CyberWire Daily - Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes]

Episode Date: June 12, 2022

Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler.... He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Thank you. Learn more at zscaler.com slash security. So growing up, I mean, I come from a family full of doctors. They're all in the field of medicine. So that was an area that intrigued me. But at the same time, I was very fascinated by computers and developing newer programs, software development. That was the area of interest for me when I was growing up.
Starting point is 00:02:04 That was the area of interest for me when I was growing up. It was really interesting the way I ended up in the field of cybersecurity. This is more than 20 years ago. I was introduced to an online game where there were folks literally cheating, right? Terms such as hacking, aimbots, a lot of the features that some of the gamers were using to take advantage, to gain advantage over the competition. And more than the game, the part that really intrigued me was how those cheating applications were working. What were they doing in the backend, right? So that's when I got exposed to Microsoft Windows APIs, things like DLL injection.
Starting point is 00:02:48 How was the behavior of a legitimate process being modified to gain advantage? So that was my first exposure in that area. And then, you know, as I started getting more deeper into the field of software security, OS security. It's a thing that continues to evolve and there is never a dull day in the field of security as most cybersecurity experts would agree. Right at the master stage, all my coursework was focused on software fundamentals, OS fundamentals, and then with inclination towards cybersecurity. So I created a client that is able to detect any kind of DLL injection, any kind of attempt to modify that legitimate application behavior.
Starting point is 00:03:41 So that was the first thing. legitimate application behavior. So that was the first thing. Then I was able to get an internship at a startup that was building UTM appliances back in the day. And then the next opportunity from there onwards, I got to build detection technologies. That was at Dell SonicWall, where I influenced some of the detection technologies
Starting point is 00:04:03 on the cloud side, some on the next generation firewall that was introduced. And that really was very, very satisfying because now you're doing something that you love doing, and it's having an influence in protecting thousands of organizations around the globe. of organizations around the globe. The most recent stint, and this is eight years old, 2014 is when I joined Zscaler. And the concept was very, very disruptive.
Starting point is 00:04:37 I mean, it was already a fire. We came up with this security cloud platform where the organizations around the world that were struggling to manage those appliances and point products, now we're offering that as a service. The entire security stack is in the cloud. And that provided me and my team ability to perform some of the next generation
Starting point is 00:05:02 detection technology changes. Honestly, it's a disruption in the field of cybersecurity where we're able to scale, where we are able to protect organizations globally. Even in the situation where pandemic hit, most organizations that were using the older technologies were struggling, whereas the organizations that were using the older technologies were struggling, whereas the organizations that were using what we have built, they were excelling and we continue to see more and more adoption as
Starting point is 00:05:31 well. When I'm in the group of doctors, which is on the family side, I always call myself, I am also a doctor, but in the field of treating digital viruses. Just like you guys treat physical viruses targeting human body, we are the internet doctors trying to make sure it's a safe place and protecting the organization. There are two important components when you're trying to groom a new security expert. So number one is you need to provide time to train and research, especially in the field of security research. The way you need to structure their daily routine is 70% of their time may go towards what is needed for the business, whether it's tracking certain malware family, tracking certain exploits, or developing those detections. 30 to 35%,
Starting point is 00:06:31 at least, that's the minimum. You need to provide time to those folks to develop their skills, do research, right, learn about newer techniques, and continue to improve their ability to analyze those new evolving threats. So that's how I always have made sure my team was built and structured in a way that they are enabled to do that research activity. And then that, in a way, also helps them contribute towards that 60 to 70 percent of the goal where they're trying to protect the customers. that 60 to 70 percent of the goal where they're trying to protect the customers. For the folks that are aspiring to get into the field of cybersecurity, my number one recommendation is to have strong fundamentals on software development side as well.
Starting point is 00:07:23 Understanding the technologies, whether it's operating system fundamentals or some of the programming languages, those are some of the things that really helped me as I plunged into this completely different field because unless you know the fundamentals, you will struggle as you try to learn about how the threat actors are trying to abuse the existing technology. I'm really proud of two things, and that's honestly the areas where I would love to be remembered as well.
Starting point is 00:07:57 So number one is, you know, there is a significant skill shortage when it comes to the field of cybersecurity. There is a significant skill shortage when it comes to the field of cybersecurity. So every time when I hire someone, the team that I've built, it brings me immense pleasure as I see them progress through their career, them developing newer skills, them picking up newer responsibilities. I still remember my first team that I built 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me. So that's one area where I would like to be remembered as a mentor that helped get them into the field and learn and allowed them to pick up some of the newer stuff.
Starting point is 00:08:52 The second piece is the detection technologies, especially aimed towards the zero trust, the cloud-based security where I had some exposure at my previous job, but at Zscaler, it's been to the next level. So getting remembered for solving the problem of legacy security architecture and helping thousands of organizations especially during the time of pandemic to keep their users secure. Thank you. It's a necessity. That's why we're thrilled to partner with ThreatLocker, the cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default deny approach can keep your company safe
Starting point is 00:10:07 and compliant.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.