Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Curt Dalton - Embedding cybersecurity into the organization

By Maria Henriquez
5 mins with Curt Dalton
January 25, 2021

To effectively reduce enterprise risk, cybersecurity experts argue it's critical to fully embed cybersecurity in the enterprise-risk management framework and into the whole organization. Here, we talk to Curt Dalton, Managing Director and Global Leader of Protiviti's security and privacy practice, about the importance and the benefits of this practice.

 

Security magazine:  What is your background and title?

Dalton: I have been in information security for over 30 years. I began my career at Apollo Computer, the arch nemesis of Sun Microsystems, where I was a system and network administrator. There, I learned every flavor of Unix operating system, OS internals, and every flavor of networking technology and protocol from Thicknet, to IBM Token Ring, to Apollo Token Ring and every protocol imaginable at the time. It was a great environment for learning. A few years later, I helped to develop and implement one of the first firewalls – before most people knew if firewall was one word or two words. A few years after that, I developed an early Data Loss Prevention solution for a large technology company that was trying to determine the source of a spate of corporate IP theft. Soon after, while serving as the Security Practice Leader for a sizable consulting services firm, I co-authored a security architecture book that was published by Osborne McGraw-Hill and RSA Press. The book sold a substantial number of copies, and I used that bit of positive notoriety to found a security consulting firm, which I managed, grew and sold seven years later. I was then approached by an exciting startup company, Sapient, and became their first CISO. Several years later, I accepted the CIRSO role for the largest IT consulting company in China, which was recently acquired by a very large American PE firm. More recently, I have served in security consulting leadership positions, to where I am today at Protiviti where I serve as a managing director and the Global Leader of the Security and Privacy consulting practice.

 

Security magazine: How important is it to embed security into the organization as a whole? 

Dalton: Simply put, it is critical to embed security within the organization. Organizations that fail to take this seriously can find themselves facing heavy fines, lost customers and prolonged damage to their brand. Cybersecurity needs to be part of the organizational DNA. Leaders need to think about how they will create and encourage a security mindset across the organization, and make sure that mindset influences the what and how the organization does what it does. Baking security in and doing it from the start is nothing new. The essence of SbD (Security by Design) and PbD (Privacy by Design) is that security and privacy is considered and factored in from step 1. These approaches should become the hallmark of how an organization develops its applications, architects its networks, executes its business processes, and even pursues mergers, acquisitions and divestures, etc.

 

Security magazine: How can enterprise security leaders achieve this goal?

Dalton: Pay attention to the fundamentals, and to the details. With all of our expensive technologies in data detection, protection and response, most organizations continue to suffer from weak security hygiene. Do you know where your assets are, what they are used for, who uses them, what impact they will have to your business if they are no longer available, and are you backing them up and patching them? Are you logging security events, and do you have trained staff dedicated to identifying and responding to security events? If your organization does these things well, many of your risks will be alleviated out of the gate.

 

Security magazine: How can enterprise security executives maintain ongoing training and risk assessments?

Dalton: One of the most interesting things I’ve learned in recent years is that the bad guys actually collaborate better than the good guys, and that is a shame. They freely share information with one another to find the chink in your armor. Companies need to more fully leverage their ISACs and other peer to peer networking opportunities, and benefit from the information sharing that comes from these things -- yet many organizations remain reluctant to. By sharing information and collaborating more closely, your risk assessments and subsequent mitigations will be more focused, more thorough and that will translate to better reducing risk.

 

Security magazine: Can you detail what ongoing training and risk assessments should include? 

Dalton: The best ongoing training is tailored to people’s roles. Those in data protection should focus on trainings in data protection, while those in incident detection and response should focus on that domain, for example. Over the years, I’ve learned that my team’s hard skills benefit the most by leveraging our vendor partners. They are literally on the cutting edge of technological advancements, and keeping pace with their developments ensures the technical skill advancements I want are being addressed. On the soft skills side, I lean on a combination of sources, from Gartner, Forrester, SANS to others. Technology alone doesn’t address the challenges we have in cybersecurity. In fact, if that is your approach then you’ve left yourself wide open for a right hook. Your cybersecurity team needs to have both the soft skills and hard skills represented well to mount an adequate defense. Also, it is important to acknowledge that the cyber industry moves fast, so don’t wait for training programs to become available. You need to collaborate with your industry peers at conferences, at CISO roundtables, and other industry events – and regularly (all virtual at the moment, of course). This is how you’ll hear how your peers are tackling this or that challenge, and what pitfalls they ran into so you can try to avoid them.

KEYWORDS: cyber security privacy regulations risk management security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leader Souza

    Embedding cybersecurity into all organization levels

    See More
  • 5 minutes with Waskelis

    5 minutes with Todd Waskelis - Cybersecurity consulting during the pandemic

    See More
  • 5 mins with Kouns

    5 minutes with Jake Kouns - K-12 cybersecurity challenges during the pandemic

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing