SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
VOL 10 | ISSUE 08 | 2022
Exhibiting a Resolute Leadership Acumen in Cybersecurity
Influential
Leadersin
Cybersecurity
2022
Most
10
Group Chief Information
Security Officer
Access Banking Group
Favour
Femi-Oyewole
ybersecurity has risen to prominence on the agenda of
Cstaunch business leaders. Large firms have been struggling
with it for decades despite significant investment in that
space; however, for many across the boardroom, the realization
has taken place over the past few years that cyberattacks were
simply a matter of "when," not "if."
As the demand for robust security defence grows by the day, the
market for cybersecurity technology has been transforming, as
well as the number of solutions. Cybersecurity threats are on the
rise. With the rapid increase in security breaches, company hacks
and data leaks, cybercrime has become one of the most significant
threats to global business.
Large-scale transformative initiatives are shaping up in many
organizations and industries where cybersecurity maturity has
been low for decades. Still, in the current global enterprise context,
businesses have become increasingly reliant on technology, and
the need for qualified cybersecurity professionals continues to
grow.
Cybersecurity is all about sorting and solving complex problems
and spotting vulnerabilities. The professionals who are working in
this niche comprehend extensive experience in thinking critically
and coming up with creative solutions that are essential for this
field. Especially since there is no scarcity of potential cybersecurity
threats in the digitally advanced world.
These professionals ensure data protection while adhering to the
fact that cybersecurity is not about knowing how to use antivirus
software or firewalls. It is more about identifying and solving
problems promptly and efficiently before these issues turn into
major setbacks!
EDITOR’S NOTE
Entering a Realm of
Transformation and Novelti
Ultimately, it is a matter of fact that the best cybersecurity professionals recognize how to solve problems
and are not afraid to dive headfirst into complex projects and figure things out as they go along.
On the other hand, as businesses continue to grow and increase their investments in enhancing
cybersecurity, these organizations approach cybersecurity analysts who can anticipate potential threats
and circumvent them before they happen. As with any technical field, cybersecurity is rapidly changing
while experiencing a significant benchmark of excellence with the innovations driven by the starlets of this
niche.
CIOLook sheds light on the dignitaries who are committed to the best practices and emerging industry
trends and learning and self-educating - both on and off the clock, in its latest edition, "10 Most Influential
Leaders in Cybersecurity, 2022.”
Flip through the pages and indulge in the odyssey of sparkling augmentations with a distinctive skillset
that is revolutionizing the cybersecurity sector.
Have a Delightful Read!
ies
Abhishek Joshi
Abhishek Joshi
Influential
Leadersin
Cybersecurity
2022
Most
10
C O V E R S T O R Y
08
Favour
Femi-Oyewole
Exhibiting a Resolute Leadership Acumen in Cybersecurity
Akinlawon Babajide Fayokun
14 20
Christopher (Chris) Leigh
Chief Information Security Officer
Eversource
C O N T E N T S
CXO
24
Industry Intel
Rethinking the products
of today
for a better tomorrow
26
Leader’s Viewpoint
Its all about Evolving
18
Mr. Ahmed Zebeib,
Deputy Chief Executive Officer,
QLM Qatar Life & Medical Insurance
Akinlawon Babajide Fayokun,
Ethical Hacker
Boch Systems West Africa
CONTENT
Senior Editor Alan Swann
Executive Editors Abhishek Joshi
DESIGN
Visualizer Dave Bates
Art & Design Director Revati Badkas
Associate Designer Sandeep Tikode
SALES
Vice President Operations Kshitij S.
Senior Sales Manager Prathamesh Tate
Sales Executives Rohit, John
TECHNICAL
Technical Head Amar Sawant
Technical Consultant Victor Collins
October, 2022
Copyright © 2022 CIOLOOK, All
rights reserved. The content
and images used in this
magazine should not be
reproduced or transmitted in
any form or by any means,
electronic, mechanical,
photocopying, recording or
otherwise, without prior
permission from CIOLOOK.
Reprint rights remain solely
with CIOLOOK.
FOLLOW US ON
www.facebook.com/ciolook
www.twitter.com/ciolook
WE ARE ALSO AVAILABLE ON
Email
info@ciolook.com
For Subscription
www.ciolook.com
CONTACT US ON
Shellie Jones
Editor-in-Chief
sales@ciolook.com
SME-SMO
Research Analyst Eric Smith
SEO Executive Ravindra Kadam
Brief
Company Name
Boch Systems West Africa provides customized solutions
dealing with data security, data misuse, web attacks, and digital
forensics.
Featured Person
Boch Systems West Africa
bochsystems.net
Akinlawon Babajide
Fayokun
Ethical Hacker
Tapad Graph is evolving with the changes to privacy regulation
and data deprecation across our customer's most essential touch
points with consumers to support their efforts without
disruption.
Tapad
tapad.com
Ben Rothke
Senior Information
Security Manager
FirstBank offers banking solutions for businesses and
consumers including loans, mortgages, checking and savings
accounts, online and mobile banking.
FirstBank
efirstbank.com
Brenden Smith
CISO
Eversource is a business & residential energy provider in CT.
Access information about your residential account, outages,
programs, safety tips and more.
Eversource,
eversource.com
Chris Leigh
CISO
Access Bank's mission is to help its clients achieve all of their
financial objectives by prudently balancing their investment
needs.
Access Bank
accessbankplc.com
Favour Femi-Oyewole
Chief Visionary Officer
(CVO)
and Co-founder
Petrofac Limited is an international energy services company
that designs, builds, manages and maintains oil, gas, refining,
petrochemicals and renewable energy infrastructure.
Petrofac
petrofac.com
George Eapen
Group CIO
J.P. Morgan is a global leader in financial services offering
solutions to the world's most important corporations,
governments and institutions.
JP Morgan
jpmorganchase.com
Marissa Reese Wood
Executive Director
Academy offers the best brands under one roof — curated to
make the most of every budget.
academy
academy.com
Mark Alvarado
Director of Cyber Security
& IT Compliance
Cybertronium is a Cybersecurity Product, Services and
Training company that provides highly focused skills training
with 100% hands-on practical experience.
Cybertronium
cybertronium.com
Priyanka Jayakumar
Cybersecurity Blogger
The CERT Division is a leader in cybersecurity.
CERT Division at the
Software Engineering
Institute
dell.com/en-in
Bobbie Stempfley
Vice President
Favour
Favour
Favour
Femi-Oyewole
Exhibiting a Resolute Leadership Acumen in Cybersecurity
C O V E R S T O R Y
Efficiency and the ability
to reach a wider market
are a few of the values
we have enabled through
making digital technology
work for us.
Favour Femi-Oyewole,
Group Chief Information
Security Officer
Access Banking Group
O
utstanding leadership is the result of someone
who takes great pride in bringing others along
for the enriching climb up the ladder to
success. This climb often leads to discoveries,
advancements, and shared achievements. Achieving
success in a technology management role requires
more than just a fascination with the latest technology.
This is why Cybersecurity is often viewed as a technical
and complex field. Few realize, however, that
cybersecurity also focuses on how people work and the
way they think.
Businesses do require skills like threat intelligence,
network security, and incident response, but these
should not be the benchmark to measure cyber leaders.
Cyber leaders always appreciate technical capabilities,
but they need to be someone with an influential voice in
business strategy, enterprise risk management, and
technology decisions. Cyber leaders are focused on
building authentic relationships across the business
ecosystem alongside structuring, empowering, and
growing teams.
They also maintain to translate abstract technical
concepts into messages that can illuminate senior
leaders both logically and emotionally and elicit their
contributions. This is how Favour Femi-Oyewole,
Group Chief Information Security Officer at Access
Banking Group, excels as one of the proficient leaders
in this niche.
In an interview with CIOLook, Favour Femi-Oyewole
shared valuable facts about Access Banking Group,
highlighting the significance of her staunch leadership
acumen empowering advancements in the
cybersecurity niche.
Below are the excerpts from the interview:
Favour, brief our audience about your journey as a
business leader until your current position at Access
Banking Group. What challenges have you had to
overcome to reach where you are today?
I believe the journey of leadership begins with the self.
Every great leader starts by consciously developing
themselves into becoming an authority in whatever
they do. I am a business leader, and I am also a techie; I
know the techie may sound surprising. I have other
post-graduate degrees, including in business, but my
first degree is in a technical profession, computer
science, to be precise.
As per initial foundations, you can say I am a techie, and
added to this; I am also a woman. Starting my career in a
technical profession and carving out a path as a
computer security specialist required a good degree of
determination and study, of course, both practical
implementations and theoretical underpinnings.
Combining this within the context of the larger
activities that were fulfilled as part of living daily, I
would say these conditions individuals by putting one in
a rather difficult to discern inertial frame of reference.
Inertia is central in this conditioning, and it is such as to
keep us from making a much greater impact than we
are capable of. For example, one finds it difficult to
move from impact at a techie level to leading business
impacts at one stage. Another could be resting on one's
oars because of some wins.
This tendency to settle for the status quo has been the
main challenge I have had to overcome each step of the
way as I sought to add value and create and generate
impact at every opportunity I have. Value to myself, the
teams I lead, and teams led by others both horizontally
and vertically in each organization I had the privilege to
have been a part of both in work and non-work settings.
Overcoming the challenges of transitioning from
technical specialist to business leader has been made
smoother through the numerous supports received
from my family, colleagues, and business leaders I had
the opportunity of working with.
Tell us something more about Access Banking Group
and its mission and vision.
Access Bank, a wholly owned subsidiary of Access
Holdings Plc ("Access Corporation"), is a leading full-
service commercial bank operating through a network
of more than 700 branches and service outlets,
spanning 3 continents, 17 countries, and 45 million
customers.
Access Banking Group. has evolved from an obscure
Nigerian Bank into a world-class African financial
institution. Today, we are one of the five largest banks
in Nigeria in terms of assets, loans, deposits, and branch
network, a feat that has been achieved through a
robust long-term approach to client solutions –
providing committed and innovative advice.
Access Bank continued its impressive growth trend,
both organically and by acquisition, and quickly became
one of Nigeria's leading corporate banks with a
reputation for strong compliance, risk management,
and trade finance.
Our core values are set firmly on the following
Leadership, Excellence, Empowered employees,
Passion for customers, Professionalism, and Innovation.
Our Vision - To be the world's most respected African
bank
Our Mission - Setting standards for sustainable
business practices that unleash the talents of our
employees, deliver superior value to our customers,
