Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 09/13/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 09/13/24

Insight #1

Where should a CISO focus — on immediate threats, or on long-term security? The answer is “both.” A comprehensive cybersecurity strategy necessitates that CISOs allocate resources and planning for both immediate threats and long-term security posture enhancements. An unbalanced approach, favoring one over the other, often leads to heightened stress, inefficient operations, diminished performance metrics and an increased vulnerability to breaches.
 

Insight #2

While the traditional concept of security orchestration, automation and response (SOAR) might be diminished (per Gartner), the criticality of security automation remains undisputed. Security teams are intensifying their efforts to automate threat detection and incident response tasks to combat the escalating complexity and volume of modern cyberattacks.
 

Insight #3

The exploitation of human trust is a timeless tactic employed by attackers. The shift toward remote work and technological advancements have not altered this fundamental truth; they've merely provided attackers with more sophisticated tools and more avenues to identify and manipulate their targets.
David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.