~Akanksha Harsh

The calculus of risk in regulated industries has shifted decisively. Banks and pharmaceutical companies are now operating in an environment where a single mistake can cause ripples throughout the system and undermine public trust within hours. As a result, compliance schemes such as PCI DSS and ISO 27001 are now more numerous than ever. However, so are the areas of attack they are intended to protect.

What is arising is the concept of 'drug security,' a practice that treats the digital world with the same level of severity as controlled substances.  It is within this context that Fayyaz Ahmed has spent more than two decades architecting networks for the world's most tightly regulated environments.

As Ahmed puts it: "Security measures can't be designed in a vacuum. For example, at the bank where I played an integral part in protection, our core banking system ran on a RISC-based, legacy, closed system that had been the backbone of banking operations for decades and couldn't be swapped out overnight. With the heightened issues financial companies face today, something had to be done.

“In fact, any security proposal, no matter how technically sound, has to account for that reality. You need the C-suite's backing and years of planning because every single application talks to that core. A purely theoretical security fix can break an entire enterprise." 

Practicality and pragmatism, rather than ideological or theoretical approaches, have defined Ahmed’s career.  And it is this philosophy that would go on to define the foundation of his work in large-scale enterprise environments.

Building the Architecture Baseline

From the early 2000s until the mid-decade at Emirates Computers, Ahmed earned the prestigious Cisco Certified Internetwork Expert (CCIE) certification in 2004. This credential, often described as a PhD of networking, remains the industry's gold standard for network engineering expertise.

His focus was on migrating government institutions, the oil and gas industry, and financial institutions from flat network topologies to multi-layered network topologies.

These years were the foundation for his most significant period at Abu Dhabi Islamic Bank (ADIB), where Ahmed spent 13 years in charge of network infrastructure at 85-90 branches, international operations in the UK, Qatar, Saudi Arabia, Sudan, and Iraq, and tens of thousands of ATMs and point of sale terminals.

He managed more than 20 engineers and ensured that the infrastructure was aligned to the Payment Card Industry Data Security Standard (PCI DSS) for payment transactions and Society for Worldwide Interbank Financial Telecommunication (SWIFT) standards for financial messaging. It was during this period that the company reduced its fixed telecommunication costs by more than 25%, from more than 70 million AED (approximately $19 million USD) to less than 50 million AED (approximately $13.6 million USD), while expanding the bank's footprint.

Ahmed standardized network equipment and implemented back-to-back maintenance agreements to tightly manage the asset lifecycle, as well as optimize CAPEX and OPEX. To ensure consistency and security across the entire network, Ahmed also established baseline configuration standards for routers, switches, wireless LAN controllers, and firewalls. He then designed a modular, high-availability, seven-layer network architecture for the data center, headquarters, and call centers, eliminating single points of failure for all three locations.

He then overhauled the bank's core switching, routing, and encryption to eliminate performance bottlenecks and single points of failure, while also designing a layered, risk-based defense for its network perimeters.

Currently, as a Manager in Cybersecurity Advisory Services at PricewaterhouseCoopers (PwC), his activities have focused on assessing security posture and designing and implementing advanced security solutions in an enterprise environment.

It was during the lockdown period that he upgraded the network infrastructure and platforms, enabling the company to rapidly adapt to the shift to remote work, which was not anticipated at the time. As part of the overall cloud and SaaS adoption, he also implemented Direct Internet Access (DIA) with a cloud proxy, significantly improving user experience while maintaining strong security controls. 

Other achievements include software-defined networking solutions that use software rather than traditional hardware, enabling greater flexibility in network connectivity. Moreover, Next-Generation Firewalls (NGFWs) offer deeper security capabilities than traditional firewalls, including deep packet inspection, intrusion detection, and application-level awareness. And Vulnerability Management solutions go deeper by continuously identifying, classifying, and managing security weaknesses.

This is all done in accordance with well-established security frameworks, such as the National Institute of Standards and Technology (NIST), the ISO 27001 standard for information security management systems, and the IEC 62443 family of standards for the security of industrial automation and control systems. 

Ahmed states: “Yes, the scope has most definitely increased. But there is no doubt that the underlying philosophy has remained the same. Security needs to serve the business and not hinder it.”

He says his love for the industry has never wavered: "Networking has been my bread and butter for the past two decades or so. But it's the evolution that has kept it exciting. The fundamentals I learned for my CCIE are still the same; however, we're now applying them to cloud architectures, OT environments, and AI-based security solutions. Every new project is a chance to solve a puzzle I haven't seen before."

Deconstructing “Drug Security”: The Technical Pillars

Ahmed explains: "The principles I learned earning my CCIE in 2004 are still the bedrock, but the execution has changed. We've moved from simple IPS/IDS systems that could dynamically update a firewall config to block an attack, to today's world of Secure SD-WAN and SASE. It's about embedding intelligence into the network fabric itself."

Ahmed reveals his blueprint for the bank that was such a success, explaining how technologies like Software-Defined WAN (SD-WAN) allowed him to centralize control and use any available connection: "The network was transformed from traditional, flat architectures to layered, modular network ones that could prioritize traffic and enforce network security policies in real time. It fundamentally transformed performance and security outcomes."

