Speed Data: Tackling Federal Cybersecurity Challenges With AJ Forysiak

Building networks with military, civilian, and intelligence community leaders is just part of AJ’s day-to-day as the Business Development Executive for the Varonis Department of Defense team.
Megan Garza
2 min read
Last updated March 25, 2024
AJ Forysiak

Welcome to Speed Data: Quick Conversations With Cybersecurity Leaders. Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight in a rapid format for security professionals pressed for time.

This week, Content Editor Megan Garza spoke with Varonis’ own AJ Forysiak to glean insight into cybersecurity best practices in the federal sector. Building networks with military, civilian, and intelligence community leaders is just part of AJ’s day-to-day responsibilities as the Business Development Executive for the Varonis Department of Defense team. Read the full blog below to learn more about how AJ works with the government sector and his tips for understanding the most complex cybersecurity situations.

Fated for the federal sector

With a 20-year career in the United States Army, experience working in the Pentagon and for the Department of Defense, and previous roles in security military intelligence, AJ Forysiak is all about the federal sector. As the Business Development Executive for the Varonis FED team, AJ’s expertise and background in tactical missions serve him well in his day-to-day role.

“About 11 years ago, they were taking a lot of intelligence officers and transitioning them to cyber,” AJ said. “It was a natural fit; we do hunt-type missions in intel, and we’re just hunting in different ways in cyber.”

AJ showcases his vast knowledge of cybersecurity and government policies on his brand-new YouTube channel, AJ Talks Cyber. In his series, he discusses topics like safeguarding personal data, the risk of free-flowing information on social media, and how security policies can make the world a safer place.

“What got me excited about cyber was we could solve a lot of problems,” AJ said. “Take something like Zero Trust; there are plenty of ways to do that in the commercial space. Those are the things I talk about in my videos.”

The building blocks of cybersecurity

For someone as experienced and advanced in his field as AJ, you wouldn’t expect him to preach about the importance of fundamentals. But the complex nature of cybersecurity can seem daunting if you can’t simplify the problem into more manageable steps.

“I learned a valuable lesson early on in my career,” he said. “When you embark on something really challenging or very technical, you have to master the basics.

"Cybersecurity is a very technical and complex field, but when you start breaking down complex tasks into simple, bite-sized elements, it’s very easy to start tackling the problems we have in cyber. Master the basics, and then the bigger things will solve themselves."

With degrees and certifications from prestigious universities like Harvard, Brown, and Dartmouth, AJ has always enjoyed the technical side of data security.

“Getting into cyber was something I really looked forward to doing,” he said. But if he didn’t go that route? He’d be following in his brother’s footsteps overseas.

“What would I be doing if I wasn’t in cyber? I’d probably be in banking,” AJ said. “My brother lives in Vietnam — he’s in a very highly-regulated industry. He’s involved in investing, something that’s a secondary passion of mine.”

Watch AJ's full episode above or on our YouTube channel

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

gdpr:-pseudonymization-as-an-alternative-to-encryption
GDPR: Pseudonymization as an Alternative to Encryption
Have I mentioned lately that the General Data Protection Regulation (GDPR) is a complicated law? Sure, there are some underlying principles, such as Privacy by Design (PbD) and other ideas,...
speed-data:-the-importance-of-data-privacy-with-jordan-mcclintick
Speed Data: The Importance of Data Privacy With Jordan McClintick
Jordan McClintick, Director of Data Governance and Privacy for Optiv, Inc. talks about how his law degree helps him in his current role in data privacy.
australian-privacy-act-2022-updates
Australian Privacy Act 2022 Updates
A series of stunning data breaches in 2022 has prompted lawmakers to begin making changes to the 1988 Australian Privacy Act in the form of the new Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022.
browsing-anonymously:-is-it-really-anonymous?
Browsing Anonymously: Is It Really Anonymous?
What can tools like private browsing and VPNs really deliver in terms of privacy? See for yourself as we take a deep dive into popular privacy tools