Posted inSecurityCyber Security

Exclusive Interview: The untold cybersecurity journey of Kevin Weiss, the CEO at Sectigo

In this exclusive in-depth Q&A, we delve into the insights and experiences of Kevin Weiss, CEO of Sectigo

Meet Kevin Weiss, the Chief Executive Officer of Sectigo, a seasoned technology leader with over 25 years of experience in senior executive roles across various technology companies.

Before joining Sectigo, Kevin led Spireon (a Solera Company), the largest provider of device-independent telematics and vehicle intelligence solutions in North America, as its CEO for over six years. His leadership was pivotal in driving innovation and growth in the automotive industry.

Before Spireon, Kevin served as the CEO of Unitrends, a global technology company specialising in business recovery solutions. They held the position of President at McAfee, a renowned computer and network security firm. With a track record of success, Kevin has also held leadership roles at prominent technology companies like Author Solutions and SkyMall.

Kevin Weiss, CEO, Sectigo

Kevin’s journey in the technology sector began with significant contributions to sales and marketing at IBM, where he honed his skills and expertise. His commitment to excellence extends beyond the boardroom, as he actively contributes as a board member to the Princeton University Faith & Work Initiative (FWI).

Sectigo provides comprehensive certificate lifecycle management (CLM) with automated solutions and digital certificates that secure every human and machine identity for the world’s largest brands.

Join us as we delve into Kevin’s remarkable career, exploring his insights, experiences, and vision for the future of Sectigo and the technology landscape.

Can you tell us about your transition from running technology companies for private equity firms to joining your current company?

Over the last 14 years, I’ve been deeply involved in the leadership and management of various technology companies, primarily within the purview of private equity firms. Each role presented unique challenges and opportunities, shaping my expertise in navigating the dynamic tech landscape.

My previous tenure involved overseeing technology companies through multiple ownership transitions, including sales and integrations. However, the turning point came when I received a call from a recruiter, presenting me with an intriguing opportunity to join my current company.

Before making any commitments, I deliberated extensively, considering the significant workload and responsibilities of such a move. Consulting with my spouse, whose input is invaluable to me, was pivotal in making the decision.

After engaging in discussions with the leadership team and understanding the market dynamics, I became increasingly enthralled by this opportunity’s prospects. What initially seemed like a promising venture has surpassed my expectations, continually evolving and presenting new avenues for growth and innovation.

What key insights did you gain about the market transition that started around 2022?

Joining my current company in December 2022 provided me with a first-hand view of the market transition that had been underway. Several strategic decisions the company made before my arrival stood out to me as insightful and forward-thinking.

The company’s foresight in developing a cloud-based certificate lifecycle management solution approximately six years ago positioned us ahead of the curve. We gained a competitive edge and streamlined client operations by eschewing traditional on-premise solutions. Our embrace of open standards, particularly ACME, underscored our commitment to interoperability and industry alignment.

This strategic move facilitated seamless integration with existing systems and positioned us as a leader in embracing emerging technologies. Furthermore, our customer-centric approach, wherein we managed all certificates, irrespective of origin, spoke volumes about our dedication to comprehensively serving our clients’ needs.

This holistic approach differentiated us from competitors and solidified our reputation as a trusted partner in the cybersecurity landscape. These insights reaffirmed my belief in the market’s immense potential and instilled a sense of excitement about the journey ahead.

Reflecting on your 14-year journey in the tech industry, what key learnings have you gathered, primarily through significant events like the dot-com bust, financial crises, and pandemics?

My journey in the tech industry has been characterised by resilience, adaptability, and a relentless pursuit of innovation. Over the past 14 years, I’ve witnessed and navigated through several seismic events that have fundamentally reshaped the industry landscape. Each event offered invaluable lessons from the dot-com bust, which served as a reality check amidst irrational exuberance, to the financial crises and pandemics that tested the mettle of businesses worldwide.

One of the recurring themes throughout these tumultuous periods has been the enduring role of technology as a catalyst for progress and transformation. Despite the volatility and uncertainty, technology continued to evolve, driving efficiency, productivity, and innovation across sectors.

Moreover, these events underscored the importance of adaptability and forward-thinking leadership in navigating turbulent waters. Whether it was the resilience of tech companies during economic downturns or the rapid digital transformation witnessed amidst the pandemic, the ability to embrace change and leverage technology effectively emerged as a critical success factor.

