Mario joined World Wide Technology in 2013 after 28 years of professional experience in security in both the government and private sectors. His current business development role is to lead the cyber security consulting and advisory services for the National team.
Q&A with Mario Balakgie
- Tell us about your background and how you got into technology.
- My technology career began while working as a Federal employee with a primary role around traditional and non-traditional security. It was the early on expansion of the technology within the security functions that required a deeper appreciation for data integrity and network communications. As technology evolved, it quickly became evident for the need to have cyber security professionals who specialize in the areas of life-cycle and holistic security.
- What is your role at WWT?
- I deliver consulting services to customers by working with executives and addressing the demands of security on a global and enterprise scale. I lead a team of professionals with expertise to assist customers in defining comprehensive security and privacy programs mapped to business imperatives. This includes advanced technology solutions to support a range of customers and working with them to meet organizational requirements for establishing, implementing, monitoring and maintaining a highly capable security program.
- What innovation is happening in your technology focus area that has you really excited?
- Our cyber-analytics reference architecture (CARA) is truly an advanced capability that can be solution for the simple to complicated security environments. Customers are facing a never-ending challenge from external and internal threat. While there exists an exhausting amount of single-point technologies, bringing a design that can integrate and be highly effective is complex. Our CARA provides and demonstrates an integrated solution that can meet these demands — a real differentiator for us.
- Describe a recent interaction with a customer that led to solving a problem.
- Our advisory and technology expertise has had tremendous success across a number of clients. Security assessments of various types have been key in expanding our value by showing significant areas of weaknesses, many of which were not known. One client we assisted by conducting a penetration test to demonstrate how an attacker can obtain and elevate access to their infrastructure. Techniques and methods used by our professionals to gain access was an eye opener. In another client example, we evaluated an architecture for vulnerabilities across a global network to include access management weaknesses. Our discovery and conclusions were highly received and used to justify major funding recommendations for technology and architecture investments.