Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity NewsArenas / Stadiums / Leagues / Entertainment

Special Report / Women in Security 2022

Women in Security 2022: Diana Pan, The Museum of Modern Art (MoMA)

Diana Pan, Chief Technology Officer at The Museum of Modern Art (MoMA), develops and oversees innovative cybersecurity solutions to protect MoMA’s assets from threats.

By Madeline Lauver
pan

Bio image courtesy Diana Pan © 2021 The Museum of Modern Art, New York. Photo by Peter Ross.

Background image courtesy of Dean Mitchell / E+ / Courtesy of Getty Images

July 1, 2022

Diana Pan didn’t intentionally enter the security field. Starting as a software engineer, she developed a passion for technology that led her to her current role, implementing and securing technology as the Chief Technology Officer at The Museum of Modern Art (MoMA) in New York City.

“What I love doing is building solutions, and I have followed different technologies over the length of my career,” Pan says. “As a software engineer, the first few things you’re taught are about security and how to secure the applications that you’re writing.”

Throughout her career, those foundational security lessons evolved into enterprise security across digital properties. As a solutions-oriented leader, Pan has built applications that benefit multiple industries, including in her previous role building educational apps for Scholastic, Inc., where she designed applications that complied with strict privacy laws in the K-12 sector.

Now, Pan and her team lead all technology initiatives employed by MoMA, from digital art installations to security technology. A large part of her role is directing the museum’s cybersecurity program, which started as a payment card industry (PCI) compliance mechanism and grew into the robust operation it is today. MoMA’s cybersecurity program has evolved to protect its assets and community around the globe, including cyber best practices, General Data Protection Regulation (GDPR) compliance and data privacy and protection.

Digital technologies play a large role in the museum’s history, and Pan has developed and overseen innovative cybersecurity solutions in order to protect MoMA’s cyber assets from threats. The cyber program at MoMA plays double duty, protecting both security and operational technologies as well as digital exhibits and works of art.

“My job falls across the board,” Pan says. “We don’t secure just one type of solution — we protect technologies that support our visitors, our members, our donors, our exhibitions, physical security, the building, and Internet of Things (IoT) solutions, as well.”

The first work of art that museum visitors experience when entering MoMA serves as an example of the museum’s digital exhibitions. “Echo,“ a site-specific commission by Philippe Parreno, is programmed to respond to outside and internal sensor data. “As soon as you enter the museum, you see this very technology-driven piece of artwork, so technology is deeply embedded in our collection and exhibitions,” Pan says.

In addition to supporting works like ”Echo,” Pan and her team work closely with MoMA’s physical security department, protecting and installing security technologies to maintain the safety of visitors, staff and assets. “Most recently, we’ve been focusing a lot on the use of machine learning and computer vision intelligence and how those technologies can further enhance our program,” Pan says.

Remaining on the cutting edge of technology is something Pan cherishes in her work, challenging her to solve interesting problems as technologies evolve. She helped drive MoMA’s early adoption of the cloud and mobile workflows, modernizing security and operations to enable the museum’s around 800 staff members to work from anywhere with a mobile device. According to Pan, “those were transformative technologies that we put in place that I’m proud of to this day. You could see the clear impact of the implementations — our staff didn’t need to be tethered to a desk.”

Pan’s passion for creating and protecting innovative technologies is one of the reasons her program achieves success even in challenging situations. As many organizations struggled to adapt to the remote and hybrid environments necessitated by the COVID-19 pandemic, MoMA’s proactive move to the cloud in the early 2010s helped save the cybersecurity team the headaches of cloud migration as employees worked from home.

Pan’s proactive cybersecurity strategy helps her focus on preventing new threats as they arise. One defense strategy Pan instills at MoMA is a strong security culture. “Our philosophy is that cybersecurity should be second nature for everyone,” she says. By developing and leading in-house awareness training, the cyber team helps reduce the risk of cyberattacks caused by human error. Museum staff participate in short- and long-form training, and the cybersecurity team distributes a recurring newsletter educating the organization on current threats.

“Our training is very, very continuous,” says Pan. “That type of training and helping everyone understand the basics of what they need to do, regardless of whether you’re at home or at work, is incredibly important.”

In addition to educating MoMA employees on cybersecurity, Pan also teaches technology and cybersecurity fundamentals at the Pratt Institute, a New York-based art and design higher education institution. “I love that the students I teach are more in the cultural and museum space than they are in technology,” Pan says. “I’ve been able to help them understand that you cannot ignore technology in your daily life, and yes, cybersecurity is actually a really important part of everything that you do.”

Incorporating cybersecurity into every aspect of her role isn’t an easy task, but it is one that Pan accomplishes with fervor. “At the end of the day, everything is very intertwined. And not only is it intertwined, but everything relies on having secure technology and maximizing its use, so you can get the most out of it,” she says.

KEYWORDS: business continuity risk management security leadership security management security operations Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Museum of Modern Art Modernizes Its Network Security

    See More
  • Unarmed Security Officer

    The role of unarmed security officers in active shooter response

    See More
  • athletes in competition

    Perimeter security strategies for The World Games 2022

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing