Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Learning is a lifelong process and is something Jorge Mario Ochoa has certainly taken to heart. The cybersecurity leader complements his knowledge with master’s degrees in seven disciplines including leadership, business administration, project management, talent management, big data and data analysis, cybersecurity, artificial intelligence and deep learning, as well as a Ph.D. in psychology. Jorge Mario considers a well-rounded education an important tool for cybersecurity professionals. “I am a firm advocate for education and collaboration,”…

Read More

Ryan Field | Top Cybersecurity Leaders 2024

Ryan Field | Top Cybersecurity Leaders 2024

From protecting sensitive financial data to serving his country, Ryan Field has dedicated his career to cybersecurity, leading innovative programs to secure systems and develop the next generation of experts in the field. Ryan Field was hired into the security field straight out of college, working at PricewaterhouseCoopers (PwC) in IT Security assessments, including penetration testing. This inspired Field to pursue his master’s, wanting to learn more about cybersecurity. After attending Harvard, Field continued to…

Read More

Lessons from leaders: How security teams Foster Resilience and Support

Lessons from leaders: How security teams Foster Resilience and Support

With the security landscape ever-evolving, the resilience of security teams is an essential part of a cohesive and effective security program. As teams face constant challenges from safeguarding personnel, customers, buildings and information, security professionals today need to rely on more than just technical expertise. Here, enterprise security leaders share advice and valuable lessons learned from their time spent in the trenches of the security industry. Doug Alexander, Director of Security and Loss Prevention at…

Read More

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Security’s Most Influential People in Security 2023

Security’s Most Influential People in Security 2023

Security’s Most Influential People in Security 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Eric Vélez-Villar | Most Influential People in Security 2023

Eric Vélez-Villar | Most Influential People in Security 2023

Eric Vélez-Villar | Most Influential People in Security 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Preparing for the expected and streamlining risk management

Preparing for the expected and streamlining risk management

Preparing for the expected and streamlining risk management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Expanding the security candidate pool

Expanding the security candidate pool

Expanding the security candidate pool | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More
1 2 3 4 12