Written by 4:50 am Cyber Security, Data, Featured, Interview, Video

Innovation Talk:  Maheswaran S of Varonis on shifting to data & user-centric security 

Maheswaran S, Country Manager, Varonis India, on focusing on the weakest link in cybersecurity – data.

Maheswaran S, Varonis

For today’s digital businesses, the perimeter isn’t static. The perimeter rather consists of all the data and users that an organization holds. And, that perimeter is everywhere – across devices, networks, and clouds. Cyber incidents have, therefore, become an inevitable reality. A global report points out that, each organization faces an average of 1,248 attacks per week. 

In our latest episode of Innovation Talk series, we spoke to Maheswaran S, Country Manager, Varonis India, to understand the evolving threat landscape. 

CISOs are taking a closer look at whether their existing controls are aligned with their organization’s attack surface. Most organizations have invested in assets and perimeter-centric controls, which is important. What is equally important is to have controls around data. Security must shift from being threat-centric to being user and data-centricl” says Maheswaran. 

Watch the full video here: 

As a security industry veteran with over two decades of experience, Maheswaran has been working with enterprises across the APAC region to guide their data protection strategies. 

He believes that data and users are the weakest link in the system. 

In an organization with a headcount of 10,000+, an average employee has access to over 12 million files while all she needs is a few thousand files. This has led to overexposure of data and increased attack surface, he adds. 

AI and automation technologies can greatly help in analyzing and reducing a company’s attack surface and blast radius. “Automation has a wide range of application across the security value chain, right from addressing the skills gap, creating awareness among employees to data security, incident management and so on,” says Maheswaran. He goes on to talk about effectively leveraging automation technologies and how CISOs can achieve better RoI from their cybersecurity investments.  

(Visited 452 times, 1 visits today)
Close