Into the Cloud – Mark De Simone

Mark De Simone. Regional Director MEA at ThycoticCentrify 

What does ‘security’ mean to you? 

True security means that no individual or device is trusted by default, with organisations instead implementing a policy of ‘zero trust’.  

What made you want to work in the industry? 

Human societies are built on trust. Today, the world around us is rapidly evolving through the adoption of new processes based on digital identities and digital privileges. Organisations that continue to follow traditional security paradigms as they move to the realms of digital, cloud, and AI will find that they now have a far greater risk exposure.  

If you could change anything in the industry, what would it be? 

I would like to elevate discussions around the complexity of various cybersecurity threats and solutions to the Board of Directors level.  

Describe a funny thing that happened to you recently? 

At the conclusion of a particularly interminable, though fruitful, session I recently had with two customers on a video call, I stood up and vigorously directed my hand towards them for a handshake, only for it to bounce off the monitor! 

What’s the most important trend you see today? 

With nearly 80% of security incidents and breaches involving compromised user credentials, I see robust privileged access management (PAM) becoming an integral part of any modern cybersecurity strategy. I also see the line between PAM and IAM becoming increasingly blurry because, as an enterprise setting, virtually all users are in fact, privileged users. Eventually, every identity will become a privileged identity for some short period of time under certain access use cases. 

What three words define you? 

Energy, Bold, Passion! 

If you didn’t work in security, what would you be doing? 

I would be a singer. 

What’s the most interesting thing about you that we wouldn’t learn from your CV? 

I spent a full day being interviewed by Steve Jobs for an executive position at NEXT. 

What is one thing you would make compulsory in the office and one thing you would ban? 

I’d make one good hearty group laugh each day compulsory, while banning closed doors. 

Where do you see yourself in 5 years? 

Using my experience to help young entrepreneurs.  

 

To read more exclusive features and latest news please see our April issue here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

AI’s Digital Pollution

AI’s Digital Pollution

As AI continues to shape industries, responsible AI governance remains a pressing concern. Yolanda Hamblen and Pauline…
The Role of AI Gateway Devices

From the Expert – The Role of AI Gateway Devices

AI gateway devices bridge legacy security cameras and cloud platforms, enabling real-time analytics, hybrid storage, and compliance…
Cover Story - Empowering the Mobile Workforce with HID

Cover Story – Empowering the Mobile Workforce with HID

HID presents the latest in portable readers, depicting a modern world where secure access moves with you…
Frank Mueller headshot

How LiDAR protects railways

Frank Mueller, Hexagon, presents a thought leadership perspective of the use of LiDAR in railway infrastructure.
Image provided by Customs support group

Hello Post-Brexit Security Protocols

Jo Cloherty, Senior Commercial Manager at Customs Support Group, explores the 2025 Safety and Security Protocols that have…
Copyright: Security Buyer

Mind Games – The Psychological Perimeter

Joseph Clarke analyses how combining psychological deterrence with physical barriers, hidden detection, and forensic marking..
Image provided by ICT

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry  
Copyright: Security Buyer

Is Your Office Security Failing?

Unification and the user experience is transforming corporate security—enhancing access control, surveillance, and cybersecurity…
image provided by HID

HID Unveils OMNIKEY® SE Plug, Redefining Mobile Authentication

HID, a global leader in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader…
Human oversight in the age of AI security image - Security Buyer

Human oversight in the age of AI security

Alex Kazerani, SVP of Cloud Video Security & Access Control, Motorola Solutions explores the power of AI in video security.
Scroll to Top