Manage Cybersecurity Risk
20/01/26
Cybersecurity
Welcome to our monthly series of virtual fireside chats entitled “Manage Cybersecurity Risk”. In this episode we will be getting acquainted with our resident cybersecurity expert Erik Barnett who is based in North Carolina, USA.
What is your technical background and how long have you been in the cybersecurity industry?
I am a United States patented technology inventor with over 30 years in the cybersecurity. I have had the great opportunity to travel and collaborate with some of the worlds brightest engineers on various cybersecurity initiatives.
How did you get into the cybersecurity industry?
My early interest in technology was in my early teens. My grandfather had 3-D Chess on a computer and I needed to run batch commands to get it started. Cybersecurity clicked for me a few years later while watching the 1995 American Crime Movie Hackers, which was about Hacking. I was hooked, this hacking world is awesome!
How relevant is cybersecurity to AI?
Cybersecurity is the Immune System ensuring AI stays as it was originally designed. I would say it’s critical to AI in many ways. There are so many interdependencies that must be available for AI to complete its task. There are other risks too where it’s a larger topic for all groups, not just cybersecurity.
What is the main consideration for an organisation when building a cybersecurity framework?
Focusing on the organisational “dream” or vision and where that corporate footprint may lead you. Understanding not only what you need today but also thinking about the future. This includes maturing your operational strategy and implementing compliance checks as the business grows. This allows you to be flexible and spend less, while being mindful that you might have to increase your cybersecurity budget.
What are your top 3 cybersecurity fitness recommendations for organisations operating in multiple jurisdictions?
I would highly recommend at the very minimum:
1. Good and tight security access controls around your resources, firewall policies and access rights.
2. VPN connections to anyone remote or not on the business network.
3. Monitor the technologies and ensure logging is active.
What cybersecurity system would you recommend?
HomeSirens A.I. by SecureTelligence
This is cutting-edge technology designed by our team that empowers businesses to safeguard their assets while fostering unprecedented growth and innovation. It delivers genuine Zero Trust Architecture services and caters specifically to organizations with remote operations, providing them with a robust security framework. It is built on years of experience in handling complex initiatives across various industries and unique use cases.
Erik is ready to answer your questions. We would also love to hear your comments. Use the CONTACT US button to stay connected with us.