Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Absolute Security: Push the Reset Button Even After a Ransomware Wipe

Truth in IT
05/09/2025
103
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data and we are here at Rsac 2025. We are looking at the greatest and latest cybersecurity solutions from around the world, and we are now going to visit with one of our favorites. How are you doing? Great, great. I'm Harold Rivas I am the chief information security officer at Absolute. So, uh, you're you're a CISO is what you're saying. And, uh, what's your life expectancy as a CISO? It's very short. A lot of stress in the role. I actually got into this line of work thinking that it would be less stressful. That's proven completely wrong, but I've learned to, uh, to cope. All right, so this is this is a case of where you are a security vendor, but you're using it for yourself and for your clients on their behalf. So you learn. You learn as you're going along, right? That's right. So we run the program, I run technology, product security, compliance and of course the information security role. So it's a pretty comprehensive role through all those facets. Effectively. I am customer zero my organization. It's our eat our own dog food type of program. Drink our own champagne program. Yeah. Yeah. Uh, yeah. You never really want to say dog food when you're talking about your own product. Um, so, uh, tell us a little bit then about what the scope of Absolute is. I'm not sure that everyone who's watching this would, would, you know, already know. So just just at a high level, what do you what do you do, uh, as a solution vendor in the security space? Happy to. So we are a global leader in cyber resilience or enterprise resilience. We have a deep focus and an amazing piece of technology that operates below the operating system. So you could have a completely ransomware device. And that device, almost in a Lazarus like effect, bring itself completely back to life from bare metal. This relationship with the hardware below the operating system gives us an ability to focus in on Sin on resilience and have visibility and nobody else has. So, for example, 24% of all of the security stack, we have telemetry to evaluate this, the security stack that CISOs rely on to protect their enterprise. On average, at 24% of those are not running. We have the ability to go in below the operating system and ensure it's brought back to life and is always consistently operating. Same thing with device encryption. If the device is lost, we can operate in a way no one else in the world can. We call that extreme resilience. That's I think I'm getting to the name absolute right. We're talking about absolute zero trust basically. Right. That's what it gets down to. So I think we'd be interested to know just a little bit more. Even though we don't have a lot of time. How do you manage to do that? How do you manage to get in at a hardware level and insert yourself down there? So we have about 30 OEM agreements that we've had for a very long time. And some of our partners, Lenovo's and others are going to deploy a piece of technology deeply embedded at the build process of that hardware cannot be removed. We work with those vendors closely to deploy this capability, and then those agents communicate back. If a customer chooses to license the underlying technology, which then communicates with our council and gives them all of this amazing capability. So there's no like corrupting the software or jailbreaking that it's baked into what the infrastructure is. That's exactly right. It's baked in. It's something that allows us that individual control outside, independent of the operating system. Uh, here at the I mean, there's a lot of places to go with this conversation. And as you know, as a former IT guy, if I want to go there, but just we're here at the Rsac show. So let's talk about the themes you're seeing here. Obviously, there's things about AI. There's things about supply chain. What are you seeing here that's particularly relevant for absolute? So for us, there has been a tremendous amount of focus over the past several years around On detection and attempts to prevent cyber incidents. We recognize fully that there are going to be cyber incidents. Assume breach. Right. For a long time the industry has talked about this, but what are we doing as an industry to focus on what happens after the barbarians are inside the gate? And that's where we're really focused. That's where we shine. It's about helping you restore after such an event. You could have a completely ransomware organization. You could have an environment that's gone completely blue. Screen of death worldwide. And we can help you bring that entire environment back to life. So like a magic reset button at the hardware level? That's exactly right. Yeah. All right. Well, there's definitely a lot more to discover there. I don't think we've even scratched the surface of how that actually works physically, but it's a very astute place to dig in and say, here's where security has to be, right? We have to be at that layer. And that's that's an area we're really making sure we're bringing forward. We've had opportunities to connect with leaders, other vendors and partners to make sure that the focus now shifts to what happens after the event. What can we do to be more resilient? And in our case, we're pushing the agenda of extreme resilience out of band capabilities, not just tabletop exercises, but actual technical controls that allow you to do things nobody else can. I like the extreme resilience idea of just being able to reset the, you know, reset everything from the ground up, so to speak, on their at a push of a button. Um, if you had to give one message to other people attending RSA because there's 25,000 people here, uh, what would you like everyone to sort of understand about absolute and, uh, where where they should be thinking? Yeah. So we believe we have something that is truly unique in the market. You're making investments in security solutions. Our research shows, through our Cyber Resilience Report that we just released at the kickoff of RSA, shows that 24% of the time it's not working. So understand that one quarter of your guards are not active. And that's a big risk that many people need to understand. Through our capabilities, we can ensure that technology is operational. It's an ecosystem of capabilities. In general, CISOs depend upon 75 different pieces of technology to protect themselves. How often are you evaluating whether or not they're actually doing the job you set out for them to do? So it's important for you to focus on, am I getting the return on those capabilities, and do I have the right kinds of controls? If something breaks to restore my organization, the focus on resilience is really about let's move the conversation beyond detection and prevention and start to really focus on it's going to happen. What are you doing after the fact? Yeah, I mean, I'm struck by the fact that a fourth of their tools aren't actually going to be functional in that situation anyway, and they have no magic reset button unless they're doing something at this level. That's exactly right. That's exactly right. So we want to make sure that we're promoting awareness on the need to start to have a conversation around resilience. If someone wants to learn more information about absolute, you probably have a website. Is there something specific you point them to? Maybe something that would help them get started understanding this? Absolutely. So Absolute.com but also an opportunity for you to research online and check out our resilience report that we just published. So resilience report from Absolute. Com um any uh any last words you want to give to our audience here. Yeah. What I would say is we're all in this together. So we believe in an ecosystem of capabilities, an ecosystem of partners to get us through. We are getting better as an industry. We're partnering. We're working together. We're doing our part in contributing back into that ecosystem. So look forward to partnering not only with our customers, but with others out there in the industry. All right. Thank you so much. Thank you.

