ITSourceTek CEO & Co-Founder, Brian Arellanes, Featured in Hispanic Executive March/April 2017 Issue
Wednesday, March 1, 2017
Posted by: Salina Rivera
In Cybersecurity, a Talented Workforce Is a Diverse One
How ITSourcetek is leveraging people, process, and technology to protect clients’ data
February 27, 2017, written by Alison Ver Halen
When it comes to protecting the information on your computer, what you really need is another computer, according to Brian Arellanes.
His company, ITSourceTek, is currently working with machine learning and using that technology to help keep their clients’ data secure.
“One of the trends that is emerging here is leveraging unsupervised machine learning of the heavy lifting for us with automating processes and protection,” says Arellanes, the CEO and co-founder. “We’ve aligned ourselves with quite a few partner-solution companies that have products that use the latest advancements and data science to help identify threats, as well as prevent attacks.”
Because ITSourceTek’s clients include industry-leading companies in heavily regulated sectors such as healthcare, it is vital not just to raise the alarm after an attack happens, but also to prevent them from ever happening in the first place. If a hacker or malicious insider is able to access and alter medical records, it could lead to patients receiving the wrong medication and treatment, which could then lead to fatalities.
“Healthcare providers, insurance providers, and technologies that support that industry need to take more and more action towards protecting their data and leveraging some of these technologies,” Arellanes says.
To most effectively help its clients protect their data, ITSourceTek keeps track of the latest cybersecurity trends that affect financial services, healthcare, retail, and other industries they support.
“It started to become clear to us that the crux of the problem was how to protect the data,” Arellanes says. “And so that’s where we’ve really spent the majority of the last three-and-a-half years or so.”
That meant switching the focus from protecting the environment—i.e., firewalls and perimeter protection—to focusing on keeping the data itself secure.