• Industry News
  • CXO Spotlight
  • AI
  • Enterprise Security
  • Cloud & SaaS

 Back to New Tab

How a Senior Telecom Engineer Spots Security Risks Hidden in 'Patchwork' IT

Island News Desk
October 7, 2025
Enterprise Security

Catharina Cerny, Senior Engineer at Verizon Enterprise Solutions, explains why existing security practices may not withstand future AI threats.

Credit: Outlever

Everybody's making a tiny patch here, a tiny patch there. But nobody really has the whole picture. Then, when gaps get overlooked or forgotten, projects fail. All due to a simple lack of communication.

*The views and opinions expressed by Catharina Cerny are her own and do not necessarily represent those of her former or current employers.

Enterprises stuck on AI may be caught in a web of their own making. Having created a patchwork of tiny IT fixes scattered across organizational silos, most face massive blind spots today. Now, some experts say the future of security and business resilience depends on an enterprise architecture that can untangle the complexity of systems and processes for a panoramic view. The challenge is especially acute in telecommunications, where evolving threat profiles are forcing providers to reevaluate their visibility into cybersecurity risk.

For a practitioner's perspective on the problem, we spoke with Catharina Cerny, Senior Engineer in Global Advanced Technology Support at Verizon Enterprise Solutions. With over 20 years of experience in network engineering, cybersecurity, and cloud solutions, Cerny's expertise blends a unique combination of deep engineering knowledge and modern threat analysis.

  • A patchwork anatomy: When businesses operate in silos, they create a 'patchwork' of solutions where no single person or team has a holistic view, Cerny explains. The result is a level of fragmentation she describes as an exponentially growing security nightmare. "Everybody's making a tiny patch here, a tiny patch there. But nobody really has the whole picture. Then, when gaps get overlooked or forgotten, projects fail. All due to a simple lack of communication."

According to the EY 2024 Telco of Tomorrow, senior telecom executives rank 'poor internal collaboration' as the second-biggest barrier to transformation, surpassed only by a lack of budget. But the patchwork approach also creates a dangerous false sense of security, Cerny says. Existing procedures might feel resilient, when, in reality, they're often an inadequate defense against the new generation of AI-driven threats. The vulnerability is especially critical in Cerny's industry, where 57% of telecom companies are concerned about the impact of security attacks.

  • The 20% that kills: Most systems can handle most incidents right now, Cerny continues. But soon, the exceptions will be catastrophic. "Most big companies aren't very flexible. They have their procedures, and in 80% of all cases, they get the job done. But in the future, they'll be lost. That 20% is what will kill them."

  • A trust barrier: Process is part of the problem, but the core issue remains a human one. More specifically, Cerny identifies the lack of communication as a symptom of a much deeper cultural deficit preventing critical information sharing across teams. The real problem is a trust issue, she says.

As one solution, Cerny proposes creating a task force to foster the very trust and communication that's missing. As AI-driven systems dissolve traditional organizational boundaries, enterprises must design new structures to eliminate the blind spots, she explains.

  • The seeds of change: Start by creating a dedicated, cross-functional team with members from all major departments (IT, security, HR, marketing, etc.), Cerny says. "Include people from every silo to exchange knowledge based on their different perspectives, backgrounds, and histories. Then, split their time 50/50 between the task force and their original teams to plant the seeds of change."

However, even the best task force is doomed without empowered leadership, Cerny cautions. Too often, CISOs are handed immense responsibility only to be sidelined in guidance-only roles. Without the direct authority to enact real change, most tech leaders face an impossible task, she explains.

  • A security checkbox: The power vacuum leads to performative 'checkbox security,' according to Cerny. But, in many cases, the illusion of safety is precisely what leaves the organization exposed. As an example, she describes disengaged security training. "It's not enough to check a box and say, 'Okay, everybody has security training, so we're fine.' No, that's by far not enough."

Already, the financial consequences are becoming more tangible. For example, Cerny explains how the threat of insurance agencies refusing to cover breaches due to negligence can be a powerful motivator for management to respond with more urgency. Nevertheless, a top-down approach will be essential for transformation, she concludes.

To help build the bridges currently missing, Cerny offers a final piece of advice for leaders: real change can start small. "Begin by appointing one person who is open, communicative, and can see other perspectives on each siloed team. Working together, they can lay the groundwork from the bottom up for cultural change on a larger scale."

Related content

Arizona State University CISO Makes Security a Business Function to Speed Research Safely

Lester Godsey, Chief Information Security Officer for Arizona State University, explains why the CISO role is evolving from a defensive gatekeeper to a strategic business enabler, and how modern security leaders can adapt for success.

Enterprise AI Becomes Critical Infrastructure as Gap Between Security and Governance Grows

Aaron Mathews, Global Head of Cybersecurity at Orion Innovation, explains why AI is becoming essential to business operations even though security and governance frameworks haven't kept pace.

Hindsight Comes at High Cost for Security Leaders as 'Bolt-On' Security Breaks Budgets in OT

Gernette Wright, IT Security Officer, Americas at Schneider Electric, on threats to legacy OT systems and failed human patches.

You might also like

See all →
Enterprise AI Becomes Critical Infrastructure as Gap Between Security and Governance Grows
Hindsight Comes at High Cost for Security Leaders as 'Bolt-On' Security Breaks Budgets in OT
How a Senior Telecom Engineer Spots Security Risks Hidden in 'Patchwork' IT
Powered by Island.
© ISLAND, 2025. All rights reserved