Sign in to view Khalid’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
McKinney, Texas, United States
Sign in to view Khalid’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
5K followers
500+ connections
Sign in to view Khalid’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Khalid
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Khalid
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Khalid’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Articles by Khalid
-
CIOs: Prepare for digital transformation with 6 paradigm shifts
CIOs: Prepare for digital transformation with 6 paradigm shifts
I recently had the privilege of conducting many CIO interviews as part of Deloitte’s 2018 Global CIO Survey. In this…
52
11 Comments -
Manifesting Legacy – Invitation to join the researchJan 10, 2018
Manifesting Legacy – Invitation to join the research
After months of preparation, I am happy to announce that Deloitte’s 2018 Global CIO Survey is now open for CIOs and…
23
2 Comments -
Three key capability gaps for CIOsJan 14, 2017
Three key capability gaps for CIOs
Successful CIOs are experts at reading the tea leaves and anticipating the future direction of the business. This gives…
22
4 Comments
Activity
5K followers
-
Khalid Kark shared thisHeading home from Cloudflare Immerse Houston deeply energized. While I had the privilege of sharing Cloudflare’s mission and vision and leading a customer panel, the true highlight was listening to and learning from the collective insights shared over the past two days. The conversations confirmed that we are no longer just connecting applications; we are governing the inherent intent of a machine-speed digital ecosystem. Here are my takeaways: 1. Agentic is a Revolution, Not an Evolution. Agentic AI enables building applications at the speed of thought. The unprecedented speed, scale, and scope require more than new technology, it requires a fundamentally different operating model and mindset. 2. AI Governance is Now Non-Negotiable. The era of hiding behind basic hygiene is over. Modern, hyper-targeted attacks make robust AI governance an absolute prerequisite for success. 3. Decouple Dependencies to Minimize Blast Radius. The new mandate is decoupled resilience. To manage systemic risk, organizations must architect systems that can contain failure within a specific segment, limiting any compromise within the transaction window. 4. The Internet is the New Enterprise Edge. The datacenter wall is irrelevant. This reality demands a shift toward an architecture, where policy, identity, and security are enforced on one integrated global level to ensure localized authority without cascading disruption. 5. The Success Mandate: Consolidation & Context. Success will belong to organizations that operate masterfully at speed and scale. This requires a composable tech stack that reduces complexity and synthesizes high-fidelity signal into actionable intelligence, rather than managing a fragmented stack. Michelle Mezger and Michael Tarsha did an awesome job moderating the event and our Todd Murray, Humair Ahmed, Ayush Kumar, and Warnessa Weaver delivered compelling presentations digging deeper into these topics. Special thanks to Zach Phillippe (Deputy CISO, Memorial Hermann) and Whit Armstrong (CISO & VP, Landry’s - Fertitta Entertainment), for sharing their invaluable insights. The event would not be possible without the relentless focus on John Meyer, Joe Felz and our awesome events team. Thank you all! #CloudflareImmerse #HoustonTech #Resilience #CSuiteLeadership #AI #ZeroTrust
-
Khalid Kark shared thisIt is awesome to be hosting our annual Trust Forward Summit by Cloudflare at RSAC 2026. We’re gathering the brightest minds in cybersecurity, AI, and tech to reimagine what "trust" actually looks like in an AI-driven world. Here is the incredible lineup of sessions: 🎤 Leading Beyond Certainty - - Trust and Strategy for an Unpredictable World. 🦾 Taming the Algorithm – Governing AI as a Core Business Risk 🤖 Trust at Machine Speed – Humans Are No Longer in the Loop 🔗 Shadow Supply Chains – 3rd / 4th-Party Risk in a Hyperconnected World 📡 Signals of Intent – The Future of Threat Intelligence 🪤 The Debt Trap – Why Tech Debt Is Becoming a Systemic Security Risk 🎯 Designing Trust for 2026 and Beyond This is a conversation you won’t want to miss! Spots are limited - register below to join us: ⤵ https://lnkd.in/gUMFu5sR #RSAC2026 #Cloudflare #TrustForward #AIGovernance #CyberResilience Ramy Houssaini Michael Goodman Menny Barzilay Tim Brown Katherine Kuehn Oliver Newbury Jerry Perullo Joe Sullivan Dave Trader Sandip Wadje Michael Goodman Troy Wilkinson Grant Bourzikas Stephanie Cohen Mark Hughes Farooq Sheikh 🔐Dr Kevin Jones David Drossman Jeffrey Samuels Liz Morton
