As the CISO-in-Residence of YL Ventures, a cybersecurity-focused venture capital firm, Sounil Yu provides entrepreneurs first-hand insights into product development, customer needs and how global enterprises evaluate cybersecurity vendors and their solutions pre- and post-investment.
Executive Director, The Institute for Critical Infrastructure Technology
September 3, 2020
Joyce Hunter is the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), a nonprofit cybersecurity and technology think tank. There, she is responsible for building and executing ICIT's mission of improving national security, increasing public and private sector cyber resiliency, and modernizing critical infrastructures.
As Chief Cybersecurity Officer, Kurt John is responsible for overseeing the development and implementation of cybersecurity strategy in Siemens’ largest market, the U.S. In this role, he oversees the coordination of cybersecurity for the enterprise’s products, solutions, services and infrastructure utilized to deliver value to Siemens USA’s customers.
Director of Technology, Outsourcing and Privacy Fieldfisher
September 3, 2020
Paul Lanois is Director of Technology, Outsourcing and Privacy at Fieldfisher, a European law firm with practices in many of the world’s dynamic sectors. Lanois provides guidance on information governance, data protection, privacy, cybersecurity and digitalization.
Get to know James Carder, CSO at LogRhythm, who has more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies; protects the confidentiality, integrity and availability of information assets; and oversees both threat and vulnerability management as well as the security operations center (SOC). Carder previously led criminal and national security related investigations at the city, state and federal levels, including those involving the theft of credit card information and Advanced Persistent Threats (APT).
The National Institute of Standards and Technology (NIST) is looking for public and private sector experts to take part in an exercise that will evaluate the digital forensics community’s ability to conduct mobile- and computer-based investigations.
There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value. Read More
This month in Security magazine, we bring you our 2020 Most Influential People in Security annual report, where we highlight 22 industry leaders, their path to security, careers, goals and guidance for future security professionals. Industry experts discuss the evolution of ransomware, houses of worship security, cybersecurity standards, security careers in investigations and the unifying power of security. Diane Ritchey, past Editor-in-Chief, says goodbye and thank you to our readers.