Strategies
June 06, 2019

Welcome to CISO to CISO 2.0

blog
1 min. read
By Mary Gardner

As the Chief Information Security Officer at F5, it is my pleasure to welcome you to F5 Labs’ CISO to CISO section. This is an arena for frank and transparent discussions on all aspects of running an information security program. We’ll discuss topics like technical guidance on mitigating specific risks, as well as broader perspectives on building program maturity, communicating about security, new approaches, and ruminations on the future of the field.

Before I came to F5, I worked in security in one form or another for a wide range of organizations, including Washington Mutual, Fred Hutchinson Cancer Research Center, and as the CISO at Seattle Children’s Hospital. Every place I’ve worked has taught me something different about developing a program, leading a security team, and adapting to change—a changing world, changing architectures and a changing threat landscape. As my roles and responsibilities have grown, I have had to place greater emphasis on communication and politics, the “fuzzy” side of security that often goes unappreciated, so we have ensured that we address the broader questions here as much as we do the nitty-gritty.

Every CISO and security practitioner I’ve met along the way has experiences and a perspective that are worth hearing, so we feature guest contributors with diverse backgrounds and viewpoints to prompt us all to pause and rethink our assumptions. It’s with all of this in mind that I hope F5 Labs continues to serve our community as a venue for security professionals to learn, share, reflect (and vent) to our mutual benefit.

Need-to-Know

Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.