fbpx

CISO Point of View: The ever-changing role of data, and the implications for data protection & storage security

The “business value” of data continues to grow, making it an organization’s key piece of intellectual property.

From a cyber risk perspective, attacks on data are the most prominent threat to organizations. Recent years have witnessed a dramatic shift in the cyber threat landscape, with organizational data becoming a prime target for cybercriminals.

We interviewed 8 CISOs to get their unique insights on new data protection methods and the importance of securing storage & backup, including: John Meakin, Former CISO at GlaxoSmithKline and Deutsche Bank, Joel Fulton, Former CISO at Symantec and Splunk, Endré Jarraux Walls, CISO at Customers Bank, and George Eapen, Group CIO (and former CISO) at Petrofac

The “business value” of data continues to grow, making it an organization’s key piece of intellectual property.

From a cyber risk perspective, attacks on data are the most prominent threat to organizations. Recent years have witnessed a dramatic shift in the cyber threat landscape, with organizational data becoming a prime target for cybercriminals.

We interviewed 8 CISOs to get their unique insights on new data protection methods and the importance of securing storage & backup, including: John Meakin, Former CISO at GlaxoSmithKline and Deutsche Bank, Joel Fulton, Former CISO at Symantec and Splunk, Endré Jarraux Walls, CISO at Customers Bank, and George Eapen, Group CIO (and former CISO) at Petrofac

We gathered the opinions of 8 CISOs on the topic of securing data:

  • What contributes to the increase in data’s ‘business value’
  • How is technology adapting to accommodate this change
  • Which security practices have evolved, and do they match the current business needs
  • CISO lessons learned: how did you approach data protection in your career? What worked and what didn’t, and what would you have done differently
  • Where should other CISOs start when it comes to taking a risk-based approach to data protection and recoverability
  • Top recommendations for your peers

Virtual Panel with Check Point, Qualys and Rapid7: Vulnerability Management 2025 Innovations – January 16

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree