In an era defined by rapid technological advancement, businesses across industries are racing to stay competitive by adopting digital solutions. At the heart of this shift is the growing need for Digital Transformation Services, which help organizati
Blog (925)
This is smart: a financial sector CISO recognizes the inherent risks of MCPs, that are used by agentic AIs, and role-plays the attackers to find vulnerabilities to protect the overall environment! Focusing red and purple team investments to areas tha
198 thousand LinkedIn followers! That is truly amazing. I am humbled and honored to be a part of such an incredible community! Thank you everyone.
My goal is to make digital technology trustworthy. To that end, I share ideas and innovation, foster com
Cybersecurity and digital identity march towards an intersection.
The age-old approach of cybersecurity has been to defend networks, devices, and applications against external threats. Enterprise defense strategies have always been based on firewalls,
In 2026 two classes of threat actors will rise in the overall impact rankings: Data Harvester and Vulnerability Researcher. AI tools will benefit them greatly in their pursuits, which will have a cascading impact on the types of attacks and damage ca
This Week’s Pick by David B. Cross (CISO, Atlassian)
The cybersecurity landscape has evolved dramatically. A decade ago cybercrime was a costly nuisance; today it is a national‑security threat and a billion‑dollar industry in its own right. The stakes are especially high for enterprises, small and medi
Former cybersecurity ransomware negotiator turns to the dark side and into a ransomware cybercriminal.
Here is another ugly lesson in “be careful who you trust, even in cybersecurity”. We have seen malicious individuals, deceitful vendors, and product
The convergence between anti-money laundering and cybersecurity control is rapidly taking the shape of the future of financial crime prevention. With digital banking, instant payments, and remote onboarding becoming the norm, criminals are both takin
I am honored to be listed among this great group of cybersecurity leaders!
“2025 USA Top 30 Winners didn’t just protect their organizations; they transformed them. These leaders proved that reactive security is dead. What matters now is proactive resi
Join us for a live Panel Discussion on "Top Breaches in Cyber Security in 2025" with Sachin Deodhar (Former CTO, Government Intelligence Establishment), Maril Vernon (Field Offensive Security Officer, FireCompass), Matthew Harris (Director of Securit
Actionable Insights For CISOs
1) Assume Compromise Before a Vulnerability Is Publicly Disclosed
Zero-day exploitation cycles are now measured in weeks, not months, and attackers often maintain silent presence long before vendors acknowledge the risk.
Full list and detailed breakdown available on my Substack: https://matthewrosenquist.substack.com/p/top-10-cybersecurity-predictions
Actionable Insights for CISOs
1. Treat Workforce Stability as a Core Risk Management Priority
Don’t view layoffs, freezes, and budget cuts as HR issues, tie them directly to enterprise risk metrics.
Build executive dashboards that show how staffi
Actionable Insights for CISOs
1. Redefine Cyber Terrorism as an Enterprise Risk
Cyber terrorism is not limited to nation-states or military targets. Any organization that supports public services, financial systems, or digital trust can become a targ
This Week’s Pick by David B. Cross (CISO, Atlassian)
Actionable Insights for CISOs:
1. Treat Prompt Style as an Attack Surface, Not a Cosmetic Detail
Most organizations assess AI risk by focusing on what a user asks, assuming harmful intent will be explicit and easy to detect. For CISOs, this means pro
Security architecture and practices are important to every vendor, but the expectations and consequences are especially high for Cybersecurity products. When a password or credential vendor has multiple breaches, not only do customers abandon them bu
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
Panel Discussion: Top Breaches in Cyber Security in 2025
- Description:
Join us for a live Panel Discussion on "Top Breaches in Cyber Security in 2025" with Sachin Deodhar (Former CTO, Government Intelligence Establishment), Maril Vernon (Field Offensive Security Officer, FireCompass), Matthew Harris (Director of Security, Specialty Dental Brands), and Matthew Rosenquist (CISO and Cybersecurity Strategist, Mercury Risk and Compliance).…
- Created by: Biswajit Banerjee
- Tags: cybersecurity, breach, top breaches, sachin deodhar, maril vernon, matthew rosenquist, matthew harris, panel discussion
