Updated July 06, 2017 (originally published January 18, 2017) Updated July 06, 2017

Welcome to CISO to CISO

2 min. read

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.

As you may or may not know, I spent many years developing cyberwarfare programs for the military before heading up Microsoft’s Global Network Security team and taking on the role of CISO at CrowdStrike. My experience has taught me that no organization is completely secure. We all can—and must—do better.

In this new threat landscape, securing your applications is the key to securing your data and protecting your business. No system is perfect. Companies will get compromised. The measure of your organization is how you respond. We built this forum so that members of the CISO community can discuss current security issues, share best practices, and crowdsource information security. We’ll talk about positioning your business to take advantage of the ongoing digital transformation, how to stay ahead of the multitude of threats and attackers, and the evolving role of the CISO in the constantly changing security landscape.

I could go on, but this portal isn’t about F5 or me personally; it’s about all of us, as fellow members of the CISO community. This thing comes to life when you, through guest blogs, interviews, podcasts, or other means, are willing to share your ideas, opinions, best practices, cautionary tales, and success stories with confidence and trust. That’s what I’m hoping we can build here: a forum that brings to light the issues that affect us the most. It’s not about products. It’s about ideas and sharing them.

Join me as we walk through this landscape of evolving threats, dedicated adversaries, and ongoing opportunities to innovate. Together, we’ll all be more secure.

Join the Discussion


Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.