Futurecon - Dallas

CISOs Enable Business Growth With This Strategy

Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees connect unauthorized devices and applications to the network, leave unlocked computers unattended, or engage in other risky behavior. But what ... Read More

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or supplier is just one connected device or phishing email away from a security incident. That vulnerability puts your ... Read More
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive information and must be protected, but still made accessible to authorized users. Cyberattacks and data breaches are omnipresent ... Read More
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

For Healthcare CISOs, There’s No Risk Quite Like This Risk

One one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare, overwhelming healthcare providers’ ability to protect the data and the source of the data – patients. Steps taken, heart rate, ... Read More
Jake Margolis, CISO, Metro Water District for So. Cal

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery. But does buying the same basketball shoes as Steph Curry make us play basketball as good as he ... Read More
Frank Gillman, CISO, Lewis Brisbois

Until Hackers Give Up, CISOs Must Always Do This

In the early 2000’s, UPS advertised that they moved “at the speed of business.” The implication was business moves quickly and UPS accommodated businesses by moving quickly too. Logistics experts however aren’t the only ones that need to be nimble. CISOs also need to respond quickly to change. For a ... Read More
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

Modern CISO’s Don’t Say This Word Anymore

When it’s your job to limit risk, it’s understandable to be wary of anything new. It’s much easier to stick to the formula because it’s safe and predictable. In a competitive business environment, however, the company that avoids innovation falls behind. Nevertheless if a company adopts a new technology solution ... Read More
Jake Margolis, CISO, Metropolitan Water District of Southern California

What CISOs and Cat Herders Have in Common

What do CISOs and cat herders have in common? Both are good at herding cats. This may be an odd skill for a highly-skilled profession that couples technology with risk mitigation. But the CISO role is a people role first and foremost. CISOs work with department leaders across the organization ... Read More
CISO Perspectives with Jay Gonzales

Want to Aggravate Your CISO? Bring IoT Devices Onto the Network

Internet of Things (IoT) devices have evolved from consumer applications in smart homes to commercial applications in nearly every industry. With features like remote access/control, machine learning, and real-time analytics, IoT devices have the potential to dramatically improve business efficiencies. With IoT devices, businesses track energy usage, balance power generation, ... Read More