiTrust's flagshipsolution,enables organizationstoachieveand maintaincompliancewithlegal, industrial,andsecuritystandardsand frameworks,includingdata protection,datatransferand retention,ProtectedHealth Information(PHI),andPayment CardIndustryDataSecurityStandard (PCIDSS),ISO27001compliance programs,andcorporategovernance.

VigiTrusthelpsglobalFortune500 customerscomplywithUSFederal regulations,Stateregulations,and Europeandirectives.

VigiTrusthasclientsintheretail, hospitality,banking,PSP,and assessors'industries(tonamebuta few)in120+countries.Thankstothe VigiTrustGlobalAdvisoryBoard,a non-commercialthinktankbringing togetheragroupofexperts, researchers,securityandcompliance professionals,regulators,law enforcement,andotherindustryand domainexperts,VigiTrustisalways attheforefrontofcyber-security innovation.

TheVigiTrustAdvisoryBoardallows membersandgueststodiscussand explorenewtrends,researchand innovation,andthelatestthreat vectorsintermsofcybersecurityand regulatorycompliance.Theseevents, nowgonevirtual,areorganizedinaconfidential,noncommercial,andnon-profitsettingunderChathamHouse Rules.Theyfeatureinternationalspeakersrenownedfor theirknowledgeinaspecificfieldregardingsecurity& compliance.

SecurityisaJourney

Ifyoulookattherootsofthebusiness,you'llseethatdata protectionwasalwaysthecenterstoneofallthings VigiTrust.Itstillis,soGDPRisrightupthepouringalley. ProvidingasolutionlikeVigiOneallowsclientsand partnerstopreparefor,validate,andmaintaincompliance withGDPRandlinkthattoover100interrelateddata protectionstandardsandlawsmakestotalsense.

| April 2022 www.insightssuccess.com46

InMathieu'sview,GDPRsetstherighttonefordata protectionminimumlevels,enforcement,andcontinuous security.Mathieualwayssaysthatsecurityisajourneyand notadestination.GDPRiswellalignedwiththisbecause youmustcontinuallyupdateyourdataecosystemand performprivacyimpactassessmentswhenanewdataflow comesintoplay

SimplifyingImplementationofSecuritySolutions

VigiTrusthaseighteenyearsofexperienceinthe informationsecurityservicessectorintoonesingleSaaS solution,enablingcomplexanddisparateorganizationsto simplifyimplementingandmanagingsecurityandprivacy regulations.Itssolution,VigiOne,utilizes

VigiTrust's5PillarsofSecurityFramework™ andit enablestoachieveandmaintaincompliancewithlegal, industrial,andsecuritystandardsandframeworks.

VigiTrustcontinuallyinnovatesandcreatesnewfeatures.It hasaroadmapthatitfollowswithprecisiontoensurethat VigiOneisalwaysadaptedtoanyorganizationlikeQSAs, ASVs,hotels,acquiringbanks,largeretailcompanies,and otherend-usersworldwide!

VigiTrustcontinuestoinnovateandreliesontopics discussedattheGlobalAdvisoryBoardanditscommunity

of700+memberstohelpitdriveinnovationintheright direction!

AddressingEver-EvolvingIssues

VigiTrustwillcontinuetoinnovateandaddresstheever evolvinglegalandindustrystandardslandscaperegarding dataprotectionandcompliance.

TheAdvisoryBoardwillcontinuetomonitorthesecurity andcomplianceenvironment.

VigiOnehasaverybusyroadmapforthisnewyearandis nowventuringintoMachinelearningandAIinnovation,so watchthisspacein2022forsomemajorannouncements!

PrioritizingRightAssociation

Mathieuadvisesaspiringentrepreneursinthecompliance sector, "Just do it! It's a fascinating, ever-evolving domain! Surround yourself with the right people who know more than you in their respective domains, build a great company culture for your team, work super hard, and make fun!"

|April 2022www.insightssuccess.com 47

igitalization'swidespreadhasdisruptedseveral

Dindustriesbringingwavesoftransformativeshifts elevatingandstreamliningtheworkflow.However, italsocomeswithseveralchallengesintheformsofcyber attacksandthreats.Sincethepasttwoyears,cyberthreats havetargetedvulnerabletargetscompromisingcompliance, data,andprivacyconcerns.Theleadersinthecybersecurity nicheareworkingfingerstothebonetotacklethissolution toprotectandsafeguardbusinessesworldwide.

