CW500 Interview: Paddy Francis, CTO, Airbus CyberSecurity

By
  • Clare McDonald, Business Editor

Digital transformation is a topic most firms are currently engaged in, and with plans for introducing or increasing the use of digital in an organisation, a discussion surrounding cyber security is not far behind. When it comes to digital transformation, IT leaders must be aware of the security challenges and opportunities that may present themselves when adopting new technologies, as well as how to secure emerging technologies when bringing them into an organisation.

In this CW500 video, Paddy Francis, CTO, Airbus CyberSecurity shares his advice and experiences of keeping tabs on security when trying to introduce emerging digital technologies into large organisations.

According to Computer Weekly’s editor-in-chief, Bryan Glick, firms increasingly want to implement technologies such as cloud and internet of things, but doing so can introduce the potential for threats.

Francis answers questions posed by Glick such as:

What can firms do to prevent these potential vulnerabilities?

When it comes to digital transformation and emerging technologies, what are the biggest challenges that organisations face when it comes to security?

How can businesses tackle those challenges successfully?

What piece of advice, from a security perspective, should be taken into consideration at that early stage of digital adoption?

Some of this session’s key takeaways for those looking to securely implement digital technologies include:

New technologies come with complexity – people aren’t necessarily used to dealing with new tech like they are traditional systems. Then these new systems also have to be configured in a secure manner. Money is often not taken into account during this process. Very often these issues are treated as an IT problem rather than a business-wide problem.

You can't secure something you don't understand. Either get support in configuration or get people trained. Once you've configured the system, make sure you test it and undergo penetration testing.

Make sure only the correct people have access to these newly configured systems.

Where third parties are involved, make sure you've got the skilled people in place and available to help.

As part of the same CW500 event, Computer Weekly also spoke to Jonathan Moreira, CTO of PrimaryBid.com

View All Videos

Start the conversation

Send me notifications when other members comment.

SearchCIO

  • 5 ways to keep developers happy so they deliver great CX

    Companies need to work on ensuring their developers are satisfied with their jobs and how they're treated, otherwise it'll be ...

  • Link software development to measured business value creation

    Companies must balance customer needs against potential risks during software development to ensure they aren't ignoring security...

  • 5 digital transformation success factors for 2021

    With the right planning, leadership and skills, companies can use digital transformation to drive improved revenues and customer ...

SearchSecurity

  • 8 benefits of a security operations center

    A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. ...

  • Weighing remote browser isolation benefits and drawbacks

    Remote browser isolation benefits end-user experience and an organization's network security. Compare the pros, cons and cost ...

  • Compare 5 SecOps certifications and training courses

    Explore five SecOps certifications available to IT professionals looking to demonstrate and enhance their knowledge of threat ...

SearchNetworking

  • Network pros share Cisco DevNet certification advice

    Cisco DevNet certifications require a lot of time investment, but network pros who pursue the certifications say the gained ...

  • Cloud automation use cases for managing and troubleshooting

    Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and ...

  • A look inside the official Cisco DEVASC 200-901 guidebook

    In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams...

SearchDataCenter

  • Avoid server overheating with ASHRAE data center guidelines

    Finding the right server operating temperature can be tricky. ASHRAE standards provide guidance for all server classes and what ...

  • Hidden colocation cost drivers to look out for in 2021

    These unexpected charges and fees can balloon colocation costs for enterprise IT organizations.

  • 5 ways a remote hands data center ensures colocation success

    Off-site hardware upkeep can be tricky and time-consuming. With remote hands options, your admins can delegate routine ...

SearchDataManagement

  • Ataccama automates data governance with Gen2 platform update

    Data management vendor Ataccama adds new automation features to its Gen2 platform to help organizations automatically discover ...

  • IBM to deliver refurbished Db2 for the AI and cloud era

    IBM has a tuned-up version of Db2 planned, featuring a handful of AI and machine learning capabilities to make it easier for ...

  • Fauna improves data API collaboration and security

    A database company founded by former Twitter engineers is pushing forward its vision of a way to consume database as a service ...

Close