Governance & Risk Management , IT Risk Management

Why Smaller Businesses Need Comprehensive Security

Avast's Vince Steckler on the Layered Security Imperative
Vince Steckler, CEO, Avast

Security incidents often result in damage, regardless of an organization's size. But for small and midsize firms, which often lack robust security defenses, the damage may be so severe that it means not only disruption but also the end of the business, says Vince Steckler of Avast.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Steckler discusses:

  • Why cyber threats present such a big risk to small and midsize organizations;
  • Essential components of a layered approach for security;
  • How smaller organizations with limited resources can best implement layered security.

Steckler has served as CEO and director of Avast since January 2009. In May 2018, he took the company public on the London Stock Exchange. Prior to joining Avast, Steckler was the senior vice president of worldwide consumer sales at Symantec Corp. and also served as Symantec's vice president for Asia Pacific and Japan. He has 20 years of experience in software development, systems analysis and engineering, and business development.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.