-
Khalid Kark shared thisIf you’re in Vegas for AWS re:Invent, we’d love for you to join us at Cloudflare’s Trust Forward Summit. Cybersecurity, AI, and technology leaders will be sharing how they’re delivering real business value while maintaining trust in an AI-driven world. I’ll be hosting a session on how organizations can move faster and innovate responsibly—without compromising safety, security, or integrity. Seats are limited. Register here:https://lnkd.in/gWDfD7rh
-
Khalid Kark shared thisTechnology leadership is entering a new era—where AI accelerates innovation and amplifies risk in equal measure. Inspiring to see the conversations shifting from managing change to mastering it. Join me at Gartner IT Symposium/Xpo™ for The Catalyst Playbook: Redesigning Digital Foundations for Business Growth — a pragmatic look at how CIOs, CTOs, and CISOs can turn AI, resilience, and agility into real business outcomes. #GartnerSYM #DigitalTransformation #AI #Resilience #Leadership #CloudflareKhalid Kark shared this🚨 Join us at Gartner IT Symposium/Xpo™ 2025 in Orlando! Digital is no longer just an IT initiative—it's the backbone of business growth. As transformation accelerates, CIOs, CTOs, and CISOs must work together to build AI-powered, resilient, and adaptable platforms. In this session, we’ll share a pragmatic playbook to help tech leaders: ✅ Drive agility and monetization ✅ Architect responsible AI integration ✅ Build resilience and trust ✅ Enable faster innovation and better customer outcomes Let’s shape the future of business through bold, foundational change. Don’t miss it! #GartnerSYM #DigitalTransformation #AI #CIO #CTO #CISO #TechLeadership #Innovation
-
Khalid Kark shared thisExcited to be hosting multiple events at Gartner IT Symposium/Xpo™ next week! If you’re attending, let’s connect — message me or grab a slot using the link below. https://lnkd.in/eGwNQBxN Let’s build a faster, safer, and more connected digital future — together. #Cloudflare #GartnerSYM #Techleadership #CIO #CyberSecurity #AI #ZeroTrustKhalid Kark shared this🚨 Heading to Gartner IT Symposium/Xpo™ 2025 in Orlando? Come meet Cloudflare at Booth #745! ✅ See in-depth demos of our latest platform capabilities ✅ Explore how we’re helping organizations build faster, safer, and more reliable digital experiences 🎁 Plus—enter for a chance to win exclusive prizes! 📍 Booth #745 Whether you're looking to modernize your network, secure your applications, or harness AI at the edge—we've got you covered. For more information click here: https://lnkd.in/eGwNQBxN #Cloudflare #GartnerSYM #CyberSecurity #AI #Networking #ZeroTrust #Performance
-
Khalid Kark shared thisWhat do AI, third parties, and regulators have in common? They all want to keep you up at night. 😊 I teamed up with Jeff Gatz from Kyndryl to take on this exact challenge. In our new article on theNET, we lay out 6 must-do priorities to help you stay ahead of disruption—and maybe even get some sleep. If you're in the business of keeping the lights on (figuratively or literally), give it a read 👇 https://lnkd.in/gmDfpa2s #AIthreats #resilience #businesscontinuity #CIOlife #Cloudflare #theNETKhalid Kark shared thisIt’s time to build a new strategy for maintaining business continuity in the face of emerging AI threats, third-party risks, and shifting regulations. In the lateset article on theNET Field CIO Khalid Kark and Jeff Gatz, Kyndryl’s VP of Alliances share 6 priorities for addressing threats and preventing operational disruptions. Click the link below to read the full article 👇 👇 https://lnkd.in/gmDfpa2sCyber resilience strategies for business continuityCyber resilience strategies for business continuity
-