and provide innovative solutions for the markets and
communities we serve.
Enlighten us on how you have impacted cybersecurity
through your expertise in the market.
I formerly held positions as the first Chair of the
Standard and Evaluations Committee and a member of
Nigeria's Cybercrime Advisory Council, both of which
had the responsibility of implementing cybersecurity
throughout all Nigerian industries.
The contributions at the forefront of my heart are
positively impacting the African cybersecurity skillset
and having professionals whose proficiency is at par
with what you will find in the top cyber nations.
Through interactions and contributions, my
contributions to attaining strategic objectives,
increasing value, and keeping information safe have
been recognized by my country and the business
community. I have a leading position among the most
enthusiastic and outstanding leaders of thought on
cybersecurity & governance in Africa.
For example, contributions and recognitions such as
Outstanding Cybersecurity Woman Leader 2020,
Women in Cybersecurity Award (WiCA) by Cyber in
Africa. I was the first woman in the world to win the
Global Certified CISO (G C|CISO) of the Year 2017
from the EC-Council in the USA. and a member of the
Global CCISO Advisory Board, EC-Council, USA.
Describe in detail the values and the work culture that
drives Access Banking Group.
Our core values underlie everything we do, and these
are reflected in our everyday interactions at Access
Banking Group. At the forefront, we can be seen
leading positively in each dimension of corporate
impact. We lead by taking the right steps, constantly
improving, and habituation. For use, excellence
becomes a habit and an effortless action.
So, through our targeted training and empowerment,
our employees reflect intuitively on their passion for
customers. Our customers feel the warmth of our
professionalism, and mutually, we work together to
grow their businesses and aspirations. The outcome is
that together we grow, seek out better solutions, and
drive sustainable innovation for our customers for a
positive impact globally and through Africa.
Undeniably, technology is playing a significant role in
almost every sector. How are you leveraging
technological advancements to make your solutions
resourceful?
Technology is a driving force in our business. Efficiency
and the ability to reach a wider market are a few of the
values we have enabled through making digital
technology work for us. We understand that
technology is a tool; hence, we ensure our employees
are well grounded and trained so we can have the
winning combination of people, processes, and
technology to drive innovation and creativity.
Security is a tool, and with relevant automation,
implementing solutions has become seamless.
Many things can now be done with little or no
supervision, thereby allowing us to maximize time and
yield more positive results.
What change would you like to bring to the
cybersecurity industry if given a chance?
Artificial intelligence (AI), Blockchain technologies, and
Machine Learning (ML) are making it easier to make
informed decisions more quickly, use cases to enhance
trust, and enhanced predictive analysis; however, we
would like to see greater interoperability in log data
formats and its processing to reduce the man work that
goes into the architecting to make it more seamless.
Work has begun in this respect at a global level, but I
would like to see an acceleration of these efforts.
What, according to you, could be the next significant
change in the cybersecurity sector? How is Access
Banking Group preparing to be a part of that change?
Advances in quantum technology promise to bring
major changes, and globally there are concerns about
what the massive increase in computing ability may
bring. We are preparing for this both from the risk and
opportunity perspective. One of our risk mitigation
actions is embracing quantum-safe cryptography and
creating awareness of why this needs to be considered
and brought closer to the horizon. On the opportunity
side, we see potential and look forward to driving
greater innovation as the technology becomes more
accessible.
Where do you envision yourself to be in the long run,
and what are your future goals for Access Banking
Group?
Making a greater impact, remaining a globally sought
Cybersecurity & Information Risk Management expert,
and championing the sustainable use of technology, AI,
and Quantum technologies in a safe, ethical, and
sustainable way. While I continue to work as an integral
part of ensuring the strategy and business objectives of
Access Banking Group are always achieved.
What would be your advice to budding entrepreneurs
aspiring to venture into cybersecurity?
My advice to them would be to never stop learning.
Cybersecurity is a fast-growing field; new threats are
being discovered daily. You must be at the top of your
game.
Secondly, we need more entrepreneurs in cyberspace. I
will encourage African entrepreneurs and skilled cyber
professionals to synergize, create products, and tap
into the global cybersecurity market to drive greater
derivable value from an African perspective.
1 Year
12 Issues
$250
6 Months
6 Issues
$130
3 Months
3 Issues
$70
1 Month
1 Issue
$25
CHOOSE OUR SUBSCRIPTION
Stay in the known.
Subscribe to CIOLOOK
Get CIOLOOK Magazine in print, and
digital on www.ciolook.com
By nature, we are
all going to face
challenges, just
that individual
challenges might
differ from each
other. But what
kept me going
regardless of
things I was
facing is
‘determination.
Akinlawon Babajide Fayokun,
Ethical Hacker
Boch Systems West Africa
| October 2022 |
www.ciolook.com
14
Babajide Fayokun
Akinlawon An Ascension of
Determination
T
he ladder to success often comes with some
steps missing. In those times, it is the simple
determination that carries forward, even as
resources fall short, because grit sees obstacles to
overcome, rather than just dead ends. Living this truth
is Akinlawon Babajide Fayokun, working as an Ethical
Hacker at Boch Systems West Africa.
Akinlawon is a cybersecurity expert specializing in
penetration testing. He encounters dead ends, threats,
and cyber-attacks on a daily basis, but he meets them
with equanimity and a resolve to succeed.
Akinlawon is skilled in deterring, identifying,
containing, investigating, and preventing cyber-attacks
on the network, endpoints, and the web. He performs
comprehensive computer surveillance/monitoring and
identifies vulnerabilities and processes to ensure the
confidentiality, integrity, and availability of agency
information resources.
He is also proficient in vulnerability assessment &
penetration testing, threat hunting, malware analysis,
threat intelligence, email analysis, computer
networking, data loss prevention, incident response,
and improving soc processes by utilizing top industry
security solutions.
Akinlawon Babajide Fayokun, in an exclusive interview
with Insights Success, relates a journey of encountering
challenges with a firm resolution to succeed.
Being a Self-Starter
“I’m a self-motivated and goal-oriented cyber security
expert,” begins Akinlawon, “I started my journey as a cisco
network engineer, where I managed a medium-scale
network infrastructure.” He continues, “My business
leadership skill grew more when I started handling the
entire IT infrastructure budget. This was initially difficult
because sometimes the management would assign a budget
that was hard to adhere to, but it really built my budget
management skills.”
Due to the rate of unemployment and the demand for
IT skills, Akinlawon created a service named ‘Space
Block Technology.’ Here he trained people on IT skills,
mentored beginners in cybersecurity & software
development, and also offered buying and selling
services for computer accessories.
Currently, Akinlawon is working at Boch Systems as a
full-time Ethical hacker (Penetration Tester), where he
performs authorized security testing on computer
systems in order to expose weaknesses.
Challenges as Stepping Stones
Akinlawon says, “By nature, we are all going to face
challenges, just that individual challenges might differ from
each other. But what kept me going regardless of things I
was facing is ‘determination.’”
Even when he was yet to have his own personal laptop,
Akinlawon would borrow laptops from his friends to
study. Sometimes he would go down to the cybercafé
and spend nights there to learn and do his online labs
simply because he was so determined.
“Another challenge I encountered was society because we
all come from different societies and have different beliefs
and cultures. One thing that can affect his or her growth is
society, so I make sure I focus on the positive side and see
myself beyond my society.”
BOCH Systems West Africa
Founded in 2006, Boch Systems Company Limited
(BOCH) is a leading premium provider of business
technology integration. Its mission is to provide
professional and quality service delivery on information
and communication technology that is reliable, timely,
and cost-effective; to its esteemed clients through a
highly skilled and dedicated workforce, partners, and
technology, returning value to its stakeholders.
10 Most Influential Leaders in Cybersecurity, 2022
| October 2022 |
www.ciolook.com
15
The business is founded on three core pillars of Trust,
Experience, and Dedication. It has four core values:
Leadership, Excellence, Proactive, and Passion.
Employees are encouraged to share these core values
in order to achieve desired levels of business and
individual performance.
Leadership: We are committed to being a benchmark
and reference point in our operating space.
Excellence: We commit to the highest possible
standards of service delivery.
Proactive: We are committed to consciously creating
the future we desire for our clients, staff, and all
stakeholders.
Passion: We are excited about what we do and the
opportunities that abound by leveraging the power of
technology.
Skills for Impact
Akinlawon uses his skills to leave an impact on this
world. He says, “I have used my knowledge and skills of
cybersecurity to change people's lives by training and
mentoring the youth on cybersecurity skills, supporting
people on various challenges, defending and preventing
cyberattacks on enterprises, undertaking vulnerability
assessment and penetration testing on government
infrastructure, financial/fintech institutes, law firms, etc.”
Akinlawon is also the chapter leader of OWASP (Open
Web Application Security Project) in his region (Lagos
chapter). There he supports and helps software
developers in solving security challenges, helps
youngsters learn secure coding best practices, and does
application vulnerability assessments & penetration
testing.
Creating Optimized Solutions
The digital world is now going completely into
automation simply because it helps in solving several IT
problems and makes work faster. Akinlawon also often
uses technological advancements to enhance his
cybersecurity solutions.
He says, “Just recently, I found myself in a very large
financial institution where I was meant to perform security
testing. To not waste time, I developed an automated
network IP scan with PowerShell scripts.”
Building a Secure Practice
In Akinlawon’s opinion, no system is 100% secure but
cybersecurity regulations should be constantly done to
see if the organization is regularly abiding by best
practices for security. There should be more focus on
the people than the technology because humans often
are the weakest link.
| October 2022 |
www.ciolook.com
16
Mr. Ahmed Zebeib,
Deputy Chief Executive Officer,
QLM Qatar Life & Medical Insurance
ackground: QLM Life and Medical Insurance is
Bconsidered as the largest health insurance
company in Qatar and the only specialized
company that leads the health insurance sector
through its advanced services and flexible insurance
programs that suit all segments of society in Qatar.
