Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24

Insight #1:  Chuck the checkbox, seize real risk

To achieve a strong security posture, CISOs must avoid a "checkbox mentality" that prioritizes compliance over actual risk management and instead cultivate a security culture that is demonstrated in practice.

 

Insight #2: CISOs, stop drowning in the tsunami of alerts

CISOs are overwhelmed by threat detections from numerous security tools, yet they still lack visibility into data breaches, especially in hybrid cloud environments. They should prioritize consolidation and optimization of current tools and increase visibility into data-in-motion to improve security posture.

 

Insight #3: Tool sprawl is flattening SOCs; ADR & AI to the rescue!

Security operations center (SOC) teams are overwhelmed by the sheer number of threat detection tools they manage, leading to alert fatigue and hindering their ability to respond effectively to real threats. To combat this, they should consolidate their security stack and prioritize tools that leverage AI and machine learning to filter out false positives, to streamline workflows, and utilize techniques like Attack Detection and Response (ADR) to better understand and complete the exploit chain for more accurate threat assessment.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.