top of page
John Richardson

CEO, JWR Identity

1

Tell us about your career in cybersecurity to date

I have over two decades of expertise in Identity Security and have been fortunate enough to share my knowledge as a thought leader at speaking engagements across North America, Latin America, and Europe.

 

My career began as a systems engineer and administrator for Microsoft, Linux, and Novell networks, where I focused on user privileges and resources. This experience laid the groundwork for my transition to Privileged Account Management, during which I became a trusted advisor to companies worldwide. Transitioning from Privileged Account Management, I broadened my understanding of Identity Security to encompass Identity Authentication and Verification, Identity Governance, Decentralised Identity, and Synthetic Identity.

 

As CEO of JWR Identity, I lead with sincerity and a hands-on approach, stressing the importance of collaboration and having the right personnel in place.

2

What does Cyber Safety mean to you?

For me, Cyber Safety is the comprehensive understanding that, in our technology-driven world, IT breaches are inevitable. So, rather than simply creating protective barriers, companies must design robust and adaptable systems designed to thoroughly understand the businesses relationship between risk and protection. In essence, it's about going beyond compliance to effectively minimize risk while enhancing the capacity to respond, recover, and learn from each incident.

 

Embracing Cyber Safety means adapting and growing in the face of digital challenges. It involves transforming vulnerabilities into learning opportunities and potential risks into areas for growth. When executed effectively, Cyber Safety is not merely a protective measure—it serves as a testament to a company's resilience and preparedness.

3

Why is Cyber Safety important to you and your organisation?

As a leader of a dedicated Identity Security boutique, I view Cyber Safety as both a professional responsibility and a personal commitment. Our clients trust us to help protect them in a digital landscape increasingly marred by security threats that go beyond financial risk and can often disrupt lives, breach privacy, and undermine trust. Our goal is to utilise our expertise to create a world where technology serves as a tool for empowerment and connection, rather than a source of harm.

 

Cyber Safety is our primary tool to combat these harmful attacks and our pledge to protect and fortify the digital space. We understand that in today's interconnected society, Cyber Safety isn't a choice, it's a necessity; it’s why Cyber Safety is fundamentally woven into the fabric of our operations, our vision, and our pledge to our clients. In our view, Cyber Safety is about maintaining trust, providing a sense of security, and ultimately, fostering a secure environment within our digital society.

4

What are the three biggest Cyber Safety challenges facing businesses today?

Ransomware Attacks are becoming increasingly prevalent and sophisticated. If successful, business operations can be significantly disrupted and there can be considerable reputational damage as well. Adhering to Cyber Safety principles, improving privileged access security, conducting regular backups, and training employees to recognise potential threats are crucial steps towards mitigating this risk.

 

Exploitation of User Access Control has increased as managing access data has become more intricate. Integrated systems like Identity Access Management (IAM), Privileged Access Management (PAM), and Identity Governance and Administration (IGA) form the defence against unauthorised access and potential misuse of privileges.

 

Each—IAM, PAM, and IGA—plays a distinct role in enhancing security and reducing risk. However, implementation is expertise and resource heavy, meaning insufficiently staffed businesses, or those without senior decision makers knowledgeable in these threat types, are more vulnerable to exploitation.

 

The increased use of personal devices and home networks for business tasks, usually via remote working, has introduced new vulnerabilities. It's crucial to establish secure connections, such as VPNs, implement end-to-end encryption, and employ multi-factor authentication to ensure the security of data accessed by remote workers.

5

What more can be done to support businesses with improving their Cyber Safety?

Organisations need a concerted, collaborative effort, linking identity technologies, people, and processes with business goals. This is the core of Cyber Safety, with technical efforts falling under this ethos. By closing the gap between the understanding of identity access and its crucial role in business outcomes and security, we will not only protect our organisation but also create a more secure digital environment for companies.

 

Embracing Cyber Safety principles to address ever-advancing new attack vectors, businesses must champion visibility, implementing systems that proactively accelerate defences and reduce risk. From detecting synthetic identities and harnessing self-sovereign identity to incorporating advanced resilience measures such as adaptive Multi-Factor Authentication (MFA), navigating the continuous evolution threats demands constant innovation.

