Application Security , Data Loss Prevention (DLP) , Endpoint Security

Achieving Resilient Cybersecurity

Verisign's Michael Kaczmarek on Embracing Hybrid Cloud/On-Premise Solutions
Achieving Resilient Cybersecurity

In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture. Michael Kaczmarek of Verisign describes how to achieve this resiliency.

Attacks are bigger and more frequent than ever, and they come via more vectors, too, says Kaczmarek, VP of Product & Marketing at Verisign. It is challenging, then, for security leaders to prioritize their defenses.

"There are basically four questions you should ask yourself, and you should ask them in this order," Kaczmarek says. "1) Are you aware? 2) Are you protected? 3) Are you prepared? 4) Are you able?"

Preparedness is part of the defensive strategy, he adds, but it's hardly everything.

"You can be prepared, you can be protected, you can be aware of what's going on," Kaczmarek says. "But given what we are seeing in the threat trends in the industry today, and the rate at which these attacks are growing, we believe these are things that you can't [face] alone."

In an interview about achieving resilient cybersecurity, Kaczmarek discusses:

  • How security leaders can prioritize their defenses again the many threats they face;
  • The benefits of using a hybrid security architecture;
  • How smaller organizations will benefit from enterprise-level security solutions.

Kaczmarek heads product management and marketing for Verisign's Security Services product suite. He is responsible for developing the vision, strategies, and tactics for the successful launch and expansion of products into new and existing markets.

He has been with Verisign for more than 16 years and has served in various capacities including director of the program management organization and technical operations manager. Prior to joining Verisign, he was a systems engineering manager for Lockheed Martin in charge of their Solid Rocket Motor Disposition in Russia Program.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.