Cybersecurity Leadership: Navigating Identity, Access, and Complexity

Insights from CEOs and CISOs on Navigating the ‘Work From Anywhere’ Challenge


In the current landscape where remote work is becoming the norm, identity and access management solutions face unprecedented challenges. Leading CEOs and Chief Information Security Officers (CISOs) have shared crucial strategies and solutions for enhancing cybersecurity. An expert panel recently convened to address these pressing issues.

This forum featured insights from Robert Hill, CEO of Cyturus; Arun Singh, CEO of Ilantus; Kim Green, CISO of Rodan + Fields; and Kathy Wang, CISO at Very Good Security.

During the discussion hosted by Information Security Media Group and CyberTheory, the executives delved into various critical topics, including the importance of visibility into endpoints, methods for preventing network snooping, and addressing vulnerabilities in application security.

Robert Hill boasts over three decades of experience in IT, focused on mitigating business risks through effective cybersecurity practices and technologies. Before founding Cyturus, he worked extensively as a cybersecurity consultant and frequently speaks on topics related to cybersecurity risk management.

Arun Singh has been with Ilantus since October 2020, after his tenure as principal and Americas advisory risk leader for cybersecurity at Ernst & Young LLP. He brings with him more than 25 years of experience managing global cybersecurity initiatives.

Kim Green has held various senior-level IT and information security positions while advising and investing in numerous security and healthcare enterprises. With a rich background spanning over 25 years in both public and private healthcare, she has collaborated with governmental and private organizations on security strategies.

Kathy Wang is a renowned expert in malware analysis, known for her work in creating solutions that detect and thwart client-side attacks targeting major digital platforms. With over 20 years of expertise in digital security, she has contributed significantly to the field, including her time at GitLab.

As organizations adapt to this new working paradigm, the panel underscored the critical need for robust cybersecurity measures. Techniques aligning with the MITRE ATT&CK framework, such as initial access, persistence, and privilege escalation, are increasingly relevant in understanding potential cyber threats faced by businesses. This knowledge is essential for business leaders looking to safeguard their operations in an evolving digital landscape.

Source link