CISO Trainings , Governance & Risk Management , Training & Security Leadership

CISO Confidential: How to Secure a Publicly Traded Company

Mat Newfield of Unisys Shares a Day in the Life of a CISO
Mat Newfield, CISO, Unisys

Successful CISOs distinguish themselves by the length of their tenure in the job, which in many cases depends on their ability to communicate with the board of directors and senior managers, says Mat Newfield, CISO of Unisys. And that involves much more than demanding additional money and people, he adds.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Newfield discusses:

  • How to execute strategic and tactically on the CISO mission;
  • What success looks like to a CISO;
  • How to choose the right security vendors.

Newfield is CISO at Unisys, leading a team responsible for the design, development and implementation of the company's corporate information security and risk program across all regions and functions - including its two go-to-market organizations: the enterprise solutions unit and Unisys Federal. Previously, he served as director of global managed security services for IBM as well as the business information security officer within IBM's security organization. Newfield also has previously held security leadership roles with Cybertrust, RSA and DDC Advocacy.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.