Specialist
C-level Executive, Information Security at Twitter Inc
Agenda
- Enterprise cybersecurity budget trends
- Spending shifts and companies' approaches to cybersecurity
- Cyber threats prioritised by large enterprises
- Outlook for 2019 and beyond
Questions
1.
What major shifts in trends are occurring and how are CISOs approaching cybersecurity? What are the YoY changes in IT budget allocations ?
2.
When we look at the different segments, you mentioned endpoint, network, app security. Is there any way to quantify changes and how spend is allocated to those segments?
3.
On the endpoint side, what vendor differentiation are you noticing, if you can hit on Carbon Black, Symantec, etc.? How should we think about who’s truly next gen as opposed to legacy-declining vendors?
4.
How do you think the shift to mobile is impacting endpoint security? How should we think about how the vendors secure mobile platforms that are walled-garden approaches like iOS?
5.
What’s your view on FireEye? There’s been some worry that it’s past its prime. Where does it fit in the stack at this point, from the CISO perspective?
6.
How are CISOs opting more broadly between best-of-breed point solutions vs suites, and are there any particular suite vendors that you think are strongest at this point?
7.
What’s your outlook on the identity side, who wins that market?
8.
You mentioned a decreased importance on the physical firewall and more of a perimeter-less architecture. What are the new tools and measures that are able to take the place of that on the cloud side? For a company such as Palo Alto, how are the virtual firewall products being adopted relative to the legacy physical business? Do you think it’s possible to make up the loss in revenue due to a shift away from physical to cloud-based environments?
9.
What is your view on ADC vendors offering security solutions? How real is the argument that they have an advantage because they have visibility into the applications that go through to the ADCs?
10.
You mentioned how the key integration of the three priority points, Endpoint, IAM and telemetry is at the SIEM level. What are the SIEMs of choice being used? How should we think about a SIEM vs a log analytics tool such as Splunk, which seems to be focusing on security as well? Could you dissect this landscape for us a bit?
11.
How does the shift to OPEX across the stack impact the refresh cycle? Where do you think we are on a refresh cycle, is it elongating?
12.
Zscaler seems to be abstracting CASB with a firewall and a bunch of elements of the traditional stack into the cloud. How successful do you expect Zscaler to be in the long term? Does its approach have any weaknesses and what’s stopping it from really being disruptive to all the legacy providers?
13.
What adoption rate are you seeing enterprises utilising CASBs and what’s the core role they’re playing right now?
14.
How should we think about the potential threat that public cloud vendors pose in the security landscape? What moves are you seeing them make up the stack, and more broadly how should we think about their responsibility from a security standpoint?
15.
What approaches are CISOs taking on the e-mail security side? You mentioned Office 365, but what are the challenges in securing e-mail? What are the core threats that are still tough to track on the e-mail side?
16.
What’s your final outlook on winners or losers, maybe some vendors we haven’t mentioned yet – Forescout, Check Point, McAfee? Who do you think are the strongest vendors moving forward in the next 2-3 of years, which are you particularly optimistic about? Are there any clear losers who have not been able to keep up from an R&D perspective?
Gain access to Premium Content
Submit your details to access up to 5 Forum Transcripts or to request a complimentary one week trial.
The information, material and content contained in this transcript (“Content”) is for information purposes only and does not constitute advice of any type or a trade recommendation and should not form the basis of any investment decision.This transcript has been edited by Third Bridge for ease of reading. Third Bridge Group Limited and its affiliates (together “Third Bridge”) make no representation and accept no liability for the Contentor for any errors, omissions or inaccuracies in respect of it. The views of the specialist expressed in the Content are those of the specialist and they are not endorsed by, nor do they represent the opinion of, Third Bridge. Third Bridge reserves all copyright, intellectual and other property rights in the Content. Any modification, reformatting, copying, displaying, distributing, transmitting, publishing, licensing, creating derivative works from, transferring or selling any Content is strictly prohibited