One2One Summits: Episode 9: David Cass and John Masserini

One2One Summit podcast where David Cass, CSO for IBM Cloud and SaaS solutions, and I sit down and discuss the challenges of modern technology in a legacy environment, the hiring and staffing issues we face and building your personal network. One2One: iTunes: YouTube: For more podcasts, click here

SecurityCurrent Biometrics User Behavior Analytics

SecurityCurrent: 10 CISOs Say Passwords are Failing and Must be Augmented or Supplanted

A SecurityCurrent interview around the demise of passwords and a need for a capable password-replacement solution. Ten CISOs from across industries weigh in on the effectiveness of passwords, with most predicting that the days are numbered for the password as the sole authentication method. They see enterprises moving to augment or supplant the traditional password with

TEN ISE Information Security Executive

T.E.N./ISE Success Story: John Masserini

A profile piece by the folks at T.E.N./ISE after winning the 2014 North America Information Security Project of the Year. While these days, there are countless organizations who provide networking opportunities to those in the Information Security profession, I am very lucky to have been involved with T.E.N. and ISE® programs for quite some time. For


Waters Technology: Rise of the CISO

CISO’s and Security executives from across the industry talk about how their role has grown in prominence in the capital markets industry. They come from different backgrounds: some have experience as technologists, while others made a name for themselves on the business side; they are former risk officers and auditors, and hold degrees in economics


Technically Philly: Fears challenge ‘bring your own device’ trend

Technically Philly held a panel discussion featuring several prominent local CISO’s to talk about the evolving cybersecurity industry, the challenges we face with bring your own device, and what the future holds. Healthcare, Financial, and Government CISO’s shared their differing views on the environments they work in and how cybersecurity plays a role in their