Governance & Risk Management , IT Risk Management , Multi-factor & Risk-based Authentication

Focusing on Risk Mitigation in 2022

Field CTO of Illumio on Why Organizations Must Move From Risk Acceptance to Risk Mitigation
Raghu Nandakumara, field CTO, Illumio

Risk management is essential to the existence of every business. It requires organizations to consider which risks they can accept and which risks they can mitigate. But the problem with risk acceptance is that attackers are "actively looking for risks that you haven't mitigated that they're able to exploit," says Raghu Nandakumara of Illumio.

"We're at … an inflection point where we need to reevaluate what risks we have accepted and determine whether there is a way to mitigate them," he says.

In a video interview with Information Security Media Group, Nandakumara discusses:

  • Why businesses need to move from risk acceptance to risk mitigation and the danger of not doing so;
  • Mitigating risks associated with poor patch management and cloud computing;
  • How recent cybersecurity strategies from Singapore and Australia set the tone for what's expected of organizations' security postures.

Nandakumara is responsible for helping customers and prospects through their segmentation journeys. Previously, he spent 15 years at Citibank, where he held a number of network security operations and engineering roles. Most recently, he served as a senior vice president, where he was responsible for defining strategy, engineering and delivery of solutions to secure Citi’s private, public and hybrid cloud environments.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.