Inthechaosofcyberthreats,NirAyalontookitupon himselftoprotectthemaritimeindustryfromcyber-attacks, workingwithprofessionalswithdeepknowledgeand experience.Today,NirleadsasCEOandCo Founderof Cydome,anaward-winningmaritimecybersecurityfirm. HealsoservesasanISOcommitteememberforMarine& ShiptechnologyandCybersecurity.

TheRise

Nir'sprofessionallifebegandevelopingandresearching dataprotectionanddisasterrecoverysolutionsfor enterprises,developingintoseveraltechnicaland commercialrolesatIBM.Hehasbeeninvolvedwith severalsuccessfulstart-upsdevelopingtechnologyforthe businesssector.WhiledevelopingadvancedR&D initiativesfocusedoncyberdefenseandprotection,hesaw thevalueandopportunitytocreateahighlyspecialized businessinthemaritimeindustry Thus,NirCo-founded Cydome,amaritimecybersecuritycompanywithan excellentteamhavingextensiveexperienceinmaritime ecosystemandCybersecurity.

Nirstatesthathefaceduniquechallengesthathadahuge impact.Theglobalshippingindustryisthebackboneor foundationlayeroftheworld'ssupplychainandhistorically hasseveralsecurityweaknesses.Heunderstandsthatthe cybersecuritythreatinthemaritimesectorisrelativelynew -anditistheresultofincreasingdigitalizationandan improvementofsatellitecommunicationtechnology.

TheSecureApproach

SinceCydome'sinitiation,Nirknewhehadtodevelopa differentapproachtoCybersecurity.Heexpressesthatthe maritimecybersecuritysectorsuffersfromthemajorlegacy providersputtinga"maritime"labelontheirproductand thinkingtheirproductdevelopmentjobisdone.Thereality isthattheITandOTinfrastructureswithinashippresenta significantlymorecomplexsetofvulnerabilitiesbothtoand fromtheship.Cydomestartedwithacleandesignsheet.

Cydome'smissionistoprotecttheentiresupplychainby protectingthemaritimeindustry.Thisindustryisthe backboneoftheworld'ssupplychainandeconomy; therefore,cyberleadersneedtoactasaglobalprotectorfor shipping.

Nirstatesthatcyberdefensemustalwaysbeonand defending,anditmustprotectallpointsofaccessingallof thetime.Cydomehasapproachedtheproblemswith innovativesolutionsandthenconstantlyreviewed, evaluated,andimproved.Itcommittedasignificant percentageofitsincomebackintoitsR&Ddevelopment, resultinginaward-winningsolutions.

Cydomeenvisionsinnovatingandbeingastepahead oftheindustry'sproblemstohelptheentiresupply chain.Ithasalreadyimplementedstepsbypartnering withoneoftheleadingmaritimeuniversitiesto createacentraldatabaseforcyber-attacks,withthe visionofleadingtransparencyandinnovationinthe sector

Cydomehasmadeadentintheuniversewithits solutions.Nirsays, "Where there is an industry with big problems, there is an opportunity to build a big business providing the solutions." Theglobal shippingindustryismassiveandat-risk;figuresfor 2019showthat11billiontonsofcargoworth$11

“ Safety, Visibility, Compliance. Complete Cyber Security solution for the maritime ecosystem.
10 Most Influential Business Leaders in Cyber Security, 2022 | April 2022 www.insightssuccess.com48

NirAyalon

Safeguarding SEAS from Cyberthreats

trillionweremovedby98,000ships.Suchbignumbers attractunwantedattention,andCydomedetectsand preventsthousandsofattackseachdayonclients'vessels.

UniqueApproach

Cydome'sstrategyhasalwaysbeentoinvestinresearchand developmenttocreateoriginal,innovative,andproactive solutions.Nirmentionsthattheearlydaysofcyberdefense werelimitedtodetectionandreporting;proactivedefense andprotection,combinedwithanalways-onapproachto monitoring,isthewayforward.

