Klogix: Profiles in Confidence – John Masserini
Truly honored to be a featured CISO in the Klogix Profiles in Confidence magazine. Feats of Strength is a business-focused information security magazine created by K logix. They provide a…
The world through a CISO's eyes
Truly honored to be a featured CISO in the Klogix Profiles in Confidence magazine. Feats of Strength is a business-focused information security magazine created by K logix. They provide a…
Honored to be included in this multi-topic whitepaper on how to manage risk throughout the enterprise by partnering with your business lines. In this special Risk Management report by Ethisphere…
An interview with Radware around identifying cybersecurity talent in unexpected places within your enterprise. Companies are scrambling to fill cybersecurity positions. Some 41 percent of CIOs surveyed by recruiting firm…
An interview with SecurityWeek around how FUD permeates the cybersecurity industry and how security vendors use it to sell unnecessary products. Increasingly, vendors have come under scrutiny with the never…
TechTarget interview around aligning Crisis Management and Business Continuity with the control structures of the organization. All CISOs have responsibilities and pressures that make the job fun, interesting and sometimes…
An interview with CSOonline around the hiring challenges the security industry continues to face. New U.S. Attorney General Jeff Sessions may disagree about whether there is a shortage of skilled…
The report includes an overview of the technology, staffing implications, recommendations for selling User Behavior Analytics (UBA) to the C-Suite and possible objections. It also features a market assessment based…
I recently had the honor of participating in an IBM/International Consortium of Minority Cybersecurity Professionals (ICMCP) event in Manhattan. This is coverage of the panel I was on which discussed…
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes…
Interview in SecurityWeek around the pros/cons of legacy antivirus endpoint and next-gen antivirus endpoint solutions. There is bad feeling between what can be described as traditional antivirus (Trad AV) and…
As infrastructures become increasingly fragmented and distributed, the need for a strong application security program becomes more and more critical. Cloud-based hosts, server-less architectures, and Applications as a Service require…
The MIAX Security team was honored to be a case study on deploying a real-world, fully integrated Privileged Access Management solution. The MIAX Options Exchange needed more than a way…
A case study on the enterprise-wide deployment of a fully integrated privileged account management solution, the potential deployment challenges, and the numerous post-deployment security and productivity benefits. Challenge: Provide Regulatory…
Recently, I had the opportunity to sit down with Morey Haber, VP of Technology, BeyondTrust to discuss the future of biometrics and the role it played in advanced authentication techniques.…
One2One Summit podcast where David Cass, CSO for IBM Cloud and SaaS solutions, and I sit down and discuss the challenges of modern technology in a legacy environment, the hiring…
A SecurityCurrent interview around the demise of passwords and a need for a capable password-replacement solution. Ten CISOs from across industries weigh in on the effectiveness of passwords, with most…
Recap of a panel discussion which focused on a few key data security topics and included Mike Marsilio, director of security and compliance, DTI; Mark Connelly, CISO, Thomson Reuters; Steve…
A profile piece by the folks at T.E.N./ISE after winning the 2014 North America Information Security Project of the Year. While these days, there are countless organizations who provide networking…
CISO’s and Security executives from across the industry talk about how their role has grown in prominence in the capital markets industry. They come from different backgrounds: some have experience…
To ensure both safety and survival, we all have to recognize our personal responsibility for information security. Admiral Michael Rogers, the director of the National Security Agency, said he expects…
An interview with Info Security magazine around the maturation of advanced evasion techniques and how attackers abilities to evade detection have matured. With the average cost of a data breach…
Technically Philly held a panel discussion featuring several prominent local CISO’s to talk about the evolving cybersecurity industry, the challenges we face with bring your own device, and what the…
A Politics of Information Security Webcast Earlier this year, a panel of Chief Security Officers from some of the nation’s highest profile companies met to talk about how to get…