Expert Interviews
Spotlight on Industry Experts
Upscaling Through Cloud
Hybrid Pathways and industry recognized security expert, Roland Cloutier, talk about how a business can use their cloud migration as a catalyst to advance their security capabilities. Security executives know that protecting complex technical infrastructures with varying levels of aged technology is a cost pit that detracts from critical next generation needs. Often, it also detracts from their ability to upscale and advance their programs as they have to balance protecting what they have versus preparing for the future. In this complexity lies an opportunity to bridge the old with the new, advance your defensive posture, and be a business leader that helps accelerate your company’s digital transformation.
Enabling and Securing the Next Generation Workplace
The Security Executives of the future are shifting from only stopping bad things from happening to supporting innovation efforts geared to accelerate the business. The most important asset of any company is its employees. Through the Pandemic, many CISO’s had to work feverishly to enable new ways to work and still keep the company secure. Security Leaders are supporting a complex workforce with changing expectations of technology use. Security Leaders have an opportunity to bring focus and positive business results to decisioning, enablement, and employee engagement as companies define their “new normal”.
Imperatives for Securing GenAI
Listen to Roland and Hybrid Pathways discuss the meteoric rise in awareness and use around generative AI and the Opportunities, Imperatives, and Priorities for today’s Security Teams and Leaders. We will discuss the responsible use of generative AI in business and how to create corporate oversight to protect your business assets. Roland will discuss the reality of where regulations are going, what AI protections can look like, and how to put those protections in place. He will focus on discovery, transparency, and the things Security Teams and Leaders can control today around their company’s utilization of generative AI.
How to Have Effective Global Presence Without Hiring
Security executives have wide responsibilities across the gamut of cyber operations, incident response, forensics, data defense and access assurance, identity management, business resiliency, risk management, and so much more. The reality is if you are a multinational company, you simply cannot afford to have 100% of all the necessary functions and services staffed fully around the globe. Often, the infrequency of the use of those services in specific jurisdictions prohibits staffing them there until the day you need them. This discussion will focus on how security leaders can have the most effective operational presence with the least cost.
Beyond Shifting Left
The efforts to move core elements of technology security and privacy controls, quality assurance, and accreditation closer to “at the time of development” has accelerated exponentially in the past 3 years. A well-developed Security and Privacy By-Design program enables shifting left through process, technology, and organizational design. In this video, Roland will share his experience and some design imperatives that can set you on the right By-Design path.
How to Use MSSP as Force Multiplier
Hybrid Pathways and Roland Cloutier talk about practical ways to increase your business operational time to value utilizing Managed Security Service Providers (MSSPs). Every CISSO has come across the question of “do I need” or “is it better” to use an MSSP. Sometimes it's for cost, sometimes it's for workforce leverage, and at other times it's during a season of change.
Getting Identity Right
Hybrid Pathways interviews Roland Cloutier to talk about Why Getting Identity Right for Your Business Matters - how Identity becomes the core element for Zero Trust. Businesses that are successful in managing their complex regulatory requirements in the areas of data protection, consumer protection, privacy, and do so in a way that is comprehensive, repeatable, and provable; all have one thing in common. They got identity right.
Transforming Information Security
We were interested in speaking with Danielle Goulet, Vice President, Chief Information Security Officer at The Hanover Insurance Group about her experience transforming their information security program. Learn how Danielle’s leadership has helped modernize information security at The Hanover.
3rd to 5th Party Risk Management
We were interested in speaking with Jim Routh about his experience designing and implementing a continuous risk management process driven by near real-time data for 3rd, 4th, and 5th parties in the supply chain. The following provides a glimpse into the experiences and ideas from one of information security’s thought leaders.
Building a Modern Security Program
We were interested in speaking with Doug Graham, Chief Trust Officer, about his thoughts on building a modern security program. The following provides a glimpse into one of information security’s thought leaders.