Cloud Security , Events , RSA Conference

Organizations Hard-Pressed to Run Multiple Security Tools

Curt Aubley, COO, Deepwatch, on Maximizing Cybersecurity Tool Effectiveness
Curt Aubley, COO and chief product officer, Deepwatch

Organizations onboard multiple security solutions to meet their specific needs, such as securing cloud workloads or protecting identities, but many organizations lack the personnel or the training required to maximize the use of such tools, said Curt Aubley, COO and chief product officer, Deepwatch.

"There are so many cybersecurity tools. Now that we're moving to more of a platform-based approach, that's helping get more value out of the technology you're providing. But it definitely does not replace a need for training your end users, engineers and operators," Aubley said.

Aubley said organizations lacking the necessary workforce or know-how can benefit from cybersecurity service providers that provide the right level of engineering and architecture support and can infuse AI-driven capabilities to maximize the usefulness of the cybersecurity tool stack.

In this video interview with Information Security Media Group at RSA Conference 2024, Aubley also discussed:

  • The top cybersecurity threats to organizations;
  • Why vendor collaboration works best for enterprise customers;
  • How AI can help organizations meet their cyber goals.

Aubley has extensive industry experience in cybersecurity and risk management and has served in leadership roles at CrowdStrike, Tanium, Intel Corp., Lockheed Martin Information Systems & Global Services and, most recently, Deloitte.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.