Khalid Kark shared thisEpisode 3 of Security Signal is live! I had the pleasure of hosting Jeff Gatz, VP of Alliances at Kyndryl, for a sharp and timely conversation: “Resilience Reimagined.” Let’s be honest—most resilience strategies would struggle to survive a stiff breeze, let alone a cyberstorm. With third-party risks escalating, compliance evolving, and geopolitics getting spicier by the day, it's clear the old playbooks won’t cut it. We unpacked: ➡️ Why legacy frameworks are overdue for retirement ➡️ How to scale full-stack resilience across tech and teams ➡️ Why supply chain security can’t be a blind spot anymore If you’re still planning for recovery after impact, you’re already behind. It's time for resilience that bends, adapts, and stays ahead. Catch the episode here: https://lnkd.in/gaJZH5WP Would love your take. #CyberResilience #SecuritySignal #Cloudflare #Kyndryl #RiskManagement #SecurityCulture #LeadershipSecurity Signal Resilience Reimagined | CloudflareTV - Cloudflare TVSecurity Signal Resilience Reimagined | CloudflareTV - Cloudflare TV
-
Khalid Kark shared this🚨 Security Signal Episode 2 is live! This time, we’re diving into Adversarial AI—because let’s face it, the threat landscape just got a lot smarter (and faster). I sat down with Daniel Kendzior (Global Data & AI Security Lead, Accenture) and Mike Hamilton (CIO, Cloudflare) to unpack how AI is being weaponized by attackers—and how leaders can use AI to fight back. My take: Defending against AI without AI is like guarding your organization with a slingshot while the other side’s using a drone swarm. Noble effort—but it won’t end well. :-) In this episode, we explore: 🔹 How AI is changing the rules of cyber offense and defense 🔹 What proactive, AI-driven security looks like today 🔹 Real-world strategies for CISOs and CTOs to stay resilient under pressure 🎧 Listen now: https://cfl.re/43GLFyr 📘 And grab the 2025 Cloudflare Signals Report for more insights: https://cfl.re/44QI1nY #SecuritySignal #AdversarialAI #Cybersecurity #AI #Cloudflare #CISO #CTO #DigitalResilience #PodcastLaunch #Signals2025
-
Khalid Kark shared thisFriday Fun: We are kicking off the Security Signal podcast series with a light topic… just kidding—we dove straight into quantum. Quantum computing may not be mainstream yet, but the security risks are already knocking. In this premiere episode, I sat down with Scott Francis (Accenture) and my colleague Trey Guinn to unpack how quantum breakthroughs could shatter today’s encryption—and what business leaders should be doing now to get ahead. We also share practical takeaways from the 2025 Cloudflare Signals Report to help shape your roadmap. Enjoy! 🎧 Full episode: https://bit.ly/3H8jZuC #SecuritySignal #QuantumComputing #PostQuantum #CybersecurityTrends #CloudflareTVSecurity Signal Post-Quantum Era | CloudflareTV - Cloudflare TVSecurity Signal Post-Quantum Era | CloudflareTV - Cloudflare TV
-
Khalid Kark liked thisKhalid Kark liked thisHeading back to Denver today after two excellent days in Houston. The Cloudflare team hosted 5 events around our Cloudflare Immerse event. Excellent presentations by our team and insightful conversations with customers, future customers, and our incredible partners. Much appreciation for an incredible team. Our speakers Warnessa Weaver Michelle Mezger Khalid Kark Todd Murray Ayush Kumar Humair Ahmed Michael Tarsha. It is hard to beat our MCs Michelle and Tarsha. And Khalid does an incredible job kicking things off with thought provoking data, that changes daily, and moderating our incredible customer panel. And Meredith Foor for making the panel happen. Our onsite staff that keeps things flowing. Aileen Zerbonia, CMP Joe Felz Ravi Kiran Reddi Sylvia Cooper , MBA Carl Steffens online Gracia S.. And thank you Kevin Enrique Hernandez Lopez and Cassidy Hunter for all the behind the scenes help. Our trainers and presenters in the University and Partner sessions. Ricardo Perez, 🔐Vasanth Balakrishnan Erik Vidaurri Jay Dombroski Tucker Fruge Our lead SEs for our Ask a Cloudflare Expert area. John Gall Scott Friedman The dozens of amazing Cloudflare employees who invited our customers and partners. Thank you all. Next stop? New York City, Minneapolis, Chicago to name a few. See the full list here: https://lnkd.in/gsVKxhnt
-
Khalid Kark liked thisKhalid Kark liked thisIf you're reading this, you most likely know who we are at TAG Infosphere, but have you ever wondered what it is that we actually do? In today's TAG Talk, I'll give you a brief summary of just that. You can watch the full video on YouTube here: https://lnkd.in/ez3Xjkbs
-
Khalid Kark liked thisKhalid Kark liked thisDive into the new 2026 CFO guide to tech trends to learn what five tech disruptors finance leaders should watch for to boost efficiency, decisions, and trust.
