Dr. Erdal Ozkaya
Search
  • Home
  • General, Erdal in the news, Cybersecurity Leadership
  • Breaking the Stereotype

Breaking the Stereotype

Breaking the Stereotype
Erdal2023-05-22T17:12:16-04:00

Breaking the Stereotype

Whilst others consider cyber security as a protocol, Dr. Erdal Ozkaya believes that it is a mindset that goes deep into the ancient human DNA. You know it, you got it!

By : Anushree Dixit via Cyber Sentinels Magazine 

Dr. Erdal Ozkaya’s association with IT goes back to an era in 1996 when computers were not only rare, but expensive as well. Security in those days was limited to formatting Windows with various floppy disks.

With affiliations to various geographies like Turkey, Germany, Australia and now UAE, Dr. Erdal has tried and tested human behavior and its core DNA in security like none other.

Cyber Sentinels Magazine Dr Ozkaya

WEAKNESS- CURIOSITY

Table of Contents

  • WEAKNESS- CURIOSITY
    • WEAKNESS – IGNORANCE
    • WEAKNESS – UNDERESTIMATING
    • WEAKNESS – EXPERTISE
    • THE ART OF CHOOSING THE RIGHT VENDOR

“Regardless of which country you are in or which nationality you belong to, human behavior is the same,” says Dr. Erdal.

“Let me give you a very ancient and well-known citation to this theory of mine. Adam and Eve (different name in different culture) were thrown out of the paradise for just one reason— eating the forbidden fruit. Even though they had a garden full of fruits to devour, they were tempted by the forbidden fruit and were curious to taste it, because they were told ‘NOT TO TOUCH’.”

While listening to this, my mind automatically draws in analogies and allegories from various mythological instances. The famous ‘Lakshman Rekha’ from Ramayan’s Sita Haran chapter also tells us that the solution or the ‘lakshman rekha’ had no technical flaws, but it was the concerned heart of Sita that forced her to cross the line, leading to the demon king Ravana kidnapping her.

The Trojan horse; how can someone believe that the enemy withdrew their forces leaving a gift? The curious nature of the Troy soldiers led to the diminish of a nation.

Dr. Erdal believes that the very nature of human being and the curious DNA is the sole reason for a majority of breaches that happen.

“In order to weave a successful cybersecurity strategy, we have to understand that, it all starts with humans. Let us imagine that we invented a time machine, travelled ahead 50 years, took the latest technology from there and came back to 2019.Will that make us secure?…. No, because the human factor still exists.”

WEAKNESS – IGNORANCE

Well, Ignorance is never a bliss, if you ask Dr. Erdal.

“The practice of ignoring alerts is the second point of weakness that we see in the human beings. In a situation where I have a personal situation to attend, I will tend to ignore an email that just landed in my inbox. It may look suspicious to me, but I will choose to ignore and look at it later.”

WEAKNESS – UNDERESTIMATING

Dr. Erdal pulls out a bit from a book written in the 5th Century BC, named ‘The Art of War’. “It is a very ancient book, but the facts still stand true. In the book, the writer, Sun Tzu says that, in order to win a battle you not only need to know yourself but know the enemy as well. The more you know the enemy, the more you own the battleground.”

WEAKNESS – EXPERTISE

Buying technology, understanding technology, using technology. According to Dr. Erdal, these three are fairly different terms.

“I will give my grandmother a Bugatti car and give Michael Schumacher a Hyundai. Who do you think will win if they race? Of course Schumacher, we know! Because it is not about having the fanciest of cars, but knowing how to drive one. Similarly, organizations should realize that it is not about having the most expensive technologies in place, but knowing which technologies fits where and how to implement it in the organizational architecture.”

THE ART OF CHOOSING THE RIGHT VENDOR

‘Not all vendors fit, not all vendors are misfit.’

“My suggestion to my colleague CISOs and security heads is that, choose the right vendor. Believe me, it is not as difficult as it appears. Know who you are,  know what you need and do not let the vendor tell you what you need. It has to come from you. Be vocal about your problems and let the vendor give you the solution. We, as the CISOs or head of security often do not want to bring into limelight the vulnerabilities or the gaps that we have in our organization, but I would strongly recommend that we do. No solutions are bad, it is only about what fits your company the best. Go for that!”

According to Dr. Erdal, Cyber security is like green tea and coffee. Our bodies respond to both differently and choice varies from person to person. If you have a clear understanding of the technology brought in by the solution provider, you will achieve the desired result.

“My role with Standard Chartered Bank also revolves around this – understand what the bank wants, work together with the teams and meet as many people as possible and reach out to friends.” he adds.

POST BREACH SCENARIOS

It is a regular affair to see innumerable posts, advices and comments pouring in from the industry after a threat happens.

Dr. Erdal says that there are two types of organizations; one that know they are being hacked and other that do not know. But the fact is that, in both cases you are hacked. “When a football match is happening, it is very easy to sit in front of a TV and judge a player and remark that he should have done this or that to score a goal. Similarly, in the industry, once a breach happens we have various inputs coming in stating what should have been done.

Instead, the question that should be asked is, why did it happen. I would also recommend my partners and colleagues in the region to share information and not keep it to themselves. Many times it happens that a breach happens and the information shared in a media or press release is that everything is under control. This should not be the case. The more we share, the more we learn. We should all imbibe this culture of taking security as a shared responsibility.

I have worked in different companies, some cases it was an insider who leaked information and some with a vulnerability that they could not fix. Every car has a bumper and bumpers are made to protect the engines in small accidents.