We live in a world that has become highly dependent on
information technology in management, especially with
managing a large volume of data, as is the case in health
insurance. Therefore, our vision in this field was to
develop a system capable of absorbing any volume of
data and managing it effectively in the most efficient
way possible. This will, in turn, positively reflect on the
speed of responding to the requirements of our
customers and the requirements of medical service
providers at the same time.
The advancement of technology benefit both insured
members and insurance companies; QLM is no
exception. QLM is constantly innovating and growing;
we capitalized on the extensive data, experience, and
technology advancement to build an outstanding
insurtech to guarantee excellence in our services. At
the same time, it gives us a real time feedback on
operations. The development of our solutions was
highly sophisticated as it involved many parties
internally as well as externally. We’ve invested in
developing a highly sophisticated solution involving
both internal and external parties.
We managed to build a system through an interactive
electronic platform that automatically approves
without the need for human intervention except in rare
cases, which shortens the time for issuing approval to a
record time where the patient experiences a seamless
process. This electronic platform helps health centers
communicate, get the right information, and make the
whole transaction an easy journey for both parties. All
this is in the interest of the client/patient, who will feel
that they are receiving prompt and a high standard of
service.
Today, our systems are all online and fully integrated
with healthcare providers inside as well as outside
Qatar; the provider can at a fingertip verify eligibility,
obtain approval, and submit a claim all online without
the need for any direct interaction with our team. The
secret behind this is the claims auto-approval/auto-
adjudication; our systems are equipped with all
international medical coding that are mapped together
in the back end of the system. Therefore, any coding the
provider is using is mapped and auto adjudicated in the
back end, and the decision is communicated to the
provider by the system.
The crown jewel of our IT platform is the Artificial
intelligence (AI) that we have developed. Underwriting
in health insurance is always seen as risky and needs
extra attention; our AI module analyzes the data
provided by the client and, at the same time, analyzes
the existing QLM data measuring behavior, trend,
frequency, etc. Thus, suggesting an appropriate
premium with the prediction of a loss ratio based on the
suggested premium.
Our AI is constantly monitoring the behavior of
providers in real-time and alerting our team of any
| October 2022 |
www.ciolook.com
18
abnormal behavior that is taking place; it is monitoring
the auto-adjudication module and correcting any errors
that may exist during the process.
We are constantly evolving and growing as the leading
Medical and Life insurer in Qatar; as we rely heavily on
tech, we will continue investing where appropriate to
maximize the satisfaction of all our partners. In QLM,
we believe that insurtech is the present and future. We
will continue playing our role and assessing the markets
worldwide while simultaneously be at the forefront
when it comes to tech and for others to follow.
Mr. Ahmed Zebeib,
Deputy Chief Execu ve Officer,
QLM Qatar Life &
Medical Insurance
| October 2022 |
www.ciolook.com
19
ChristopherLeigh
Exhibiting Brilliance with Sheer Expertise
o act requires comprehension first. Although
Tbusinesses are facing increasing cyber threats
from every direction in modern times, the
expertise needed to understand the threat is scarce at
the C-level associateship. This predominantly affects
the strategic planning of the organization, and being
underprepared for a business, becomes a major source
of risk with a liability.
An understanding of what a cybersecurity threat means
for the business and the solutions it needs to adopt to
mitigate the risk is required. This is what Christopher
Leigh, the Chief Information Security Officer at
Eversource, has been striving to achieve. He has been
leveraging his expertise to communicate effectively and
translate the cybersecurity lexicon into business speak.
Christopher has over two decades of domestic and
global experience in leading cybersecurity teams. He
has a strong background in building and expanding
diverse internal cyber security programs, improving
cultures of security, and communicating risk reductions
through all management levels of the company.
Currently, he is responsible for all aspects of
information security, including Threat and Risk
Management, Policy and Compliance, architecture, and
Incident Response. Christopher is also an adjunct
professor at Central Connecticut State University and
Boston College. He alsosits on the Board of Directors for
Community Solutions, Incorporated, where he continues
to endeavor to disseminate knowledge on the topic of
cybersecurity and corporate leadership.
Christopher is a high-energy, customer-focused cyber
and corporate executive with over multiple years of
global experience in safeguarding the company's
systems and data in the electric, gas, and aerospace
industries. He was named one of the 'Top 100 CISOs' by
Cyber Defense Awards in 2020.
CIOLook caught up with Christopher in an exclusive
interview regarding cybersecurity's importance in the
modern world.
Below are the highlights of the interview:
Chris, please brief our audience on your journey to
being the CISO at Eversource. What challenges have
you had to overcome to reach where you are today?
My career has been focused on the Aerospace and
Defense and Electric/Natural Gas utility industries. I
have been in the Information Technology field for over
20 years, spending the last 18 years in cyber security.
Having Finance and, subsequently, IT experience has
helped me develop a balance between technology and
business. Many IT security leaders have strong
technical skills. However, if you can't understand
business issues and communicate the risk to the
business, then you will never be adequate.
I would say that over the past five to ten years,
management has begun to value the CISO because we
are able to communicate with business leaders. So, I
appreciate everyone who has coached and mentored
me throughout the years to help me get to where I am
now.
Can you guide us about the Eversource mission and
vision?
Eversource is the provider of the largest electric,
natural gas, and water utilities in New England,
servicing over 4 million customers across the states of
Connecticut, Massachusetts, and New Hampshire. Our
corporate vision is to continue to deliver safe and
reliable electricity, natural gas, and water to our
customers.
We also plan to be carbon neutral by 2030. Because our
employees live in our service territory, they are
members of the communities we serve. Our greatest
asset, our employees, spend significant time
volunteering in the community. All of these efforts will
result in a cleaner, more reliable energy future.
| October 2022 |
www.ciolook.com
20
Christopher (Chris) Leigh,
Chief Information Security Officer
Eversource
Having a Finance and,
subsequently, IT
experience has helped
me develop a balance
between technology
and business.
| October 2022 |
www.ciolook.com
21
Please enlighten us on the contributions you have
made in the cybersecurity sector.
My contributions to the cyber security industry are
varied. In addition to my primary job at Eversource, I
have focused on educating the future workforce
through teaching at the undergraduate and graduate
levels. Education of the future workforce, through real-
life experiences, can help students connect the dots
between the textbook and the real world. By getting to
know the students, we are also able to identify interns
who most often become employees after graduation.
I have also been able to work with industry and
government officials to increase the amount and quality
of threat intelligence that is shared between the
government and the industry. This sharing of
information allows organizations to better understand
the threats and subsequently prepare to prevent and or
respond when they occur.
Will you tell us about the values and the work culture
that drives Eversource?
We value dedication to our communities and
customers. Our diverse employees are dedicated and
committed to delivering the best service possible. In
the office, we strive to have a balanced work-life
environment. This commitment ensures we deliver on
our objectives to serve.
Undeniably, technology is playing a significant role in
almost every sector. How are you leveraging
technological advancements to make your solutions
resourceful?
The Electric, Gas, and Water industries leverage
technology to deliver high-quality, reliable services to
our customers. We are enabled through technology to
manage the power grid better and ensure safe water
and natural gas delivery. The available information
allows are control operators to react faster to changing
events and to make more informed decisions.
Technology also enables us to communicate through
different channels with our customers. Our customers
are using technology to access their information and to
interact with our employees. However, some
customers prefer to talk to a person or interact over the
phone. Providing different options enables us to
reachout to more people on their preferred methods.
What change would you like to bring to the
cybersecurity industry if given a chance?
Electric, Gas, and Water industries are considered to be
part of the Critical Infrastructure by the Department of
Homeland Security. The industry and the Federal
Government need to continue to improve their
relationships and share more information to make
informed decisions and to secure their systems better.
What, according to you, could be the next significant
change in the cybersecurity sector? How is your
company preparing to be a part of that change?
Across the world, organizations are facing various
supply chain challenges. This ranges from access to
technology to the security of the technology being
acquired. In my opinion, industries and companies such
as Eversource will continue to work with suppliers and
vendors to ensure they are following best practices for
producing reliable and secure products.
There also needs to be improved information sharing
on vulnerabilities. While there is a need to have a fix
developed when announcing a vulnerability, many
nation-states already know of these vulnerabilities
before they are public. If the vendor can make the
industry aware while they are finding a fix, then
monitoring and mitigating controls can be developed.
We have to work together to fight the adversary who
wants to do us harm.
Where do you envision yourself to be in the long run,
and what are your future goals?
I am very fortunate to be doing exactly what I want.
Eversource is one of the best companies to work for.
My work is challenging and rewarding. I have an
excellent work-life balance, and the time I spend
volunteering and teaching at the college level is
personally satisfying. I hope to be doing exactly what I
am doing for many more years, helping others.
What would be your advice to budding entrepreneurs
who aspire to venture into the cybersecurity sector?
I would suggest to first know yourself and your likes
and dislikes. Then find the path that best fits you. We
need to be curious, humble, and always willing to learn
and grow. Even the most senior executive must always
be willing to learn and develop professionally and
personally.
| October 2022 |
www.ciolook.com
22
| October 2022 |
www.ciolook.com
25
| October 2022 |
www.ciolook.com
26
| October 2022 |
www.ciolook.com
28
Connecting
Dots
with
Technology
10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf

