Forging the Digital Enterprise Protocol

Line

4 key Takeaways

The new CISO archetype emerges

The new CISO archetype emerges

The three faces of the security officer have been technology, regulation and defense. In a hyperconnected world, the new face is more business-relevant than ever: core to products from smart medical devices to smart utility meters.

This is a digital paradigm of ‘zero trust’

This is a digital paradigm of ‘zero trust’

Do firewalls hold up when the door is always open? As companies move to a cloud-centric and IoT-driven network, anything that connects is guilty until tagged innocent. The ecosystem of security is built on trusting nothing and securing everything.

Finding meaning in all the metrics

Finding meaning in all the metrics

Step one is putting together all the data to manage security. Step two is looking through the maze and tracing the relevance and impact of each metric to a larger security goal. Step three? Contexts will change, so keep looping back to step two.

From cyber-speak to business-speak

From cyber-speak to business-speak

Cybersecurity is a domain that now demands an understandable boardroom lexicon. One where terms like threat vectors and encryption protocols can be translated into balance sheet impact. A language of “what’s at stake”.

The evolving science of cybersecurity is rewriting the rules of the old order. New definitions are being cast for enterprise repositories, roles and rigors. To get a grounds-eye view of this new charter, Confluence brought together three leaders driving the change: Vishal Salvi, CISO at Infosys; Mike Wilson, SVP and Chief Security Officer, Molina; and Michael Guenzler, SVP and CISO, Venerable Holdings, Inc.