Michael has been in the security/cyber security and incident response/forensic investigation and security software space for more than 20 years. He has been certified in endpoint security ...
For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, cloud infrastructure, and developer tools, is ...
Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and ...
Olivia Rose is an award-winning Cybersecurity leader and three-time global Chief Information Security Officer (CISO). Olivia Rose is the founder of the Rose CISO Group (www.rosecisogroup.com), a ...
Chief Technologist and Senior Director of Programs at CyberRisk Collaborative CEO at Computer Coach Training Center Suzanne Ricci, CEO at Computer Coach Training Center is an award-winning career ...
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has over 25 years in the security industry as a security company ...
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we ...
As the VP of CISO Memberships for the CyberRisk Collaborative Accelerator, Tom enjoys sharing awareness of all the resources the CRA provides, including the Acclerator Program. Tom has been ...
Brandon McCaffrey is a Solution Strategy Architect at CyberArk with 6+ years in the Identity Security space. Brandon works with the largest enterprises on their Identity strategy to limit risk ...
As a Program Manager for CyberRisk Collaborative, Melissa plays a key role in building a national community that strengthens the cybersecurity landscape through strategic networking and digital ...