This Week’s Pick by David B. Cross (CISO, Atlassian)
Why this matters to CISOs
|
Copy-paste takeaways for your team
|
Standout ideas from the session
- Phishing-resistant MFA matters. Not all MFA stops token theft.
- Security awareness has limits. Expecting users to catch this is unrealistic.
- Attackers use SaaS tooling. These are commoditized, not elite techniques.
- Conditional Access is the new firewall. Powerful but easy to misconfigure.
Try these in the next 7 days
- Log review: Correlate MFA success with unusual access behavior.
- Session revocation drill: Validate you can fully invalidate tokens fast.
- Email review: Audit encrypted messaging configurations.
- CA policy check: Re-evaluate Conditional Access logic and inheritance.
- Attack simulation: Test MFA proxy attacks internally.
About David B. Cross
David B. Cross is Chief Information Security Officer at Atlassian. Before Atlassian he held senior security leadership roles at Microsoft, Google and Oracle and began his career in US Navy aviation and electronic warfare. His work focuses on building engineering centric security programs, scaling security operations and helping the next generation of practitioners build meaningful careers.
Want your pick featured next?We are building a rotating slate of member recommendations from USA, Middle East and India. If you are a CISO or security leader, submit a link and 3 bullets on why it matters for other security teams. |
How we choose
|

Comments