-
Khalid Kark liked thisI wrote a book on the convergence of AI and quantum. Being invited to discuss it at the U.S. Embassy is another thing entirely. NCSC in the room. Governments are preparing for what comes next. Companies should be too. I have nothing further to say today.
-
Khalid Kark liked thisI’m incredibly honored — and truly humbled — to share that I’ve been inducted into the Chief Security Officer Hall of Fame. This recognition means a great deal, not just because of what it represents, but because of the extraordinary leaders I now stand alongside. The CSOs in this community set the bar for what it means to protect, enable, and elevate organizations in an ever‑changing security landscape. Being included among them is something I don’t take lightly. I’ve always believed that if you have something to fight for, you have something to fight with. Fight for your company. Fight for your shareholders. Fight for your customers. And fight for the future — especially as we all need take on the responsibility to properly secure AI. #ciso #cso #protect2enable #security4AIKhalid Kark liked this🏆 Announcing the 2026 CSO Award Winners and Hall of Fame Inductees CSO has officially announced the 2026 CSO Award winners and CSO Hall of Fame inductees, recognizing organizations and leaders driving meaningful impact in cybersecurity and risk management. This year’s honorees represent the very best in security leadership — teams and individuals who are advancing innovation, strengthening resilience, and positioning cybersecurity as a strategic business enabler. From global enterprises to public sector organizations, the 2026 CSO Award winners demonstrate how thoughtful planning, new technologies, and strong execution can protect revenue continuity, improve resilience, and strengthen compliance. We are also proud to welcome a new class of CSO Hall of Fame inductees whose careers have helped shape the modern practice of information security and risk management. Their leadership has influenced organizations, mentored the next generation of security professionals, and advanced the broader cybersecurity community. 👏 Congratulations to all of this year’s winners and inductees. We look forward to celebrating these achievements at the CSO Cybersecurity Awards & Conference, taking place May 11–13, 2026 in Nashville. Join us to connect with security leaders 🧑💻, explore emerging challenges in cyber defense, and celebrate the organizations and individuals shaping the future of cybersecurity. Learn more about the winners and the event 👉 https://lnkd.in/ecdyYktg #CSOAwards #Cybersecurity #CISO #SecurityLeadership #RiskManagement #CyberLeadership #CSOConference
-
Khalid Kark liked thisKhalid Kark liked this“At this juncture of my life, I'm thinking legacy,” Usher says. The King of R&B recently expanded his business empire by opening his first entertainment innovation hub in Detroit. And he’s just getting warmed up—he aims to open 500 by 2050. Get the full story: https://lnkd.in/et2_xTcj 📸: Paras Griffin via Getty Images
Licenses & Certifications
Publications
-
: TKinetic leader: Boldly reinventing the enterprise—Findings from the 2020 Global Technology Leadership Study
Deloitte Insights
See publicationFaced with unprecedented uncertainty, businesses now more than ever need their technology leaders to be resilient, agile, and future-focused. At the same time, current market, economic, and social conditions indicate this is the time for transformational, not incremental, change—and who better than technology leaders to help drive this change?
-
People Technology and the path to organizational resilliance
Deloitte
See publicationCIO game plan to respond to Covid-19
-
Reimagining the role of technology: Fusing business and technology strategies to co-create exponential value for the company
Deloitte Insights
See publicationWith technology driving transformation, long-term sustainable value will only be created by unifying business and technology strategies to co-create exponential value for companies.
