Strategies

Welcome to CISO to CISO

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.
January 18, 2017
2 min. read

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.

As you may or may not know, I spent many years developing cyberwarfare programs for the military before heading up Microsoft’s Global Network Security team and taking on the role of CISO at CrowdStrike. My experience has taught me that no organization is completely secure. We all can—and must—do better.

In this new threat landscape, securing your applications is the key to securing your data and protecting your business. No system is perfect. Companies will get compromised. The measure of your organization is how you respond. We built this forum so that members of the CISO community can discuss current security issues, share best practices, and crowdsource information security. We’ll talk about positioning your business to take advantage of the ongoing digital transformation, how to stay ahead of the multitude of threats and attackers, and the evolving role of the CISO in the constantly changing security landscape.

I could go on, but this portal isn’t about F5 or me personally; it’s about all of us, as fellow members of the CISO community. This thing comes to life when you, through guest blogs, interviews, podcasts, or other means, are willing to share your ideas, opinions, best practices, cautionary tales, and success stories with confidence and trust. That’s what I’m hoping we can build here: a forum that brings to light the issues that affect us the most. It’s not about products. It’s about ideas and sharing them.

Join me as we walk through this landscape of evolving threats, dedicated adversaries, and ongoing opportunities to innovate. Together, we’ll all be more secure.

Join the Discussion
Authors & Contributors
Mike Convertino (Author)
Head of Technology

What's trending?

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read