
How AI is empowering non-technical users in cybersecurity
Find out why non-technical users will be critical to cyber resilience in the future, and how AI-powered cybersecurity platforms are empowering them to manage complex operations.
Read MoreIf you were at Black Hat MEA 2023, you might have heard Omar Khawaja (CISO at DataBricks) sharing his experience on the keynote stage. From leading a team of more than 200 cybersecurity professionals at Highmark Health to his current role at DataBricks, Khawaja has a broad scope of knowledge about the security landscape.
But he’s dedicated to expanding his awareness all the time. He serves on several boards and supports tech firms in an advisory role – and each of these engagements helps to shape (and reshape, and then reshape again) his perspective on security.
We asked how this work influences his professional development, and what the biggest stumbling blocks are for tech firms trying to implement robust security operations. Here’s what he told us.
“The moments that most shaped my career were the ones I did not have the requisite skills for, but went ahead anyway – sort of like jumping into the deep end of the pool.
“Those experiences gave me all the motivation I needed to figure things out – being responsible for security at a startup without any prior security experience, moving into a product management role as an engineer, and becoming a CISO with no prior operational and executive expertise.”
“Each person is wired differently – for me, I learned years ago that I thrive when I have an abundance of stimuli – it gives me more dots to connect. Being on boards gives me exposure to both challenges and solutions in contexts that otherwise I would have never known about. It allows me to cross-pollinate solutions to challenges, sometimes in novel ways.”
“My perspective on cyber is evolving fairly continuously. It is driven by three forces:
1. The inherent changes in the cyber risk landscape.
2. My personal vantage point (security engineer > security architect > security product manager > CISO > board member > CISO faculty at CMU).
3. Regularly re-synthesising my own learnings and those of others.
“One example: I used to think technical security controls were the most important part of a security program, then I realised it was important to not just have controls but for the controls to be part of some comprehensive framework (compliance!). Then I evolved my thinking to consider the business as the most important stakeholder (risk management). Along the way, I learned that in a complex organisation, people and process are immensely more important than technical controls.”
“I see a common failure caused by thinking that if we just buy and install the right technology we can solve our security challenges. The most impactful security challenges can rarely be solved by implementing tech on its own – they require changing people's mindset and behaviours.”
“By meeting a couple dozen CISOs (both global and regional), I gained some valuable insights on how security operations evolve in the unique organisations they support – particularly when they are trying to develop very fast.”
Thanks to Omar Khawaja at DataBricks. Want to learn more? Join us at Black Hat MEA 2024.
Join the newsletter to receive the latest updates in your inbox.
Find out why non-technical users will be critical to cyber resilience in the future, and how AI-powered cybersecurity platforms are empowering them to manage complex operations.
Read MoreCaitlin Sarian, also known as Cybersecurity Girl, shares her experience at Black Hat MEA – and her best advice for women in cyber.
Read MoreThree cybersecurity experts share the technologies they’re most excited about. Discover how AI, quantum computing, and process-driven security will shape the future.
Read More