GITEX 2025: ‘You cannot protect what you cannot see,” says Tenable MENA Vice President Maher Jadallah

Tenable’s Maher Jadallah highlights cloud migration risks without security measures

Staff Writer
Staff Writer

Article summary

AI Generated

In an interview at GITEX Global Dubai 2025, Tenable's Maher Jadallah discussed the risks of cloud migration without security, highlighting control gaps and the need for misconfiguration protection and identity management. He stressed visibility and communication between security teams and executives are key to managing cloud security risks.

Key points

  • Tenable's Maher Jadallah highlights cloud migration risks without security measures.
  • Control gaps and misconfigurations pose threats when moving assets to the cloud.
  • Visibility and identity management are key to navigating cloud security risks.

Speaking exclusively with Lana at GITEX Global Dubai 2025, Maher Jadallah, Tenable’s Vice President for Middle East and North Africa discussed the risks organisations face when migrating to cloud infrastructure without security measures.

During the conversation, he addressed the control gap that organisations experience when moving assets to the cloud, noting that misconfiguration protection and identity management are essential to managing risks and achieving business continuity. He also highlighted the communication barrier between technical security teams and executives when discussing vulnerabilities with board members.

Jadallah stressed that visibility is a cornerstone of asset protection decisions. “It’s like using the ATM cards to withdraw money while having a vault to keep the money in the bank,” Jadallah said. “Everybody’s moving towards the cloud, but without security it’s a very risky journey.”

He highlighted findings from Tenable’s 2025 cloud and AI research on hybrid setups and AI workloads. “The minute the asset goes to the cloud, you lost control,” Jadallah said. “You need to make sure that when you put your assets to the cloud or you access cloud, you want it to make sure that those assets are safe.”

On identity management, he said: “You want it to make sure that the identities in the cloud, they have limited privilege in order to access that specific asset, because you don’t see it, it’s outside your control.”

He also explored how organisations prioritising visibility, identity management, and recovery speed are positioned to navigate cloud security risks through understanding business impact and continuous monitoring.

Advertisement