Intelligent CXO Issue 39 | Page 66

BUSINESS INSIGHTS

TACKLING SOPHISTICATED THREATS WITH CORELIGHT

Implementing robust cybersecurity measures , leveraging advanced technologies and fostering continuous improvement are critical steps in achieving a robust cybersecurity posture . Vijit Nair , VP , Product at Corelight , discusses how to protect digital assets in a connected world and uncovers the path to fortify defences . He highlights the primary ways Corelight is helping organisations enhance their cybersecurity posture and drive significant growth .

C

Can you start by telling us about yourself and your career path so far ?
My career path has been somewhat traditional . I grew up in India deeply fascinated by science and technology . I recall undertaking projects in high school like determining the optimum flight path for drones about 30 years ago . This fascination led me on a journey around the world and ultimately to the US for college . After graduating , I joined a startup where we were working on AI before it became widely popular . We used AI to predict the health of machines and systems utilised by large organisations in the US , focusing on green energy initiatives .
Eventually , I joined Juniper Networks and during my tenure there , I started in the engineering organisation developing some of the world ' s most advanced and fastest routers and eventually got promoted to the head of product for their cloud vertical .
Following this , I was looking for a company that was dedicated to defending some of the most critical organisations which is why I took the opportunity to join Corelight . I ' ve been at Corelight now for around four-anda-half years working on various products before becoming head of product .
What are some of the main challenges facing security organisations today ?
After conversing with Chief Information Security Officers ( CISOs ) almost weekly for several years , it ’ s clear that the environments they intend to secure are becoming more complex . Several factors contribute to this evolution . The pandemic , for instance , forced many organisations to transition to remote work . Consequently , workloads and applications shifted from data centres and campuses to the cloud , adding layers of complexity . This on-going change is driven by developers , engineers and users adopting new and interesting technologies which continuously expand the attack surface . As a CISO , one must remain vigilant about the evolving threat model and address these changes consistently .
Adding to this complexity is the constantly shifting geopolitical landscape . Attackers are becoming increasingly resourceful and sophisticated , ranging from low-level hackers to nation-state actors who are
66 www . intelligentcxo . com