3rd Party Risk Management , Access Management , Business Continuity Management / Disaster Recovery

Advantage CISO: Why Cybersecurity Should Shine in 2021

Expel CISO Bruce Potter on How to Influence Strategy and Budget
Bruce Potter, CISO, Expel

It’s a good time to be a CISO. You have the board’s attention, and now you can use your position to ensure appropriate resources to tackle key challenges such as identity & access, cloud application security and third-party risk. Expel CISO Bruce Potter discusses how best to influence these decisions.

See Also: Overcoming the Unique Challenges Security Vendors Face in 2018

In a video interview recorded in advance of an upcoming virtual roundtable, Potter discusses:

  • How the global crisis helped put the CISO in a better position of influence;
  • The key to maintaining this influence;
  • Tech topics to focus on in 2021, including cloud, zero trust security and third-party risk.

Potter is Expel’s (expel.io) chief information security officer. He’s responsible for cyber risk management and ensuring the secure operations of Expel’s services. He also remains perpetually frustrated that employees pronounce CISO not-the-way-he-wants.

Previously, he co-founded Ponte Technologies, a cybersecurity research and engineering company that worked with organizations ranging from hedge funds to intelligence agencies. Potter sold Ponte Technologies to the KeyW Corporation where he served as CTO for two years.

To learn more about this event, please visit the registration page.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.