Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

    
Cybersecurity Insights with Contrast CISO David Lindner | 5/31/24

Insight #1

Transparency isn't just about promising action, it's about proving it. It means sharing the data and results that show you're following through on your commitments.

Insight #2

In the age of Artificial Intelligence (AI), Chief Information Security Officers (CISOs) and security leaders face increased pressure to implement new technologies, and to do so quickly. However, it's crucial for them to have the power and willingness to say "no" to protect their organizations from unnecessary risks and to ensure alignment with overall business objectives. You can say “No” without being viewed as “the Department of No”: You do so by keeping the conversation going, turning the “No” into a “Yes, and…” By focusing on strategic decision-making and prioritizing initiatives based on their impact on security and the organization's goals, CISOs can effectively manage the challenges presented by AI and drive successful outcomes.

Insight #3

 According to a Kroll report, attackers are benefitting from AI. They’re using IT to automate tasks, improve social engineering attacks and develop more sophisticated malware. To counter this evolving threat, organizations need to adopt a proactive approach to cybersecurity, staying informed about emerging threats, investing in robust security measures and continuously adapting their defense strategies.

David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.