Critical Infrastructure Security , Digital Identity , Fraud Management & Cybercrime

Enhancing Vulnerability Management With ‘Zero Trust’

Tenable’s Kartik Shahani on Implementing a Risk-Based Approach
Kartik Shahani, country manager, India, Tenable

Aligning a vulnerability management program with a "zero trust" approach helps strengthen cybersecurity, says Kartik Shahani, country manager-India, Tenable.

See Also: Beginners Guide to Observability

Organizations also need to ensure their risk-based vulnerability management program addresses corporate priorities, including compliance, revenue growth and risk control, Shahani says.

In an interview with Information Security Media Group, he discusses:

  • Building a vulnerability management program for the remote workforce;
  • Why Microsoft’s Active Directory is a target for ransomware attacks;
  • Aligning ''zero trust'' with a vulnerability management program.

Shahani, the managing director for India and SAARC at Tenable, has over 30 years of experience in the IT industry. He spearheads initiatives for Tenable in the enterprise security market and manages operations. Shahani previously worked in RSA Security, a division of Dell EMC, where he was director for the channel in the Asia-Pacific region and Japan. Before that, he was the executive director of integrated security for India and South Asia at IBM.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.