Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceTop Cybersecurity Leaders

Special Report

Making the future safer

Chris Novak, Director, Threat Research Advisory Center, Verizon

By Maggie Shein
Novak cyber leaders
March 1, 2022

Chris Novak has a 20-plus-year track record of building and growing cybersecurity talent and successful teams. As Director of Verizon’s Threat Research Advisory Center (VTRAC), Novak has developed his current team to support both public and private sector clients across more than 100 countries with a truly global reach. The team provides a multitude of services, including digital forensics, incident response, cyber threat intelligence and penetration testing, among others. At Verizon, Novak also routinely leads the organization’s CISO Customer Advisory Board meetings, where he helps facilitate conversations between chief information security officers (CISOs) on important and timely topics.

Back when Novak first found himself designing and implementing basic security controls for organizations more than two decades ago, he found many organizations lacking security in their products, processes and operations.

After implementing firewalls and other security controls for organizations for a number of years, Novak learned about incident response and digital forensics. “There wasn’t a name to it then, but my colleagues and I realized that organizations around the world could benefit from these capabilities,” he says. “A lot of my early experiences were self-taught or learned together in a peer group since there weren’t many formal education opportunities in security back then.”

Teamwork and innovation helped Novak early on in his career, and he’s still a big proponent of teamwork within the industry today. “Cybersecurity is best operated and viewed as a team sport, as most of the problems and challenges are bigger than one person can solve. You need an army to be able to problem-solve and work through together,” he says.

Not only does teamwork help organizations create more mature, robust security programs, but Novak believes it also helps avoid burnout. “When you really create a team environment, it can help remove some of that stress from the individual. It doesn’t have to be all one person; everyone can benefit from having a team and knowing that there is always someone else there to step in, manage and help,” he says.

Part of creating strong teams is encouraging effective communication and, while critical to building a cybersecurity team — particularly a global cybersecurity team — it’s also one of the biggest challenges. “Everyone speaks differently, not just in language, but in how they communicate, and it’s critical to focus on how your team is communicating with one another to make sure that there’s no miscommunication which can lead to mistakes,” he says.

Novak’s impact on the industry goes far beyond Verizon and other organizations he has worked with during his career. He was one of the original authors of the first Verizon Data Breach Investigations Report (DBIR) going back more than 14 years ago, and he has continued to champion the well-respected report and others, such as Verizon’s Cyber Espionage Report and Insider Threat Report. According to Novak, the idea behind the creation of the DBIR was to present non-biased, research-driven analysis of data breaches and investigations, mirroring the concept of the National Transportation Safety Board’s Investigation Reports.

“It’s done in an unbiased way. It’s not about laying blame, but rather understanding what happened so we can make the future of cybersecurity safer as a whole,” he says.

Recently, in part, due to his contributions to the DBIR and work in the cybersecurity industry, Novak was appointed to the inaugural Cyber Safety Review Board (CSRB), created by President Biden’s Executive Order 14028. The CSRB is modeled after the National Transportation Safety Board and will meet in cases of significant cybersecurity incidents. “This is something I have dreamed about for years — to be a part of something that tackles the thorny issues of cybersecurity and really allows us to understand what happens when an incident occurs. From there, we can gain a level of insight that helps the whole industry move forward,” he says.

Novak is a firm believer that knowledge and intelligence can help enterprise and government cybersecurity become safer and more successful. In addition to his research work and appointment to the CSRB, Novak is also an active member of the cybersecurity industry, speaking at conferences, mentoring young professionals and offering insight, commentary and analysis on security topics to a wide range of media outlets, including CNBC, The Wall Street Journal, ABC and CBS. He earned a CISO certificate from Carnegie Mellon and holds his Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Payment Card Industry Forensic Investigator (PCI PFI) certifications.

He makes sure to carve out time to participate and speak at industry conferences, remains active on LinkedIn and industry platforms, and mentors the next generation of cybersecurity leaders to encourage others, while also doing his part to bridge the cybersecurity skills gap that exists today.

Novak helped start a formal cybersecurity internship program at Verizon, and he also provides guidance to other organizations on creating similar programs. He frequently participates in external mentorship programs, provides career advice and serves on the Ithaca College advisory board, giving insight to the college on its cybersecurity curriculum and student mentorship programs.

“I look at the cyber gap through two lenses,” he says. “One is very broad in the sense that the biggest concern is how do we get more people involved in this industry. There are just not enough people playing defense against the offense right now at a macro level, and it’s hard to win if you don’t have enough people. I try to encourage and mentor others, but I also think it’s important to talk about organizations changing their mindset. It’s important for the industry to have an open mind, looking for diverse candidates from a variety of backgrounds. Reevaluating what you are looking for in candidates and opening up the aperture is incredibly important. If you don’t do that, you miss a lot of great people out there. We need to take more chances on people and be willing to make investments.”


KEYWORDS: business continuity Chief Information Security Officer (CISO) cyber security diversity in security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jaffe leader profile

    Embracing challenges and making a difference

    See More
  • future workplace

    The case for security intelligence

    See More
  • West

    Inspiring the next generation of cyber leaders

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • databasehacker

    The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!