Skip to main content
banner image
venafi logo

What Cyber Security Super Power Would You Like to have?

What Cyber Security Super Power Would You Like to have?

cyber security
January 18, 2017 | Brooke Cook

IT security can sometimes feel like a thankless job. With limited resources, IT security teams are asked to defend the organization from a wide variety of constantly changing external threats They are also responsible for educating their executive teams and peers about the importance of security, which sometimes seems to require super human abilities.

At Venafi, we spend a lot of time talking to security teams that are tasked with these Sisyphean tasks. We wanted to recognize their heroic contributions to keeping their organizations safe against overwhelming odds. So, we asked IT security leaders which super power would help them accomplish even more.

We discovered that many security leaders wanted some form super power relating to privileged access and identity and access management. Apparently, they are constantly saving hapless users from the evils of flawed passwords and weak security controls around privileged machine identities.

We’re not sure what this IAM super power should be called. But one IT leader cleverly labeled the super hero who uses it ‘Captain Identity.’ Here’s what the security leaders we talked to said about the cyber security super powers they’d like to have:

“I would like to be able to have a perfect infallible identity and authentication mechanism to ensure secure communications between authorized users and the ability to permanently revoke the privilege no matter where the data resides.  I would use this to stop phishing attacks, malicious web spoofing attacks and protection of sensitive information.”
-Bruce Jones, Fortune 100 HealthCare Company

“I’d like the ability to identify and authenticate the exact person to the exact data they need at the exact time they need it. I'd be called Captain Identity.”
-Larry Whiteside Jr., Optiv

“I want the ability to get people to use unique passwords. This really would be a superpower.”
-Chris Huntington, Nexigen

“How about the ability to make people use complex passwords. Because passwords aren't going away anytime soon. And if people used complex passwords—and didn’t reuse them across sites—90% of stolen identities would go away.”
-Randall Gamby, US Bank

Unfortunately, these challenges are nothing new. We have often heard that identity and access management is an area that needs to evolve to strengthen an organizations’ cyber defenses—especially in connection with privileged access for machines,

The CISO of Michael’s Stores shares some valuable insights on strengthening identity and access management programs in a recent video blog.

We’d love to hear what kind of super power you’d like to have. Share it with us on Twitter and tag @Venafi, on LinkedIn or at the Venafi RSA booth N-3924.


Like this blog? We think you will love this.
image representing big data
Featured Blog

Was ist homomorphe Verschlüsselung, und wie wird sie verwendet?

Was ist homomorphe Verschlüsselung? Zweck der

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Brooke Cook
Brooke Cook

Brooke is Director of Global CISO Community Engagement for Venafi. Her work involves building and expanding a global community of executive IT leaders of CIOs, CISOs, and Security Architectures from the Global 5000

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more