Active Defense & Deception , Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime

Cybersecurity Leadership: The New Threat Landscape

CEOs and CISOs on How to Respond to Disruption, Distortion and Deterioration

Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.

See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry

Participating in the latest in a series of Information Security Media Group cybersecurity leadership forums are:

CEOS: Sahir Hidayatullah of Smokescreen and Lou Manousos of RiskIQ.

CISOs: Chris Roberts, a researcher and hacker; Kathy Wang of VeryGoodSecurity; Rebecca Wynn of [24]7.ai; and Anne Marie Zettlemoyer of Mastercard.

In the latest Cybersecurity Leadership panel discussion hosted by ISMG and CyberTheory, these CEOs and CISOs discuss:

  • Risks posed by disruption, distortion and deterioration;
  • The state of predictive analytics and active defense;
  • How to defend against AI-enabled phishing attacks.

Manousos is CEO and co-founder of RiskIQ. He is a recognized expert in Internet security and fraud prevention. He has been developing and delivering enterprise protection technologies for more than 15 years. As CEO of RiskIQ, he has spearheaded a new approach that helps Internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud.

Wang is an internationally recognized malware expert, having researched, developed, evaluated and operationalized solutions for detecting and preventing client-side attacks used by advanced persistent threat groups as they target common digital platforms. Wang brings digital security expertise accumulated over 20 years, most recently from her time at GitLab.

Hidayatullah is the co-founder and CEO of Smokescreen Technologies, a cybersecurity technology company. He is a serial cybersecurity entrepreneur, and his past ventures have investigated numerous high-profile data breaches with clients spanning critical infrastructure, global financial institutions and Fortune 500 companies.

Wynn leads all aspects of [24]7.ai's global enterprise cybersecurity, compliance, privacy and risk management programs. In this role at the customer service software and services company, she helps to ensure compliance and alignment with global industry standards and is responsible for leading and overseeing all aspects of the internal audit activities that encompass scoping, risk assessment, planning, execution and reporting.

Roberts, a virtual CISO, has founded or worked with a number of companies specializing in Darknet research, intelligence gathering, cryptography, deception technologies, security services and threat intelligence. He is an expert on counter threat intelligence and vulnerability research. He's a frequent speaker at industry conferences and has been interviewed by CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News and The Wall Street Journal.

Zettlemoyer is a cyber strategist with over 20 years of experience in eight industries. At the intersection of business, security and analytics, Zettlemoyer has served as a trusted adviser for Fortune 500 companies, government agencies, startups and think tanks. She now serves as vice president of security engineering and business security officer at Mastercard.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.