Access Management , Governance & Risk Management , Identity & Access Management
Cybersecurity Leadership: Identity, Access, Complexity
CEOs and CISOs on Dealing With the ‘Work From Anywhere’ ChallengeIn this era of "work from anywhere," identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.
See Also: Cloud Security and Developers: Role of Zero Standing Privilege
Participating in this latest forum are:
Robert Hill, CEO, Cyturus; Arun Singh CEO, Ilantus; Kim Green, CISO, Rodan + Fields; and Kathy Wang, CISO, Very Good Security.
In this panel discussion hosted by Information Security Media Group and CyberTheory, these executives discuss:
- Visibility into the endpoint;
- How to stop network snooping;
- Plugging the holes in application security.
Hill has spent over 30 years in IT working to reduce business risk through applied cybersecurity practices, programs and technologies. Prior to founding Cyturus, he worked as a cybersecurity consultant, serving as a frequent speaker on cybersecurity risk.
Singh joined Ilantus in October 2020 after serving as principal and Americas advisory risk leader for cybersecurity at Ernst & Young LLP. He has more than 25 years of experience in running global cybersecurity businesses.
Green has served in several executive and senior-level IT and infosec roles and as an adviser and investor at several security and healthcare companies. With over 25 years of experience in the private and public healthcare sectors, she has consulted with federal and state government healthcare agencies and private companies.
Wang is an internationally recognized malware expert, having researched, developed, evaluated and operationalized solutions for detecting and preventing client-side attacks used by advanced persistent threat groups as they target common digital platforms. She has over 20 years of digital security experience, including at GitLab.