Seasoned Security Leaders Share Their Perspectives on the Future of Data Security

Seasoned Security Leaders Share Their Perspectives on the Future of Data Security

Feeling inundated with the looming threat of cybercriminals trying to penetrate your defenses and steal your data? IT and Security teams must shift their focus from preventing attacks to achieving cyber resilience and ensuring their ability to bounce back after a cyberattack.?

At Data Security Summit, we heard from leaders across cybersecurity as they evaluated the latest strategies and approaches to defend our data, how the role of the CIO and CISO are changing, lessons from past incidents, and the future of data security and AI.?

Read about our favorite sessions below, or if you’d like to jump right in and watch every session on demand, click here!

CIO and CISO - Partnering Effectively to Secure Data

For this unique session, we were joined by Leonard De Botton and Dana Kilcrease , the CIO and the CISO of Berkeley College , who provided their unique perspectives on the state of data security in conversation with Vinitha Varadarajan . Both Leonard and Dana discussed the strong collaborative environment that they’ve helped build at Berkeley College, where both IT and security teams work together to plan and support ongoing projects, and make sure resources are properly allocated.?

Leonard and Dana have worked together to build a culture where everyone at Berkeley College can report any possible incidents or suspensions, and be recognized for being diligent and careful. They are also both all-in on a strategy focused on cyber resilience, knowing that while prevention is important, working towards effective response and recovery is the key to long-term success.?

Dana and Leonard finish the session noting that they meet at least twice a week to ensure both teams are on the same page, run regular incident response exercises, and discover new ways to improve their approach. Watch their session here.

Data Security in the Cloud

In this session, we heard from Peter M. O'Donnell from Amazon Web Services (AWS) and Matt Bisceglia as they discussed the numerous advantages that cloud services like AWS provide for their customers, but emphasized the importance of a culture built on security.?

“At Amazon, when we talk about this culture of security, it pervades everything we do. Everything we ever develop and everything we build…we’re thinking about the security for our customers and of course, for our own company.” - Peter M. O'Donnell, Principal Solutions Architect, Security, AWS

Peter also pointed out that this emphasis on security isn’t just important for engineers, product designers, and others, but it’s also critical for executives and boards to make security a key goal for the business as a whole.?

One of the biggest issues over the years for AWS customers according to Peter: losing control over credentials. He continues by describing different ways companies can unsubscribe from the terrible consequences that come with compromised credentials. To find out what they are, click here.

The Uber Breach: Joe Sullivan Learned the Lessons So You Don’t Have To

A well-respected cybersecurity leader is vacationing in the mountains with his family when he receives a phone call telling him that major news outlets are accusing him of covering up a security incident. His laptop and phone have been remotely bricked. He doesn’t know what is happening, he doesn’t know where this is coming from. How would you respond?

This scenario was a reality for Joe Sullivan , former CSO at Uber, when it was widely reported that he had been a part of a massive cover-up after a breach.

Joe joined Nicole Perlroth to tell his side of the story of what really happened at Uber in 2017, and provides a perspective only he can provide on the pressure being put on cybersecurity leadership today. Joe talks about what business leaders can do to ensure they are complying with government agencies, and what he believes public agencies and private companies can do to get on the same page.?

You won’t want to miss this session. Watch the entirety of this conversation here.?


Hungry for more Cyber Resilience Content?

Check out some of these highly recommended reads from Rubrik here:

?? As Deadline Looms, Agencies Must Ensure Zero Trust, Cyber Recovery and Resilience, by Brendan MacCarthy (Read it here)

?? Clean Recovery in the Cloud: Rubrik and Google Cloud, by Kev Johnson (Read it here)

??? Rubrik + CrowdStrike Webinar: Prevent data breaches and secure your critical information (Register here)

??? Webinar on Oct. 25th: Gain control of your data with Rubrik’s Data Security Posture Management (Register here)

??? Join Rubrik at VMware Explore in Barcelona! (Meet with us)

?? Data Security Decoded: Building a Cyber Resilient Healthcare System with Anahi Santiago , CISO at ChristianaCare (Listen here)


Rubrik is a cybersecurity company and our mission is to secure the world’s data. Zero Trust Data Security? helps organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, built with a Zero Trust design and powered by machine learning, delivers complete cyber resilience in a single platform across enterprise, cloud, and SaaS. Our platform automates data policy management and enforcement, safeguards sensitive data, delivers data threat analytics and response, and orchestrates rapid cyber and operational recovery.

Subscribe to Data Security Digest as your destination for all things Zero Trust Data Security.


I completely agree that Resilience is important, and it's not only about backup and recovery.

Mauricio Ortiz, CISA

Great dad | Inspired Risk Management and Security Profesional | Cybersecurity | Leveraging Data Science & Analytics My posts and comments are my personal views and perspectives but not those of my employer

1 个月

CISO vs CIO? This example shows how a good interaction between CIO and CISO can work, but there is still debate whether CISOs should report at the same level of the CIO and have an independent budget given the constant need for them to report to the boards or they are liable and accountable for managing cybersecurity incidents.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了