Can you describe your current role, and what responsibilities do you undertake?
I am responsible for the global information security program, providing strategic leadership and direction for the organization’s security initiatives. My role involves ensuring the protection of information assets and aligning security measures with business objectives to effectively respond to evolving threats. Key areas of focus include Information Security Program, Strategic Leadership, Risk Management, GRC, Product Security, Vendor and Third-Party Risk, Collaboration and Communication, Awareness, Continuous Improvement, and Building Trust.
How will you describe your journey in the cybersecurity industry?
My journey in cybersecurity has been both challenging and rewarding, marked by continuous learning, adaptation, and a commitment to protecting information assets. I have faced numerous challenges throughout my journey, from staying ahead of evolving threats to balancing security with business needs. These experiences have taught me the importance of adaptability, continuous learning, and collaboration.
If you could make one recommendation to the next generation of cybersecurity leaders, what would it be?
For the next generation of cybersecurity leaders, continuous learning and adaptability are not just beneficial—they are essential. By staying informed, investing in education, developing soft skills, and embracing change, you will be well-equipped to navigate the complexities of the cybersecurity landscape and lead your organizations to success.
How do you stay current with the latest security threats and technologies?
I stay current with the latest security threats and technologies by regularly reading industry publications and blogs, maintaining professional certifications, and participating in associations such as ISC² and ISACA. Attending major cybersecurity conferences like ISC², ISACA, and Blackhat, along with engaging in webinars, keeps me informed about emerging trends and innovations. I subscribe to threat intelligence feeds and use platforms to analyze real-time threat data. Networking with peers through online communities and local meetups allows for shared knowledge. Continuous learning through online courses and hands-on labs, staying updated with vendor communications and security bulletins, and following relevant podcasts provide diverse insights. Additionally, I read academic journals and research papers and collaborate both internally and externally to stay ahead in the dynamic cybersecurity landscape.