Some people run from change. Arun DeSouza of Nexteer Automotive runs toward it. "Now is my time," says the veteran chief information security and privacy officer, who shares his leadership and technology insights in this exclusive interview.
Today’s visionary executives know that having a strong personal brand can also have a big impact on the perception of their company brand.
Elon Musk, Jeff Bezos, Richard Branson, and Bill Gates are household names. So strong is their personal brand that it’s inseparable from their companies. Bezos is Amazon,...
By some estimates, there are more than 3,500 cybersecurity vendors, and the market is growing more crowded, noisy and competitive. How does one be the signal and not the noise? Six Israeli cybersecurity marketing executives share their passionate views.
Boeing CISO Howard Whyte started his job just as the world shut down to COVID-19. Since then, he's secured the workforce, ensured resiliency, grown his team and got to know peers, partners and board members - all from quarantine. In this exclusive keynote, he discusses:
Responding to 2020's challenges
Twitter has hired network security expert Peiter Zatko to serve in the newly created position of head of security following a series of high-profile cyber incidents. Zatko, known as "Mudge," gained fame as a member of the ethical hacking group "Cult of the Dead Cow" and worked for the government and Google.
Information Security Media Group's members-only CyberEdBoard CISO community has opened its doors, giving senior cybersecurity practitioners a private ecosystem to exchange intelligence, gain access to critical resources and enhance personal career capabilities in collaboration with peers around the world.
The latest edition of the ISMG Security Report features an analysis of the EU General Data Protection Regulation fines that have finally been imposed on Marriott and BA over serious data breaches each suffered. Also featured: Regional digital fraud trends, and a look at the CISO role and its responsibilities.
The imperative for CISOs during the COVID-19 pandemic is to do more with less. While disruptive attacks - as well as privacy concerns - keep rising, budgets are down. As organizations rapidly adopt new technologies, however, EY's Kris Lovejoy says CISOs must seize the opportunity to streamline.
Yes, a CISO must be technologist and a business risk leader. But more than ever, a CISO also must be a bit of a counselor, says Mark Eggleston, chief information security and privacy officer of Health Partners Plans, who puts mental health support atop his own list of key responsibilities.
He's been a police officer, a special agent, a CIO and a CISO. Don Cox has some ideas about cybersecurity leadership and what the CISO reporting relationship should be, and he shares them in this interview.
There's a saying at Rocket Software: "Legacy powers legendary." As vice president and CISO, Adam Glick uses training, technology and recruitment to get similar performance from his ever-evolving cybersecurity team.
She was deputy CIO at the White House and served as CISO at Xerox. Now, as deputy CSO at Mastercard, Alissa "Dr. Jay" Abdullah opens up on the accomplishments of her first year as well as new leadership techniques and strategies for refining talent and tools.
In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.
In this exclusive panel...
As CISO of the Federal Reserve Bank of Philadelphia, Nancy Hunter has a defined role and priorities. But she also has a refined sense of responsibility for collaboration, mentoring and creating new career opportunities for women.