About Vasco Gomes


Global CTO for cybersecurity products, Distinguished Expert, Atos and member of the Scientific Community

Coming from an Information Technology engineering background, with 20 years’ of experience in information security, Vasco has helped many customers balance operational constraints versus acceptable business risks. In the recent years he has expanded this experience to help customers look into what the information security landscape might be in the next 5 years+ and best way to manage it. During innovation workshops, he shares with them some keys to anticipate the future shape of cybersecurity and maximize sovereignty over their most critical data.

Using those customer interactions and by continuously monitoring major technological trends, Vasco influences Atos cybersecurity services and products roadmaps, as well as partnerships, mergers and acquisitions.




Follow or contact Vasco


Articles posted by Vasco Gomes

What future for the security of communications?

No need to remind our readers that our world is going through an intense digitalization, only accelerated by the recent pandemic… And communications are at the heart of this digital transformation. Indeed, information continuously travels back and forth, between devices, objects and servers, in the shape of digits forming bytes, parts of packets and datagrams. In the “Future of…

The challenge of Cloud security

Migrating business elements to cloud services can deliver significant cost and efficiency gains for organizations of all sizes. The Cloud enables enterprises to reinvent their business models, forge better relationships with customers, take significant costs out of their operations and get successful innovations to market ahead of competition. But, while multiplying opportunities, cloud computing can also multiply risks. The rise of cloud…

Using the power of cooperation to defeat cybercrime

Philippe Letellier  ITEA Vice-ChairmanPierre Barnabé Senior Executive Vice-President, Head of Big Data & CybersecurityVasco Gomes Global CTO for cybersecurity products, senior expert and member of the Scientific Community Posted on: 9 June 2020 Cybercrime is an ever-growing issue in an expanding and increasingly accessible digital world, where any chink in the armor can be an Achilles’ heel for…

The mutation of Cloud Identity and Access Management

The mutation of Cloud Identity and Access Management IAM, a pillar of IT Security Identity and Access Management (IAM) is one of the oldest and most pervasive security controls. It is required for controlling who (user) or what (entity[1]) is trying to establish communication, for what purpose (read, write, modify…) and if it is entitled to. Whatever the…

Leveraging cloud: enhanced security in a multi-cloud environment

Cloud security has the boardroom’s attention and is preventing some organizations from benefiting from the full power of cloud computing. Let’s explore how businesses can increase trust in cloud technologies as the threat landscape evolves. Security in a multi-cloud environment Cloud computing sees your organizational data move beyond the traditional perimeter, expanding the attack surface. With…