The role of the CISO has skyrocketed in prominence far more rapidly than many pundits had predicted, underpinned by relentless cyber incursions, tightening regulatory screws and increased personal liability on corporate directors. Once a peripheral technology role, an increasing number of CISOs now frequently present to boards. Furthermore, CISOs are now expected to weigh in on a wide range of strategic matters, such as new product development, mergers and acquisitions and expansion into new markets.
But as these changes unfold, most cyber leaders are finding themselves woefully unprepared. Most cyber leaders rose through the ranks from technical engineering and operational roles. Their deep technical expertise and range of cybersecurity certifications equipped them to excel in prior middle managerial roles. But as many CISOs can attest, success in the c-suite is less to do with technical proficiency, but one’s ability to navigate complex and deeply entrenched political systems, influence power brokers, lead with courage, and communicate to the board with clarity and persuasion.
In our upcoming Webinar, Morey Haber, CISO & CTO at BeyondTrust, sits down with Phil Zongo, the CEO and Cofounder the Cyber Leadership Institute to discuss some practical tools cyber leaders can deploy to boost their credibility with the c-suite and deliver transformation fast. Phil is a multi-award winning cyber executive, thought leader and bestselling author of The Five Anchors of Cyber Resilience.
Among other practical insights, participants will:
Phil Zongo is a multi-award winning cybersecurity executive, keynote speaker and bestselling author. Some of his career highlights include:
🔹 Author of The Five Anchors of Cyber Resilience, a best-selling strategy book that provides practical guidance to business executives.
🔹 Author of The Gift of Adversity, an intriguing memoir to be published in 2021.
🔹 2017 winner of ISACA International’s Best Book/Article Award, one of ISACA’s highest global honours, which recognises individuals for major contributions to publications in the field of cybersecurity and IT governance. 2016 winner of the ISACA Sydney’s first-ever Best Governance Professional of the Year Award.
🔹 2020 Global Top 100 Most Influential People of African Descent (MIPAD - New York) - 4th Industrial Revolution Category. MIPAD is a unique global list that identifies high achievers of African descent globally in support of the International Decade for People of African Descent (2015-2024), proclaimed by the UN General Assembly Resolution 68/237.
🔹 2019 Semifinalist - The Wharton Executive Entrepreneurship Acceleration Program Business Plan Competition, which features dozens of entrepreneurs globally.
🔹Nominee - Australian Information Security Association (AISA) - 2019 Cyber Security Professional & 2020 ISC2 Asia Pacific Senior Cyber Security Professional of the year awards
🔹 Winner of 2018 Zim International (Australia) Outstanding Achievement Award, African Australian NSW 2018 Outstanding Performance Award, 2019 Appreciate Africa Asia Outstanding in Business Award (Beijing, China), accolades that recognise achievements that far exceed the norm.
🔹 Delivered cutting edge insights to thousands of professionals and business executives across high profile conferences, diving deep into important global trends such as cyber resilience, digital transformation, cloud computing, artificial intelligence, etc.
🔹 My thought leadership has been distributed to more than 180 countries and has been featured in several newspapers and well-regarded magazines.
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.