Más contenido relacionado

Similar a 10 Most Influential Leaders in Cybersecurity, 2022.pdf

The 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfThe 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfCIO Look Magazine
 
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...thesiliconleaders
 
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdf
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdfThe 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdf
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdfCIO Look Magazine
 
Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low resMichael McManamon
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 
The 10 Most Influential Leaders in Telecom Industry, 2023.pdf
The 10 Most Influential Leaders in Telecom Industry, 2023.pdfThe 10 Most Influential Leaders in Telecom Industry, 2023.pdf
The 10 Most Influential Leaders in Telecom Industry, 2023.pdfCIO Look Magazine
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdfinsightssuccess2
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Final File The Most Influential CTOs to Follow in the Middle East.pdf
Final File The Most Influential CTOs to Follow in the Middle East.pdfFinal File The Most Influential CTOs to Follow in the Middle East.pdf
Final File The Most Influential CTOs to Follow in the Middle East.pdfTHECIOWORLD
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfThe Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfCIO Look Magazine
 
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...Steven Callahan
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdfCIO Look Magazine
 

Similar a 10 Most Influential Leaders in Cybersecurity, 2022.pdf (20)

The 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfThe 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdf
 
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
 
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdf
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdfThe 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdf
The 30 Most Influential Business Leaders in Tech 2022 Simon Bonk (1).pdf
 
Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low res
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
The 10 Most Influential Leaders in Telecom Industry, 2023.pdf
The 10 Most Influential Leaders in Telecom Industry, 2023.pdfThe 10 Most Influential Leaders in Telecom Industry, 2023.pdf
The 10 Most Influential Leaders in Telecom Industry, 2023.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Final File The Most Influential CTOs to Follow in the Middle East.pdf
Final File The Most Influential CTOs to Follow in the Middle East.pdfFinal File The Most Influential CTOs to Follow in the Middle East.pdf
Final File The Most Influential CTOs to Follow in the Middle East.pdf
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfThe Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
 
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...
201210 Insurance and Technology: Changing Times- How CIO's Can Increase Influ...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
 

Más de CIO Look Magazine

10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf
10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf
10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdfCIO Look Magazine
 
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdf
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdfThe 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdf
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdfCIO Look Magazine
 
Most Powerful Women of The Channel in 2024.pdf
Most Powerful Women of The Channel in 2024.pdfMost Powerful Women of The Channel in 2024.pdf
Most Powerful Women of The Channel in 2024.pdfCIO Look Magazine
 
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdf
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdfGlobal E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdf
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdfCIO Look Magazine
 
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdf
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdfThe 10 Most Innovative Leaders in AI & Big Data, 2024.pdf
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdfCIO Look Magazine
 
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdf
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdfMost Impressive Leaders in Tech, Making Waves in the Industry 2024.pdf
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdfCIO Look Magazine
 
The Most Influential HR Leaders To Follow, 2024.pdf
The Most Influential HR Leaders To Follow, 2024.pdfThe Most Influential HR Leaders To Follow, 2024.pdf
The Most Influential HR Leaders To Follow, 2024.pdfCIO Look Magazine
 
The 10 Most Trailblazing Healthcare Leaders in 2024.pdf
The 10 Most Trailblazing Healthcare Leaders in 2024.pdfThe 10 Most Trailblazing Healthcare Leaders in 2024.pdf
The 10 Most Trailblazing Healthcare Leaders in 2024.pdfCIO Look Magazine
 
The 10 Most Influential Women In Energy,2024.pdf
The 10 Most Influential Women In Energy,2024.pdfThe 10 Most Influential Women In Energy,2024.pdf
The 10 Most Influential Women In Energy,2024.pdfCIO Look Magazine
 
Most Iconic HR Leaders To watch In 2024.pdf
Most Iconic HR Leaders To watch In 2024.pdfMost Iconic HR Leaders To watch In 2024.pdf
Most Iconic HR Leaders To watch In 2024.pdfCIO Look Magazine
 
The 10 Most Influential Leaders In Cloud Tech,2024.pdf
The 10 Most Influential Leaders In Cloud Tech,2024.pdfThe 10 Most Influential Leaders In Cloud Tech,2024.pdf
The 10 Most Influential Leaders In Cloud Tech,2024.pdfCIO Look Magazine
 
Most Iconic Women In Talent Aquisition To watch In 2024.pdf
Most Iconic Women In Talent Aquisition To watch In 2024.pdfMost Iconic Women In Talent Aquisition To watch In 2024.pdf
Most Iconic Women In Talent Aquisition To watch In 2024.pdfCIO Look Magazine
 
