CISO Conversations: CISOs of Identity Giants IDEMIA and Ping
SecurityWeek recently had the opportunity to speak with Dennis Kallelis, Chief Security Officer at IDEMIA, and Jason Kees, Chief Information Security Officer at Ping, two industry leaders in identity and security. The conversation centered around the role of the modern CISO and the paths that these two esteemed professionals took to reach their current positions.
The Unplanned Career Path
One common theme among many top CISOs today is that they did not plan to end up in their current positions. Cybersecurity was a relatively new field when they started, and for many, it was a matter of being in the right place at the right time.
Kallelis recalled a moment in 2006 when he was walking down the hallway in his office and his CEO approached him, asking if he had federal security clearance and if he was an engineer. When Kallelis confirmed, his CEO named him the new chief security officer. This unexpected promotion prompted Kallelis to become determined to do such a good job that his company couldn’t do without him.
Kees also fell into cybersecurity due to a need he saw in the industry. He started his career as an engineer and saw a lack of dedication to security in his field. He decided to change that and became a leader because it was necessary.
<< photo by George Becker >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- Exploring the Ransomware Epidemic: A Fresh Perspective on Cyber Threats
- The Escalation of Ransomware Extortion: A Deep Dive into the Soaring $449.1 Million Crisis
- MOVEit: Exploring the Vulnerabilities and Resilience of Supply Chain Security
- Navigating the AI Frontier: Safeguarding Your Business Against Potential Pitfalls
- The Urgent Call for a National Cyber Director: Industry Groups Push White House to Take Action
- SpecterOps Secures $33.5M in Series A Extension, Fueling Growth and Innovation
- Digital Privacy: Evaluating the Impacts of Meta’s Race to Dethrone Twitter
- Promoting Data Privacy: Exploring Collaborative Analysis with Missing Values Safeguarded
- Swedish Regulators Crack Down on Corporate Google Dependency
- The “Pig Butchering” Crypto Scam: Unraveling the Massive Wealth Transfer to Southeast Asia
- No Patch Available: Microsoft Sounds Alarm over Office Zero-Day Attacks
- “Mastodon: Patching Bugs, but Can It Truly Challenge Twitter’s Dominion?”
- The Unending Struggle: Cyberattacks, Defense, and the Battle to Protect Our Digital World
- Microsoft Takes a Stand Against Chinese Cybercriminals by Revoking Signed Drivers
- Introducing Aurora™: Hubble’s Revolutionary Cybersecurity Asset Intelligence™ Platform