Stay tuned for CISOs Investigate: Vulnerability Management

Posted on: 12 Feb 2019

Vulnerabilities cannot be eliminated; they can only be managed. In Security Current’s upcoming report CISOs Investigate: Vulnerability Management, lead writer David Sheidlower (CISO for a construction company) and executive editor Bob Turner (CISO for a higher education institution) share their experiences and best practices in managing vulnerabilities for their organizations. The report also features seven…

Adi Dar, CEO, Cyberbit

Posted on: 11 Feb 2019

Many cybersecurity startups in Israel share a similar vision: To become so successful and promising that a bigger entity would acquire it. This was not what Adi Dar had in mind in 2015 when he established Cyberbit. “We did not want to be bought by anybody,” he says. “My goal was to establish a cyber…

CISOs Connect Miami 2019: Happening on Feb 4-5

Posted on: 31 Jan 2019

CISOs Connect™ Miami 2019

You can do so much more with logs: A CISOs Connect group discussion

Posted on: 26 Jan 2019

If you have questions for Columbia University’s Joel Rosenblatt, ask him directly in a group discussion on CISOs Connect starting Jan. 28. Sign up at or send an email to Users log in and out of your system all the time, but what most administrators do is to put these logs in a hard…

Arun Buduri, President and Co-founder, Pixm

Posted on: 23 Jan 2019

Leaps of faith When people think of Craigslist, they probably think about second-hand furniture, apartment rentals, odd jobs. But in 2016, when Arun Buduri was searching for a contract job with a startup, he found more than what he was looking for – a co-founder in Chris Cleveland who initially advertised for a coder on…

Log-ical Benefits: Why Logs Are a Treasure Trove of Information

Posted on: 21 Jan 2019

by Joel Rosenblatt Director for Network and Computer Security Columbia University (Beginning January 28, Joel Rosenblatt will be moderating a group discussion on CISOs Connect. The discussion will run for two weeks and is open to all CISOs Connect members. CISOs who want to sign up may send an email to There’s a familiar…

Chris Wolski, CISO, Herman Miller

Posted on: 21 Jan 2019

Chris Wolski’s cybersecurity journey began in the form of a gift from his grandmother – a computer with neither keyboard nor monitor. What the computer had was a number pad. Underneath the numbers were three colors – red, green and blue. Wolski, then in seventh grade, and his brother, hooked the computer to the television…

Ibrahima Mbaye, CISO, Computer Generated Solutions

Posted on: 03 Jan 2019

  Ibrahima Mbaye sets aside time in his busy schedule to have coffee, lunch or dinner with young cybersecurity graduates and college students.   Mentoring young graduates and students entering the profession is his way of giving back to an industry that gave him enormous opportunities after he migrated to the United States from his native Senegal.   “I…

Ilan Barda, Founder and CEO, Radiflow

Posted on: 27 Dec 2018

Ilan Barda is the founder and CEO of Radiflow, a leading provider of cybersecurity solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others. His current position perfectly blends his education in electronics and computer engineering with the cybersecurity experience that he honed while spending six years in…

Wes Knight, CISO, Georgia Department of Revenue

Posted on: 18 Dec 2018

After almost 20 years working for IBM in various IT roles and working under bosses of different temperaments, Wes Knight was perfectly happy to run his own training and consultancy firm in Atlanta, Georgia.   “In my company, pretty much I was the company, the sole revenue generator,” he says.  He worked long hours, travelled more days than…