Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Insight #1

One of the most significant errors an organization can make is assuming they are not a target. This belief is especially prevalent among small and medium-sized businesses (SMBs), and it represents a dangerous oversight. An estimated 69% of SMBs reported experiencing at least one cyberattack in the last year, according to one report, and the attack frequency is increasing. If you’re not using basic measures like password managers, two-factor authentication (2FA) and cybersecurity training, you’re risking more than you might realize.

Insight #2

The transparency and accountability themes continue, with more cyber-incident reporting rules proposed (PDF) by the Cybersecurity and Infrastructure Security Agency (CISA). The first iteration of these new rules are definitely a good start, but there’s still a lot of subjectivity in what should be reported.

Insight #3

Skate where the puck is going. If you’re not adapting your Application Security (AppSec) practices with the speed and agility of development, are you even trying to keep up with the puck? Runtime Security is the only way to get in front of security risk.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.