In this RSAC 2025 conversation, Mike Matchett interviews Harold Rivas, CISO of Absolute Security. Absolute delivers 'extreme resilience' by operating below the OS, with embedded firmware agents capable of restoring devices—even from a ransomware attack. With OEM partnerships and deep telemetry, Absolute Security ensures security tools are actually running and recoverable. Their Absolute Security Cyber Resilience Risk Index 2025 reveals 24% of endpoint security tools go dark when you need them most. Rivas argues it’s time to plan for post-breach recovery, not just prevention.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • absolute
  • security
  • cybersecurity
  • ransomware
  • recovery
  • firmware
  • agents
  • cyber
  • resilience
  • endpoint
  • security
  • device
  • recovery
  • embedded
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Absolute Security: Push the Reset Button Even After a Ransomware Wipe

              Upcoming Webinar Calendar

              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AD CS Protection Strategies for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/ad-cs-protection-strategies-for-enhanced-threat-prevention-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Safeguarding Data in the AI Era with DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-safeguarding-data-in-the-ai-era-with-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for 2026: Lessons from 2025’s Challenges
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-2026-lessons-from-2025s-challenges/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: asegurando datos sensibles de manera integral
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-asegurando-datos-sensibles-de-manera-integral/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/10/2026
                12:00 AM
                02/10/2026
                Transforming Secure Access Through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1802/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Solutions
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-solutions/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                • Jan
                  27

                  AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                  01/27/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    AD CS Protection Strategies for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Safeguarding Data in the AI Era with DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Jan
                          20

                          Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                          01/20/202601:00 PM ET
                          • Dec
                            10

                            The Next Generation of Managed Data Security Services

                            12/10/202501:00 PM ET
                            • Dec
                              02

                              The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                              12/02/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version