Additionally, these experiences reinforced the significance of customer-centricity, open architectures, and fair pricing in sustaining long-term growth and relevance in the tech industry. Reflecting on my journey, I’m reminded of the resilience and ingenuity inherent in the tech community, which continues to inspire me to push boundaries and drive positive change in the ever-evolving landscape.

Why did you focus on the Middle East market, and what is your perspective on its potential?

The decision to focus on the Middle East market stems from recognising its growing significance in the global economy and its commitment to diversification beyond traditional sectors. The Middle East has long been synonymous with oil and energy production, but in recent years, there has been a concerted effort to embrace innovation and entrepreneurship across various industries.

This shift presents a compelling opportunity for companies like ours to contribute to the region’s economic development and security. As the Middle East seeks to position itself as a hub for technology and innovation, there is a growing demand for cybersecurity solutions to safeguard businesses and infrastructure.

Our perspective on the region’s potential is optimistic yet pragmatic. While inherent challenges exist, such as geopolitical tensions and regulatory complexities, the Middle East offers a fertile ground for growth and collaboration. By establishing a solid presence in the region and forging strategic partnerships, we aim to capitalise on emerging opportunities and support the aspirations of businesses and governments in the Middle East.

How has the cybersecurity landscape evolved in recent years, especially considering the rise of AI, deep fakes, and quantum computing?

Cybersecurity has profoundly transformed in recent years, driven by technological advancements and the evolving threat landscape. The proliferation of AI, deep fakes, and quantum computing has introduced new challenges and opportunities for cybersecurity professionals. While AI offers tremendous potential for improving security operations and threat detection, it also poses risks in the form of AI-generated attacks and sophisticated malware.

Deep fakes, fuelled by AI algorithms, have raised concerns about manipulating digital content and spreading disinformation. Similarly, quantum computing presents a paradigm shift in cryptographic security, potentially rendering traditional encryption algorithms obsolete.

These developments underscore the need for proactive measures and adaptive strategies to mitigate emerging threats. Organisations must invest in robust cybersecurity frameworks, leverage AI for threat intelligence and detection, and stay abreast of quantum-safe encryption standards.

Moreover, collaboration between industry stakeholders, governments, and cybersecurity experts is essential to address the complex challenges of AI, deep fakes, and quantum computing. By fostering a culture of resilience and innovation, we can navigate the evolving cybersecurity landscape and safeguard tomorrow’s digital infrastructure.

How has Sectigo adapted to the evolving cybersecurity landscape, particularly in managing the increasing complexity of certificates and security threats?

Sectigo has been at the forefront of innovation in the cybersecurity landscape, continuously adapting to address the evolving threats and challenges organisations worldwide face. As the complexity of managing certificates continues to increase, Sectigo has developed comprehensive solutions to streamline certificate lifecycle management and enhance security posture.

Our certificate lifecycle management platform enables organisations to discover, automate, and replace certificates efficiently, reducing the risk of outages and vulnerabilities. Moreover, our focus on education and partnerships ensures that customers have the knowledge and resources to deploy certificate management solutions effectively.

In response to emerging security threats, such as AI-generated attacks and deep fakes, Sectigo has invested in advanced threat intelligence capabilities and AI-driven analytics to detect and mitigate risks proactively. Additionally, our commitment to innovation and research ensures that we stay ahead of emerging threats, offering cutting-edge solutions to safeguard organisations against evolving cyber threats. By empowering organisations with the tools and expertise needed to navigate the complex cybersecurity landscape, Sectigo remains a trusted partner in the fight against cybercrime and digital threats.

Considering the diverse markets in the MENA region, how does Sectigo approach customisation while maintaining scalability?

 Sectigo recognises the diverse needs and challenges faced by organisations across the MENA region and adopts a tailored approach to address specific requirements while maintaining scalability and flexibility. Our strategy revolves around understanding the unique nuances of each market and leveraging partnerships to deliver customised solutions that align with local regulations and industry standards.

By collaborating with local partners and stakeholders, Sectigo ensures that our solutions are tailored to meet the evolving needs of businesses and governments in the region. Moreover, our commitment to innovation and research enables us to develop scalable solutions that adapt to changing market dynamics and emerging threats.

Whether deploying certificate lifecycle management solutions for enterprises or providing AI-driven threat intelligence for government agencies, Sectigo remains committed to delivering value-driven cybersecurity solutions that empower organisations to thrive in today’s digital landscape.

How does over-customisation impact technology companies and their customers?

Over-customisation within technology solutions can have far-reaching implications for the company and its customers. When a technology solution is overly customised to meet the specific needs of a single client, it often results in substantial costs, both in terms of initial development and ongoing maintenance.

