Into the Cloud Interview – Joseph Carson

Joseph Carson, Chief Security Scientist at ThycoticCentrify

  • What does ‘security’ mean to you?

In the past I used to think security was all about security solutions, best practices and technology. But in recent years I have changed my opinion after many long meetings and discussions with business leaders and executive boards.  Today, security is all about reducing risk and that means finding the right balance between technology, processes and people.  Security is my skill but my job is to help organizations reduce the risks from cyberattacks and human error to become more resilient.     

  • What made you want to work in the industry?

I have been a tech geek all my life for more than 30 years now and working in the IT industry for more than 25 years, though early in my career, security was just part of the job but not the core focus.  It was not until around 2000 when I had first-hand experience of a major security incident which changed my career path into becoming focused and dedicated to security.

  • If you could change anything in the industry, what would it be?

I believe the industry needs to spend more time listening and understanding the business needs to find how security can help them be successful.  We have no time in our industry for complexity and that means security must be usable.  Security must be better than the alternative.

  • Describe a funny thing that happened to you recently?

I used to travel so much I turned up at the airport and could not remember if I was actually meant to be travelling anywhere.  

  • What’s the most important trend you see today?

Everything is connected and that means everything is a vulnerable potential target.

  • What three words define you?

Passionate, Geek and dedicated.

  • If you didn’t work in security, what would you be doing?

I would be doing something with Technology as that is my passion and hobby.

  • What is one thing you would make compulsory in the office and one thing you would ban?

Logging out of the computer when you walk away from your desk should be compulsory and I would ban weak passwords.

  • Where do you see yourself in 5 years?

Continuing to make the internet a safer place for everyone.

 

To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922
Email: [email protected]

 

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

AI’s Digital Pollution

AI’s Digital Pollution

As AI continues to shape industries, responsible AI governance remains a pressing concern. Yolanda Hamblen and Pauline…
The Role of AI Gateway Devices

From the Expert – The Role of AI Gateway Devices

AI gateway devices bridge legacy security cameras and cloud platforms, enabling real-time analytics, hybrid storage, and compliance…
Cover Story - Empowering the Mobile Workforce with HID

Cover Story – Empowering the Mobile Workforce with HID

HID presents the latest in portable readers, depicting a modern world where secure access moves with you…
Frank Mueller headshot

How LiDAR protects railways

Frank Mueller, Hexagon, presents a thought leadership perspective of the use of LiDAR in railway infrastructure.
Image provided by Customs support group

Hello Post-Brexit Security Protocols

Jo Cloherty, Senior Commercial Manager at Customs Support Group, explores the 2025 Safety and Security Protocols that have…
Copyright: Security Buyer

Mind Games – The Psychological Perimeter

Joseph Clarke analyses how combining psychological deterrence with physical barriers, hidden detection, and forensic marking..
Image provided by ICT

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry  
Copyright: Security Buyer

Is Your Office Security Failing?

Unification and the user experience is transforming corporate security—enhancing access control, surveillance, and cybersecurity…
image provided by HID

HID Unveils OMNIKEY® SE Plug, Redefining Mobile Authentication

HID, a global leader in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader…
Human oversight in the age of AI security image - Security Buyer

Human oversight in the age of AI security

Alex Kazerani, SVP of Cloud Video Security & Access Control, Motorola Solutions explores the power of AI in video security.
Scroll to Top