Breach Notification , Incident & Breach Response , Security Operations

Effective Security Programs: Keeping Pace With Threats

Ashwin Ram of Check Point Says Security Programs Need Agility, Flexibility
Ashwin Ram, cybersecurity evangelist, Check Point Software Technologies

An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point.

A strategy must prioritize the delivery of security capabilities based on the threats that will cause an organization the most harm but also be flexible, he says.

"It's incredibly important that the cyber strategy adopts an agile delivery methodology," Ram says. "The cyberthreat landscape changes so quickly that if you are not evaluating your strategy, your transformation project may actually be outdated by the time you're delivering it."

Data breaches are also costing organizations more. Automation, including in the cloud, is critical for identifying and containing breaches and reducing costs, he says.

In an interview with Information Security Media Group as part of the CyberEdBoard's ongoing Profiles in Leadership series, Ram discusses:

  • The current trends and attack vectors in the data breach landscape;
  • How to structure an effective security control program and strategy;
  • What organizations can do to increase their cyber resilience.

Ram is a cybersecurity evangelist at Check Point Software Technologies. He helps business leaders make smarter, more insightful cybersecurity decisions by ensuring that cybersecurity strategies are designed to achieve cyber resilience. He focuses on both pre- and post-infection security controls across corporate networks, cloud, endpoints, mobile and IoT. Ram has delivered technical trainings and cybersecurity boot camps and assisted with designing and remediating cybersecurity solutions across many organizations within APAC.

About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.