
We must rethink and repurpose cybersecurity for the COVID-19 era
COVID-19 has changed how people work, and cybersecurity needs to reflect this. We know what to do; the challenge is not new tech, however, but old mindsets.
BSc and MSc in Electronic Engineering, Tsinghua University; MSc in Electrical Engineering, Stanford University. Cybersecurity expert and entrepreneur; has built three cybersecurity companies that have shaped the cybersecurity industry. Formerly: Founder, President and Chief Executive Officer, NetScreen; led the company to develop the industry's first ASIC and dedicated hardware systems for high-performance firewalls and VPNs; NetScreen (NASDAQ: NSCN) was acquired by Juniper (NASDAQ: JNPR) for $4 billion. 2000, founded Fortinet, which today is among the top three cyber security companies worldwide and is one of the fastest-growing network security companies. Its portfolio of solutions spans network, infrastructure, cloud and internet of things, serving more than 360,000 customers worldwide including 70% of the Fortune 100. As of 2017, Fortinet reached $1.8 billion in billings and expanded to over 5,000 employees in 79 countries. In 2018, Fortinet crossed an innovation milestone of over 500 issued patents worldwide, with an additional 240 pending patent applications, a record among similar security vendors. Member, National Academy of Engineering. Member of the Board of Directors, Cyber Threat Alliance. Founding Member, Center for Cybersecurity, World Economic Forum.
COVID-19 has changed how people work, and cybersecurity needs to reflect this. We know what to do; the challenge is not new tech, however, but old mindsets.
To be truly effective today, cybersecurity must be built into every product and system. To achieve this level of integration, we need to address four fundamental leadership challenges.
Over the next five years, economic loss due to cybercrime is predicted to reach a staggering $5.2 trillion. Unless we train the next generation of defenders, our systems remain vulnerable.
There are not enough skilled workers to plan, manage, integrate, and optimize security devices, strategies, and protocols