Home CISO CORNER Interview with John Joseph, Director – Cybersecurity, Perceptive Inc.

Interview with John Joseph, Director – Cybersecurity, Perceptive Inc.

by CISOCONNECT Bureau

Executives need to understand the business implications of security risks, while technical teams require hands-on knowledge of threat mitigation.“, John Joseph, Director – Cybersecurity, Perceptive Inc.

 

Q1. As the head of cybersecurity, can you describe in general terms an example of a security issue in your organization and how you managed it?
In our organization, we encountered a challenge related to patch management and network security, two critical areas that affect our overall security posture. The root cause was the lack of timely updates and proactive communication from the IT department, despite regular follow-ups. To address this, we initiated a cross-functional task force, bringing together IT, security, and operations teams. We streamlined the patching process through automation and enhanced our vulnerability management practices, which involved regular scanning, prioritizing critical patches, and assigning accountable teams. This collaborative approach helped us improve our security posture while maintaining operational integrity.

Q2. Which are the key security areas that you would identify which will change the course of the security Industry?
Three key areas will redefine the future of cybersecurity:

* AI-driven security – AI and machine learning models will continue to evolve, helping predict and mitigate threats in real-time. As AI tools become more sophisticated, their role in automating incident response and enhancing security analytics will expand.

* Zero Trust Architectures – With remote work becoming the norm, securing the perimeter is obsolete. Zero Trust frameworks, which verify every user and device at each interaction, will become the backbone of future security models.

* Quantum-safe Cryptography – As quantum computing advances, encryption protocols will need to evolve. The transition to quantum-resistant algorithms will be a major focus for security teams globally.

Q3. As ransomware attacks is one of the key cybersecurity concerns for cybersecurity leaders, how does your organization deal with this security threat?
We have adopted a multi-layered defense approach to combat ransomware. This includes:

* Advanced threat detection and response – Leveraging tools like CrowdStrike’s Falcon, we monitor for unusual activities and execute automatic isolation of suspicious endpoints.

* Frequent backups – Regular backups are performed, and these are encrypted and stored offline to ensure data integrity.

* Security awareness – Phishing remains a primary entry point for ransomware. We conduct simulated phishing campaigns and regularly update employees on spotting suspicious emails. By embedding security into our corporate culture, we empower employees to be the first line of defense.

Q4. What are the various challenges involved in creating an Information Security awareness training program for various type of employees and different levels of program in an organization?
The primary challenge is tailoring the content to match the different levels of understanding and job functions within the organization. Executives need to understand the business implications of security risks, while technical teams require hands-on knowledge of threat mitigation. We address this by offering a tiered training program:

* General awareness for all employees – This focuses on basic security hygiene such as recognizing phishing attempts and protecting credentials.

* Role-specific training – Technical staff undergo in-depth workshops on advanced threat detection, incident response, and secure coding practices.

* Leadership workshops – Senior executives receive tailored sessions on risk management, business continuity, and regulatory impacts of cybersecurity threats.

Q5. What are the various things that a CEO needs to be informed on the business impact of IT security and compliance changes?
A CEO needs a high-level view of the risk landscape and how security efforts align with business objectives. They should be informed about:

* Regulatory compliance – How changes in data privacy laws (e.g., GDPR) or industry-specific regulations can impact operational costs and timelines.

* Financial implications – The cost of breaches, both in terms of potential fines and long-term reputational damage.

* Business continuity – CEOs should understand how cybersecurity impacts business resilience, particularly in the face of threats like ransomware that could halt operations.

Q6. Based on your experience, give us an insight into the hardship and challenges for the budding Cybersecurity leaders in the coming years.
Upcoming cybersecurity leaders face several key challenges:

* Talent shortage – The demand for skilled cybersecurity professionals far exceeds supply, making it difficult to build strong teams.

* Rapidly evolving threat landscape – New threats are emerging at an unprecedented rate. Future leaders need to be agile and constantly learning to stay ahead.

* Balancing business objectives and security – Cybersecurity leaders must align security initiatives with business goals, ensuring security enhances rather than hinders organizational growth. This requires strong communication skills and a deep understanding of both technology and business.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads