Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufactu...

Channel:
Subscribers:
4,680
Published on ● Video Link: https://www.youtube.com/watch?v=cIwLtX5WEOQ



Duration: 0:00
2 views
0


The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.


Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.


During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.


The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.


Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.


This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.


Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.


The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.


Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.


This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.


Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.


The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.


Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.


Today, as healthcare systems, manufacturing facili...




Other Videos By ITSPmagazine


2025-09-25F-Secure Reveals: AI Will Predict Your Scams 3 Days Early | Cybersecurity prediction 2025
2025-09-25How F-Secure Transformed from Endpoint Security to Predicting Scams Before They Happen | A Brand ...
2025-09-25Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity ...
2025-09-25Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity ...
2025-09-25Why Cybersecurity Training Isn’t Working — And What To Do Instead
2025-09-21Un Mistero A Firenze | Una Storia Breve Scritta da Lucia & Marco Ciappelli (Versione in Italiano...
2025-09-21📚 Storie della Buonanotte per Bambini: Un Mistero a Firenze 🇮🇹
2025-09-18A Mystery In Florence | A Short Story Written By Lucia & Marco Ciappelli (English Version) | Stor...
2025-09-18A Mystery In Florence | A Short Story Written By Lucia & Marco Ciappelli (English Version) | Stor...
2025-09-17Why This Cybersecurity Executive Left Corporate to Start His Cybersecurity Company
2025-09-17Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufactu...
2025-09-17Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufactu...
2025-09-15✨ A Mystery in Florence 🇮🇹 | Magical Children Bed Time Story
2025-09-12The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | ...
2025-09-12The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | ...
2025-09-12The Problem With THREAT MODELING in Application Security and Why It Fails to Deliver
2025-09-12Post-Quantum Ready: How AQtive Guard Transforms Enterprise CyberSecurity Operations | 2025 Webinar
2025-09-10La Stanza dei Balocchi 🧸 Storia Magica per Bambini | Storie della Buonanotte ⭐ Per tutta la famiglia
2025-09-10The Toy Room 🧸 Magical Children's Story | Stories Under The Stars ⭐ Kids Bedtime Story
2025-09-09AI in Application Security: Why AI Creates More Noise Than It Solves | AppSec Contradictions Ep 1
2025-09-08We Have All the Information, So Why Do We Know Less? | Analog Minds in a Digital World: Part 1 | ...