U N D E R T H E M I C R O S C O P E
SENIOR DIRECTOR MIDDLE EAST AND NORTH AFRICA , TENABLE
On the lighter side of things , Maher Jadallah , Senior Director Middle East and North Africa , Tenable , talks to us about life inside and outside of the office .
What would you describe as your most memorable achievement ?
Honestly speaking , my joy comes from taking new companies with great vision to a totally new place , with an excellent footprint in the region , empowered by the best team and supported by a great partner network .
What first made you think of a career in technology ?
I ’ ve always been interested in technology , after all it touches all parts of our lives . It ’ s fast paced and innovative and I enjoy learning about new developments and how they can be used to enhance business operations or even our daily lives .
What style of management philosophy do you employ with your current position ?
Leadership is hard and requires a lot of agility and admitting mistakes . Believing in people , developing a great value of listening , open communication and promoting diversity are key values for a healthy work environment . For my team , I ’ m not a micro-manager but instead strive to create an environment where staff are empowered to do their best work , safe in the knowledge that I ’ m here if they need input , support or lead by example . We really are stronger together .
What do you think is the current hot technology talking point ?
Complexity is the enemy of security . It ’ s staggering when you think that the average large organisation uses more than 130 cybersecurity point solutions , each with its own analytics and reporting . Discrete tools can lead to duplicate efforts and unintended gaps in security programs . This leaves security practitioners with no clear path forward to tangibly reduce risk or succinctly communicate an organisation ’ s security posture .
Against this backdrop , when threat actors evaluate a company ' s attack surface , they ' re not thinking in terms of organisational silos . They ' re probing for the right combination of vulnerabilities , misconfigurations and identity privileges .
Securing the modern attack surface requires a new approach , one that provides an understanding of all the conditions that matter in today ’ s complex and dynamic environments . Preventing cyberattacks requires full visibility
60 www . intelligenthealth . tech