-
Technology and the boardroom: A CIO’s guide to engaging the board
Deloitte Insights
See publicationBecause technology is a crucial part of business strategy, boards and CIOs may need to elevate their engagement and collaboration with each other. How can CIOs lead and guide the conversation about technology's impact on business trajectory?
-
The new CISO: Leading the strategic security organization
Deloitte University Press
As customer data and intellectual property evolve and invite new forms of information theft, the leadership role of the chief information security officer must become stronger and more strategic—moving beyond the role of compliance monitor to help create an organizational culture of shared cyber risk ownership.
Other authors -
Recommendations received
18 people have recommended Khalid
Join now to viewView Khalid’s full profile
-
See who you know in common
-
Get introduced
-
Contact Khalid directly
Other similar profiles
-
Jason Juliano
Jason Juliano
GTIA - Global Technology Industry Association
13K followersGreater Tampa Bay Area -
Rick Smith - Veteran, C-CISO, CISSP, CISM, CCNA, CSA
Rick Smith - Veteran, C-CISO, CISSP, CISM, CCNA, CSA
ServiceNow
12K followersPurcellville, VA
Explore more posts
-
Timothy Youngblood, CISSP
Onyx Security • 5K followers
Reflecting on my experience with numerous early-stage companies, I'm reminded of the timeless insights from Geoffrey Moore's book, "Crossing the Chasm." Despite reading it during my master's program at the University of Texas years ago, its lessons remain profoundly relevant, especially for Cyber Security startups. 1. **Market Validation:** Understanding Customer Segments and the Chasm - **Technology Adoption Lifecycle:** Identifying five customer segments: - Innovators: Driven by technology, eager to experiment. - Early Adopters (Visionaries): Seek competitive advantage, embrace risks, and influence others. - Early Majority (Pragmatists): Crucial for mainstream success, risk-averse, rely on proven solutions. - Late Majority (Conservatives): Adopt when necessary or standard. - Laggards (Skeptics): Resistant to change, adopt under compulsion. 2. **The Chasm:** A critical gap between Early Adopters and the Early Majority. While early adopters accept imperfections, pragmatists demand reliability. Failure to bridge this gap results in growth stagnation and market setbacks. 3. **Defining a Target Market (Beachhead):** Companies must select a specific, narrow niche market (a "beachhead") before crossing the chasm. This niche should: - Be sizable enough to drive significant growth. These fundamental principles are paramount for any new venture's success. Targeting everyone equates to targeting no one. Focus on growth drivers at the opportune moment. #CrossingtheChasm #Startup #Venture
15
6 Comments -
Monica Ward,M.S., CISSP
Cyderes • 2K followers
Ever meet people that just melt your heart? The conversation was powerful and left me thinking about something we don’t talk about enough in cybersecurity: high capacity often comes with a high personal cost. Today’s Women in Cyber panel was a reminder that leadership isn’t about carrying everything; it’s about building teams and cultures where no one has to. Grateful for the conversation and the incredible leaders pushing our industry forward.
44
2 Comments -
Dr.Deepak Kumar Sahu,PhD
Faceoff Technologies Inc. • 19K followers
This evolution enables IT teams to focus on strategic initiatives rather than routine troubleshooting. When designed with robust identity management, observability, and governance aligned with frameworks like NIST and CISA, Agentic AI ensures security, compliance, and operational transparency. The impact is measurable—improved Mean Time to Detect (MTTD), faster Mean Time to Resolve (MTTR), reduced ticket volumes, and enhanced employee experience. #AgenticAI #ITOperations #CyberSecurity #DigitalTransformation #Observability
4
-
Royce M.
