Governance & Risk Management

Why Threat-Centric Security Is Bound to Fail

RSA CTO Zulfikar Ramzan on Taking a Business-Driven Approach
Zulfikar Ramzan, CTO, RSA

Taking a threat-centric approach - trying to defend against every threat out there - is a recipe for failure in the current threat landscape, says RSA CTO Zulfikar Ramzan, who advocates a business-driven approach instead.

See Also: How Enterprise Browsers Enhance Security and Efficiency

Organizations need to identify which risks are the most relevant to their business context and address them first, rather than trying to defend against everything, he asserts.

In this video interview at the RSA Conference 2018, Ramzan discusses:

  • The need for a mission-driven approach to security;
  • The platform versus point solution stack debate;
  • How to best invest security dollars in 2018.

As CTO at RSA, Ramzan is responsible for leading the development of the company's technology strategy and bringing innovations to market. Previously, he was CTO at Elastica and chief scientist of Sourcefire, implementing and deploying machine learning systems. He has co-authored more than 50 technical articles and two books and holds more than 50 patents.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.