Rob Buller is an innovative entrepreneur, founder, and Managing Partner ofa revolutionary and reliable cybersecurity solution provider—Cyberhill. The company offers solutions that utilize AI and Machine Learning to develop a top-notch cybersecurity architecture. “One cannot eradicate a human error or a flaw that can jeopardize the organization’s functioning. However, one can be prepared and create a firewall to mitigate risks that include data attacks. Eventually, cybercriminals find a loophole that allows them to take advantage of any system using different tools or methods to cause mass disruption. With time, we must learn and educate ourselves to be one step ahead of these criminals and offer solutions that control and regulate data theft situations. We are currently at the Web4 stage, where AI, Machine Learning, and Quantum Cryptography play a significant role in the evolution of information technology. Harnessing this kind of technology makes it not invincible but attempts to be ahead of cyberattacks,” says Rob. He believes that as enterprises expand to the fringes, they need help across three primary areas: scalability, security, and endpoint intelligence. Cyberhill has three primary areas of discipline: Cloud (scalability), Cybersecurity (security), and Artificial Intelligence/Data Analytics (Intelligence). These disciplines are intermixed across his client base, so having expertise in AI within cybersecurity is one of his company’s specialties. He believes that compromised identities are involved in some capacity in every single cyber incident, whether it is ransomware, malware, system hacks, or many others.
Rob states that the companies need to realize Active Directory was invented 20 years ago and they must implement the solutions. He advises these companies to start with cleaning, auditing, and securing identities, as it will reduce threats to the organization significantly. Active Directory (AD) is a vital component of many network infrastructures and serves as the backbone for managing users, computers, and resources within an organization’s domain. Ensuring AD security is crucial to safeguarding against potential threats and vulnerabilities. Rob expresses that by embracing the Principle of Least Privilege, one can take the risk of unauthorized access and data exposure by limiting access to sensitive resources within Active Directory; also, they must implement Robust Password Policies, as strengthening authentication mechanisms helps prevent unauthorized access to user accounts and enhances overall security posture.
Rob Buller
Rob has contributed to the evolution of several technology-based ventures that have had a significant impact on the growth of industries. He is well known for being a serial entrepreneur who created multiple profitable businesses and made significant contributions to the ever-evolving cybersecurity sector. He is a pioneer in e-commerce and led the way in creating shop-online-pickup-at-store, i.e., Harris Teeter ExpressLanes and BedBathBeyond. He has laid the foundation for passwordless authentication utilizing machine learning. At his well-established venture, his modesty overpowers his caliber, as he claims to be a worker for his employees. He explains his job to put them in a position to succeed. He treats them like adults and does not measure keystrokes, but instead provides unlimited vacation and benefits befitting responsible adults. “We play as a team always!” declares Rob.
He started the company in 2006 with the motive to Manage Enterprise Software. Currently, Cyberhill is in 22 states of the US with 5 offices. It is a professional engineering services firm that implements complex enterprise software, typically for multi-national, multi-billion-dollar entities. It supports implementing packaged software solutions within the three pillars of the Internet of Things (IoT): Cybersecurity, Cloud, and Data Analytics. With over 700 complex cybersecurity implementations completed, Cyberhill is an established and trusted partner. It provides a proven implementation methodology with a team of high-quality service providers, including engineers, architects, project managers, analysts, and support staff. It offers cybersecurity solutions such as Identity and Access Management (IAM), Privileged Access Management (PAM), Cybersecurity Strategy (Roadmap), Complex Integrations, Implementations, and Managed Cybersecurity Services. It has implemented a privileged access management solution for one of the largest advertising firms in the world that has made a business out of acquiring other businesses. The enterprises were facing the issue of handling 285 domains, numerous data centers, on-premise data centers, and two clouds across the globe. To resolve it, Rob and his team had to create a Red Forest with zero trust and then implement the PAM. “That was only the beginning of a major cybersecurity integration journey,” Rob adds. Since then, it has deployed PAM globally across complex NOCs with a global set of sites and datacentres (cloud and on-prem) supporting a team of 300+ admin users and 500+ US hospitals that required access to on-site medical imaging systems. It also built a seamless backup of either cloud or on-prem to paired software in a DR site for a leading global PAM software firm. And deployed a PAM and integrated Vault into the PAM in Europe for a Top 5 Global Software company.
Rob explains that Thycotic Secret Server is a leading Privileged Access Management (PAM) software solution designed to manage and monitor privileged access to accounts and applications, alerting system administrators to high-risk events for cybersecurity. For better results, the company certifies its engineers in Cyberhill software partner solutions. As an example, it has certified Secret Server engineers and certified HashiCorp Vault and Terraform engineers. Rob says, “Every firm, regardless of the brilliant technical staff it houses, requires outside assistance to implement complex cybersecurity technologies. These technologies touch everything within an enterprise, and great care and experience must be present in order to guide a team through a successful implementation.”
"One cannot eradicate a human error or a flaw that can jeopardize the organization’s functioning. "
Future Entailments
Many enterprises find themselves in a position where they fail to meet the costs of cybersecurity implementations. It becomes a threat to them, as cybersecurity is a cost center that is subjected to cost-versus-security-need evaluations. If economic slowdowns occur in an organization, it will not be able to spend more on cybersecurity solutions to protect its sensitive data. This leaves a massive opportunity for malicious activities. This is an ongoing phenomenon, yet the cybersecurity sector is working to reduce the costs and implications to cater to all-size enterprises.
AI is taking hold in almost every aspect of industry. Rob says that in many ways, disruption is heading toward the cybersecurity sector. Platforms will begin to replace piecemeal cybersecurity implementations. AI is a requirement now within cybersecurity, and while some solutions offer this, they are typically rudimentary. Whereas large cybersecurity data lakes with generative AI cybersecurity solutions will begin to become the norm, Rob shares, “Quantum computing already exists in the market and is available on AWWS, Azure, and others.” Further out, the use of Quantum Computing’s Quantum Cryptography will exponentially accelerate the rate of cyber incidents and, thus, the rate of adoption and integration into existing enterprise cybersecurity stacks. But this will occur in 2030 and beyond.
Rob believes that implementing generative AI within the cybersecurity stack is paramount to the overall success of the enterprise security posture. The identities are the primary threat, and many of his company’s product partnerships revolve around fixing the Enterprise Identity issue. That issue is simply that many companies are checking the product boxes like SIEM, CIEM, CNAPP, XDR, and EDR and not spending time and money on fixing the identity issue.
The 5-Year Strategic Cybersecurity Roadmap
Cyberhill performed multiple system reviews and collected and analyzed various cybersecurity data focused on Active Directory, permissions and activity, GPOs, application lifecycle, vulnerability identification, architectural review, network diagram creation, internal documentation review, and a full PAM review against several maturity models (PAM, AD, etc.). By filtering the envisioned environment against their current environment, Cyberhill was able to create a GAP Analysis and outline a 5-Year Roadmap with associated 1-Year Program Plans. The underlying 1 Year Program Plan outlines projects including software, hardware, and resource costs and needs.
Following the changes the pandemic has brought about in the business world, organizations have significantly increased their use of data and the internet. This,...
10 Inspiring
Women in Security,
2022
“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
Read the magazine
On the...