His expertise was later applied at a Dallas-based financial institution with branches across the Midwest, where he led a Fortinet-based network transformation across 65 retail branches.

Central to Ahmed’s vision is the integration of software-defined networking with Secure Access Service Edge (SASE). Technologies he champions to replace brittle MPLS/ATM/ISDN setups with dynamic, cloud-agnostic networks. For Ahmed, the shift to Secure Access Service Edge (SASE) was integral to extending the software-defined network, enabling networking and security services in a single, cloud-based framework.

Highlighting the value for financial services institutions, he adds: “Legacy systems are like outdated vaults—functional but frail. In finance, where data is the new currency, we must evolve to ‘drug security’ paradigms that treat information as a controlled substance, safeguarded against theft or tampering.”

The importance of that shift cannot be overstated. In banking and pharmaceutical operations, employees are scattered across hundreds of branches, remote offices, and cloud applications.

Ahmed says: “Traditional hub-and-spoke models forced all traffic back through central data centers, creating latency, single points of failure, and compliance headaches during audits. SASE eliminates those bottlenecks by delivering zero-trust security at the edge, enabling consistent policy enforcement regardless of the user's or device's location.”

He adds: “The ability to enforce policies across distributed environments, whether users are in a branch, remote, or accessing cloud services, while maintaining compliance with regulatory frameworks such as SOC2 and NIST 800-53 is so important.”

Network Segmentation and Zero Trust

The traditional network security approach is based on a castle-and-moat approach. This is where the traditional network is well protected on the outside, but once inside, users are free to roam.

However, as cyber attacks become increasingly complex, this approach is no longer sufficient. Because a set of credentials may now provide access to the entire network. 

Ahmed says: "As organizations grow, they must move away from flat networks. You need proper segregation of duties—maker, checker, reviewer—and technical segmentation. It's about containing the 'blast radius.'If an incident occurs, you want it contained, not rippling throughout the entirety of the IT and OT infrastructure."

This is exactly what Zero Trust Architecture is based on: no user and no system is trusted, whether inside or outside the network perimeter. Network segmentation is one way to implement Zero Trust Architecture. In other words, the network is carved up into separate areas that are completely sealed off from one another.

Ahmed's approach to network segmentation has reshaped how financial institutions worldwide view internal security.

By using micro-segmentation with VMware NSX-T, which is a network virtualization solution that enables security policies to be implemented at the individual workload layer without regard to hardware, and next-generation firewalls in the ISTP security transformation, he has been able to move beyond traditional security approaches that are based on protecting the perimeter of an organization and instead implement a model where workloads are segregated and the 'blast radius' of any potential security breach is contained.

This model now underpins modern zero-trust architectures in heavily regulated environments, and he has been at the forefront of preventing breaches that cascade across domains.

In operational technology environments, Ahmed applies IEC 62443 standards to ensure industrial systems are equally protected: "The gap between security theory and operational reality is where most failures happen. I've seen security professionals propose changes that look perfect on paper but would bring down a core banking system because they didn't understand how deeply legacy systems are integrated. You can't just read a standard and implement it—you have to understand the business first." 

Cloud Integration and Hybrid Architectures

As applications and data are moved to the cloud, so must the network architecture. Data center-centric network architectures are not well-suited to cloud environments, leading to issues with latency, security, and management.

A hybrid architecture aims to bring together traditional and cloud infrastructure. This enables the organization to retain control over its data while also leveraging the scalability of cloud computing.

It is also important to understand that business priorities must align with the technical architecture.

Ahmed explains: "A major challenge is translating security postures into business language. The question that clients have is: ‘What is my maturity level? Am I a 3.2 or a 4.1? And how do we get to a 5?’ My approach is to always back recommendations with references—whether they're NIST standards or principal vendors like Palo Alto or Cisco. That gives the C-suite the proof they need to make informed decisions."

The aforementioned numbers relate to the Capability Maturity Model, in which the organization is scored on a scale of 1 (initial/ad hoc) to 5 (optimizing). A score of 3.2 indicates that the process is defined but not quantitatively managed, while a score of 4.1 indicates that operations are measurable and controlled.

Ahmed has also deployed Direct Route with MACSEC encryption, a security protocol that provides hop-by-hop encryption at the Ethernet layer. This ensures that the data is protected during transit. Azure ExpressRoute is a dedicated private network that provides a direct connection between the organization’s infrastructure and the Microsoft cloud, bypassing the public Internet.

These solutions enable the organization to retain control over its data while still leveraging the scalability of cloud computing.

In regulated environments, such architectures must satisfy various compliance requirements. These include SOC 2 audits, which are in-depth examinations of a service organization’s controls for security, availability, processing integrity, confidentiality, and privacy.

Ahmed’s methodology, based on standards and vetted by vendor best practices, delivers a proven blueprint for success amid these complexities.