Top 10 Visionaries in Data & Analytics,2024.pdf
Top 10 Visionaries in Data & Analytics,2024.pdfTop 10 Visionaries in Data & Analytics,2024.pdf
Top 10 Visionaries in Data & Analytics,2024.pdfCIO Look Magazine
 
The 10 Most Influential Leaders In Real Estate,2024.pdf
The 10 Most Influential Leaders In Real Estate,2024.pdfThe 10 Most Influential Leaders In Real Estate,2024.pdf
The 10 Most Influential Leaders In Real Estate,2024.pdfCIO Look Magazine
 
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdfCIO Look Magazine
 
The 10 Most Visionary Leaders Shining In Mining.pdf
The 10 Most Visionary Leaders Shining In Mining.pdfThe 10 Most Visionary Leaders Shining In Mining.pdf
The 10 Most Visionary Leaders Shining In Mining.pdfCIO Look Magazine
 
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdf
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdfThe 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdf
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdfCIO Look Magazine
 
The Most Innovative Women business Leaders Revamping The Future,2024.pdf
The Most Innovative Women business Leaders Revamping The Future,2024.pdfThe Most Innovative Women business Leaders Revamping The Future,2024.pdf
The Most Innovative Women business Leaders Revamping The Future,2024.pdfCIO Look Magazine
 
10 Influential leaders guiding the future of E-mobility,2024.pdf
10 Influential leaders guiding the future of E-mobility,2024.pdf10 Influential leaders guiding the future of E-mobility,2024.pdf
10 Influential leaders guiding the future of E-mobility,2024.pdfCIO Look Magazine
 
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdf
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdfThe 10 Most Influential Leaders In Supply Chain To watch In 2024.pdf
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdfCIO Look Magazine
 

Más de CIO Look Magazine (20)

10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf
10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf
10 Best Leaders of the AI Age, shaping a New Technological Era - 2024.pdf
 
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdf
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdfThe 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdf
The 10 Most Influential Women Leaders in the Aviation & Aerospace, 2024.pdf
 
Most Powerful Women of The Channel in 2024.pdf
Most Powerful Women of The Channel in 2024.pdfMost Powerful Women of The Channel in 2024.pdf
Most Powerful Women of The Channel in 2024.pdf
 
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdf
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdfGlobal E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdf
Global E-Commerce Leaders Shaping the Retail Future To Know in 2024.pdf
 
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdf
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdfThe 10 Most Innovative Leaders in AI & Big Data, 2024.pdf
The 10 Most Innovative Leaders in AI & Big Data, 2024.pdf
 
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdf
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdfMost Impressive Leaders in Tech, Making Waves in the Industry 2024.pdf
Most Impressive Leaders in Tech, Making Waves in the Industry 2024.pdf
 
The Most Influential HR Leaders To Follow, 2024.pdf
The Most Influential HR Leaders To Follow, 2024.pdfThe Most Influential HR Leaders To Follow, 2024.pdf
The Most Influential HR Leaders To Follow, 2024.pdf
 
The 10 Most Trailblazing Healthcare Leaders in 2024.pdf
The 10 Most Trailblazing Healthcare Leaders in 2024.pdfThe 10 Most Trailblazing Healthcare Leaders in 2024.pdf
The 10 Most Trailblazing Healthcare Leaders in 2024.pdf
 
The 10 Most Influential Women In Energy,2024.pdf
The 10 Most Influential Women In Energy,2024.pdfThe 10 Most Influential Women In Energy,2024.pdf
The 10 Most Influential Women In Energy,2024.pdf
 
Most Iconic HR Leaders To watch In 2024.pdf
Most Iconic HR Leaders To watch In 2024.pdfMost Iconic HR Leaders To watch In 2024.pdf
Most Iconic HR Leaders To watch In 2024.pdf
 
The 10 Most Influential Leaders In Cloud Tech,2024.pdf
The 10 Most Influential Leaders In Cloud Tech,2024.pdfThe 10 Most Influential Leaders In Cloud Tech,2024.pdf
The 10 Most Influential Leaders In Cloud Tech,2024.pdf
 
Most Iconic Women In Talent Aquisition To watch In 2024.pdf
Most Iconic Women In Talent Aquisition To watch In 2024.pdfMost Iconic Women In Talent Aquisition To watch In 2024.pdf
Most Iconic Women In Talent Aquisition To watch In 2024.pdf
 
Top 10 Visionaries in Data & Analytics,2024.pdf
Top 10 Visionaries in Data & Analytics,2024.pdfTop 10 Visionaries in Data & Analytics,2024.pdf
Top 10 Visionaries in Data & Analytics,2024.pdf
 
The 10 Most Influential Leaders In Real Estate,2024.pdf
The 10 Most Influential Leaders In Real Estate,2024.pdfThe 10 Most Influential Leaders In Real Estate,2024.pdf
The 10 Most Influential Leaders In Real Estate,2024.pdf
 
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf
10 Best Leaders Of The AI Age,Shaping a New Technological Era-2024.pdf
 
The 10 Most Visionary Leaders Shining In Mining.pdf
The 10 Most Visionary Leaders Shining In Mining.pdfThe 10 Most Visionary Leaders Shining In Mining.pdf
The 10 Most Visionary Leaders Shining In Mining.pdf
 
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdf
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdfThe 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdf
The 10 Most Ingenious Leaders In data science and analytics,2024 (1).pdf
 
The Most Innovative Women business Leaders Revamping The Future,2024.pdf
The Most Innovative Women business Leaders Revamping The Future,2024.pdfThe Most Innovative Women business Leaders Revamping The Future,2024.pdf
The Most Innovative Women business Leaders Revamping The Future,2024.pdf
 
10 Influential leaders guiding the future of E-mobility,2024.pdf
10 Influential leaders guiding the future of E-mobility,2024.pdf10 Influential leaders guiding the future of E-mobility,2024.pdf
10 Influential leaders guiding the future of E-mobility,2024.pdf
 
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdf
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdfThe 10 Most Influential Leaders In Supply Chain To watch In 2024.pdf
The 10 Most Influential Leaders In Supply Chain To watch In 2024.pdf
 

Último

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 

Último (20)