19K followers
🔒 Reflections from FutureCon Richardson 2026 Spent yesterday at FutureCon in Richardson and left genuinely energized by where our industry is headed. The conversations, the community, and the candor reinforced why the DFW cybersecurity ecosystem continues to punch above its weight nationally. I was honored to join the CISO Panel and take part in a high-level discussion on how our role is evolving. One theme came through loud and clear: we’re no longer “gatekeepers.” We’re business enablers navigating AI-driven risk at enterprise scale. A few takeaways that really stood out: • Assume Breach as a Strategy Modern defense isn’t about perfect prevention. It’s about speed — how quickly we can detect, validate, and hunt once an attacker inevitably gets a foothold. • AI Is Now a First-Order Security Risk From AI-generated code and model abuse to autonomous attack tooling, our controls, governance, and detection models must evolve at the same pace as the platforms we’re deploying. • From Shift Left to Continuous Assurance Security can’t live only in design reviews anymore. We’re moving toward lifecycle-wide prevention, runtime protection, and continuous validation that keeps up with modern delivery pipelines. • The Power of Community Beyond the CPEs, the real value was in the hallway conversations and sponsor sessions. Peer exchange is where strategy actually gets sharpened. The scalability crisis in security is real. Talent, tooling, and complexity are colliding fast. But days like this are a reminder that with the right community and leadership mindset, we’re well positioned to meet what’s coming next. To everyone I connected with — let’s keep the dialogue going. #FutureCon #CyberSecurity #CISO #InformationSecurity #AIinSecurity #RiskManagement #DFWTech #Leadership #Networking #NTXISSA #Vistrada
140
14 Comments -
Hussar Systems LLC | Cisco
106 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/Q1obO #IAM #ZeroTrust #Security
1
-
Chickasaw Telecom, Inc.
932 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/nq0Lr #IAM #ZeroTrust #Security
-
Solubra S.A
180 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/36byC #IAM #ZeroTrust #Security
-
Herbert Mattord, Ph. D., CISM, CISSP
Kennesaw State University • 6K followers
Colleagues, About a month ago, several of you responded to my call for CISO experts to serve on a panel to review a research project that Dr. Michael Whitman, Dr. Gunjan Batra, and I are conducting. The project focuses on how senior cybersecurity leaders assess material cybersecurity management issues, including governance, workforce challenges, and emerging technologies. Our goal is to establish an annually administered longitudinal survey of senior cybersecurity executives across the United States. We have room for a few additional participants to join this expert panel to review and validate the survey instrument before it is fielded more broadly. Given the importance of practitioner relevance, we are seeking input from a broad array of experienced leaders in the field. If you have served as a CISO/CSO, or as a direct report to a CISO/CSO within a Global 2000 organization, we would welcome your participation. Participation involves reviewing a draft survey instrument and providing written feedback on clarity, relevance, completeness, and suitability for senior cybersecurity executives. The review is expected to take 30–45 minutes and can be completed by email reply at your convenience over the next 30 days. Participation is voluntary and uncompensated. Feedback will be used solely to refine the survey instrument and will not be analyzed or attributed to individual reviewers. If you are interested in participating or would like additional details, please feel free to contact me directly by DM or email. The review materials are ready, and those who previously volunteered will receive them by email within the next few days. Thank you for your consideration and for your continued contributions to the cybersecurity profession. — Best regards, Dr. Herbert Mattord hmattord@kennesaw.edu
9
-
Mitch Tanenbaum
Turnkey Cybersecurity and… • 2K followers
Texas cities and agencies have been under [cyber] attack for the last several years and they have been losing the fight. They are standing up the Texas Cyber Command at UT San Antonio. Interesting plan. Learn more at https://lnkd.in/gT9C5FeD
3
-
Richard Staynings
Cylera • 26K followers
Jen Easterly, former director of CISA and now a strategic advisory board member for Huntress, is focusing on boosting cyber resilience for small and medium enterprises. These organizations often face sophisticated attacks but lack the resources to defend themselves. During her CISA tenure, Easterly championed initiatives such as the Joint Cyber Defense Collaborative and persistent threat hunting. These measures strengthened federal capabilities and deepened operational collaboration with the private sector, enabling rapid sharing of threat intelligence and faster mitigation of risks. In light of the shift from espionage to disruptive attacks on critical infrastructure, Easterly urges all organizations, regardless of size, to prioritize resilience - preparing for, responding to, and recovering from incidents - and to demand secure-by-design technology from vendors. "Every business, large and small, should consider themselves vulnerable. It's all about resilience. How do you understand the threat, prepare for it, be able to respond to it and then recover so that you can mitigate and drive down risk," she said. https://lnkd.in/gejpe3CB
