Chief Information Security Officer

Is CTO Truly Above CISO? Sorting Out the Corporate Hierarchy

adcyber

I’ve seen it happen time and time again – the boss announces a new C-level position, and all hell breaks ...

Who is CISO of Geisinger? Meet the Cybersecurity Pro Protecting Patient Data

adcyber

I’ve been in the cybersecurity field for over a decade now, and I’ve seen first-hand the value of protecting sensitive ...

Who Leads Zoom’s Cybersecurity? Meet the CISO in Charge

adcyber

I’ve always been fascinated by technology and its seemingly endless possibilities. But as the world becomes increasingly interconnected, with more ...

What is IBM CISO? Defending Businesses against Cyber Threats

adcyber

I have seen the unimaginable damage that cyber attacks can cause to businesses. From financial loss to reputational damage, the ...

Who Guards the Gates? An Insight into the Head of Cyber Security

adcyber

I’ve seen it all- from sophisticated phishing scams to the successful execution of ransomware attacks. These threats can wreak havoc ...

What is the top cybersecurity role in the industry?

adcyber

I’m often asked what role is the most crucial in our industry. The truth is, there isn’t a one-size-fits-all answer. ...

Who Leads Honeywell’s Cyber Defense? Meet the Chief Information Security Officer

adcyber

nothing fascinates me more than knowing who’s in charge of securing a company’s information. After all, with cyber-attacks on the ...

Who is the CISO of Chevron? Uncovering the Protector of Energy Cybersecurity.

adcyber

I often find myself captivated by those who dedicate their lives to protecting the infrastructures we rely on every day. ...

Who is the CISO at USAA? Meet the Cybersecurity Leader Safeguarding Your Finances

adcyber

It was a crisp autumn morning when I had the pleasure of sitting down with the Chief Information Security Officer ...

Who was the first CISO in the world? Uncovering Cybersecurity History

adcyber

When it comes to the world of cybersecurity, most people focus on the present and future threats to their information ...