Business Continuity Management / Disaster Recovery , COVID-19 , Endpoint Security

Cybersecurity Leadership: Risk Exposure Awareness

CEOs and CISOs on Assessing and Mitigating the New Risk Landscape

It might be new, but are we ready to call this “normal?” In this latest in a series of CEO/CISO panels, cybersecurity leaders talk frankly about the new risk surface and the role emerging technologies play in helping us keep pace with our adversaries.

See Also: The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

Participating in this panel discussion are:

CEOS: Kristin Hazlewood, general manager and vice president, BigFix, HCL Technologies; Bob Lyons, CEO, Alert Logic.

CISOs: Summer Fowler, CISO, Argo AI; Anne-Marie Scollay, ex-CISO, Axiom; Don Cox, CISO, MEDNAX; Allie Mellen, security strategist, office of the CSO at Cybereason.

In this Cybersecurity Leadership panel discussion hosted by Information Security Media Group and CyberTheory, these CEOs and CISOs discuss:

Hazlewood has more than 15 years of experience in the software industry, leading product development organizations through periods of growth and transformation. Most recently, she led the BigFix transition from IBM to HCL Software. Hazlewood was influential in the formation of the HCL Software federal business. An acknowledged expert in endpoint management and security, Hazlewood holds more than 35 software patents.

As CEO, Lyons brings to Alert Logic more than 25 years of experience as a global executive with a demonstrated track record of value creation through technology innovation, revenue growth, customer experience and operational excellence. He is recognized for his success in helping high-growth technology and software-as-a-service companies scale globally and innovate, most recently as president and chief operating officer of Connexions, which offers SaaS-based customer loyalty and engagement solutions. Previously, he served as executive vice president, technology and operations at Ascend Learning, an educational content and SaaS company.

Fowler has more than 19 years of experience in risk management and software engineering. She came to Argo AI from Carnegie Mellon University’s CERT cybersecurity division, where she served as technical director of cybersecurity risk and resilience. Prior to her work at CERT, Fowler was a technical member at Johns Hopkins University Applied Physics Lab and a software engineer at Northrop Grumman. Today, in addition to her role as Argo’s CISO, she is an adjunct faculty member at Carnegie Mellon University. She advises corporate boards on cybersecurity governance and serves as a director on the board for PA Women Work, a Pittsburgh nonprofit.

In her former role as CISO for Axiom Law, Scollay led the information security strategy for Axiom's products and services. Earlier, she built out and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multinationals.

Cox has over 30 years of experience in technology. Currently serving as the CISO at MEDNAX, the physician-led healthcare organization headquartered in Sunrise, Florida, Cox is responsible for cyber operations and engineering, identity and access management, disaster recovery, business continuity planning, and risk and compliance.

Mellen has spent the past decade in engineering, development and technical consulting roles at venture-backed startups as well as research roles at MIT and Boston University. In her current position as chief of staff and security strategist in the Office of the CSO at Cybereason, she is a frequent speaker at security conferences.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.