4
-
Rick Weaver CISSP
InfraGard • 2K followers
At The University of Texas at Arlington - College of Business's panel, Check Point's Micki Boland joined Adriana Sanford and Amy Chaney to discuss how organizations can confront rapidly evolving risks in the age of AI. From weaponized information and deepfakes to responsible AI and defense-in-depth strategies, the discussion explored how technology, governance, and leadership intersect in today’s digital world. 🔗 Watch the full panel here: https://lnkd.in/g89hFjH8 Together, we’re shaping a more secure and responsible AI future. #CyberSecurity #AI #CyberAwareness #UTABusinessWeek
-
Michelle Buckner
2K followers
Data sovereignty isn’t just a buzzword—it’s becoming the new bedrock of global business and national policy. This week’s U.S.–China talks underscore how critical digital borders and control over data have become—not just for governments, but for every company operating across them. You can’t just say you control your data. You have to prove it. That’s exactly what my latest piece for CSO Online explores: how to operationalize and verify data sovereignty using real-world models as a blueprint for verifiable trust. I’m deeply grateful to the exceptional minds who lent their insight and experience to this discussion: 🙏 J. Michael Daniel, President & CEO of the Cyber Threat Alliance and former Special Assistant to President Obama for Cybersecurity Policy, for his clarity on how oversight becomes trust. 🙏 Ian Rogers, Co-Founder and Data Sovereignty Expert at TEAM Cloud, for reminding us that sovereignty isn’t a region—it’s an operating model. 🙏 Craig McLellan, Founder & CEO of ThinkOn, for his vision on how automation and AI will redefine “provable controls.” Their perspectives shaped this story into something practical and human—a real-world guide to building trust through evidence. 👉 Read the full article: Data Sovereignty Proof: How to Verify Controls Like Project Texas https://lnkd.in/gKM2vuV2 What’s your organization’s biggest challenge when it comes to proving sovereignty—technical controls, legal frameworks, or customer trust? #DataSovereignty #ProjectTexas #CyberSecurity #CISO #Privacy #Compliance #ZeroTrust #InfoSec #GRC #Leadership #TikTokBan #ByteDance #TrumpChinaTalks #USChinaRelations #TechNationalism
125
13 Comments -
Uma Shanker Chamoli
Genpact • 662 followers
Honored to have joined the DSCI Annual Security Summit as a speaker, contributing to the dialogue on the emerging theme “Passwordless Now.” shared perspectives on how passwordless authentication is redefining trust, resilience, and user experience in enterprise security. Engaging with peers and industry leaders at this forum reinforced the importance of driving secure digital transformation while balancing compliance and innovation.
47
1 Comment -
Steve Hosie, CISSP-ISSAP, CISM, CRISC, CGEIT, CDPSE
Broadcom Software • 8K followers
This episode of The Main Scoop explores how generational perspectives are shaping the adoption of generative AI and IT career paths for new technologists. Hosts Daniel Newman and Greg Lotko are joined by Rice University's Enzo Damato, President of Rice Telecom, for a conversation on making mainframes more accessible to new technologists and bridging the generational divide on emerging IT trends. https://dy.si/btdS7
13
1 Comment -
Myles J. W.W
Dexcom • 2K followers
I am honored and more than excited to be speaking at the upcoming ISACA Orange County Chapter event on March 10th. My talk will focus on one of the biggest challenges facing regulated industries like healthcare...how to effectively manage and ensure the remediation of the security risks introduced by AI. During the session, we’ll explore how to apply threat modeling to AI-enabled systems as well as how to move beyond technical findings to risk language that supports governance, regulatory expectations, and executive decision-making. You can use the following link to register: https://lnkd.in/gie35Ax3
18
-
Karthik Swarnam
Kroger • 9K followers
The AppSec leader is no longer a back-office role. It’s now a strategic function tied to business velocity, resilience, and trust. As #AIgenerated Code, open-source sprawl, and tool fragmentation reshape the risk landscape, #AppSec leadership has become a board-level priority. This article I've written for SecurityInfoWatch.com explores what that shift means and why over 75% of organizations are betting on ASPM to meet the moment: https://lnkd.in/dDRhEq2y
36
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content