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 

10 Most Influential Leaders in Cybersecurity, 2022.pdf

  • 1. VOL 10 | ISSUE 08 | 2022 Exhibiting a Resolute Leadership Acumen in Cybersecurity Influential Leadersin Cybersecurity 2022 Most 10 Group Chief Information Security Officer Access Banking Group Favour Femi-Oyewole
  • 2.
  • 3.
  • 4. ybersecurity has risen to prominence on the agenda of Cstaunch business leaders. Large firms have been struggling with it for decades despite significant investment in that space; however, for many across the boardroom, the realization has taken place over the past few years that cyberattacks were simply a matter of "when," not "if." As the demand for robust security defence grows by the day, the market for cybersecurity technology has been transforming, as well as the number of solutions. Cybersecurity threats are on the rise. With the rapid increase in security breaches, company hacks and data leaks, cybercrime has become one of the most significant threats to global business. Large-scale transformative initiatives are shaping up in many organizations and industries where cybersecurity maturity has been low for decades. Still, in the current global enterprise context, businesses have become increasingly reliant on technology, and the need for qualified cybersecurity professionals continues to grow. Cybersecurity is all about sorting and solving complex problems and spotting vulnerabilities. The professionals who are working in this niche comprehend extensive experience in thinking critically and coming up with creative solutions that are essential for this field. Especially since there is no scarcity of potential cybersecurity threats in the digitally advanced world. These professionals ensure data protection while adhering to the fact that cybersecurity is not about knowing how to use antivirus software or firewalls. It is more about identifying and solving problems promptly and efficiently before these issues turn into major setbacks! EDITOR’S NOTE Entering a Realm of Transformation and Novelti
  • 5. Ultimately, it is a matter of fact that the best cybersecurity professionals recognize how to solve problems and are not afraid to dive headfirst into complex projects and figure things out as they go along. On the other hand, as businesses continue to grow and increase their investments in enhancing cybersecurity, these organizations approach cybersecurity analysts who can anticipate potential threats and circumvent them before they happen. As with any technical field, cybersecurity is rapidly changing while experiencing a significant benchmark of excellence with the innovations driven by the starlets of this niche. CIOLook sheds light on the dignitaries who are committed to the best practices and emerging industry trends and learning and self-educating - both on and off the clock, in its latest edition, "10 Most Influential Leaders in Cybersecurity, 2022.” Flip through the pages and indulge in the odyssey of sparkling augmentations with a distinctive skillset that is revolutionizing the cybersecurity sector. Have a Delightful Read! ies Abhishek Joshi Abhishek Joshi Influential Leadersin Cybersecurity 2022 Most 10
  • 6. C O V E R S T O R Y 08 Favour Femi-Oyewole Exhibiting a Resolute Leadership Acumen in Cybersecurity
  • 7. Akinlawon Babajide Fayokun 14 20 Christopher (Chris) Leigh Chief Information Security Officer Eversource C O N T E N T S CXO 24 Industry Intel Rethinking the products of today for a better tomorrow 26 Leader’s Viewpoint Its all about Evolving 18 Mr. Ahmed Zebeib, Deputy Chief Executive Officer, QLM Qatar Life & Medical Insurance Akinlawon Babajide Fayokun, Ethical Hacker Boch Systems West Africa
  • 8. CONTENT Senior Editor Alan Swann Executive Editors Abhishek Joshi DESIGN Visualizer Dave Bates Art & Design Director Revati Badkas Associate Designer Sandeep Tikode SALES Vice President Operations Kshitij S. Senior Sales Manager Prathamesh Tate Sales Executives Rohit, John TECHNICAL Technical Head Amar Sawant Technical Consultant Victor Collins October, 2022 Copyright © 2022 CIOLOOK, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from CIOLOOK. Reprint rights remain solely with CIOLOOK. FOLLOW US ON www.facebook.com/ciolook www.twitter.com/ciolook WE ARE ALSO AVAILABLE ON Email info@ciolook.com For Subscription www.ciolook.com CONTACT US ON Shellie Jones Editor-in-Chief sales@ciolook.com SME-SMO Research Analyst Eric Smith SEO Executive Ravindra Kadam
  • 9. Brief Company Name Boch Systems West Africa provides customized solutions dealing with data security, data misuse, web attacks, and digital forensics. Featured Person Boch Systems West Africa bochsystems.net Akinlawon Babajide Fayokun Ethical Hacker Tapad Graph is evolving with the changes to privacy regulation and data deprecation across our customer's most essential touch points with consumers to support their efforts without disruption. Tapad tapad.com Ben Rothke Senior Information Security Manager FirstBank offers banking solutions for businesses and consumers including loans, mortgages, checking and savings accounts, online and mobile banking. FirstBank efirstbank.com Brenden Smith CISO Eversource is a business & residential energy provider in CT. Access information about your residential account, outages, programs, safety tips and more. Eversource, eversource.com Chris Leigh CISO Access Bank's mission is to help its clients achieve all of their financial objectives by prudently balancing their investment needs. Access Bank accessbankplc.com Favour Femi-Oyewole Chief Visionary Officer (CVO) and Co-founder Petrofac Limited is an international energy services company that designs, builds, manages and maintains oil, gas, refining, petrochemicals and renewable energy infrastructure. Petrofac petrofac.com George Eapen Group CIO J.P. Morgan is a global leader in financial services offering solutions to the world's most important corporations, governments and institutions. JP Morgan jpmorganchase.com Marissa Reese Wood Executive Director Academy offers the best brands under one roof — curated to make the most of every budget. academy academy.com Mark Alvarado Director of Cyber Security & IT Compliance Cybertronium is a Cybersecurity Product, Services and Training company that provides highly focused skills training with 100% hands-on practical experience. Cybertronium cybertronium.com Priyanka Jayakumar Cybersecurity Blogger The CERT Division is a leader in cybersecurity. CERT Division at the Software Engineering Institute dell.com/en-in Bobbie Stempfley Vice President
  • 10. Favour Favour Favour Femi-Oyewole Exhibiting a Resolute Leadership Acumen in Cybersecurity C O V E R S T O R Y Efficiency and the ability to reach a wider market are a few of the values we have enabled through making digital technology work for us.
  • 11. Favour Femi-Oyewole, Group Chief Information Security Officer Access Banking Group
  • 12. O utstanding leadership is the result of someone who takes great pride in bringing others along for the enriching climb up the ladder to success. This climb often leads to discoveries, advancements, and shared achievements. Achieving success in a technology management role requires more than just a fascination with the latest technology. This is why Cybersecurity is often viewed as a technical and complex field. Few realize, however, that cybersecurity also focuses on how people work and the way they think. Businesses do require skills like threat intelligence, network security, and incident response, but these should not be the benchmark to measure cyber leaders. Cyber leaders always appreciate technical capabilities, but they need to be someone with an influential voice in business strategy, enterprise risk management, and technology decisions. Cyber leaders are focused on building authentic relationships across the business ecosystem alongside structuring, empowering, and growing teams. They also maintain to translate abstract technical concepts into messages that can illuminate senior leaders both logically and emotionally and elicit their contributions. This is how Favour Femi-Oyewole, Group Chief Information Security Officer at Access Banking Group, excels as one of the proficient leaders in this niche. In an interview with CIOLook, Favour Femi-Oyewole shared valuable facts about Access Banking Group, highlighting the significance of her staunch leadership acumen empowering advancements in the cybersecurity niche. Below are the excerpts from the interview: Favour, brief our audience about your journey as a business leader until your current position at Access Banking Group. What challenges have you had to overcome to reach where you are today? I believe the journey of leadership begins with the self. Every great leader starts by consciously developing themselves into becoming an authority in whatever they do. I am a business leader, and I am also a techie; I know the techie may sound surprising. I have other post-graduate degrees, including in business, but my first degree is in a technical profession, computer science, to be precise. As per initial foundations, you can say I am a techie, and added to this; I am also a woman. Starting my career in a technical profession and carving out a path as a computer security specialist required a good degree of determination and study, of course, both practical implementations and theoretical underpinnings. Combining this within the context of the larger activities that were fulfilled as part of living daily, I would say these conditions individuals by putting one in a rather difficult to discern inertial frame of reference. Inertia is central in this conditioning, and it is such as to keep us from making a much greater impact than we are capable of. For example, one finds it difficult to move from impact at a techie level to leading business impacts at one stage. Another could be resting on one's oars because of some wins. This tendency to settle for the status quo has been the main challenge I have had to overcome each step of the way as I sought to add value and create and generate impact at every opportunity I have. Value to myself, the teams I lead, and teams led by others both horizontally and vertically in each organization I had the privilege to have been a part of both in work and non-work settings. Overcoming the challenges of transitioning from technical specialist to business leader has been made smoother through the numerous supports received from my family, colleagues, and business leaders I had the opportunity of working with. Tell us something more about Access Banking Group and its mission and vision. Access Bank, a wholly owned subsidiary of Access Holdings Plc ("Access Corporation"), is a leading full- service commercial bank operating through a network of more than 700 branches and service outlets, spanning 3 continents, 17 countries, and 45 million customers. Access Banking Group. has evolved from an obscure Nigerian Bank into a world-class African financial institution. Today, we are one of the five largest banks in Nigeria in terms of assets, loans, deposits, and branch network, a feat that has been achieved through a robust long-term approach to client solutions –
