3rd Party Risk Management , Business Continuity Management / Disaster Recovery , COVID-19

CISO Spotlight: Marene Allison, Johnson & Johnson

Reflections on Seismic Change in 2020 and Opportunities in the Year Ahead
Marene Allison, CISO, Johnson & Johnson

As CISO of Johnson & Johnson, Marene Allison was used to gauging her security posture by the top threat activity: nation-state, cybercrime, insider or hacktivist. But in 2020, they all struck at once. Here is one CISO's take on the state of the industry.

See Also: Gartner Guide for Digital Forensics and Incident Response

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Allison discusses:

  • Her unique career path;
  • How Johnson & Johnson has changed after the pandemic year;
  • How these changes influence her cybersecurity priorities going forward.

As chief information security officer for Johnson & Johnson, Allison is responsible for protecting the company’s information technology systems and business data worldwide. This includes ensuring that the company’s information security posture supports business growth objectives, protects public trust in the Johnson & Johnson brand and meets legal/regulatory requirements. She has held corporate roles at Medco, Avaya and The Great Atlantic and Pacific Tea Company; served as an FBI special agent and in the U.S. Army; and graduated from West Point in the first class to include women. She is on the boards of H-ISAC, West Point Women and ASIS International.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.