3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Cloud Security

Automated Monitoring in the Cloud

Glen Hymers of Save The Children International on Implementing a Cloud-First Approach
Glen Hymers, global CISO and head of data protection, Save the Children International

Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.

See Also: Cyber Insurance Assessment Readiness Checklist

“Even though it’s not in our data center, it’s still our data and we have to understand what’s happening to it,” he says.

In a video interview with Information Security Media Group, Hymers discusses:

  • How the pandemic has impacted the role and expectations of the CISO;
  • Tools and technologies to reduce third-party risk;
  • Securing the cloud and other automation priorities in 2021.

Hymers became global CISO and head of data protection at Save the Children International in 2019. He has a background in policing and security, joining the RAF Police in 1998 where he worked in the counter intelligence unit. After leaving the RAF in 2012, he joined Fujitsu Defense and National Security as their head of operational security and risk management before moving to Sopra Steria as head of operational security for government accounts. Later, he served as CSO and then DPO at The Prince’s Trust.

About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.