  • 13. providing committed and innovative advice. Access Bank continued its impressive growth trend, both organically and by acquisition, and quickly became one of Nigeria's leading corporate banks with a reputation for strong compliance, risk management, and trade finance. Our core values are set firmly on the following Leadership, Excellence, Empowered employees, Passion for customers, Professionalism, and Innovation. Our Vision - To be the world's most respected African bank Our Mission - Setting standards for sustainable business practices that unleash the talents of our employees, deliver superior value to our customers, and provide innovative solutions for the markets and communities we serve. Enlighten us on how you have impacted cybersecurity through your expertise in the market. I formerly held positions as the first Chair of the Standard and Evaluations Committee and a member of Nigeria's Cybercrime Advisory Council, both of which had the responsibility of implementing cybersecurity throughout all Nigerian industries. The contributions at the forefront of my heart are positively impacting the African cybersecurity skillset and having professionals whose proficiency is at par with what you will find in the top cyber nations. Through interactions and contributions, my contributions to attaining strategic objectives, increasing value, and keeping information safe have been recognized by my country and the business community. I have a leading position among the most enthusiastic and outstanding leaders of thought on cybersecurity & governance in Africa. For example, contributions and recognitions such as Outstanding Cybersecurity Woman Leader 2020, Women in Cybersecurity Award (WiCA) by Cyber in Africa. I was the first woman in the world to win the Global Certified CISO (G C|CISO) of the Year 2017 from the EC-Council in the USA. and a member of the Global CCISO Advisory Board, EC-Council, USA. Describe in detail the values and the work culture that drives Access Banking Group. Our core values underlie everything we do, and these are reflected in our everyday interactions at Access Banking Group. At the forefront, we can be seen leading positively in each dimension of corporate impact. We lead by taking the right steps, constantly improving, and habituation. For use, excellence becomes a habit and an effortless action. So, through our targeted training and empowerment, our employees reflect intuitively on their passion for customers. Our customers feel the warmth of our professionalism, and mutually, we work together to grow their businesses and aspirations. The outcome is that together we grow, seek out better solutions, and drive sustainable innovation for our customers for a positive impact globally and through Africa.
  • 14. Undeniably, technology is playing a significant role in almost every sector. How are you leveraging technological advancements to make your solutions resourceful? Technology is a driving force in our business. Efficiency and the ability to reach a wider market are a few of the values we have enabled through making digital technology work for us. We understand that technology is a tool; hence, we ensure our employees are well grounded and trained so we can have the winning combination of people, processes, and technology to drive innovation and creativity. Security is a tool, and with relevant automation, implementing solutions has become seamless. Many things can now be done with little or no supervision, thereby allowing us to maximize time and yield more positive results. What change would you like to bring to the cybersecurity industry if given a chance? Artificial intelligence (AI), Blockchain technologies, and Machine Learning (ML) are making it easier to make informed decisions more quickly, use cases to enhance trust, and enhanced predictive analysis; however, we would like to see greater interoperability in log data formats and its processing to reduce the man work that goes into the architecting to make it more seamless. Work has begun in this respect at a global level, but I would like to see an acceleration of these efforts. What, according to you, could be the next significant change in the cybersecurity sector? How is Access Banking Group preparing to be a part of that change? Advances in quantum technology promise to bring major changes, and globally there are concerns about what the massive increase in computing ability may bring. We are preparing for this both from the risk and opportunity perspective. One of our risk mitigation actions is embracing quantum-safe cryptography and creating awareness of why this needs to be considered and brought closer to the horizon. On the opportunity side, we see potential and look forward to driving greater innovation as the technology becomes more accessible. Where do you envision yourself to be in the long run, and what are your future goals for Access Banking Group? Making a greater impact, remaining a globally sought Cybersecurity & Information Risk Management expert, and championing the sustainable use of technology, AI, and Quantum technologies in a safe, ethical, and sustainable way. While I continue to work as an integral part of ensuring the strategy and business objectives of Access Banking Group are always achieved. What would be your advice to budding entrepreneurs aspiring to venture into cybersecurity? My advice to them would be to never stop learning. Cybersecurity is a fast-growing field; new threats are being discovered daily. You must be at the top of your game. Secondly, we need more entrepreneurs in cyberspace. I will encourage African entrepreneurs and skilled cyber professionals to synergize, create products, and tap into the global cybersecurity market to drive greater derivable value from an African perspective.
  • 15. 1 Year 12 Issues $250 6 Months 6 Issues $130 3 Months 3 Issues $70 1 Month 1 Issue $25 CHOOSE OUR SUBSCRIPTION Stay in the known. Subscribe to CIOLOOK Get CIOLOOK Magazine in print, and digital on www.ciolook.com
  • 16. By nature, we are all going to face challenges, just that individual challenges might differ from each other. But what kept me going regardless of things I was facing is ‘determination. Akinlawon Babajide Fayokun, Ethical Hacker Boch Systems West Africa | October 2022 | www.ciolook.com 14
  • 17. Babajide Fayokun Akinlawon An Ascension of Determination T he ladder to success often comes with some steps missing. In those times, it is the simple determination that carries forward, even as resources fall short, because grit sees obstacles to overcome, rather than just dead ends. Living this truth is Akinlawon Babajide Fayokun, working as an Ethical Hacker at Boch Systems West Africa. Akinlawon is a cybersecurity expert specializing in penetration testing. He encounters dead ends, threats, and cyber-attacks on a daily basis, but he meets them with equanimity and a resolve to succeed. Akinlawon is skilled in deterring, identifying, containing, investigating, and preventing cyber-attacks on the network, endpoints, and the web. He performs comprehensive computer surveillance/monitoring and identifies vulnerabilities and processes to ensure the confidentiality, integrity, and availability of agency information resources. He is also proficient in vulnerability assessment & penetration testing, threat hunting, malware analysis, threat intelligence, email analysis, computer networking, data loss prevention, incident response, and improving soc processes by utilizing top industry security solutions. Akinlawon Babajide Fayokun, in an exclusive interview with Insights Success, relates a journey of encountering challenges with a firm resolution to succeed. Being a Self-Starter “I’m a self-motivated and goal-oriented cyber security expert,” begins Akinlawon, “I started my journey as a cisco network engineer, where I managed a medium-scale network infrastructure.” He continues, “My business leadership skill grew more when I started handling the entire IT infrastructure budget. This was initially difficult because sometimes the management would assign a budget that was hard to adhere to, but it really built my budget management skills.” Due to the rate of unemployment and the demand for IT skills, Akinlawon created a service named ‘Space Block Technology.’ Here he trained people on IT skills, mentored beginners in cybersecurity & software development, and also offered buying and selling services for computer accessories. Currently, Akinlawon is working at Boch Systems as a full-time Ethical hacker (Penetration Tester), where he performs authorized security testing on computer systems in order to expose weaknesses. Challenges as Stepping Stones Akinlawon says, “By nature, we are all going to face challenges, just that individual challenges might differ from each other. But what kept me going regardless of things I was facing is ‘determination.’” Even when he was yet to have his own personal laptop, Akinlawon would borrow laptops from his friends to study. Sometimes he would go down to the cybercafé and spend nights there to learn and do his online labs simply because he was so determined. “Another challenge I encountered was society because we all come from different societies and have different beliefs and cultures. One thing that can affect his or her growth is society, so I make sure I focus on the positive side and see myself beyond my society.” BOCH Systems West Africa Founded in 2006, Boch Systems Company Limited (BOCH) is a leading premium provider of business technology integration. Its mission is to provide professional and quality service delivery on information and communication technology that is reliable, timely, and cost-effective; to its esteemed clients through a highly skilled and dedicated workforce, partners, and technology, returning value to its stakeholders. 10 Most Influential Leaders in Cybersecurity, 2022 | October 2022 | www.ciolook.com 15
  • 18. The business is founded on three core pillars of Trust, Experience, and Dedication. It has four core values: Leadership, Excellence, Proactive, and Passion. Employees are encouraged to share these core values in order to achieve desired levels of business and individual performance. Leadership: We are committed to being a benchmark and reference point in our operating space. Excellence: We commit to the highest possible standards of service delivery. Proactive: We are committed to consciously creating the future we desire for our clients, staff, and all stakeholders. Passion: We are excited about what we do and the opportunities that abound by leveraging the power of technology. Skills for Impact Akinlawon uses his skills to leave an impact on this world. He says, “I have used my knowledge and skills of cybersecurity to change people's lives by training and mentoring the youth on cybersecurity skills, supporting people on various challenges, defending and preventing cyberattacks on enterprises, undertaking vulnerability assessment and penetration testing on government infrastructure, financial/fintech institutes, law firms, etc.” Akinlawon is also the chapter leader of OWASP (Open Web Application Security Project) in his region (Lagos chapter). There he supports and helps software developers in solving security challenges, helps youngsters learn secure coding best practices, and does application vulnerability assessments & penetration testing. Creating Optimized Solutions The digital world is now going completely into automation simply because it helps in solving several IT problems and makes work faster. Akinlawon also often uses technological advancements to enhance his cybersecurity solutions. He says, “Just recently, I found myself in a very large financial institution where I was meant to perform security testing. To not waste time, I developed an automated network IP scan with PowerShell scripts.” Building a Secure Practice In Akinlawon’s opinion, no system is 100% secure but cybersecurity regulations should be constantly done to see if the organization is regularly abiding by best practices for security. There should be more focus on the people than the technology because humans often are the weakest link. | October 2022 | www.ciolook.com 16
  • 19.