He reveals: “When I walk into a client meeting, I don’t just bring opinions—I bring evidence. Whether it’s a NIST control or another reference architecture, I want the C-suite to see that all recommendations are grounded in something they can validate. That’s how you build trust, especially in an industry where the stakes are highest."

Global Footprint, Local Resilience

Ahmed’s work extends beyond individual organizations, shaping global infrastructure. His influence extends globally through his work designing and building a Global APN for point-of-sale machines across foreign government offices worldwide. This infrastructure enabled secure, centralized collection of government fees across continents, illustrating how robust network design can support national interests and international diplomacy.

Closer to the industry, his success in scaling ADIB's point-of-sale business to over 40,000 terminals—making it a top-five player in the country—while simultaneously slashing fixed telecom costs by more than 20%, set a new benchmark for operational efficiency in the region's banking sector.

In March 2016, severe flooding in Dubai inundated a data center during peak business hours. Thanks to Ahmed's meticulous Business Continuity Planning (BCP) and Disaster Recovery (DR) planning—ensuring that critical systems could be restored quickly in the event of an unexpected outage—core banking and customer-facing operations were restored within two hours.

Ramprasath Sadasivam, a Principal Infrastructure Engineer, recalls: "I have had the privilege of knowing and working closely with Mr. Ahmed for 12 years. He designed and built the Global APN for the organization, deploying POS systems globally at all foreign government offices worldwide. During the March 2016 flood, our Data Center faced a disaster recovery crisis. Ahmed's meticulous BCP and DR planning ensured we recovered successfully without major business impact."

Ahmed undertook a complete data center transformation, modernizing the LAN with Cisco Nexus switches and migrating over 300 business applications. Using Cisco OTV for Data Center Interconnect, Ahmed achieved the migration in record time without disrupting the business, demonstrating the capability of modern network architecture to support the business rather than hinder it.

Syed Fahimuddin, ex-VP of IT Infrastructure and Operations, adds: “Even under high pressure and tight deadlines, he remains composed, leads from the front, and is always available to support the team. His disciplined approach helped the organization maintain strong compliance and achieve successful audit outcomes from the regulators."

What is perhaps more remarkable, though, are the engineers Ahmed has inspired.

A senior network engineering leader recalls: "Ahmed was selected from a group of candidates and stood out because of his knowledge and experience as well as his professionalism. He built for himself a reputation for reliability and expert knowledge across the IT organization. We all became better engineers as a result of having worked alongside him."

For Ahmed, it’s all about building the next generation: “I've always believed that my success is measured by the people I develop. If someone on my team is good enough to take my role someday, then I've done my job—and I'll move on to the next challenge. We built what I consider the strongest team I've ever been part of, and that wasn't an accident. It came from giving people real responsibility and supporting them when it mattered."

The Credentials Behind the Architecture

Ahmed's standing in the industry is reflected in a career-long commitment to mastering its highest benchmarks.

He holds the Cisco Certified Internetwork Expert (CCIE) as a Lifetime Emeritus (certificate #14258), a credential often described as the "PhD of networking." As his focus expanded from pure networking to enterprise and industrial security, he earned the Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), and Global Industrial Cyber Security Professional (GICSP) certifications.

His ability to align security with business goals is further informed by the SABSA Chartered Foundation framework. Ahmed is also an active member of the IET, ISACA, ISC2, and the Association of MBAs.

While he has received awards like "Most Valuable Professional" at Emirates Computers and multiple honors at ADIB, he points to the consistent, successful delivery across challenging environments as the true measure of his work.

Strategic Insights for the C-Suite

What does Ahmed’s experience tell us about managing security complexities in a rapidly changing world?

He shares: "You know security measures cannot be designed in a vacuum; you have to consider operational realities. A purely theoretical fix can break an entire enterprise."

Equally critical is the ability to communicate risk in terms that resonate with business leaders. As Ahmed demonstrated in his cloud security work, translating technical postures into measurable maturity levels—and backing every recommendation with references to established standards—gives the C-suite the proof they need to make informed decisions.

In regulated industries, compliance is often treated as the end goal. Ahmed's work suggests otherwise. For example, security frameworks such as PCI-DSS, SWIFT, NIST, and ISO 27001 are foundational and must be implemented; however, in order to maintain operations in adverse conditions, a more comprehensive and integrated approach must be taken to include security in architectures, segmentation to limit threat propagation, and leveraging cloud technologies without sacrificing control.

Operational continuity must be a core requirement: "My philosophy has always been to know about an issue before the user does. If a branch network went down at 2 a.m., we had hours to fix it before the first employee arrived. In regulated industries, that isn't a luxury—it's a baseline requirement."

He further adds: "At the end of the day, what I want from my clients is that they should be able to call me when things are at stake and not just because I have a long list of answers at my fingertips that I can recite by heart. It’s because they know that I will get them to the right answer and back it up with something real. In this business, your reputation is only as good as your last recommendation; therefore, I ensure that each and every one of my recommendations counts."

Ahmed has demonstrated how these principles translate into practice, ensuring the systems on which modern economies depend remain secure, compliant, and operational.

About the Author: Aakanksha Harsh is a business and technology writer covering digital innovation, startups, and industry trends.