Transcript
A (0:02)
Welcome to cyberatthetop, a podcast from RSAC that unpacks real experiences, lessons learned, and practical strategies from CISOs at some of the world's leading organizations.
B (0:21)
Choosing the right cybersecurity partners has become increasingly more complex as security leaders navigate crowded markets, very bold marketing claims in some cases, and rapidly evolving technologies. In today's episode, I'm joined by Tal Arhat, a leader who brings both CISO and CTO experience to the table. Most recently at Carlsberg Group. He offers a practical lens on how to evaluate providers beyond the buzzwords. One, discuss what it took for him to find out who is the right partner. How do you look for that right partner? How do you balance innovation with stability? And how do you ensure providers truly support your security strategy? After the contract is signed, let's get started. Tal, thanks so much for being here.
A (1:20)
Thank you for having me.
B (1:22)
Let's start out with just a simple question. Can you tell us a little bit more about your role at Carlsberg Group?
A (1:30)
Sure. So my role, which. Well, I left the company back in May, so up until that point, I was the first ever CISO for the company. There was a security team there, but there wasn't someone set up as a ciso. And then after two years, I also got the responsibility to run IT infrastructure and what we call the machine shop, the part that no one ever sees. But when it's not working, you get a lot of issues. So running the important part of it,
B (1:59)
as far as I'm concerned, that's great. I mean, that's kind of unusual that you're running the factory, so to speak, as well as security, right? Not a lot of people get that experience. And I'm curious from that perspective, why is choosing the right cybersecurity partners become so complex? Today? It feels like it's harder than ever.
A (2:26)
I think there's a. There's a few reasons for that. First of all, if you look at the never ending arms race between the attackers and the defenders, the. It feels like the rhythm has become even more extreme the last few years. What? If you think about a few years ago where sandboxing was the very big height, right? The likes of FireEye, it was like everyone was sitting there and said, that's like science fiction and I have to have it. It was so expensive and so innovative and so difficult to implement. And today it's so mainstream that I don't think anyone makes that solution as a standalone anymore. The thing is that you keep running not only after new attacks, but also about the defensive technologies. Is that what do these guys actually do? What problem do they solve? Can I put another piece of technology in my never ending ecosystem? Is it going to destabilize something else? Is it going to cause me issues which I'm not foreseeing right now? So the technology, technological environment is becoming more and more difficult. In parallel to that, there are so many players out there that are trying to do good in most cases in cyber security, both in services and technology, it is becoming really difficult to differentiate between who's actually delivering, who's actually being innovative and is actually listening to what it is you're asking them to do and which one is just trying to make a quick buck and vanish towards the sunset. Not that it's bad doing a quick buck, but you know you want get something out of it as well as the customer.