  • 20. Mr. Ahmed Zebeib, Deputy Chief Executive Officer, QLM Qatar Life & Medical Insurance ackground: QLM Life and Medical Insurance is Bconsidered as the largest health insurance company in Qatar and the only specialized company that leads the health insurance sector through its advanced services and flexible insurance programs that suit all segments of society in Qatar. We live in a world that has become highly dependent on information technology in management, especially with managing a large volume of data, as is the case in health insurance. Therefore, our vision in this field was to develop a system capable of absorbing any volume of data and managing it effectively in the most efficient way possible. This will, in turn, positively reflect on the speed of responding to the requirements of our customers and the requirements of medical service providers at the same time. The advancement of technology benefit both insured members and insurance companies; QLM is no exception. QLM is constantly innovating and growing; we capitalized on the extensive data, experience, and technology advancement to build an outstanding insurtech to guarantee excellence in our services. At the same time, it gives us a real time feedback on operations. The development of our solutions was highly sophisticated as it involved many parties internally as well as externally. We’ve invested in developing a highly sophisticated solution involving both internal and external parties. We managed to build a system through an interactive electronic platform that automatically approves without the need for human intervention except in rare cases, which shortens the time for issuing approval to a record time where the patient experiences a seamless process. This electronic platform helps health centers communicate, get the right information, and make the whole transaction an easy journey for both parties. All this is in the interest of the client/patient, who will feel that they are receiving prompt and a high standard of service. Today, our systems are all online and fully integrated with healthcare providers inside as well as outside Qatar; the provider can at a fingertip verify eligibility, obtain approval, and submit a claim all online without the need for any direct interaction with our team. The secret behind this is the claims auto-approval/auto- adjudication; our systems are equipped with all international medical coding that are mapped together in the back end of the system. Therefore, any coding the provider is using is mapped and auto adjudicated in the back end, and the decision is communicated to the provider by the system. The crown jewel of our IT platform is the Artificial intelligence (AI) that we have developed. Underwriting in health insurance is always seen as risky and needs extra attention; our AI module analyzes the data provided by the client and, at the same time, analyzes the existing QLM data measuring behavior, trend, frequency, etc. Thus, suggesting an appropriate premium with the prediction of a loss ratio based on the suggested premium. Our AI is constantly monitoring the behavior of providers in real-time and alerting our team of any | October 2022 | www.ciolook.com 18
  • 21. abnormal behavior that is taking place; it is monitoring the auto-adjudication module and correcting any errors that may exist during the process. We are constantly evolving and growing as the leading Medical and Life insurer in Qatar; as we rely heavily on tech, we will continue investing where appropriate to maximize the satisfaction of all our partners. In QLM, we believe that insurtech is the present and future. We will continue playing our role and assessing the markets worldwide while simultaneously be at the forefront when it comes to tech and for others to follow. Mr. Ahmed Zebeib, Deputy Chief Execu ve Officer, QLM Qatar Life & Medical Insurance | October 2022 | www.ciolook.com 19
  • 22. ChristopherLeigh Exhibiting Brilliance with Sheer Expertise o act requires comprehension first. Although Tbusinesses are facing increasing cyber threats from every direction in modern times, the expertise needed to understand the threat is scarce at the C-level associateship. This predominantly affects the strategic planning of the organization, and being underprepared for a business, becomes a major source of risk with a liability. An understanding of what a cybersecurity threat means for the business and the solutions it needs to adopt to mitigate the risk is required. This is what Christopher Leigh, the Chief Information Security Officer at Eversource, has been striving to achieve. He has been leveraging his expertise to communicate effectively and translate the cybersecurity lexicon into business speak. Christopher has over two decades of domestic and global experience in leading cybersecurity teams. He has a strong background in building and expanding diverse internal cyber security programs, improving cultures of security, and communicating risk reductions through all management levels of the company. Currently, he is responsible for all aspects of information security, including Threat and Risk Management, Policy and Compliance, architecture, and Incident Response. Christopher is also an adjunct professor at Central Connecticut State University and Boston College. He alsosits on the Board of Directors for Community Solutions, Incorporated, where he continues to endeavor to disseminate knowledge on the topic of cybersecurity and corporate leadership. Christopher is a high-energy, customer-focused cyber and corporate executive with over multiple years of global experience in safeguarding the company's systems and data in the electric, gas, and aerospace industries. He was named one of the 'Top 100 CISOs' by Cyber Defense Awards in 2020. CIOLook caught up with Christopher in an exclusive interview regarding cybersecurity's importance in the modern world. Below are the highlights of the interview: Chris, please brief our audience on your journey to being the CISO at Eversource. What challenges have you had to overcome to reach where you are today? My career has been focused on the Aerospace and Defense and Electric/Natural Gas utility industries. I have been in the Information Technology field for over 20 years, spending the last 18 years in cyber security. Having Finance and, subsequently, IT experience has helped me develop a balance between technology and business. Many IT security leaders have strong technical skills. However, if you can't understand business issues and communicate the risk to the business, then you will never be adequate. I would say that over the past five to ten years, management has begun to value the CISO because we are able to communicate with business leaders. So, I appreciate everyone who has coached and mentored me throughout the years to help me get to where I am now. Can you guide us about the Eversource mission and vision? Eversource is the provider of the largest electric, natural gas, and water utilities in New England, servicing over 4 million customers across the states of Connecticut, Massachusetts, and New Hampshire. Our corporate vision is to continue to deliver safe and reliable electricity, natural gas, and water to our customers. We also plan to be carbon neutral by 2030. Because our employees live in our service territory, they are members of the communities we serve. Our greatest asset, our employees, spend significant time volunteering in the community. All of these efforts will result in a cleaner, more reliable energy future. | October 2022 | www.ciolook.com 20
  • 23. Christopher (Chris) Leigh, Chief Information Security Officer Eversource Having a Finance and, subsequently, IT experience has helped me develop a balance between technology and business. | October 2022 | www.ciolook.com 21
  • 24. Please enlighten us on the contributions you have made in the cybersecurity sector. My contributions to the cyber security industry are varied. In addition to my primary job at Eversource, I have focused on educating the future workforce through teaching at the undergraduate and graduate levels. Education of the future workforce, through real- life experiences, can help students connect the dots between the textbook and the real world. By getting to know the students, we are also able to identify interns who most often become employees after graduation. I have also been able to work with industry and government officials to increase the amount and quality of threat intelligence that is shared between the government and the industry. This sharing of information allows organizations to better understand the threats and subsequently prepare to prevent and or respond when they occur. Will you tell us about the values and the work culture that drives Eversource? We value dedication to our communities and customers. Our diverse employees are dedicated and committed to delivering the best service possible. In the office, we strive to have a balanced work-life environment. This commitment ensures we deliver on our objectives to serve. Undeniably, technology is playing a significant role in almost every sector. How are you leveraging technological advancements to make your solutions resourceful? The Electric, Gas, and Water industries leverage technology to deliver high-quality, reliable services to our customers. We are enabled through technology to manage the power grid better and ensure safe water and natural gas delivery. The available information allows are control operators to react faster to changing events and to make more informed decisions. Technology also enables us to communicate through different channels with our customers. Our customers are using technology to access their information and to interact with our employees. However, some customers prefer to talk to a person or interact over the phone. Providing different options enables us to reachout to more people on their preferred methods. What change would you like to bring to the cybersecurity industry if given a chance? Electric, Gas, and Water industries are considered to be part of the Critical Infrastructure by the Department of Homeland Security. The industry and the Federal Government need to continue to improve their relationships and share more information to make informed decisions and to secure their systems better. What, according to you, could be the next significant change in the cybersecurity sector? How is your company preparing to be a part of that change? Across the world, organizations are facing various supply chain challenges. This ranges from access to technology to the security of the technology being acquired. In my opinion, industries and companies such as Eversource will continue to work with suppliers and vendors to ensure they are following best practices for producing reliable and secure products. There also needs to be improved information sharing on vulnerabilities. While there is a need to have a fix developed when announcing a vulnerability, many nation-states already know of these vulnerabilities before they are public. If the vendor can make the industry aware while they are finding a fix, then monitoring and mitigating controls can be developed. We have to work together to fight the adversary who wants to do us harm. Where do you envision yourself to be in the long run, and what are your future goals? I am very fortunate to be doing exactly what I want. Eversource is one of the best companies to work for. My work is challenging and rewarding. I have an excellent work-life balance, and the time I spend volunteering and teaching at the college level is personally satisfying. I hope to be doing exactly what I am doing for many more years, helping others. What would be your advice to budding entrepreneurs who aspire to venture into the cybersecurity sector? I would suggest to first know yourself and your likes and dislikes. Then find the path that best fits you. We need to be curious, humble, and always willing to learn and grow. Even the most senior executive must always be willing to learn and develop professionally and personally. | October 2022 | www.ciolook.com 22
  • 25.
  • 26.
  • 27. | October 2022 | www.ciolook.com 25
  • 28. | October 2022 | www.ciolook.com 26
  • 29.
  • 30. | October 2022 | www.ciolook.com 28
  • 31.
  • 32.
  • 33.