Cydomeisdevelopingandimplementingseveralmethods tosupportthechallengesofthemaritimeindustry,suchas MachineLearning(ML),whichusesBigDatatoprovide effectivedetectionanddefenseagainstattacks.Itfocuseson developingautomatedtoolstobringanewlevelofease-ofuseintheeventofcyberincidentsthathappeninreal-time. Nirasserts, "As automation is the future, we have also brought it into our compliance tool, which is specifically aimed at regulations for maritime cybersecurity, including IMO 2021.”

PreparedMindset

Thecybersecurityworldisdynamicandchangesconstantly Attackersexploitvulnerabilities,anddefendersdetectand protecttheprotectedassets.Technology,ingeneral,isalso advancingveryrapidly-creatingopportunitiesformore zero-dayexploits.

Machinelearningisapowerfultoolthatwilltakethiscatmousescenariotoanentirelynewlevelwhenattackersuse MLtolaunchnewcomplex,difficult-to-detecttypesof attacks.

CydomeisalreadydevelopingandusingAItomonitorand searchforsignsofanomaliesthatsuggestacomplexattack.

WhatComesNext?

Currently,NirisfocusedonbuildingCydomeintothe leadingcybersecurityproviderinthemaritimesector Todo so,theapproachofthecompanywillcontinuetofocuson thesecurityoftheentiresupplychain,whichinvolves protectingfleets,portsandoffshorefacilities.Withoutthese partshavingproper,ongoingdefenceagainst cybercriminalstheentiremaritimeecosystemisatrisk. Cydomewillcontinuechampioningthisintegral

propositionforthebenefitoftheentiresupplychainand economy

WordsofExperience

Niradvisesbuddingentrepreneursaspiringtoventureinto thecybersecuritynichetoresearchextensively.Hesays, "Understand and validate the problem and know your users. And the most important thing - build a diverse and creative team that will complete each other. Plan to build a solution to a real and significant problem and develop a strategy to be the best provider of that service."

| April 2022 www.insightssuccess.com50

Nitesh Sinha Founder, and CEO Sacumen

Nitesh SinhaNitesh Sinha

A Rising Phoenix Safeguarding YOU Digitally

heCybersecurityspaceistransformingtheways

Tbusinessoperates,spreadingitsrootsdeepenough toincreaseaccessibilityanddetectandprotectdata frompotentialthreats.Theleadersinthenichearemapping aframeworkthatcanhelpbusinessesdevelopinnovative securityproducts.Providingatrustedarrayofservicesto helpcompaniesstayaheadofthecurve,NiteshSinha foundedSacumen.

AstheCEO,Niteshispassionatelytransformingthe perspectiveofthesecurityindustrybybecomingthetrusted enableranddifferentiator.HeworkswithSecurityProduct Companiestoassisttheminfacingever-evolvingsecurity challenges,competitivemarket,andever-changingbusiness dynamics.

SacumenaimstobetheleadingGlobalSecurityProduct EngineeringandServicescompanybyhelpingitsclient stayaheadofthecurvebecauseoftheever-evolving securitychallengesbyprovidinginnovativesecurity solutions,generatingmoreexcellentvalueforitscustomers.

SowingStart

Followingatraditionalprofessionaljourney,Niteshwent throughthestrugglesthatmostpeopledo,buthishumble yetconstantrisethroughtheranksmakeshis entrepreneurialjourneydistinctive.However,hewantedto dosomethingmoretocontributehisexpertiseinthe cybersecurityspace.Whenthestarsaligned,hecameacross ClarionVenturePartners,whoreachedouttoNiteshto buildacompanyspecializinginsecurityservices;thus, Sacumencameintoexistence.

Niteshhasalwaysbeen arisk-taker,andbytheSacumen wasborn,hehadgarneredenrichingexperienceofrunning businesslearningfromhispreviousjobs.Comingfroma developerbackground,hedevelopedsecurityproductsand solutions.Though,histechnicalexpertisecameinhandyto shapeSacumentobethecompanythatcanpivotfaster, withadiverseskillset.

