Governance & Risk Management , Leadership & Executive Communication , Training & Security Leadership

Profiles in Leadership: Michael Lines

The Head of Product Security for LeanIX Is Focused on Risk
Michael Lines, head of product security, LeanIX

As the head of product security for LeanIX, Michael Lines is primarily focused on risk management, risk assessment and data governance. He tells why he believes that more security leaders and CISOs should focus on risk.

See Also: Isolated Castles: Incident Response in the New Work From Home Economy

In a video interview with Information Security Media Group as part of CyberEdBoard's Profiles in Leadership series, Lines discusses:

  • Why understanding risk is so important to a CISO's success;
  • What CISOs and other security leaders don't understand about risk and what can be done about that;
  • How CISOs can ensure that risk is built into the frameworks that they follow.

Lines, a CyberEdBoard Executive Member, is head of product security for LeanIX, a leading SaaS solution that helps companies define, design and manage their digital transformation journeys. He is responsible for the product vision for the platform related to customer security needs and acts as the security architect and subject matter expert for the LeanIX platform. Lines has over 20 years of experience. He served as the global CISO for PricewaterhouseCoopers, TransUnion and Fair Isaac Corp. and led the advisory practices in security risk and privacy for Online Business Systems and Optiv.


About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, GovInfoSecurity, ISMG

Ferguson is the managing editor for the GovInfoSecurity.com media website at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.