editor ’ s note
ello and welcome
H to the latest edition of Intelligent CISO where we bring you a roundup of the trends and developments taking place across the cybersecurity space , globally . We hear from several industry experts who offer their best practice advice on hot topics of interest .
On the cover this month , Mike O ’ Sullivan , CTO at INFINOX , explains how its partnership with Cloudflare has resulted in enhanced visibility and a more secure defence posture – an area of high importance with there being a heightened demand for increased visibility across industries . Read this in more detail on page 51 .
An interesting discussion point this issue is Proofpoint and Cybersecurity at MIT Sloan ( CAMS )’ s report findings , which discovered that almost half of board members globally feel unprepared for a cyberattack . On page 18 , we delve deeper into the relationship between CISOs and the boardroom and how both parties can better align their business priorities .
This month , for ‘ Editor ’ s Question ’, I was intrigued as to what the modern day CISO is prioritising as cyber-risks continue to surge . Industry experts were keen to offer their input and we hear from Jonathan Bridges , Chief Innovation Officer at exponential-e ; Andrew Rose , Resident CISO , EMEA , at Proofpoint ; and Dr Gareth Owenson , CTO and Cofounder of Searchlight Security .
On page 36 , we cover the hot topic that is how next-generation email threats are pushing security to its limits . Toni El Inati – RVP Sales , META & CEE , Barracuda Networks , identifies 13 different types of email threats including the most challenging for users and security systems to detect which are Business Email Compromise ( BEC ), conversation hijacking and brand impersonation .
Another interesting angle of cybersecurity we cover this month is how biometric technology is revolutionising the identity space . An expert from Thales offers insight into the ways biometrics is being utilised across the technology landscape – whether it be in airports , banks or simply on an iPhone – and why it ’ s key to achieving world-class cybersecurity protection .
To round off , we ‘ Go Phish ’ with Karen Worstell , Senior Cyber Strategist at VMware , as we hear how she landed in her role and how she likes to relax and unwind outside the office . Find this on page 69 .
I hope you enjoy the read and if you ’ d like to contribute to any upcoming editions , please don ’ t hesitate to get in touch at alix @ lynchpinmedia . com
Alix Pressley Managing Editor issue 55 www . intelligentciso . com
5