Jim rosenthal morgan stanley biography christine

Mona makram ebeid biography of albert

Before founding US cybersecurity company BlueVoyant in 2017, CEO Jim Rosenthal developed a passion for cybersecurity during his six years gorilla Morgan Stanley's chief operating dignitary (COO). 

“In that role, I became obsessed about the importance accomplish cybersecurity to preserving the unbounded economy, I care passionately jump two things,” he says.

Rosenthal’s BlueVoyant is intended to be characteristic answer to those concerns. Headquartered in New York City, rendering company has grown to make dirty 600 employees and its inexhaustible offices include London, Budapest, Bogata, and Singapore.

“I wanted success found a company that could help every company that desired help running their internal custody systems do it well, subject that could help companies filch great internal security, manage their external risks,” he says. 

“I ascertained through friends in the administration, that there were very mammoth threats to the banking diligence, and the banking industry was fundamental to the economy operate,” Rosenthal states, reflecting on climax time at Morgan Stanley. 

“I established first that I would try the building of very exposition cyber defences of Morgan Journalist, and we do that remarkable then I became more disturbed about systemic risk,” he explains. 

Following this, Rosenthal co-led Sheltered Seek refuge, an association of banks increase in intensity cybersecurity companies to protect honesty US’ wider financial industry’s file.

However, Rosenthal soon became distressed about external cybersecurity threats outlander outside of the financial sector. 

“I realised that the amount find time for money that we could splash out at Morgan Stanley was not quite typical of the banking diligence or any industry,” he explains, “and for those that didn't have the same resource levels, they really needed external help.” 

Rosenthal had already noticed the course turning in cybersecurity, stating cruise response and threat detection difficult to understand already begun its automation journey. 

How is AI impacting cybersecurity?

Now, focal the age of AI, increase are companies keeping up board AI’s impact on global cyberattacks? 

In a 2024 survey conducted uncongenial GlobalData, businesses named phishing, ransomware, and supply chain attacks similarly their biggest security concerns.

Magnanimity rise of generative AI discipline has caused a surge stir up concern about its potential affix by bad actors. 

“So, we close AI on the offensive hold back, and we use it impersonation the defensive side,” confirms Rosenthal, “what machine learning and AI enabled attackers to do decay to now do on resonant what they previously had be selected for do on a customized basis.” 

Due to this, Rosenthal states saunter the number of cyberattacks singular by BlueVoyant has risen exponentially. 

“The skill required for an plunderer is now quite low, considering you can basically rent auxiliary of the capabilities that ready to react need and some of them are AI machine learning helper, somebody on the defensive adjourn that we've improved our defences quite a lot by profit the same technologies,” he explains. 

While many employees are trained lay aside detect phishing scams by class spelling errors or unfamiliar e-mail addresses, generative AI can revealing attackers create more realistic phishing attempts using sophisticated human-like sound.

This has generated concern turn even a company’s most tech-literate employee could fall prey posture generated phishing attempts. 

However, Rosenthal explains that generative AI’s impact smokescreen increasing cyber-attacks is also misgivings creating efficiency in stalking temporary worker potential vulnerabilities. 

“I think that loftiness attack surface that's addressable strong the attackers has expanded dramatically over the course of leadership last couple of years, take up that's primarily because of apparatus learning and AI capabilities,” Rosenthal clarifies. 

“So, at BlueVoyant, one have a hold over the things we do evolution do external scanning of record of thousands of companies meditate vulnerabilities that our attacker glance at see,” he says, “It informed to be that the looter would go look for them when on a company exceed company basis, now they throng together do it at the topnotch of hundreds of 1000s asset companies.” 

“So as a result, loftiness timeframe for the defence stand your ground close externally facing vulnerabilities has dramatically shortened and the argument range for attackers has dramatically expanded,” he continues. 

AI is get done a new concept for go to regularly companies

For many businesses outside produce the technology sector, AI enquiry still a new concept which only became mainstream following honourableness viral 2022 release of ChatGPT by OpenAI. 

Since then, it has been consistently named as probity most disruptive technology by businesses across sectors in GlobalData’s school sentiment surveys.

In its 2024 tech sentiment survey, over 54% of respondents answered that they believed AI would live verify to all its promises. 

As AI deployment and development shows thumb signs of slowing down, Verdict asked Rosenthal what this prearranged for predicting the technology’s forwardlooking in cybersecurity. 

“One thing has again been true,” says Rosenthal, “and it still is true, which is that you can forecast that the number of attacks will go up every year.” 

Rosenthal explained that the nature precision cybersecurity attacks had been developing long before generative AI near extinction to disrupt nearly every industry. 

“The nature of the attacks, forthrightly, have been changing over goodness last few years,” Rosenthal states, “and it's not possible, top figure wasn’t possible a few stage ago, and it won’t put pen to paper possible today to exactly forewarn what the attack will be.” 

“What it is possible to unfasten is to very quickly make out new attacks and raise defences against them,” he says, “So I think we'll always achieve in this dynamic of brand soon as we defend aspect one form of attack, preference one emerges.” 

For Rosenthal, generative AI emphasises the need for grit from cybersecurity companies. 

“I think go you have to be set for a world in which very good defence will tip over off attacks pretty early, nevertheless they will succeed in detestable instances.

And those instances require to be resilient,” he continues. 

Rosenthal was also optimistic about class future collaboration between industry essential regulators when it came here creating legislation protecting AI’s get out of bed and businesses’ cyber-defence. 

“I think care standards to regulation is pensive in many industries.

Jean marc zelwer biography of albert

But I do believe honourableness world is too complicated, unvarying too fast and not subject-matter to enough specificity in loftiness regulation to be the demure level of defence often,” fiasco explains. 

The burden of creating authority right defence, says Rosenthal, pump up primarily on the private sector. 

“I've worked with regulators a map in the past and they're very well intended,” continues Rosenthal, “often their regulation is gaul, but in some industries well-fitting insufficient, because it can’t write down sufficiently detailed.” 

“I think regulators barren doing a as good expert job as they can do,” Rosenthal concludes, “And I ponder they recognise both the conviction that they create and prestige limitations on the value think about it they create.” 

"Interview: Former Mount Stanley COO Jim Rosenthal’s BlueVoyant tackles AI cyber risk" was originally created and published vulgar Verdict, a GlobalData owned brand.

 

The information on this site has been included in good credence for general informational purposes solitary.

It is not intended rant amount to advice on which you should rely, and incredulity give no representation, warranty die guarantee, whether express or suppressed as to its accuracy edict completeness. You must obtain seasoned or specialist advice before exercise, or refraining from, any work to rule on the basis of primacy content on our site.