6

Why do you think businesses generally prioritise cybersecurity ‘compliance’ without striving to champion best practice and true Cyber Safety?

Many industries that handle sensitive data face significant pressure to comply with regulations. In the first instance, the threat of severe fines or legal action often drives businesses to concentrate their efforts on meeting these mandatory regulations. Additionally, Compliance often provides a 'quick win'—a short-term, achievable goal. Building a culture of Cyber Safety, on the other hand, is a long-term commitment that may not yield immediate, visible results.

 

Second, achieving true Cyber Safety is a resource-intensive exercise that reaps rewards over the long term. It can be particularly challenging for organisations with already stretched resources. Without clearly presented and actionable data engaging leadership teams might seem like an ideal, rather than a necessity. Thus, recommendations for best practices can be viewed as creating additional burdens rather than proactive measures to enhance Cyber Safety.

 

This resistance underscores the need for a culture shift where Cyber Safety best practices are valued and implemented willingly, not just when they are enforced or driven by audit findings. Increased cyber understanding within senior teams is integral to effectively manage expectations and oversight.

7

How will online security continue to evolve in the years to come?

As a business leader deeply engaged in Identity Security, I foresee that the evolution of online security in the coming years will be driven by both escalating threats and innovative responses to those threats.

 

Synthetic Identity Threats involving the creation of fake identities are becoming increasingly sophisticated. In response, online security measures will need to evolve to detect and counter these complex fraud patterns. This will likely involve the use of advanced AI and machine learning algorithms capable of identifying the subtle anomalies associated with synthetic identities.

 

Second, adaptive MFA represents a key evolution in our security arsenal. Unlike static MFA, adaptive MFA responds dynamically to the perceived risk level of a given access request, applying stricter authentication requirements for higher-risk situations. Over the next few years, we can expect to see adaptive MFA become increasingly mainstream, providing a more flexible and robust approach to authentication.

 

Further development and adoption of decentralised identity technologies will provide enhanced privacy and control to the individual. Self-sovereign identity takes this a step further, allowing individuals to control their identity across multiple platforms without relying on a centralised authority. Over the coming years, these technologies will empower privacy ownership for the individual while reducing the attractiveness of large, centralised databases to attackers.

8

Which technology with the potential to improve Cyber Safety are you most excited about?

With over 15 years of deep involvement in this field, I'm particularly thrilled about the recent advancements and innovations Privileged Account Management (PAM) has witnessed.

 

The legacy challenges in PAM are that there is a high level of expertise required to implement it, increasing the cost of deployment and maintenance. Enhancements in architecture has allowed PAM systems to be more adaptable and accessible, notably, improved user-friendliness and enhanced value over time is leading toward a better total cost of ownership. These strides are courtesy of innovative vendors who are pushing the envelope in PAM technology.

 

This progress is particularly relevant given the rise of external PAM, where the need to apply PAM controls is extending to external partners accessing an increasingly diverse array of privileged information and resources. The evolution of PAM technology is enabling us to secure these interactions more effectively and efficiently.

 

In short, the transformation we're witnessing in PAM technology is not only revolutionising the way we approach Cyber Safety but also promising a future where privileged account management can serve as a business enabler, and not just a protective measure.

9

Are there any other businesses you believe set the standard for Cyber Safety?

When it comes to setting the standard for Cyber Safety, I am particularly impressed by Senhasegura, a Brazilian Privileged Account Management (PAM) vendor. Their innovation and commitment to customer success are truly remarkable and set them apart from many others in the industry.

 

By increasing a focus on PAM practically, Senhasegura prioritise creating holistic, cost-effective solutions that work well in real-world scenarios and are practical to deploy and support.

 

This customer-centric approach has earned them the highest customer success scores in the industry. Their unique blend of innovation, practicality, and a high-touch customer success focus sets a benchmark in the Cyber Safety space. The driving force behind this exceptional performance is the company's leadership, starting right at the top with their CEO.

bottom of page