Cloud Security , Events , Governance & Risk Management

Offensive Security: Lose That Loser's Mindset

BreachLock's Seemant Sehgal on Proactively Finding Out Where Your Defense Will Fail
Seemant Sehgal, founder and CEO, BreachLock

Offensive security in the past five years has moved from traditional pen testing to a platform-based strategy due to the ever-increasing sophistications of hackers, the broad expansion of the attack surface and the presence of shadow IT.

A CISO can now push a button and "play the hacker," said Seemant Sehgal, the CEO of BreachLock. He said defensive security puts the defender "behind the curve" and advocated for giving up the "loser's mindset" so often seen in cybersecurity - the attitude that you've already been hacked, whether you know it or not.

"Offensive security is the only way for you to find out in a proactive way where your layered defense will fail and for what cause at what time," he said.

In this video interview with Information Security Media Group at RSA Conference 2024, Sehgal also discussed:

  • How to build a business case for defensive security;
  • The need to "tell a story" to the board to help them see what your read teaming and pen testing results mean;
  • How BreachLock solves the problem of scaling and provides a single pane of glass for defensive security.

Sehgal has more than 18 years of experience in the cybersecurity industry. Before founding BreachLock, he was head of cybersecurity at ING Bank. His areas of expertise include cyber resilience, payment security and SOC. Sehgal is a regular speaker at international conferences and has been writing articles for the ISACA Journal since 2015.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.