The Need for Speed as Attacker Dwell Time Decreases

John Shier, Field CTO at Sophos, Discusses Ongoing Security Struggles
John Shier, field CTO commercial, Sophos

Many of the same security weaknesses of the past - including incidents involving the exploitation of vulnerabilities - are still leading to major IT system compromises and data breaches, says John Shier, field CTO commercial of Sophos.

See Also: ON-DEMAND WEBINAR: Secure Your Applications: Learn How to Prevent AI-Generated Code Risks

"We're still not properly patching our environments. Why aren't we doing that?" he said. "I think there's been partly a collective failure across the entire industry. But we've got to get better at producing more secure software."

In this video interview with Information Security Media Group at RSA Conference 2023, Shier also discusses:

  • Top findings from Sophos' New 2023 Active Adversary research report;
  • Diversification among threat actors;
  • Why Sophos created a new CTO field office.

Shier is a 12-year veteran of Sophos. He constantly studies emerging cyberattacks and the technology that combats these threats, including encryption and synchronized security. Previously, he was channel sales engineer and senior field sales engineer in North America at Sophos.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.