The technology company transitions from providing standardised solutions to a custom development shop. While this may seem beneficial initially, as it caters precisely to the customer’s requirements, it can lead to several challenges down the line. Firstly, over-customization creates a dependency on the technology company for ongoing support and maintenance. Since the solution is tailored to the customer’s unique needs, they rely heavily on the technology company’s expertise. Any mistakes or oversights in the customisation process can result in significant disruptions for the customer, potentially impacting their operations and bottom line.

Moreover, over-customisation limits scalability and interoperability. If the solution is too tailored to the specific requirements of one customer, it may not be easily adaptable for use by other organisations or integration with third-party systems. This restricts the technology company’s ability to market the solution to a broader audience and limits potential growth opportunities. Ultimately, the goal for technology companies should be to strike a balance between customisation and standardisation.

While some customisation may be necessary to address unique customer needs, developing solutions that a broader customer base can leverage is essential. By focusing on building solutions that can eventually become standard off-the-shelf offerings, technology companies can ensure scalability, interoperability, and long-term viability for both themselves and their customers.

How do data sovereignty concerns impact global technology operations, particularly in regions like the Middle East?

Data sovereignty concerns have become increasingly prevalent in global technology operations, posing significant challenges for companies operating across borders. In regions like the Middle East, where data privacy and localisation regulations are evolving rapidly, navigating data sovereignty requirements is essential for compliance and operational efficiency.

Data sovereignty refers to the jurisdictional authority over data stored and processed within a particular geographic region. Organisations operating in the Middle East must adhere to local regulations governing data collection, storage, and processing within the region’s borders.

Failure to comply with these regulations can result in legal and financial consequences and damage the organisation’s reputation. One of the primary challenges associated with data sovereignty is the fragmented regulatory landscape.

Different countries within the Middle East may have varying requirements regarding data localisation, encryption standards, and cross-border data transfers. This complexity makes it challenging for multinational technology companies to develop and deploy compliant solutions across all jurisdictions. Another challenge arises from the tension between data sovereignty requirements and the benefits of cloud computing.

While cloud-based solutions offer scalability, flexibility, and cost-efficiency, concerns about data sovereignty may deter organisations from adopting cloud services. This is particularly true in regions that prefer on-premise solutions or stringent cloud usage regulations.

Technology companies must adopt a proactive compliance and risk management approach to navigate these challenges. This includes conducting thorough assessments of regulatory requirements in each jurisdiction where they operate, implementing robust data protection measures, and leveraging technologies such as encryption and tokenisation to secure sensitive data. Additionally, fostering collaboration and dialogue with regulatory authorities and industry stakeholders can help shape policies that balance data sovereignty requirements with the needs of businesses and consumers.

What shifts are essential for organisations to enhance cybersecurity readiness, especially in the Middle East?

Enhancing cybersecurity readiness is a pressing concern for organisations worldwide, particularly in regions like the Middle East, where geopolitical tensions and evolving threat landscapes pose unique challenges. To bolster cybersecurity resilience, organisations must adapt to several critical shifts in their approach to security.

Firstly, organisations must acknowledge and address the increasing complexity of their technological ecosystems. The proliferation of devices, users, and applications, coupled with the growing sophistication of cyber threats, requires a proactive and multifaceted approach to cybersecurity.

This includes implementing robust certification processes to ensure digital assets and infrastructure integrity and security. Furthermore, the shortening validity of certificates, as mandated by industry leaders like Google and Apple, underscores the need for agile and scalable security solutions.

Organisations must invest in management solutions that can efficiently handle the complexity of managing certificates and digital identities across diverse environments. This shift mirrors past transitions, such as the move from mainframe computing to client-server architecture, which demanded new management tools to manage increasing complexity.

Additionally, collaboration and alignment among organisations in the Middle East are crucial to addressing cybersecurity challenges effectively. As the region undergoes rapid digital transformation, coordinated efforts are needed to develop and implement cybersecurity frameworks prioritising data protection, threat detection, and incident response.

This includes fostering partnerships between government agencies, industry associations, and private-sector organisations to share threat intelligence and best practices. Moreover, as organisations increasingly embrace cloud computing and remote work arrangements, endpoint protection becomes paramount. Robust security measures must be implemented to secure endpoints, such as laptops, smartphones, and IoT devices, against evolving cyber threats.

