Transcript
David Moulton (0:02)
You're listening to the Cyberwire Network, powered by N2K. Welcome to Threat Vector, the Palo Alto Networks podcast where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior Director of thought leadership for unit 42.
Isaiah (0:25)
We have so many different tools nowadays and if you are not properly aware, if you do not strategize, if you do not understand your objective and where you want to go, you may find yourself lost with this whole plethora of different AI tools nowadays. And I think this is an important thing to have in mind. Stay relevant, stay updated. It is impossible. Know about everything at the same time. It's just too much.
David Moulton (1:21)
I know it's been a minute that we've been talking about having you on the show and what I'm so excited about is we're going to talk about security success stories today, which is maybe a little bit different than most folks are used to, you know, hearing from the podcast. When we talk about risks and threats and, you know, what did we learn from a failure? In your case, we're going 180 and I think that's really exciting.
Isaiah (1:45)
Absolutely excited to be talking about it and, you know, looking forward for our conversation.
David Moulton (1:52)
Isaiah, you work closely with a broad range of customers. Are there specific patterns or traits that you've seen in organizations that are succeeding in today's cybersecurity security landscape?
Isaiah (2:05)
Sure, there are definitely clear patterns that I observed and organizations that are truly excelling, they share a few traits and things that I can mention here is that firstly they see security as a business enabler. It's not just a cost center, it's not just spinning. And that's one important trait of organizations investing in security. You need to have in mind and pass beyond the idea that that's just an exp. Because security needs to be properly aligned with your business objectives. That's a whole way to get that alignment and so we can succeed based on that first pillar. Let's say these organizations, they are proactive, they have adaptive security, they look to use threat intelligence and automation especially as they are always looking for the next and as an example, adopting cloud technologies and zero trust models. Also they have a strong cross functional collaboration which is to the point that I mentioned is when these organizations, they have their IT strategy very aligned with the other teams and everything happening into their organization in terms of operational master plan, drivers, objectives, definition, everything is cascaded down to the IT level with meaningful, actionable, relevant objectives.
