Skip to content
    
Cybersecurity Insights with Contrast CISO David Lindner

Want credibility? Don’t hide in a closet after a security incident

Be transparent with stakeholders during a security incident by clearly communicating what is being done and when they can expect updates. Transparency builds credibility and helps rebuild trust by showing accountability and keeping everyone informed, reducing uncertainty and skepticism.

Speed up detection and response — or get ransomware

Ransomware gangs now extort victims within 17 hours of intrusion, some in just 4-6 hours. Use real-time monitoring tools like Application Detection and Response (ADR) and Extended Detection and Response (EDR), train your team for instant action, and test rapid-response plans to stop attacks before extortion begins.

Don’t let your work culture hurt your cybersecurity

Foster a healthy cybersecurity culture by rewarding proactive reporting as opposed to  punishing mistakes. Shift from a blame-heavy mindset to one that values resilience and collaboration, reducing errors, and strengthening defenses.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.