SproutingRootsintheDesert

TheCOVID-19Pandemiccamewithwavesof unprecedenteddisruptionthatwipedoutmuchbusiness. Although,italsowasablessingindisguiseformany companies,andSacumenwasoneofthem.Theentire businesscultureshiftedtoworkingremotely,becominga boonforNitesh.Itwaspreciselythesetofthethings Sacumenofferedsolutionsforvalidatingtheirbusiness offerings.Sacumenhasworkedwithcybersecurity companiestobecomespecialistsinbuildingconnectors, pairingwithintegrationsofsecurityproductcompaniesand non-securityproductcompaniesfromdayone.

Sacumen'sofferingsbecamethedifferentiatorinthecyber securitynichethathelpeditsurvivethePandemicand continuetorisewith100%year-on-yeargrowth.Nitesh asserts, "I think the key thing is to be much focused there and be that master in terms of doing what we are offering to our customer. Be that specialist where customers can trust us blindly to the things, we are building it for them, it needs focus and commitment, and we have all of it exhibited at Sacumen.”

Today,Nitesh'sleadershiphaspositionedSacumeninits fieldwithstrengthenedrootsbecomingatruedifferentiator initsofferingforcybersecurityproductcompanies.

ATrustfulImpact

Inthepursuitofbeingthebestofbest,Sacumenisleaving adentintheuniversewithconnectors,third-party integration,anddevelopingproductsforsecuritycompanies tounderstandtheirusecases.Sacumenhasanextensive partnersystem,whereitcanfigureoutpartnerships,access

“ “
We're here to put a dent in the Cybersecurity Universe. Otherwise, why else even be here
10 Most Influential Business Leaders in Cyber Security, 2022 |April 2022www.insightssuccess.com 53

theacquiredproduct,andlicensetodeliverarobust deliveryprocessintermsofhowitoperates.UnderNitesh's leadership,Sacumenhascementeditselftoprovidefastpacedsolutionswithhigh-qualityandreducedcosts.

Niteshisdedicatedtocompletingtheprojectwith unmatchedeffortsandmovingontothenextonetobeona continuouslearningcurve.Hehasimplementedaculture whereeveryonetakescompleteownershipoftheirworkat athresholdleveltothetopone.Niteshbelievestaking ownershipchallengeseveryemployeetokeepinnovating andmoveforward.

Niteshvaluesfairnessveryimmenselyapartfrom teamworkanddelightingcustomers.However,heisvery particularaboutthecommitmentandstickstobeing transparenttotakethebusinesstonewerfeats.

Automation:TheNextSignificantChange

Theworldismovingtowardsautomation,andSacumen willplayanessentialroleinconnectingvarioussystems withitssecurityproductsandservices.Theabilitytosortof haveareal-timedetectionofthesecuritythreatorattack andbringabletorespondwithminimalmanualintegration willcreateamassivewaveoftransformationtothis ecosystem.NiteshstatesthatSacumenisheadedtothat potentialfuturetobethecompanythatprovidesallthe digitalsecuritysolutionsunderoneroof.

OvertheHorizon

Inthelonghaul,NiteshenvisionsSacumenas50% services-basedand50%product-based.Sacumenssolvesa specificproblemofintegrationsforitscustomersandaims

tocontinuedoingso.Niteshasserts, "We are very clear that we would want to be so far the powerhouse of connectors for our customers. Once the trust is built up, you start to do more on the other set of product engineering work, exciting things on machine learning. It just a matter of continued focus to achieve that more year-on-year growth to be the player where any time you talk about security, Sacumen will be a synonym to security when people talk about it.”

ALearner'sAdvice

Niteshadvisesupcomingentrepreneursaspiringtoventure intothecybersecurityspacetobepreparedforchangesasit istheindustry'snorm.Inhisconcludingthoughts,Nitesh says, "If you want to be a successful entrepreneur, your ability to say no is much more important than the ability to say yes to things. Because there'll be many opportunities where it will just distract from your focus to what you are trying to solve, so as long as you are clear with your vision of it and what problem you are trying to solve with it, you would be successful."

| April 2022 www.insightssuccess.com54
EmpoweringYouth to GreatnessThrough Education, Mentoring, and Networking

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.