Leadership
How to Transition from a Security Engineer or Analyst to a Strategic Leader
Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles ...

Locked In – The Cybersecurity Event of the Year
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing short ...

Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead ...

5 Strategies for Cybersecurity Leaders to Influence Without Authority
Discover 5 powerful strategies for cybersecurity leaders to influence without authority. Learn how to build trust, tell compelling stories, cultivate champions, leverage reciprocity, and align security with business outcomes ...

50 CISOs & Cybersecurity Leaders Shaping the Future
I am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make our digital ecosystem trustworthy!An incredible list of cybersecurity CISOs and ...

On the Brink: Why AppSec Leaders are Burning Out (and How to Stop It)
Application Security (AppSec) leaders are facing increasing levels of burnout due to the demanding nature of their roles. This webinar addresses the critical issue of AppSec leader exhaustion, exploring the unique challenges ...

The CISO Role is Becoming Impossible – Here is How to Succeed
Learn about the challenges that make the CISO role feel impossible, from the ever-expanding scope of responsibilities to the war for cybersecurity talent. Discover strategies for success, including staying agile, partnering with ...

Securing modern application development: the CISOs’ and security team’s perspective
Application security has never been easy, but more recently it’s gotten much more complicated. It used to be about finding vulnerabilities in code. But as applications have gotten more complex, development teams ...

Overcoming our “bossypants” bias
This is the fifth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. We've previously looked at some of Sandberg's evidence That women are underrepresented ...
Other thoughts from Lean In
My previous posts in this series have touched on the core issues that Sheryl Sandberg addresses in her book Lean In: Women, Work, and the Will to Lead. If you're interested in these ...