Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 11/15/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 11/15/24

Insight #1: Two tricks to stop mystery breaches

The majority of security leaders reportedly don’t know what caused data security incidents at their organizations over the past 12 months. To reduce the likelihood of unknown security breaches, prioritize regular staff training and tabletop exercises. This empowers employees to identify and escalate potential risks, bolstering your overall security posture and resilience against cyberattacks.

Insight #2: AI: The sparkly toy that can poke your eye out

To ensure the secure and ethical adoption of AI, it's crucial for organizations to proactively establish a robust risk management framework. This involves identifying potential threats and vulnerabilities early on, implementing security protocols to mitigate these risks, and defining acceptable risk thresholds. By taking a proactive approach to risk management, organizations can harness the benefits of AI while minimizing its potential downsides.

Insight #3: Why ADR? Because your apps are a blindspot and a bull’s eye 

As a CISO, you know that your applications are critical to your business, but they're also a prime target for attackers. Traditional security tools often fall short, leaving your applications vulnerable. You need Application Detection and Response (ADR) to gain deep visibility into application behavior: It allows you to detect and respond to attacks in real time. This proactive security posture helps prevent breaches, minimize dwell time, and ultimately protect your organization's critical data and operations.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.