This includes deploying advanced endpoint security solutions to detect and mitigate threats in real-time, regardless of the device’s location or network connection. Ultimately, cybersecurity readiness in the Middle East requires a holistic and proactive approach encompassing technological innovation, regulatory compliance, and collaborative partnerships. By embracing these shifts and investing in robust cybersecurity solutions and practices, organisations can better defend against cyber threats and safeguard their digital assets and operations.

What are the emerging trends in cybersecurity for 2024, globally and in the Middle East?

In 2024, cybersecurity trends are poised to address several critical areas globally, including the Middle East. These trends reflect the evolving threat landscape, technological advancements, and regulatory developments shaping cybersecurity. Firstly, organisations must prioritise becoming “quantum-ready” to adapt to advancements in quantum computing. As quantum computing capabilities evolve, traditional cryptographic algorithms may become vulnerable to attacks. Therefore, organisations must invest in quantum-resistant encryption and authentication solutions to protect their sensitive data and communications from emerging threats. Secondly, effective management solutions are essential to handle the escalating complexity of technological ecosystems.

The proliferation of devices, users, and applications necessitates advanced management tools that efficiently handle certificate management, identity and access management, and policy enforcement. This shift towards centralised management solutions mirrors past transitions, such as the move from mainframe computing to client-server architecture, which demanded new management tools to manage increasing complexity.

Furthermore, the trend towards shorter certificate validity periods, as mandated by industry leaders like Google and Apple, underscores the need for agile and scalable security solutions. Organisations must invest in management solutions that can efficiently handle the complexity of managing certificates and digital identities across diverse environments.

This includes deploying advanced certificate lifecycle management tools to automate digital certificate issuance, renewal, and revocation to ensure continuous compliance and security. Additionally, cloud computing will play a significant role in shaping cybersecurity trends in 2024.

Securing cloud environments becomes paramount as organisations increasingly migrate their workloads and data to the cloud. This includes implementing robust security measures such as encryption, access controls, and threat detection to protect sensitive data and applications hosted in the cloud.

Moreover, endpoint protection becomes paramount as organisations embrace remote work arrangements and hybrid cloud environments. Robust security measures must be implemented to secure endpoints, such as laptops, smartphones, and IoT devices, against evolving cyber threats.

Cybersecurity Trends 2024 will ultimately focus on balancing technological advancement with robust protection mechanisms to address evolving threats and support digital transformation.

By embracing emerging trends and investing in innovative cybersecurity solutions and practices, organisations can better defend against cyber threats and safeguard their digital assets and operations.

What strategic directions is Sectigo pursuing to address evolving cybersecurity challenges?

Sectigo is undergoing significant strategic shifts to address evolving cybersecurity challenges, underpinned by substantial investments in talent, technology, and customer-centric initiatives. Recent executive appointments signal a strategic focus on managing high-growth trajectories, aligning technological innovation with customer needs, and fostering collaboration and excellence.

One of Sectigo’s vital strategic directions is to reinforce its position as a leader in providing comprehensive cybersecurity solutions that anticipate and meet the evolving needs of its global customer base. This involves investing in research and development to develop innovative security technologies and solutions that address emerging threats and vulnerabilities. By leveraging its digital identity, encryption, and certificate management expertise, Sectigo aims to deliver cutting-edge cybersecurity solutions that enable organisations to secure their digital assets and operations effectively.

Moreover, Sectigo is committed to fostering a customer-centric approach prioritising customer success and satisfaction. This involves investing in customer support and service capabilities to ensure timely and practical assistance for customers across all stages of their cybersecurity journey.

Additionally, Sectigo is expanding its partner ecosystem to provide customers access to cybersecurity solutions and expertise. Furthermore, Sectigo is focused on building strategic partnerships and alliances with industry leaders, technology providers, and regulatory bodies to shape the future of cybersecurity and advance industry standards and best practices.

By collaborating with key stakeholders, Sectigo aims to drive innovation, promote interoperability, and more effectively address emerging cybersecurity challenges.

Overall, Sectigo’s strategic directions underscore its commitment to delivering value, innovation, and excellence to its global customer base. By investing in talent, technology, and customer-centric initiatives, Sectigo is well-positioned to address evolving cybersecurity challenges and help organisations securely navigate the complex threat landscape.

In conclusion, a technology executive’s journey encompasses many experiences, insights, and strategic decisions. From navigating market transitions to embracing emerging trends in cybersecurity, the path to success is paved with resilience, adaptability, and a relentless pursuit of innovation.

 As organisations continue to evolve in response to dynamic market forces, the role of visionary leaders and forward-thinking strategies becomes increasingly pivotal in shaping the future of the tech landscape.