‘BANK’ing ON TECHNOLOGY

Before joining Standard Chartered Bank, Dr. Erdal was asked about his knowledge on banking. He says with a smile, “I told them, I do not have to understand banking, I have to understand the technology behind it. There is no bank today that runs without a sound technology framework. One thing that I was hooked on to was the willingness of Standard Chartered Bank to be world class in cyber-security and I am here to contribute to that.

If you analyze the various threats and breaches that have happened, Standard Chartered will not surface in that list. If I speak on behalf of the sector as well, I can proudly say that the banks in this region have hired and retained the right talent and professionals to run their security framework smoothly.”

classic stereotypes

Cyber Sentinel Dr Erdal OzkayaWe all know the classic stereotypes – women in the kitchen, men in the office, cybersecurity as a male-only domain. But Dr. Erdal Ozkaya is breaking down these preconceived notions with his pioneering research into the numerous ways cyber security is a mindset that taps into our ancient human DNA. With groundbreaking insights into this emerging field, Dr. Ozkaya is helping to redefine the future of cyber security.

Through his work, he is debunking the myths that have long been perpetuated about the field, and demonstrating the incredible potential of the power of human minds to protect our data. With new approaches to the development of cyber security, Dr. Ozkaya is revolutionizing the way we think about protecting ourselves from cyber threats.

So, if you’re looking to break down the walls of preconceived notions and make your mark on the world of cyber security, join Dr. Ozkaya on his journey to redefine the way we think about cyber security.

 

Download the Magazine here

About Cyber Sentinels , click here

Erdal in the news , click here

Cyber Sentinels

The only security focussed publication that reaches both IT security providers and end users

Enterprise Channels MEA, hence, brings to you ‘Cyber Sentinels- a quarterly supplement that would put spotlight on the security happenings in the Middle East and Africa region and ensure optimal readiness of the enterprises. Our target is to keep security decision makers ahead of the evolving threats and challenges to their businesses. We are here to do our best to help create safer and more profitable enterprises.

We continually invest in that audience and the security market by conducting original research, providing tools for benchmarking and creating the most effective security strategies. We continually recommit ourselves to unearthing pressing IT and corporate/ physical security topics and trends for top security decision-makers.Earlier an annual supplement, starting from March 2016, the supplement is going to reach you four times a year. Be with us, as we are here to keep security in focus not just during GISEC but all year long. Since the launch of ECMEA in 2013,

ECMEA has evolved with the demands of the role to remain the go-to-resource for the highly crucial audience comprising the ICT channel fraternity and the enterprises of the region through a great website, editorial that has been admired across the industry, leading events and timely research, creating a community of knowledge sharing and best practices without foregoing the delicate duty called corporate social responsibility.

Our close working relationships with all industry associations and stakeholders enables us to bring you topical and authoritative articles and the latest news of industry and stakeholder developments.

Cyber Sentinel Award 2020 Global
Cyber Sentinel Erdal Ozkaya

What the Vendors & Channel partners can Look Forward to

  • Solution focus
  • New technologies in market
  • Spreading awareness about security workshops and events
  • Reaching out to the leading decision makers of enterprises

Why CIOS Should make it to The Titans

  • One unified platform for all you want to know about enterprise security
  • Showcase your organization’s readiness and put forth challenges for redressal by the tech providers
  • Address your concerns, share your success with the large IT fraternity
  • Knowledge of security best practices
  • Invitation to major security conferences and workshops
  • Better understanding of the evolving threats and ways to counter the same

breaking stereotypes poster – Cyber Sentinel – Why is it important to break stereotypes? breaking gender stereotypes essay breaking gender norms examples

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

cost of a cybersecurity attack

Understanding the cost of a cybersecurity attack: The losses organizations face (2019)

Understanding the cost of a cybersecurity attack The average cost of a cybersecurity attack has been increasing over time. The rewards... read more
How Threat Intelligence is Used - CISO MAG Erdal Ozkaya

How Threat Intelligence is Used to Reduce an Organization’s Risk Profile? Free Webinar Sep 1

How Threat Intelligence is Used to Reduce an Organization's Risk Profile? EC Council University and CISO Mag has organized a Cyber... read more
Channel Champions 2015

Channel Champions 2015 –

Channel Magazine Middle East has selected TOP 50 Channel Champions for 2015 and I am proud to get... read more
Erdal Ozkaya in the News

TOP 10 BOOKS ON CYBERSECURITY YOU MUST READ IN 2020

TOP 10 BOOKS ON CYBERSECURITY YOU MUST READ IN 2020 Our Book " Cybersecurity Attack and Defense Strategies " has been... read more
Kemp Partner Summit Erdal ozkaya

Kemp Partner Summit Keynote (2014)

Kemp Partner Summit We had a great Asia Pacific Partner summit in Singapore. In the Keynote I highlighted the needs of... read more
InfoSec World Erdal Ozkaya

InfoSec World Security Conference 21 – Free and Online

InfoSec World Security Conference As an independent third-party neutral communication platform based in Chengdu while facing the whole world, INSEC WORLD... read more

Recommended by Hacker News – 1

Recommended by Hacker News The Hacker News has just recommended, our book "Cybersecurity Attack and Defense Strategies" which we wrote with... read more
Who hacked

Who Hacked? Free Online Game

Who Hacked? Here is a great resource for all of you, a hacking game developed by Microsoft, which I have contributed... read more
Outlook keeps asking for a password

Outlook keeps asking for a password? The FREE fix you are waiting 4

Outlook keeps asking for a password If you care about your Security, then you need to take an extra step and... read more
Erdal Ozkaya in the News

Readiness for remote working – Beat COVID19 cyber threats

Readiness for remote working As published in : https://www.tahawultech.com/industry/technology/watch-digitalks-on-the-uaes-readiness-for-remote-working  By Giorgia Guantario In the first edition of our new series of virtual discussions... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.