COVID-19 , Governance & Risk Management , IT Risk Management

Cybersecurity Leadership: What's Your 180-Day Plan?

CEOs, CISOs on Authentication, Access and Defending the Hybrid Workforce
Clockwise from top left: Tom Jermoluk, CEO, Beyond Identity; Jackie Smith, managing director, Security Design, Charles Schwab; Gen. Keith Alexander, CEO, IronNet Cybersecurity; Kim Green, CISO, Rodan + Fields; Rebecca Wynn, CISO, [24]7.ai; Anne-Marie Scollay, CISO, Axiom

Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.

See Also: The Evolution of Email Security

Participating in Information Security Media Group's newest cybersecurity leadership forum are:

  • CEOs: Ret. Gen. Keith Alexander, CEO, IronNet Cybersecurity; Tom Jermoluk, CEO, Beyond Identity.
  • CISOs: Kim Green, CISO, Rodan + Fields; Anne-Marie Scollay, CISO, Axiom; Jackie Smith, managing director, Security Design, Charles Schwab; Rebecca Wynn, CISO, [24]7.ai

In this spirited video discussion, the panel addresses a variety of strategic cybersecurity issues, including:

  • The enhanced need for identity validation and authentication;
  • Defending networks without perimeters;
  • Critical technologies for defending the remote workforce.

As the founder, chairman, Co-CEO and president at IronNet Cybersecurity, Alexander provides strategic vision to corporate leaders on cybersecurity issues through development of technology, consulting and education/training. The retired four-star general had a 40-year military career, culminating as director of the National Security Agency and chief of the Central Security Service.

A longtime collaborator with Jim Clark, co-founder of Netscape, Jermoluk has served as president and COO of Silicon Graphics Inc., founding chairman and CEO of @Home Network, general partner at Kleiner Perkins and CEO of Hyperion Development Group. He also has founded nine companies, including Beyond Identity, HiCMOS, AOptix and SmartPipes.

Green, CISO at the manufacturing company Rodan + Fields, has served in several executive and senior-level IT and InfoSec roles, and as an adviser and investor to several security and healthcare companies. With over 25 years' experience in both private and public healthcare sectors, Green has consulted federal and state government healthcare agencies and private companies on security and privacy best practices.

As CISO at Axiom, Scollay leads the information security strategy for its products and services as well as corporation and governance risk and compliance. She specializes in building teams for mission-critical systems and seamlessly bridging the languages of technology and business. Prior to joining Axiom, she built and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multinationals

Smith directs the work of enterprise security architecture and security governance on the Schwab cybersecurity design team. In this role, she provides leadership and influences secure-by-design concepts that will lead to new capabilities for Schwab's IT security controls and risk management.

As global CISO and chief privacy officer, Wynn leads all aspects of [24]7.ai's global enterprise cybersecurity, compliance, privacy and risk management program. In this role at the customer service software and services company, she helps to ensure compliance and alignment with global industry standards and is responsible for leading and overseeing all aspects of the internal audit activities that encompass scoping, risk assessment, planning, execution and reporting.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.